From eec99f740354ed817f825a57193b5802d84b88e9 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 4 Mar 2022 15:01:15 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/18xxx/CVE-2020-18324.json | 66 ++++++++++++++++++++++++++++++---- 2020/18xxx/CVE-2020-18325.json | 66 ++++++++++++++++++++++++++++++---- 2020/18xxx/CVE-2020-18326.json | 66 ++++++++++++++++++++++++++++++---- 2020/18xxx/CVE-2020-18327.json | 61 +++++++++++++++++++++++++++---- 2021/46xxx/CVE-2021-46378.json | 61 +++++++++++++++++++++++++++---- 2022/0xxx/CVE-2022-0849.json | 18 ++++++++++ 2022/0xxx/CVE-2022-0850.json | 18 ++++++++++ 2022/0xxx/CVE-2022-0851.json | 18 ++++++++++ 2022/0xxx/CVE-2022-0852.json | 18 ++++++++++ 2022/0xxx/CVE-2022-0853.json | 18 ++++++++++ 2022/0xxx/CVE-2022-0854.json | 18 ++++++++++ 2022/0xxx/CVE-2022-0855.json | 18 ++++++++++ 2022/0xxx/CVE-2022-0856.json | 18 ++++++++++ 2022/0xxx/CVE-2022-0857.json | 18 ++++++++++ 2022/0xxx/CVE-2022-0858.json | 18 ++++++++++ 2022/0xxx/CVE-2022-0859.json | 18 ++++++++++ 2022/0xxx/CVE-2022-0860.json | 18 ++++++++++ 2022/0xxx/CVE-2022-0861.json | 18 ++++++++++ 2022/0xxx/CVE-2022-0862.json | 18 ++++++++++ 2022/0xxx/CVE-2022-0863.json | 18 ++++++++++ 2022/0xxx/CVE-2022-0864.json | 18 ++++++++++ 2022/23xxx/CVE-2022-23397.json | 56 +++++++++++++++++++++++++---- 2022/26xxx/CVE-2022-26476.json | 18 ++++++++++ 23 files changed, 646 insertions(+), 36 deletions(-) create mode 100644 2022/0xxx/CVE-2022-0849.json create mode 100644 2022/0xxx/CVE-2022-0850.json create mode 100644 2022/0xxx/CVE-2022-0851.json create mode 100644 2022/0xxx/CVE-2022-0852.json create mode 100644 2022/0xxx/CVE-2022-0853.json create mode 100644 2022/0xxx/CVE-2022-0854.json create mode 100644 2022/0xxx/CVE-2022-0855.json create mode 100644 2022/0xxx/CVE-2022-0856.json create mode 100644 2022/0xxx/CVE-2022-0857.json create mode 100644 2022/0xxx/CVE-2022-0858.json create mode 100644 2022/0xxx/CVE-2022-0859.json create mode 100644 2022/0xxx/CVE-2022-0860.json create mode 100644 2022/0xxx/CVE-2022-0861.json create mode 100644 2022/0xxx/CVE-2022-0862.json create mode 100644 2022/0xxx/CVE-2022-0863.json create mode 100644 2022/0xxx/CVE-2022-0864.json create mode 100644 2022/26xxx/CVE-2022-26476.json diff --git a/2020/18xxx/CVE-2020-18324.json b/2020/18xxx/CVE-2020-18324.json index b5443936683..1856f213270 100644 --- a/2020/18xxx/CVE-2020-18324.json +++ b/2020/18xxx/CVE-2020-18324.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-18324", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-18324", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.1 via the q parameter in the Kickstart template." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://subrion.com", + "refsource": "MISC", + "name": "http://subrion.com" + }, + { + "url": "http://intelliants.com", + "refsource": "MISC", + "name": "http://intelliants.com" + }, + { + "refsource": "MISC", + "name": "https://github.com/hamm0nz/CVE-2020-18324", + "url": "https://github.com/hamm0nz/CVE-2020-18324" } ] } diff --git a/2020/18xxx/CVE-2020-18325.json b/2020/18xxx/CVE-2020-18325.json index 6e2473ef9ab..7f540119739 100644 --- a/2020/18xxx/CVE-2020-18325.json +++ b/2020/18xxx/CVE-2020-18325.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-18325", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-18325", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multilple Cross Site Scripting (XSS) vulnerability exists in Intelliants Subrion CMS v4.2.1 in the Configuration panel." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://subrion.com", + "refsource": "MISC", + "name": "http://subrion.com" + }, + { + "url": "http://intelliants.com", + "refsource": "MISC", + "name": "http://intelliants.com" + }, + { + "refsource": "MISC", + "name": "https://github.com/hamm0nz/CVE-2020-18325", + "url": "https://github.com/hamm0nz/CVE-2020-18325" } ] } diff --git a/2020/18xxx/CVE-2020-18326.json b/2020/18xxx/CVE-2020-18326.json index e8e5a704674..afbe05f957c 100644 --- a/2020/18xxx/CVE-2020-18326.json +++ b/2020/18xxx/CVE-2020-18326.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-18326", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-18326", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Request Forgery (CSRF) vulnerability exists in Intelliants Subrion CMS v4.2.1 via the Members administrator function, which could let a remote unauthenticated malicious user send an authorised request to victim and successfully create an arbitrary administrator user." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://subrion.com", + "refsource": "MISC", + "name": "http://subrion.com" + }, + { + "url": "http://intelliants.com", + "refsource": "MISC", + "name": "http://intelliants.com" + }, + { + "refsource": "MISC", + "name": "https://github.com/hamm0nz/CVE-2020-18326", + "url": "https://github.com/hamm0nz/CVE-2020-18326" } ] } diff --git a/2020/18xxx/CVE-2020-18327.json b/2020/18xxx/CVE-2020-18327.json index 1923bfa1c19..3c2eb25a3f2 100644 --- a/2020/18xxx/CVE-2020-18327.json +++ b/2020/18xxx/CVE-2020-18327.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-18327", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-18327", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting (XSS) vulnerability exists in Alfresco Alfresco Community Edition v5.2.0 via the action parameter in the alfresco/s/admin/admin-nodebrowser API. Fixed in v6.2" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.cvedetails.com/vulnerability-list/vendor_id-13372/product_id-27784/opxss-1/Alfresco-Alfresco.html", + "refsource": "MISC", + "name": "https://www.cvedetails.com/vulnerability-list/vendor_id-13372/product_id-27784/opxss-1/Alfresco-Alfresco.html" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/paatui/a3c7ca8cf12594b437d3854f13d76cb8", + "url": "https://gist.github.com/paatui/a3c7ca8cf12594b437d3854f13d76cb8" } ] } diff --git a/2021/46xxx/CVE-2021-46378.json b/2021/46xxx/CVE-2021-46378.json index 27573ce374d..2e55f95d075 100644 --- a/2021/46xxx/CVE-2021-46378.json +++ b/2021/46xxx/CVE-2021-46378.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-46378", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-46378", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "DLink DIR850 ET850-1.08TRb03 is affected by an incorrect access control vulnerability through an unauthenticated remote configuration download." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.dlink.com/en/security-bulletin/", + "refsource": "MISC", + "name": "https://www.dlink.com/en/security-bulletin/" + }, + { + "url": "https://drive.google.com/file/d/1S69wOovVa8NRVUXcB0PkVvZHFxREcD4Y/view?usp=sharing", + "refsource": "MISC", + "name": "https://drive.google.com/file/d/1S69wOovVa8NRVUXcB0PkVvZHFxREcD4Y/view?usp=sharing" } ] } diff --git a/2022/0xxx/CVE-2022-0849.json b/2022/0xxx/CVE-2022-0849.json new file mode 100644 index 00000000000..d692668c74c --- /dev/null +++ b/2022/0xxx/CVE-2022-0849.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0849", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0850.json b/2022/0xxx/CVE-2022-0850.json new file mode 100644 index 00000000000..53aed56629d --- /dev/null +++ b/2022/0xxx/CVE-2022-0850.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0850", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0851.json b/2022/0xxx/CVE-2022-0851.json new file mode 100644 index 00000000000..e8cdb5d5666 --- /dev/null +++ b/2022/0xxx/CVE-2022-0851.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0851", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0852.json b/2022/0xxx/CVE-2022-0852.json new file mode 100644 index 00000000000..dbe934919ba --- /dev/null +++ b/2022/0xxx/CVE-2022-0852.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0852", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0853.json b/2022/0xxx/CVE-2022-0853.json new file mode 100644 index 00000000000..7f6ef07058d --- /dev/null +++ b/2022/0xxx/CVE-2022-0853.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0853", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0854.json b/2022/0xxx/CVE-2022-0854.json new file mode 100644 index 00000000000..38ab6ce280e --- /dev/null +++ b/2022/0xxx/CVE-2022-0854.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0854", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0855.json b/2022/0xxx/CVE-2022-0855.json new file mode 100644 index 00000000000..59b3a0f3813 --- /dev/null +++ b/2022/0xxx/CVE-2022-0855.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0855", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0856.json b/2022/0xxx/CVE-2022-0856.json new file mode 100644 index 00000000000..b78d5aec58e --- /dev/null +++ b/2022/0xxx/CVE-2022-0856.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0856", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0857.json b/2022/0xxx/CVE-2022-0857.json new file mode 100644 index 00000000000..50a5182bf00 --- /dev/null +++ b/2022/0xxx/CVE-2022-0857.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0857", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0858.json b/2022/0xxx/CVE-2022-0858.json new file mode 100644 index 00000000000..feae0fe15b9 --- /dev/null +++ b/2022/0xxx/CVE-2022-0858.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0858", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0859.json b/2022/0xxx/CVE-2022-0859.json new file mode 100644 index 00000000000..16e9921d112 --- /dev/null +++ b/2022/0xxx/CVE-2022-0859.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0859", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0860.json b/2022/0xxx/CVE-2022-0860.json new file mode 100644 index 00000000000..75a54989a0c --- /dev/null +++ b/2022/0xxx/CVE-2022-0860.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0860", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0861.json b/2022/0xxx/CVE-2022-0861.json new file mode 100644 index 00000000000..d1538acb794 --- /dev/null +++ b/2022/0xxx/CVE-2022-0861.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0861", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0862.json b/2022/0xxx/CVE-2022-0862.json new file mode 100644 index 00000000000..2c30241b582 --- /dev/null +++ b/2022/0xxx/CVE-2022-0862.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0862", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0863.json b/2022/0xxx/CVE-2022-0863.json new file mode 100644 index 00000000000..afd42deb0e2 --- /dev/null +++ b/2022/0xxx/CVE-2022-0863.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0863", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0864.json b/2022/0xxx/CVE-2022-0864.json new file mode 100644 index 00000000000..eabbdeed113 --- /dev/null +++ b/2022/0xxx/CVE-2022-0864.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0864", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23397.json b/2022/23xxx/CVE-2022-23397.json index cdcf8b63b8e..9cf7cad8562 100644 --- a/2022/23xxx/CVE-2022-23397.json +++ b/2022/23xxx/CVE-2022-23397.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-23397", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-23397", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Cedar Gate EZ-NET portal 6.5.5 6.8.0 Internet portal has a call to display messages to users which does not properly sanitize data sent in through a URL parameter. This leads to a Reflected Cross-Site Scripting vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://ado.im/cedar-gate-ez-net", + "refsource": "MISC", + "name": "https://ado.im/cedar-gate-ez-net" } ] } diff --git a/2022/26xxx/CVE-2022-26476.json b/2022/26xxx/CVE-2022-26476.json new file mode 100644 index 00000000000..0247a6f8d3c --- /dev/null +++ b/2022/26xxx/CVE-2022-26476.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26476", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file