"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-04-05 01:01:34 +00:00
parent 2f1042dc3f
commit e9198a1da4
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
44 changed files with 723 additions and 273 deletions

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-45894",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-45894",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in Softwarebuero Zauner ARC 4.2.0.4. There is Cleartext Transmission of Sensitive Information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://syss.de",
"refsource": "MISC",
"name": "https://syss.de"
},
{
"refsource": "MISC",
"name": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-066.txt",
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-066.txt"
}
]
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0452",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1284584"
"url": "https://crbug.com/1284584",
"refsource": "MISC",
"name": "https://crbug.com/1284584"
},
{
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0453",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1284916"
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1284916",
"refsource": "MISC",
"name": "https://crbug.com/1284916"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0454",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1287962"
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1287962",
"refsource": "MISC",
"name": "https://crbug.com/1287962"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0455",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1270593"
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1270593",
"refsource": "MISC",
"name": "https://crbug.com/1270593"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0456",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1289523"
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1289523",
"refsource": "MISC",
"name": "https://crbug.com/1289523"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0457",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1274445"
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1274445",
"refsource": "MISC",
"name": "https://crbug.com/1274445"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0458",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1267060"
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1267060",
"refsource": "MISC",
"name": "https://crbug.com/1267060"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0459",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1244205"
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1244205",
"refsource": "MISC",
"name": "https://crbug.com/1244205"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0460",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1250227"
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1250227",
"refsource": "MISC",
"name": "https://crbug.com/1250227"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0461",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1256823"
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1256823",
"refsource": "MISC",
"name": "https://crbug.com/1256823"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0462",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1270470"
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1270470",
"refsource": "MISC",
"name": "https://crbug.com/1270470"
}
]
},
@ -56,8 +61,8 @@
"description_data": [
{
"lang": "eng",
"value": "Inappropriate implementation in Scroll in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page."
"value": "Inappropriate implementation in Scroll in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page."
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0463",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1268240"
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1268240",
"refsource": "MISC",
"name": "https://crbug.com/1268240"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0464",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1270095"
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1270095",
"refsource": "MISC",
"name": "https://crbug.com/1270095"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0465",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1281941"
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1281941",
"refsource": "MISC",
"name": "https://crbug.com/1281941"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0466",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1115460"
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1115460",
"refsource": "MISC",
"name": "https://crbug.com/1115460"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0467",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1239496"
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1239496",
"refsource": "MISC",
"name": "https://crbug.com/1239496"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0468",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1252716"
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1252716",
"refsource": "MISC",
"name": "https://crbug.com/1252716"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0469",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1279531"
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1279531",
"refsource": "MISC",
"name": "https://crbug.com/1279531"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0470",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1269225"
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1269225",
"refsource": "MISC",
"name": "https://crbug.com/1269225"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0789",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1289383"
"url": "https://crbug.com/1289383",
"refsource": "MISC",
"name": "https://crbug.com/1289383"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0790",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1274077"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1274077",
"refsource": "MISC",
"name": "https://crbug.com/1274077"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0791",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1278322"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1278322",
"refsource": "MISC",
"name": "https://crbug.com/1278322"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0792",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1285885"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1285885",
"refsource": "MISC",
"name": "https://crbug.com/1285885"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0793",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1291728"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1291728",
"refsource": "MISC",
"name": "https://crbug.com/1291728"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0794",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1294097"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1294097",
"refsource": "MISC",
"name": "https://crbug.com/1294097"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0795",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1282782"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1282782",
"refsource": "MISC",
"name": "https://crbug.com/1282782"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0796",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1295786"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1295786",
"refsource": "MISC",
"name": "https://crbug.com/1295786"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0797",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1281908"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1281908",
"refsource": "MISC",
"name": "https://crbug.com/1281908"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0798",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1283402"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1283402",
"refsource": "MISC",
"name": "https://crbug.com/1283402"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0799",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1279188"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1279188",
"refsource": "MISC",
"name": "https://crbug.com/1279188"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0800",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1242962"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1242962",
"refsource": "MISC",
"name": "https://crbug.com/1242962"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0802",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1270052"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1270052",
"refsource": "MISC",
"name": "https://crbug.com/1270052"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0803",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1280233"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1280233",
"refsource": "MISC",
"name": "https://crbug.com/1280233"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0804",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1264561"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1264561",
"refsource": "MISC",
"name": "https://crbug.com/1264561"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0805",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1290700"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1290700",
"refsource": "MISC",
"name": "https://crbug.com/1290700"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0806",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1283434"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1283434",
"refsource": "MISC",
"name": "https://crbug.com/1283434"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0807",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1287364"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1287364",
"refsource": "MISC",
"name": "https://crbug.com/1287364"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0808",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1292271"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1292271",
"refsource": "MISC",
"name": "https://crbug.com/1292271"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0809",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1293428"
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1293428",
"refsource": "MISC",
"name": "https://crbug.com/1293428"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -1,100 +1,104 @@
{
"CVE_data_meta": {
"ASSIGNER": "product-cna@github.com",
"ID": "CVE-2022-23732",
"STATE": "PUBLIC",
"TITLE": "Path traversal in GitHub Enterprise Server management console leading to a bypass of CSRF protections"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "GitHub Enterprise Server",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "3.1",
"version_value": "3.1.19"
"CVE_data_meta": {
"ASSIGNER": "product-cna@github.com",
"ID": "CVE-2022-23732",
"STATE": "PUBLIC",
"TITLE": "Path traversal in GitHub Enterprise Server management console leading to a bypass of CSRF protections"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "GitHub Enterprise Server",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "3.1",
"version_value": "3.1.19"
},
{
"version_affected": "<",
"version_name": "3.2",
"version_value": "3.2.11"
},
{
"version_affected": "<",
"version_name": "3.3",
"version_value": "3.3.6"
},
{
"version_affected": "<",
"version_name": "3.4",
"version_value": "3.4.1"
}
]
}
}
]
},
{
"version_affected": "<",
"version_name": "3.2",
"version_value": "3.2.11"
},
{
"version_affected": "<",
"version_name": "3.3",
"version_value": "3.3.6"
},
{
"version_affected": "<",
"version_name": "3.4",
"version_value": "3.4.1"
}
]
"vendor_name": "GitHub"
}
}
]
},
"vendor_name": "GitHub"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "bitquark"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A path traversal vulnerability was identified in GitHub Enterprise Server management console that allowed the bypass of CSRF protections. This could potentially lead to privilege escalation. To exploit this vulnerability, an attacker would need to target a user that was actively logged into the management console. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.5 and was fixed in versions 3.1.19, 3.2.11, 3.3.6, 3.4.1. This vulnerability was reported via the GitHub Bug Bounty program."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
},
"credit": [
{
"lang": "eng",
"value": "CWE-23, CWE-352"
}
"value": "bitquark"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A path traversal vulnerability was identified in GitHub Enterprise Server management console that allowed the bypass of CSRF protections. This could potentially lead to privilege escalation. To exploit this vulnerability, an attacker would need to target a user that was actively logged into the management console. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.5 and was fixed in versions 3.1.19, 3.2.11, 3.3.6, 3.4.1. This vulnerability was reported via the GitHub Bug Bounty program."
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://docs.github.com/en/enterprise-server@3.1/admin/release-notes#3.1.19"
},
{
"refsource": "CONFIRM",
"url": "https://docs.github.com/en/enterprise-server@3.2/admin/release-notes#3.2.11"
},
{
"refsource": "CONFIRM",
"url": "https://docs.github.com/en/enterprise-server@3.3/admin/release-notes#3.3.6"
},
{
"refsource": "CONFIRM",
"url": "https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.1"
}
]
},
"source": {
"discovery": "INTERNAL"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-23, CWE-352"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://docs.github.com/en/enterprise-server@3.1/admin/release-notes#3.1.19",
"name": "https://docs.github.com/en/enterprise-server@3.1/admin/release-notes#3.1.19"
},
{
"refsource": "MISC",
"url": "https://docs.github.com/en/enterprise-server@3.2/admin/release-notes#3.2.11",
"name": "https://docs.github.com/en/enterprise-server@3.2/admin/release-notes#3.2.11"
},
{
"refsource": "MISC",
"url": "https://docs.github.com/en/enterprise-server@3.3/admin/release-notes#3.3.6",
"name": "https://docs.github.com/en/enterprise-server@3.3/admin/release-notes#3.3.6"
},
{
"refsource": "MISC",
"url": "https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.1",
"name": "https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.1"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}

View File

@ -1,17 +1,131 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-25584",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-25584",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Seyeon Tech Co., Ltd FlexWATCH FW3170-PS-E Network Video System 4.23-3000_GY allows attackers to access sensitive information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://211.174.227.102:10001/app/multi/single.asp",
"refsource": "MISC",
"name": "http://211.174.227.102:10001/app/multi/single.asp"
},
{
"url": "http://211.240.10.38:10001/app/multi/single.asp",
"refsource": "MISC",
"name": "http://211.240.10.38:10001/app/multi/single.asp"
},
{
"url": "http://121.133.21.35:10001/app/multi/single.asp",
"refsource": "MISC",
"name": "http://121.133.21.35:10001/app/multi/single.asp"
},
{
"url": "http://211.174.227.102:10001/app/multi/single.asp.aa",
"refsource": "MISC",
"name": "http://211.174.227.102:10001/app/multi/single.asp.aa"
},
{
"url": "http://211.240.10.38:10001/app/multi/single.asp.ab",
"refsource": "MISC",
"name": "http://211.240.10.38:10001/app/multi/single.asp.ab"
},
{
"url": "http://121.133.21.35:10001/app/multi/single.asp.ac",
"refsource": "MISC",
"name": "http://121.133.21.35:10001/app/multi/single.asp.ac"
},
{
"url": "http://211.174.227.230:10001/app/multi/single.asp",
"refsource": "MISC",
"name": "http://211.174.227.230:10001/app/multi/single.asp"
},
{
"url": "http://211.36.62.253:10001/app/multi/single.asp",
"refsource": "MISC",
"name": "http://211.36.62.253:10001/app/multi/single.asp"
},
{
"url": "http://118.176.196.247:10001/app/multi/single.asp",
"refsource": "MISC",
"name": "http://118.176.196.247:10001/app/multi/single.asp"
},
{
"url": "http://183.100.61.196:10001/app/multi/single.asp",
"refsource": "MISC",
"name": "http://183.100.61.196:10001/app/multi/single.asp"
},
{
"url": "http://27.1.124.18:10001/app/multi/single.asp",
"refsource": "MISC",
"name": "http://27.1.124.18:10001/app/multi/single.asp"
},
{
"url": "http://115.142.194.178:10001/app/multi/single.asp",
"refsource": "MISC",
"name": "http://115.142.194.178:10001/app/multi/single.asp"
},
{
"url": "http://115.142.194.178:10001/app/multi/single.asp.ad",
"refsource": "MISC",
"name": "http://115.142.194.178:10001/app/multi/single.asp.ad"
},
{
"url": "http://210.223.145.159:10001/app/multi/single.asp",
"refsource": "MISC",
"name": "http://210.223.145.159:10001/app/multi/single.asp"
},
{
"refsource": "MISC",
"name": "https://github.com/NSSCYCTFER/Flexwatch",
"url": "https://github.com/NSSCYCTFER/Flexwatch"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-26585",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-26585",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Mingsoft MCMS v5.2.7 was discovered to contain a SQL injection vulnerability via /cms/content/list."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://gitee.com/mingSoft/MCMS/issues/I4W1S9",
"refsource": "MISC",
"name": "https://gitee.com/mingSoft/MCMS/issues/I4W1S9"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-26619",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-26619",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Halo Blog CMS v1.4.17 was discovered to allow attackers to upload arbitrary files via the Attachment Upload function."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/halo-dev/halo/issues/1702",
"refsource": "MISC",
"name": "https://github.com/halo-dev/halo/issues/1702"
}
]
}