From f781ddb626f0b0b62c38f3e7c24afd567519ef0f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 28 Feb 2022 23:01:21 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27000.json | 4 +-- 2021/36xxx/CVE-2021-36810.json | 4 +-- 2021/36xxx/CVE-2021-36811.json | 4 +-- 2021/36xxx/CVE-2021-36812.json | 4 +-- 2021/36xxx/CVE-2021-36813.json | 4 +-- 2021/36xxx/CVE-2021-36814.json | 4 +-- 2021/36xxx/CVE-2021-36815.json | 4 +-- 2021/36xxx/CVE-2021-36816.json | 4 +-- 2021/36xxx/CVE-2021-36817.json | 4 +-- 2021/36xxx/CVE-2021-36818.json | 4 +-- 2021/36xxx/CVE-2021-36819.json | 4 +-- 2021/36xxx/CVE-2021-36820.json | 4 +-- 2022/23xxx/CVE-2022-23906.json | 56 ++++++++++++++++++++++++++++++---- 2022/23xxx/CVE-2022-23907.json | 56 ++++++++++++++++++++++++++++++---- 2022/25xxx/CVE-2022-25028.json | 56 ++++++++++++++++++++++++++++++---- 2022/25xxx/CVE-2022-25029.json | 56 ++++++++++++++++++++++++++++++---- 2022/25xxx/CVE-2022-25407.json | 56 ++++++++++++++++++++++++++++++---- 2022/25xxx/CVE-2022-25408.json | 56 ++++++++++++++++++++++++++++++---- 2022/25xxx/CVE-2022-25409.json | 56 ++++++++++++++++++++++++++++++---- 2022/25xxx/CVE-2022-25410.json | 56 ++++++++++++++++++++++++++++++---- 2022/25xxx/CVE-2022-25411.json | 56 ++++++++++++++++++++++++++++++---- 2022/25xxx/CVE-2022-25412.json | 56 ++++++++++++++++++++++++++++++---- 2022/25xxx/CVE-2022-25413.json | 56 ++++++++++++++++++++++++++++++---- 23 files changed, 574 insertions(+), 90 deletions(-) diff --git a/2021/27xxx/CVE-2021-27000.json b/2021/27xxx/CVE-2021-27000.json index b2ba60a3ba9..46903dce3d2 100644 --- a/2021/27xxx/CVE-2021-27000.json +++ b/2021/27xxx/CVE-2021-27000.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2021-27000", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." } ] } diff --git a/2021/36xxx/CVE-2021-36810.json b/2021/36xxx/CVE-2021-36810.json index 91ef57a4679..6c9325a05b6 100644 --- a/2021/36xxx/CVE-2021-36810.json +++ b/2021/36xxx/CVE-2021-36810.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2021-36810", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." } ] } diff --git a/2021/36xxx/CVE-2021-36811.json b/2021/36xxx/CVE-2021-36811.json index 020479bb8f7..28ba1a9bc66 100644 --- a/2021/36xxx/CVE-2021-36811.json +++ b/2021/36xxx/CVE-2021-36811.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2021-36811", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." } ] } diff --git a/2021/36xxx/CVE-2021-36812.json b/2021/36xxx/CVE-2021-36812.json index d84533ba82b..9d2c01e4975 100644 --- a/2021/36xxx/CVE-2021-36812.json +++ b/2021/36xxx/CVE-2021-36812.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2021-36812", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." } ] } diff --git a/2021/36xxx/CVE-2021-36813.json b/2021/36xxx/CVE-2021-36813.json index 97bfb2f061c..3e627ab2d44 100644 --- a/2021/36xxx/CVE-2021-36813.json +++ b/2021/36xxx/CVE-2021-36813.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2021-36813", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." } ] } diff --git a/2021/36xxx/CVE-2021-36814.json b/2021/36xxx/CVE-2021-36814.json index 97d9d476c1d..6950686231c 100644 --- a/2021/36xxx/CVE-2021-36814.json +++ b/2021/36xxx/CVE-2021-36814.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2021-36814", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." } ] } diff --git a/2021/36xxx/CVE-2021-36815.json b/2021/36xxx/CVE-2021-36815.json index 2208367f2d6..2bb23acbbd3 100644 --- a/2021/36xxx/CVE-2021-36815.json +++ b/2021/36xxx/CVE-2021-36815.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2021-36815", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." } ] } diff --git a/2021/36xxx/CVE-2021-36816.json b/2021/36xxx/CVE-2021-36816.json index 1a09169997e..d2a47254de6 100644 --- a/2021/36xxx/CVE-2021-36816.json +++ b/2021/36xxx/CVE-2021-36816.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2021-36816", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." } ] } diff --git a/2021/36xxx/CVE-2021-36817.json b/2021/36xxx/CVE-2021-36817.json index ef314ce1d84..c523971bc73 100644 --- a/2021/36xxx/CVE-2021-36817.json +++ b/2021/36xxx/CVE-2021-36817.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2021-36817", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." } ] } diff --git a/2021/36xxx/CVE-2021-36818.json b/2021/36xxx/CVE-2021-36818.json index c4423f6ceaa..d1a684860a4 100644 --- a/2021/36xxx/CVE-2021-36818.json +++ b/2021/36xxx/CVE-2021-36818.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2021-36818", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." } ] } diff --git a/2021/36xxx/CVE-2021-36819.json b/2021/36xxx/CVE-2021-36819.json index d4b66f291be..3f530afcf88 100644 --- a/2021/36xxx/CVE-2021-36819.json +++ b/2021/36xxx/CVE-2021-36819.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2021-36819", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." } ] } diff --git a/2021/36xxx/CVE-2021-36820.json b/2021/36xxx/CVE-2021-36820.json index 5f069e2da19..b19fd1e86e8 100644 --- a/2021/36xxx/CVE-2021-36820.json +++ b/2021/36xxx/CVE-2021-36820.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2021-36820", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." } ] } diff --git a/2022/23xxx/CVE-2022-23906.json b/2022/23xxx/CVE-2022-23906.json index 342587c16ee..e8f79fd7913 100644 --- a/2022/23xxx/CVE-2022-23906.json +++ b/2022/23xxx/CVE-2022-23906.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-23906", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-23906", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CMS Made Simple v2.2.15 was discovered to contain a Remote Command Execution (RCE) vulnerability via the upload avatar function. This vulnerability is exploited via a crafted image file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://dev.cmsmadesimple.org/bug/view/12502", + "refsource": "MISC", + "name": "http://dev.cmsmadesimple.org/bug/view/12502" } ] } diff --git a/2022/23xxx/CVE-2022-23907.json b/2022/23xxx/CVE-2022-23907.json index 211eb39ef3d..487e5961aa0 100644 --- a/2022/23xxx/CVE-2022-23907.json +++ b/2022/23xxx/CVE-2022-23907.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-23907", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-23907", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CMS Made Simple v2.2.15 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the parameter m1_fmmessage." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://dev.cmsmadesimple.org/bug/view/12503", + "refsource": "MISC", + "name": "http://dev.cmsmadesimple.org/bug/view/12503" } ] } diff --git a/2022/25xxx/CVE-2022-25028.json b/2022/25xxx/CVE-2022-25028.json index ee672953033..273b557ea60 100644 --- a/2022/25xxx/CVE-2022-25028.json +++ b/2022/25xxx/CVE-2022-25028.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25028", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25028", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Home Owners Collection Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the collected_by parameter under the List of Collections module." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://raw.githubusercontent.com/fuzzyap1/Vendors-System-Vulnerabilities/main/Home%20Owners%20Collection%20Management%20System/xss.md", + "refsource": "MISC", + "name": "https://raw.githubusercontent.com/fuzzyap1/Vendors-System-Vulnerabilities/main/Home%20Owners%20Collection%20Management%20System/xss.md" } ] } diff --git a/2022/25xxx/CVE-2022-25029.json b/2022/25xxx/CVE-2022-25029.json index 9ba5e6757a4..2ddbb609226 100644 --- a/2022/25xxx/CVE-2022-25029.json +++ b/2022/25xxx/CVE-2022-25029.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25029", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25029", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Home Owners Collection Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter under /admin/?page=members/view_member&id=2." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/fuzzyap1/Vendors-System-Vulnerabilities/blob/main/Home%20Owners%20Collection%20Management%20System/SQL%20injection.md", + "refsource": "MISC", + "name": "https://github.com/fuzzyap1/Vendors-System-Vulnerabilities/blob/main/Home%20Owners%20Collection%20Management%20System/SQL%20injection.md" } ] } diff --git a/2022/25xxx/CVE-2022-25407.json b/2022/25xxx/CVE-2022-25407.json index 30149e3964d..f1660536e89 100644 --- a/2022/25xxx/CVE-2022-25407.json +++ b/2022/25xxx/CVE-2022-25407.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25407", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25407", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Hospital Management System v1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Doctor parameter at /admin-panel1.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/kishan0725/Hospital-Management-System/issues/21", + "refsource": "MISC", + "name": "https://github.com/kishan0725/Hospital-Management-System/issues/21" } ] } diff --git a/2022/25xxx/CVE-2022-25408.json b/2022/25xxx/CVE-2022-25408.json index 27928edd033..d49473e5d9d 100644 --- a/2022/25xxx/CVE-2022-25408.json +++ b/2022/25xxx/CVE-2022-25408.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25408", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25408", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Hospital Management System v1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the dpassword parameter at /admin-panel1.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/kishan0725/Hospital-Management-System/issues/22", + "refsource": "MISC", + "name": "https://github.com/kishan0725/Hospital-Management-System/issues/22" } ] } diff --git a/2022/25xxx/CVE-2022-25409.json b/2022/25xxx/CVE-2022-25409.json index 9a90fddbafe..ea0eaf74c5b 100644 --- a/2022/25xxx/CVE-2022-25409.json +++ b/2022/25xxx/CVE-2022-25409.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25409", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25409", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Hospital Management System v1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the demail parameter at /admin-panel1.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/kishan0725/Hospital-Management-System/issues/20", + "refsource": "MISC", + "name": "https://github.com/kishan0725/Hospital-Management-System/issues/20" } ] } diff --git a/2022/25xxx/CVE-2022-25410.json b/2022/25xxx/CVE-2022-25410.json index ef296cf22ef..d57a3deaff6 100644 --- a/2022/25xxx/CVE-2022-25410.json +++ b/2022/25xxx/CVE-2022-25410.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25410", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25410", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Maxsite CMS v180 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the parameter f_file_description at /admin/files." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/maxsite/cms/issues/485", + "refsource": "MISC", + "name": "https://github.com/maxsite/cms/issues/485" } ] } diff --git a/2022/25xxx/CVE-2022-25411.json b/2022/25xxx/CVE-2022-25411.json index fcaff18584c..774767c2935 100644 --- a/2022/25xxx/CVE-2022-25411.json +++ b/2022/25xxx/CVE-2022-25411.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25411", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25411", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Remote Code Execution (RCE) vulnerability at /admin/options in Maxsite CMS v180 allows attackers to execute arbitrary code via a crafted PHP file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/maxsite/cms/issues/487", + "refsource": "MISC", + "name": "https://github.com/maxsite/cms/issues/487" } ] } diff --git a/2022/25xxx/CVE-2022-25412.json b/2022/25xxx/CVE-2022-25412.json index 534a89bce3f..e387759680f 100644 --- a/2022/25xxx/CVE-2022-25412.json +++ b/2022/25xxx/CVE-2022-25412.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25412", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25412", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Maxsite CMS v180 was discovered to contain multiple arbitrary file deletion vulnerabilities in /admin_page/all-files-update-ajax.php via the dir and deletefile parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/maxsite/cms/issues/486", + "refsource": "MISC", + "name": "https://github.com/maxsite/cms/issues/486" } ] } diff --git a/2022/25xxx/CVE-2022-25413.json b/2022/25xxx/CVE-2022-25413.json index dac985ad8e6..5538c3f43e7 100644 --- a/2022/25xxx/CVE-2022-25413.json +++ b/2022/25xxx/CVE-2022-25413.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25413", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25413", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Maxsite CMS v108 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the parameter f_tags at /admin/page_edit/3." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/maxsite/cms/issues/484", + "refsource": "MISC", + "name": "https://github.com/maxsite/cms/issues/484" } ] }