diff --git a/2022/37xxx/CVE-2022-37706.json b/2022/37xxx/CVE-2022-37706.json index 4e846b4dbd8..daffeea1b1b 100644 --- a/2022/37xxx/CVE-2022-37706.json +++ b/2022/37xxx/CVE-2022-37706.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-37706", + "ASSIGNER": "cve@mitre.org", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,22 +27,46 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a", + "version_affected": "?" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { + "url": "https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit", "refsource": "MISC", - "name": "https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit", - "url": "https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit" + "name": "https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit" }, { + "url": "https://git.enlightenment.org/enlightenment/enlightenment/commit/cc7faeccf77fef8b0ae70e312a21e4cde087e141", "refsource": "MISC", - "name": "https://git.enlightenment.org/enlightenment/enlightenment/commit/cc7faeccf77fef8b0ae70e312a21e4cde087e141", - "url": "https://git.enlightenment.org/enlightenment/enlightenment/commit/cc7faeccf77fef8b0ae70e312a21e4cde087e141" + "name": "https://git.enlightenment.org/enlightenment/enlightenment/commit/cc7faeccf77fef8b0ae70e312a21e4cde087e141" }, { + "url": "https://git.enlightenment.org/enlightenment/enlightenment/commit/cae78cbb169f237862faef123e4abaf63a1f5064", "refsource": "MISC", - "name": "https://git.enlightenment.org/enlightenment/enlightenment/commit/cae78cbb169f237862faef123e4abaf63a1f5064", - "url": "https://git.enlightenment.org/enlightenment/enlightenment/commit/cae78cbb169f237862faef123e4abaf63a1f5064" + "name": "https://git.enlightenment.org/enlightenment/enlightenment/commit/cae78cbb169f237862faef123e4abaf63a1f5064" } ] } diff --git a/2022/40xxx/CVE-2022-40005.json b/2022/40xxx/CVE-2022-40005.json index 5b29ef7e8c8..2ceda545ccc 100644 --- a/2022/40xxx/CVE-2022-40005.json +++ b/2022/40xxx/CVE-2022-40005.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-40005", + "ASSIGNER": "cve@mitre.org", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,17 +27,41 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a", + "version_affected": "?" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { + "url": "https://cyberdanube.com/en/authenticated-command-injection-in-intelbras-wifiber-120ac-inmesh/", "refsource": "MISC", - "name": "https://cyberdanube.com/en/authenticated-command-injection-in-intelbras-wifiber-120ac-inmesh/", - "url": "https://cyberdanube.com/en/authenticated-command-injection-in-intelbras-wifiber-120ac-inmesh/" + "name": "https://cyberdanube.com/en/authenticated-command-injection-in-intelbras-wifiber-120ac-inmesh/" }, { + "url": "https://seclists.org/fulldisclosure/2022/Dec/13", "refsource": "MISC", - "name": "https://seclists.org/fulldisclosure/2022/Dec/13", - "url": "https://seclists.org/fulldisclosure/2022/Dec/13" + "name": "https://seclists.org/fulldisclosure/2022/Dec/13" } ] } diff --git a/2022/41xxx/CVE-2022-41317.json b/2022/41xxx/CVE-2022-41317.json index eb11ce61a79..73b3b7c1571 100644 --- a/2022/41xxx/CVE-2022-41317.json +++ b/2022/41xxx/CVE-2022-41317.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-41317", + "ASSIGNER": "cve@mitre.org", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,6 +27,30 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a", + "version_affected": "?" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { @@ -68,9 +69,9 @@ "name": "http://www.squid-cache.org/Versions/v5/changesets/SQUID-2022_1.patch" }, { - "refsource": "CONFIRM", - "name": "https://www.openwall.com/lists/oss-security/2022/09/23/1", - "url": "https://www.openwall.com/lists/oss-security/2022/09/23/1" + "url": "https://www.openwall.com/lists/oss-security/2022/09/23/1", + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2022/09/23/1" } ] } diff --git a/2022/41xxx/CVE-2022-41318.json b/2022/41xxx/CVE-2022-41318.json index dd5cf722590..77e1d4fe8d9 100644 --- a/2022/41xxx/CVE-2022-41318.json +++ b/2022/41xxx/CVE-2022-41318.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-41318", + "ASSIGNER": "cve@mitre.org", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,6 +27,30 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a", + "version_affected": "?" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { @@ -68,9 +69,9 @@ "name": "http://www.squid-cache.org/Versions/v5/changesets/SQUID-2022_2.patch" }, { - "refsource": "CONFIRM", - "name": "https://www.openwall.com/lists/oss-security/2022/09/23/2", - "url": "https://www.openwall.com/lists/oss-security/2022/09/23/2" + "url": "https://www.openwall.com/lists/oss-security/2022/09/23/2", + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2022/09/23/2" } ] }