Skip to content
This repository was archived by the owner on Jun 10, 2025. It is now read-only.

Commit e691e71

Browse files
committed
"-Synchronized-Data."
1 parent 057ce61 commit e691e71

File tree

8 files changed

+242
-6
lines changed

8 files changed

+242
-6
lines changed

2022/38xxx/CVE-2022-38766.json

Lines changed: 50 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,61 @@
11
{
2-
"data_type": "CVE",
3-
"data_format": "MITRE",
4-
"data_version": "4.0",
52
"CVE_data_meta": {
6-
"ID": "CVE-2022-38766",
73
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
4+
"ID": "CVE-2022-38766",
5+
"STATE": "PUBLIC"
96
},
7+
"affects": {
8+
"vendor": {
9+
"vendor_data": [
10+
{
11+
"product": {
12+
"product_data": [
13+
{
14+
"product_name": "n/a",
15+
"version": {
16+
"version_data": [
17+
{
18+
"version_value": "n/a"
19+
}
20+
]
21+
}
22+
}
23+
]
24+
},
25+
"vendor_name": "n/a"
26+
}
27+
]
28+
}
29+
},
30+
"data_format": "MITRE",
31+
"data_type": "CVE",
32+
"data_version": "4.0",
1033
"description": {
1134
"description_data": [
1235
{
1336
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
37+
"value": "The remote keyless system on Renault ZOE 2021 vehicles sends 433.92 MHz RF signals from the same Rolling Codes set for each door-open request, which allows for a replay attack."
38+
}
39+
]
40+
},
41+
"problemtype": {
42+
"problemtype_data": [
43+
{
44+
"description": [
45+
{
46+
"lang": "eng",
47+
"value": "n/a"
48+
}
49+
]
50+
}
51+
]
52+
},
53+
"references": {
54+
"reference_data": [
55+
{
56+
"refsource": "MISC",
57+
"name": "https://github.com/AUTOCRYPT-IVS-VnV/CVE-2022-38766",
58+
"url": "https://github.com/AUTOCRYPT-IVS-VnV/CVE-2022-38766"
1559
}
1660
]
1761
}

2022/48xxx/CVE-2022-48210.json

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
{
2+
"data_type": "CVE",
3+
"data_format": "MITRE",
4+
"data_version": "4.0",
5+
"CVE_data_meta": {
6+
"ID": "CVE-2022-48210",
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "RESERVED"
9+
},
10+
"description": {
11+
"description_data": [
12+
{
13+
"lang": "eng",
14+
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
15+
}
16+
]
17+
}
18+
}

2022/48xxx/CVE-2022-48211.json

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
{
2+
"data_type": "CVE",
3+
"data_format": "MITRE",
4+
"data_version": "4.0",
5+
"CVE_data_meta": {
6+
"ID": "CVE-2022-48211",
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "RESERVED"
9+
},
10+
"description": {
11+
"description_data": [
12+
{
13+
"lang": "eng",
14+
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
15+
}
16+
]
17+
}
18+
}

2022/48xxx/CVE-2022-48212.json

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
{
2+
"data_type": "CVE",
3+
"data_format": "MITRE",
4+
"data_version": "4.0",
5+
"CVE_data_meta": {
6+
"ID": "CVE-2022-48212",
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "RESERVED"
9+
},
10+
"description": {
11+
"description_data": [
12+
{
13+
"lang": "eng",
14+
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
15+
}
16+
]
17+
}
18+
}

2022/48xxx/CVE-2022-48213.json

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
{
2+
"data_type": "CVE",
3+
"data_format": "MITRE",
4+
"data_version": "4.0",
5+
"CVE_data_meta": {
6+
"ID": "CVE-2022-48213",
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "RESERVED"
9+
},
10+
"description": {
11+
"description_data": [
12+
{
13+
"lang": "eng",
14+
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
15+
}
16+
]
17+
}
18+
}

2022/48xxx/CVE-2022-48214.json

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
{
2+
"data_type": "CVE",
3+
"data_format": "MITRE",
4+
"data_version": "4.0",
5+
"CVE_data_meta": {
6+
"ID": "CVE-2022-48214",
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "RESERVED"
9+
},
10+
"description": {
11+
"description_data": [
12+
{
13+
"lang": "eng",
14+
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
15+
}
16+
]
17+
}
18+
}

2022/48xxx/CVE-2022-48215.json

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
{
2+
"data_type": "CVE",
3+
"data_format": "MITRE",
4+
"data_version": "4.0",
5+
"CVE_data_meta": {
6+
"ID": "CVE-2022-48215",
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "RESERVED"
9+
},
10+
"description": {
11+
"description_data": [
12+
{
13+
"lang": "eng",
14+
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
15+
}
16+
]
17+
}
18+
}

2023/0xxx/CVE-2023-0039.json

Lines changed: 84 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,84 @@
1+
{
2+
"data_version": "4.0",
3+
"data_type": "CVE",
4+
"data_format": "MITRE",
5+
"CVE_data_meta": {
6+
"ID": "CVE-2023-0039",
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "PUBLIC"
9+
},
10+
"description": {
11+
"description_data": [
12+
{
13+
"lang": "eng",
14+
"value": "The User Post Gallery - UPG plugin for WordPress is vulnerable to authorization bypass which leads to remote command execution due to the use of a nopriv AJAX action and user supplied function calls and parameters in versions up to, and including 2.19. This makes it possible for unauthenticated attackers to call arbitrary PHP functions and perform actions like adding new files that can be webshells and updating the site's options to allow anyone to register as an administrator."
15+
}
16+
]
17+
},
18+
"problemtype": {
19+
"problemtype_data": [
20+
{
21+
"description": [
22+
{
23+
"lang": "eng",
24+
"value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"
25+
}
26+
]
27+
}
28+
]
29+
},
30+
"affects": {
31+
"vendor": {
32+
"vendor_data": [
33+
{
34+
"vendor_name": "odude",
35+
"product": {
36+
"product_data": [
37+
{
38+
"product_name": "User Post Gallery \u2013 UPG",
39+
"version": {
40+
"version_data": [
41+
{
42+
"version_value": "*",
43+
"version_affected": "="
44+
}
45+
]
46+
}
47+
}
48+
]
49+
}
50+
}
51+
]
52+
}
53+
},
54+
"references": {
55+
"reference_data": [
56+
{
57+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7c0d7743-14f5-4fdd-a67b-b1f95dbe0f46",
58+
"refsource": "MISC",
59+
"name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7c0d7743-14f5-4fdd-a67b-b1f95dbe0f46"
60+
},
61+
{
62+
"url": "https://plugins.trac.wordpress.org/browser/wp-upg/trunk/wp-upg.php#L723",
63+
"refsource": "MISC",
64+
"name": "https://plugins.trac.wordpress.org/browser/wp-upg/trunk/wp-upg.php#L723"
65+
}
66+
]
67+
},
68+
"credits": [
69+
{
70+
"lang": "en",
71+
"value": "Chris Gardner"
72+
}
73+
],
74+
"impact": {
75+
"cvss": [
76+
{
77+
"version": "3.1",
78+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
79+
"baseScore": 9.8,
80+
"baseSeverity": "CRITICAL"
81+
}
82+
]
83+
}
84+
}

0 commit comments

Comments
 (0)