From 03031331049647ac3d0d9d8dbd67646a58cd9e30 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 13 Apr 2022 15:01:29 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/43xxx/CVE-2021-43009.json | 5 +++ 2021/46xxx/CVE-2021-46167.json | 71 +++++++++++++++++++++++++++++++--- 2021/46xxx/CVE-2021-46365.json | 2 +- 2022/26xxx/CVE-2022-26180.json | 5 +++ 2022/28xxx/CVE-2022-28052.json | 61 ++++++++++++++++++++++++++--- 2022/29xxx/CVE-2022-29159.json | 18 +++++++++ 2022/29xxx/CVE-2022-29160.json | 18 +++++++++ 2022/29xxx/CVE-2022-29161.json | 18 +++++++++ 2022/29xxx/CVE-2022-29163.json | 18 +++++++++ 2022/29xxx/CVE-2022-29166.json | 18 +++++++++ 2022/29xxx/CVE-2022-29168.json | 18 +++++++++ 2022/29xxx/CVE-2022-29170.json | 18 +++++++++ 2022/29xxx/CVE-2022-29171.json | 18 +++++++++ 2022/29xxx/CVE-2022-29172.json | 18 +++++++++ 2022/29xxx/CVE-2022-29173.json | 18 +++++++++ 2022/29xxx/CVE-2022-29174.json | 18 +++++++++ 2022/29xxx/CVE-2022-29175.json | 18 +++++++++ 2022/29xxx/CVE-2022-29177.json | 18 +++++++++ 2022/29xxx/CVE-2022-29178.json | 18 +++++++++ 2022/29xxx/CVE-2022-29179.json | 18 +++++++++ 2022/29xxx/CVE-2022-29180.json | 18 +++++++++ 2022/29xxx/CVE-2022-29181.json | 18 +++++++++ 2022/29xxx/CVE-2022-29182.json | 18 +++++++++ 2022/29xxx/CVE-2022-29183.json | 18 +++++++++ 2022/29xxx/CVE-2022-29185.json | 18 +++++++++ 2022/29xxx/CVE-2022-29186.json | 18 +++++++++ 2022/29xxx/CVE-2022-29187.json | 18 +++++++++ 2022/29xxx/CVE-2022-29190.json | 18 +++++++++ 2022/29xxx/CVE-2022-29191.json | 18 +++++++++ 2022/29xxx/CVE-2022-29192.json | 18 +++++++++ 2022/29xxx/CVE-2022-29193.json | 18 +++++++++ 2022/29xxx/CVE-2022-29194.json | 18 +++++++++ 2022/29xxx/CVE-2022-29195.json | 18 +++++++++ 2022/29xxx/CVE-2022-29196.json | 18 +++++++++ 2022/29xxx/CVE-2022-29197.json | 18 +++++++++ 2022/29xxx/CVE-2022-29198.json | 18 +++++++++ 2022/29xxx/CVE-2022-29199.json | 18 +++++++++ 2022/29xxx/CVE-2022-29200.json | 18 +++++++++ 2022/29xxx/CVE-2022-29201.json | 18 +++++++++ 2022/29xxx/CVE-2022-29202.json | 18 +++++++++ 2022/29xxx/CVE-2022-29203.json | 18 +++++++++ 2022/29xxx/CVE-2022-29205.json | 18 +++++++++ 2022/29xxx/CVE-2022-29206.json | 18 +++++++++ 2022/29xxx/CVE-2022-29207.json | 18 +++++++++ 2022/29xxx/CVE-2022-29208.json | 18 +++++++++ 2022/29xxx/CVE-2022-29209.json | 18 +++++++++ 2022/29xxx/CVE-2022-29212.json | 18 +++++++++ 2022/29xxx/CVE-2022-29213.json | 18 +++++++++ 2022/29xxx/CVE-2022-29214.json | 18 +++++++++ 2022/29xxx/CVE-2022-29216.json | 18 +++++++++ 2022/29xxx/CVE-2022-29217.json | 18 +++++++++ 2022/29xxx/CVE-2022-29218.json | 18 +++++++++ 2022/29xxx/CVE-2022-29219.json | 18 +++++++++ 2022/29xxx/CVE-2022-29220.json | 18 +++++++++ 2022/29xxx/CVE-2022-29221.json | 18 +++++++++ 2022/29xxx/CVE-2022-29222.json | 18 +++++++++ 2022/29xxx/CVE-2022-29223.json | 18 +++++++++ 2022/29xxx/CVE-2022-29224.json | 18 +++++++++ 2022/29xxx/CVE-2022-29225.json | 18 +++++++++ 2022/29xxx/CVE-2022-29226.json | 18 +++++++++ 2022/29xxx/CVE-2022-29228.json | 18 +++++++++ 2022/29xxx/CVE-2022-29229.json | 18 +++++++++ 2022/29xxx/CVE-2022-29230.json | 18 +++++++++ 2022/29xxx/CVE-2022-29232.json | 18 +++++++++ 2022/29xxx/CVE-2022-29233.json | 18 +++++++++ 2022/29xxx/CVE-2022-29234.json | 18 +++++++++ 2022/29xxx/CVE-2022-29236.json | 18 +++++++++ 2022/29xxx/CVE-2022-29237.json | 18 +++++++++ 2022/29xxx/CVE-2022-29238.json | 18 +++++++++ 2022/29xxx/CVE-2022-29240.json | 18 +++++++++ 2022/29xxx/CVE-2022-29242.json | 18 +++++++++ 2022/29xxx/CVE-2022-29243.json | 18 +++++++++ 2022/29xxx/CVE-2022-29244.json | 18 +++++++++ 2022/29xxx/CVE-2022-29245.json | 18 +++++++++ 2022/29xxx/CVE-2022-29246.json | 18 +++++++++ 2022/29xxx/CVE-2022-29247.json | 18 +++++++++ 2022/29xxx/CVE-2022-29248.json | 18 +++++++++ 2022/29xxx/CVE-2022-29249.json | 18 +++++++++ 2022/29xxx/CVE-2022-29250.json | 18 +++++++++ 2022/29xxx/CVE-2022-29252.json | 18 +++++++++ 2022/29xxx/CVE-2022-29253.json | 18 +++++++++ 2022/29xxx/CVE-2022-29254.json | 18 +++++++++ 2022/29xxx/CVE-2022-29255.json | 18 +++++++++ 2022/29xxx/CVE-2022-29256.json | 18 +++++++++ 2022/29xxx/CVE-2022-29257.json | 18 +++++++++ 85 files changed, 1571 insertions(+), 13 deletions(-) create mode 100644 2022/29xxx/CVE-2022-29159.json create mode 100644 2022/29xxx/CVE-2022-29160.json create mode 100644 2022/29xxx/CVE-2022-29161.json create mode 100644 2022/29xxx/CVE-2022-29163.json create mode 100644 2022/29xxx/CVE-2022-29166.json create mode 100644 2022/29xxx/CVE-2022-29168.json create mode 100644 2022/29xxx/CVE-2022-29170.json create mode 100644 2022/29xxx/CVE-2022-29171.json create mode 100644 2022/29xxx/CVE-2022-29172.json create mode 100644 2022/29xxx/CVE-2022-29173.json create mode 100644 2022/29xxx/CVE-2022-29174.json create mode 100644 2022/29xxx/CVE-2022-29175.json create mode 100644 2022/29xxx/CVE-2022-29177.json create mode 100644 2022/29xxx/CVE-2022-29178.json create mode 100644 2022/29xxx/CVE-2022-29179.json create mode 100644 2022/29xxx/CVE-2022-29180.json create mode 100644 2022/29xxx/CVE-2022-29181.json create mode 100644 2022/29xxx/CVE-2022-29182.json create mode 100644 2022/29xxx/CVE-2022-29183.json create mode 100644 2022/29xxx/CVE-2022-29185.json create mode 100644 2022/29xxx/CVE-2022-29186.json create mode 100644 2022/29xxx/CVE-2022-29187.json create mode 100644 2022/29xxx/CVE-2022-29190.json create mode 100644 2022/29xxx/CVE-2022-29191.json create mode 100644 2022/29xxx/CVE-2022-29192.json create mode 100644 2022/29xxx/CVE-2022-29193.json create mode 100644 2022/29xxx/CVE-2022-29194.json create mode 100644 2022/29xxx/CVE-2022-29195.json create mode 100644 2022/29xxx/CVE-2022-29196.json create mode 100644 2022/29xxx/CVE-2022-29197.json create mode 100644 2022/29xxx/CVE-2022-29198.json create mode 100644 2022/29xxx/CVE-2022-29199.json create mode 100644 2022/29xxx/CVE-2022-29200.json create mode 100644 2022/29xxx/CVE-2022-29201.json create mode 100644 2022/29xxx/CVE-2022-29202.json create mode 100644 2022/29xxx/CVE-2022-29203.json create mode 100644 2022/29xxx/CVE-2022-29205.json create mode 100644 2022/29xxx/CVE-2022-29206.json create mode 100644 2022/29xxx/CVE-2022-29207.json create mode 100644 2022/29xxx/CVE-2022-29208.json create mode 100644 2022/29xxx/CVE-2022-29209.json create mode 100644 2022/29xxx/CVE-2022-29212.json create mode 100644 2022/29xxx/CVE-2022-29213.json create mode 100644 2022/29xxx/CVE-2022-29214.json create mode 100644 2022/29xxx/CVE-2022-29216.json create mode 100644 2022/29xxx/CVE-2022-29217.json create mode 100644 2022/29xxx/CVE-2022-29218.json create mode 100644 2022/29xxx/CVE-2022-29219.json create mode 100644 2022/29xxx/CVE-2022-29220.json create mode 100644 2022/29xxx/CVE-2022-29221.json create mode 100644 2022/29xxx/CVE-2022-29222.json create mode 100644 2022/29xxx/CVE-2022-29223.json create mode 100644 2022/29xxx/CVE-2022-29224.json create mode 100644 2022/29xxx/CVE-2022-29225.json create mode 100644 2022/29xxx/CVE-2022-29226.json create mode 100644 2022/29xxx/CVE-2022-29228.json create mode 100644 2022/29xxx/CVE-2022-29229.json create mode 100644 2022/29xxx/CVE-2022-29230.json create mode 100644 2022/29xxx/CVE-2022-29232.json create mode 100644 2022/29xxx/CVE-2022-29233.json create mode 100644 2022/29xxx/CVE-2022-29234.json create mode 100644 2022/29xxx/CVE-2022-29236.json create mode 100644 2022/29xxx/CVE-2022-29237.json create mode 100644 2022/29xxx/CVE-2022-29238.json create mode 100644 2022/29xxx/CVE-2022-29240.json create mode 100644 2022/29xxx/CVE-2022-29242.json create mode 100644 2022/29xxx/CVE-2022-29243.json create mode 100644 2022/29xxx/CVE-2022-29244.json create mode 100644 2022/29xxx/CVE-2022-29245.json create mode 100644 2022/29xxx/CVE-2022-29246.json create mode 100644 2022/29xxx/CVE-2022-29247.json create mode 100644 2022/29xxx/CVE-2022-29248.json create mode 100644 2022/29xxx/CVE-2022-29249.json create mode 100644 2022/29xxx/CVE-2022-29250.json create mode 100644 2022/29xxx/CVE-2022-29252.json create mode 100644 2022/29xxx/CVE-2022-29253.json create mode 100644 2022/29xxx/CVE-2022-29254.json create mode 100644 2022/29xxx/CVE-2022-29255.json create mode 100644 2022/29xxx/CVE-2022-29256.json create mode 100644 2022/29xxx/CVE-2022-29257.json diff --git a/2021/43xxx/CVE-2021-43009.json b/2021/43xxx/CVE-2021-43009.json index 1ed6bfa82e5..42514e62659 100644 --- a/2021/43xxx/CVE-2021-43009.json +++ b/2021/43xxx/CVE-2021-43009.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/166619/Opmon-9.11-Cross-Site-Scripting.html", "url": "http://packetstormsecurity.com/files/166619/Opmon-9.11-Cross-Site-Scripting.html" + }, + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/50857", + "url": "https://www.exploit-db.com/exploits/50857" } ] } diff --git a/2021/46xxx/CVE-2021-46167.json b/2021/46xxx/CVE-2021-46167.json index 19d0204f03c..c15da2b7981 100644 --- a/2021/46xxx/CVE-2021-46167.json +++ b/2021/46xxx/CVE-2021-46167.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-46167", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-46167", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An access control issue in the authentication module of wizplat PD065 v1.19 allows attackers to access sensitive data and cause a Denial of Service (DoS)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://wizplat.com/PRODUCT1_3/?idx=217", + "refsource": "MISC", + "name": "http://wizplat.com/PRODUCT1_3/?idx=217" + }, + { + "url": "https://www.amazon.in/High-Speed-Recognition-Fingerprint-Encrypted-Security/dp/B07BRH1GF5/ref=cm_cr_arp_d_product_top?ie=UTF8", + "refsource": "MISC", + "name": "https://www.amazon.in/High-Speed-Recognition-Fingerprint-Encrypted-Security/dp/B07BRH1GF5/ref=cm_cr_arp_d_product_top?ie=UTF8" + }, + { + "url": "https://www.ebay.com/itm/DM-32GB-Fingerprint-Encrypted-Pen-Drive-Secure-Memory-USB-Stick-AES256/202929723426?hash=item2f3f8dd822:g:mugAAOSwz8NbgQKf", + "refsource": "MISC", + "name": "https://www.ebay.com/itm/DM-32GB-Fingerprint-Encrypted-Pen-Drive-Secure-Memory-USB-Stick-AES256/202929723426?hash=item2f3f8dd822:g:mugAAOSwz8NbgQKf" + }, + { + "refsource": "MISC", + "name": "https://github.com/bosslabdcu/Vulnerability-Reporting/security/advisories/GHSA-w8x7-9p5m-2vx4", + "url": "https://github.com/bosslabdcu/Vulnerability-Reporting/security/advisories/GHSA-w8x7-9p5m-2vx4" } ] } diff --git a/2021/46xxx/CVE-2021-46365.json b/2021/46xxx/CVE-2021-46365.json index 089d7aff763..a707c0749e7 100644 --- a/2021/46xxx/CVE-2021-46365.json +++ b/2021/46xxx/CVE-2021-46365.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "An issue in the Export function of Magnolia v6.2.3 and below allows attackers to execute arbitrary code via a crafted XLF file." + "value": "An issue in the Export function of Magnolia v6.2.3 and below allows attackers to execute XML External Entity attacks via a crafted XLF file." } ] }, diff --git a/2022/26xxx/CVE-2022-26180.json b/2022/26xxx/CVE-2022-26180.json index 08c904e5919..71133897779 100644 --- a/2022/26xxx/CVE-2022-26180.json +++ b/2022/26xxx/CVE-2022-26180.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/166630/qdPM-9.2-Cross-Site-Request-Forgery.html", "url": "http://packetstormsecurity.com/files/166630/qdPM-9.2-Cross-Site-Request-Forgery.html" + }, + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/50854", + "url": "https://www.exploit-db.com/exploits/50854" } ] } diff --git a/2022/28xxx/CVE-2022-28052.json b/2022/28xxx/CVE-2022-28052.json index b1b75681a4c..80522eda617 100644 --- a/2022/28xxx/CVE-2022-28052.json +++ b/2022/28xxx/CVE-2022-28052.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-28052", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-28052", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Directory Traversal vulnerability in file cn/roothub/store/FileSystemStorageService in function store in Roothub 2.6.0 allows remote attackers with low privlege to arbitrarily upload files via /common/upload API, which could lead to remote arbitrary code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/miansen/Roothub/tree/v2.6", + "refsource": "MISC", + "name": "https://github.com/miansen/Roothub/tree/v2.6" + }, + { + "refsource": "MISC", + "name": "https://github.com/Hyperkopite/Roothub_vulns/blob/main/arbitrary%20file%20upload.md", + "url": "https://github.com/Hyperkopite/Roothub_vulns/blob/main/arbitrary%20file%20upload.md" } ] } diff --git a/2022/29xxx/CVE-2022-29159.json b/2022/29xxx/CVE-2022-29159.json new file mode 100644 index 00000000000..ca457bc795c --- /dev/null +++ b/2022/29xxx/CVE-2022-29159.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29159", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29160.json b/2022/29xxx/CVE-2022-29160.json new file mode 100644 index 00000000000..1ba6c4606de --- /dev/null +++ b/2022/29xxx/CVE-2022-29160.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29160", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29161.json b/2022/29xxx/CVE-2022-29161.json new file mode 100644 index 00000000000..c0959df3687 --- /dev/null +++ b/2022/29xxx/CVE-2022-29161.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29161", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29163.json b/2022/29xxx/CVE-2022-29163.json new file mode 100644 index 00000000000..e76cb26c87b --- /dev/null +++ b/2022/29xxx/CVE-2022-29163.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29163", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29166.json b/2022/29xxx/CVE-2022-29166.json new file mode 100644 index 00000000000..896fda1caa0 --- /dev/null +++ b/2022/29xxx/CVE-2022-29166.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29166", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29168.json b/2022/29xxx/CVE-2022-29168.json new file mode 100644 index 00000000000..37b0b69c74f --- /dev/null +++ b/2022/29xxx/CVE-2022-29168.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29168", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29170.json b/2022/29xxx/CVE-2022-29170.json new file mode 100644 index 00000000000..2714b2ddafa --- /dev/null +++ b/2022/29xxx/CVE-2022-29170.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29170", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29171.json b/2022/29xxx/CVE-2022-29171.json new file mode 100644 index 00000000000..efe565d75ee --- /dev/null +++ b/2022/29xxx/CVE-2022-29171.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29171", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29172.json b/2022/29xxx/CVE-2022-29172.json new file mode 100644 index 00000000000..a01b71d7512 --- /dev/null +++ b/2022/29xxx/CVE-2022-29172.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29172", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29173.json b/2022/29xxx/CVE-2022-29173.json new file mode 100644 index 00000000000..8cacaa50139 --- /dev/null +++ b/2022/29xxx/CVE-2022-29173.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29173", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29174.json b/2022/29xxx/CVE-2022-29174.json new file mode 100644 index 00000000000..fc59db7851d --- /dev/null +++ b/2022/29xxx/CVE-2022-29174.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29174", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29175.json b/2022/29xxx/CVE-2022-29175.json new file mode 100644 index 00000000000..4736a1818e8 --- /dev/null +++ b/2022/29xxx/CVE-2022-29175.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29175", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29177.json b/2022/29xxx/CVE-2022-29177.json new file mode 100644 index 00000000000..71c66cfc568 --- /dev/null +++ b/2022/29xxx/CVE-2022-29177.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29177", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29178.json b/2022/29xxx/CVE-2022-29178.json new file mode 100644 index 00000000000..ea929a26a91 --- /dev/null +++ b/2022/29xxx/CVE-2022-29178.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29178", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29179.json b/2022/29xxx/CVE-2022-29179.json new file mode 100644 index 00000000000..96589a1c140 --- /dev/null +++ b/2022/29xxx/CVE-2022-29179.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29179", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29180.json b/2022/29xxx/CVE-2022-29180.json new file mode 100644 index 00000000000..59102f0aed9 --- /dev/null +++ b/2022/29xxx/CVE-2022-29180.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29180", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29181.json b/2022/29xxx/CVE-2022-29181.json new file mode 100644 index 00000000000..f175ce93e12 --- /dev/null +++ b/2022/29xxx/CVE-2022-29181.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29181", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29182.json b/2022/29xxx/CVE-2022-29182.json new file mode 100644 index 00000000000..e7a616de66e --- /dev/null +++ b/2022/29xxx/CVE-2022-29182.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29182", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29183.json b/2022/29xxx/CVE-2022-29183.json new file mode 100644 index 00000000000..3584c36d09b --- /dev/null +++ b/2022/29xxx/CVE-2022-29183.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29183", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29185.json b/2022/29xxx/CVE-2022-29185.json new file mode 100644 index 00000000000..2eaea51ddb9 --- /dev/null +++ b/2022/29xxx/CVE-2022-29185.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29185", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29186.json b/2022/29xxx/CVE-2022-29186.json new file mode 100644 index 00000000000..14b75d7830e --- /dev/null +++ b/2022/29xxx/CVE-2022-29186.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29186", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29187.json b/2022/29xxx/CVE-2022-29187.json new file mode 100644 index 00000000000..72264f60213 --- /dev/null +++ b/2022/29xxx/CVE-2022-29187.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29187", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29190.json b/2022/29xxx/CVE-2022-29190.json new file mode 100644 index 00000000000..c648aff3b3f --- /dev/null +++ b/2022/29xxx/CVE-2022-29190.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29190", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29191.json b/2022/29xxx/CVE-2022-29191.json new file mode 100644 index 00000000000..425077cad6a --- /dev/null +++ b/2022/29xxx/CVE-2022-29191.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29191", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29192.json b/2022/29xxx/CVE-2022-29192.json new file mode 100644 index 00000000000..0c6baa28e9f --- /dev/null +++ b/2022/29xxx/CVE-2022-29192.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29192", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29193.json b/2022/29xxx/CVE-2022-29193.json new file mode 100644 index 00000000000..b4bbb636f2d --- /dev/null +++ b/2022/29xxx/CVE-2022-29193.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29193", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29194.json b/2022/29xxx/CVE-2022-29194.json new file mode 100644 index 00000000000..d603f3d012d --- /dev/null +++ b/2022/29xxx/CVE-2022-29194.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29194", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29195.json b/2022/29xxx/CVE-2022-29195.json new file mode 100644 index 00000000000..4a81c208b2c --- /dev/null +++ b/2022/29xxx/CVE-2022-29195.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29195", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29196.json b/2022/29xxx/CVE-2022-29196.json new file mode 100644 index 00000000000..003804a6e46 --- /dev/null +++ b/2022/29xxx/CVE-2022-29196.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29196", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29197.json b/2022/29xxx/CVE-2022-29197.json new file mode 100644 index 00000000000..ad54010bf98 --- /dev/null +++ b/2022/29xxx/CVE-2022-29197.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29197", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29198.json b/2022/29xxx/CVE-2022-29198.json new file mode 100644 index 00000000000..ae09fbb8f1a --- /dev/null +++ b/2022/29xxx/CVE-2022-29198.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29198", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29199.json b/2022/29xxx/CVE-2022-29199.json new file mode 100644 index 00000000000..5784de2bab1 --- /dev/null +++ b/2022/29xxx/CVE-2022-29199.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29199", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29200.json b/2022/29xxx/CVE-2022-29200.json new file mode 100644 index 00000000000..5d8551b0b75 --- /dev/null +++ b/2022/29xxx/CVE-2022-29200.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29200", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29201.json b/2022/29xxx/CVE-2022-29201.json new file mode 100644 index 00000000000..9677087128c --- /dev/null +++ b/2022/29xxx/CVE-2022-29201.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29201", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29202.json b/2022/29xxx/CVE-2022-29202.json new file mode 100644 index 00000000000..c583afa1d17 --- /dev/null +++ b/2022/29xxx/CVE-2022-29202.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29202", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29203.json b/2022/29xxx/CVE-2022-29203.json new file mode 100644 index 00000000000..ba1d0312771 --- /dev/null +++ b/2022/29xxx/CVE-2022-29203.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29203", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29205.json b/2022/29xxx/CVE-2022-29205.json new file mode 100644 index 00000000000..888aea3ad13 --- /dev/null +++ b/2022/29xxx/CVE-2022-29205.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29205", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29206.json b/2022/29xxx/CVE-2022-29206.json new file mode 100644 index 00000000000..3d1f85e9d57 --- /dev/null +++ b/2022/29xxx/CVE-2022-29206.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29206", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29207.json b/2022/29xxx/CVE-2022-29207.json new file mode 100644 index 00000000000..c65bfb88133 --- /dev/null +++ b/2022/29xxx/CVE-2022-29207.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29207", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29208.json b/2022/29xxx/CVE-2022-29208.json new file mode 100644 index 00000000000..daf6f9875d8 --- /dev/null +++ b/2022/29xxx/CVE-2022-29208.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29208", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29209.json b/2022/29xxx/CVE-2022-29209.json new file mode 100644 index 00000000000..ca214b6abee --- /dev/null +++ b/2022/29xxx/CVE-2022-29209.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29209", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29212.json b/2022/29xxx/CVE-2022-29212.json new file mode 100644 index 00000000000..11e2af164b3 --- /dev/null +++ b/2022/29xxx/CVE-2022-29212.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29212", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29213.json b/2022/29xxx/CVE-2022-29213.json new file mode 100644 index 00000000000..db7f02fada4 --- /dev/null +++ b/2022/29xxx/CVE-2022-29213.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29213", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29214.json b/2022/29xxx/CVE-2022-29214.json new file mode 100644 index 00000000000..da4a70993e1 --- /dev/null +++ b/2022/29xxx/CVE-2022-29214.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29214", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29216.json b/2022/29xxx/CVE-2022-29216.json new file mode 100644 index 00000000000..796b591aa82 --- /dev/null +++ b/2022/29xxx/CVE-2022-29216.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29216", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29217.json b/2022/29xxx/CVE-2022-29217.json new file mode 100644 index 00000000000..a8089752f4b --- /dev/null +++ b/2022/29xxx/CVE-2022-29217.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29217", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29218.json b/2022/29xxx/CVE-2022-29218.json new file mode 100644 index 00000000000..cc5e1f7dbab --- /dev/null +++ b/2022/29xxx/CVE-2022-29218.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29218", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29219.json b/2022/29xxx/CVE-2022-29219.json new file mode 100644 index 00000000000..e9615cd2f4a --- /dev/null +++ b/2022/29xxx/CVE-2022-29219.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29219", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29220.json b/2022/29xxx/CVE-2022-29220.json new file mode 100644 index 00000000000..083c53aca91 --- /dev/null +++ b/2022/29xxx/CVE-2022-29220.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29220", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29221.json b/2022/29xxx/CVE-2022-29221.json new file mode 100644 index 00000000000..2679aead2aa --- /dev/null +++ b/2022/29xxx/CVE-2022-29221.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29221", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29222.json b/2022/29xxx/CVE-2022-29222.json new file mode 100644 index 00000000000..7c6b3718f54 --- /dev/null +++ b/2022/29xxx/CVE-2022-29222.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29222", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29223.json b/2022/29xxx/CVE-2022-29223.json new file mode 100644 index 00000000000..1d84c86c264 --- /dev/null +++ b/2022/29xxx/CVE-2022-29223.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29223", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29224.json b/2022/29xxx/CVE-2022-29224.json new file mode 100644 index 00000000000..6fbf751cfe4 --- /dev/null +++ b/2022/29xxx/CVE-2022-29224.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29224", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29225.json b/2022/29xxx/CVE-2022-29225.json new file mode 100644 index 00000000000..e8018aee657 --- /dev/null +++ b/2022/29xxx/CVE-2022-29225.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29225", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29226.json b/2022/29xxx/CVE-2022-29226.json new file mode 100644 index 00000000000..f4a24420d76 --- /dev/null +++ b/2022/29xxx/CVE-2022-29226.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29226", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29228.json b/2022/29xxx/CVE-2022-29228.json new file mode 100644 index 00000000000..87171a5d3be --- /dev/null +++ b/2022/29xxx/CVE-2022-29228.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29228", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29229.json b/2022/29xxx/CVE-2022-29229.json new file mode 100644 index 00000000000..5c260b83e1e --- /dev/null +++ b/2022/29xxx/CVE-2022-29229.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29229", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29230.json b/2022/29xxx/CVE-2022-29230.json new file mode 100644 index 00000000000..086d5832a01 --- /dev/null +++ b/2022/29xxx/CVE-2022-29230.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29230", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29232.json b/2022/29xxx/CVE-2022-29232.json new file mode 100644 index 00000000000..6a9bea9413b --- /dev/null +++ b/2022/29xxx/CVE-2022-29232.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29232", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29233.json b/2022/29xxx/CVE-2022-29233.json new file mode 100644 index 00000000000..9a18e411133 --- /dev/null +++ b/2022/29xxx/CVE-2022-29233.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29233", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29234.json b/2022/29xxx/CVE-2022-29234.json new file mode 100644 index 00000000000..6970e021282 --- /dev/null +++ b/2022/29xxx/CVE-2022-29234.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29234", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29236.json b/2022/29xxx/CVE-2022-29236.json new file mode 100644 index 00000000000..22f3c43a2c3 --- /dev/null +++ b/2022/29xxx/CVE-2022-29236.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29236", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29237.json b/2022/29xxx/CVE-2022-29237.json new file mode 100644 index 00000000000..4be4a40dac8 --- /dev/null +++ b/2022/29xxx/CVE-2022-29237.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29237", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29238.json b/2022/29xxx/CVE-2022-29238.json new file mode 100644 index 00000000000..6d8c64ba4b1 --- /dev/null +++ b/2022/29xxx/CVE-2022-29238.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29238", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29240.json b/2022/29xxx/CVE-2022-29240.json new file mode 100644 index 00000000000..2fdc26319eb --- /dev/null +++ b/2022/29xxx/CVE-2022-29240.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29240", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29242.json b/2022/29xxx/CVE-2022-29242.json new file mode 100644 index 00000000000..b56d1acd85b --- /dev/null +++ b/2022/29xxx/CVE-2022-29242.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29242", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29243.json b/2022/29xxx/CVE-2022-29243.json new file mode 100644 index 00000000000..53aecc03931 --- /dev/null +++ b/2022/29xxx/CVE-2022-29243.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29243", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29244.json b/2022/29xxx/CVE-2022-29244.json new file mode 100644 index 00000000000..2392a24586c --- /dev/null +++ b/2022/29xxx/CVE-2022-29244.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29244", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29245.json b/2022/29xxx/CVE-2022-29245.json new file mode 100644 index 00000000000..5036cd266b9 --- /dev/null +++ b/2022/29xxx/CVE-2022-29245.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29245", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29246.json b/2022/29xxx/CVE-2022-29246.json new file mode 100644 index 00000000000..958e0a570c3 --- /dev/null +++ b/2022/29xxx/CVE-2022-29246.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29246", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29247.json b/2022/29xxx/CVE-2022-29247.json new file mode 100644 index 00000000000..8ff358a7f50 --- /dev/null +++ b/2022/29xxx/CVE-2022-29247.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29247", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29248.json b/2022/29xxx/CVE-2022-29248.json new file mode 100644 index 00000000000..96db75652c5 --- /dev/null +++ b/2022/29xxx/CVE-2022-29248.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29248", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29249.json b/2022/29xxx/CVE-2022-29249.json new file mode 100644 index 00000000000..87922dc3bee --- /dev/null +++ b/2022/29xxx/CVE-2022-29249.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29249", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29250.json b/2022/29xxx/CVE-2022-29250.json new file mode 100644 index 00000000000..fa5772dd665 --- /dev/null +++ b/2022/29xxx/CVE-2022-29250.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29250", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29252.json b/2022/29xxx/CVE-2022-29252.json new file mode 100644 index 00000000000..1618d20d6e8 --- /dev/null +++ b/2022/29xxx/CVE-2022-29252.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29252", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29253.json b/2022/29xxx/CVE-2022-29253.json new file mode 100644 index 00000000000..20b65ed1fee --- /dev/null +++ b/2022/29xxx/CVE-2022-29253.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29253", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29254.json b/2022/29xxx/CVE-2022-29254.json new file mode 100644 index 00000000000..25c74e3c2f2 --- /dev/null +++ b/2022/29xxx/CVE-2022-29254.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29254", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29255.json b/2022/29xxx/CVE-2022-29255.json new file mode 100644 index 00000000000..74a9163af24 --- /dev/null +++ b/2022/29xxx/CVE-2022-29255.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29255", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29256.json b/2022/29xxx/CVE-2022-29256.json new file mode 100644 index 00000000000..a65e62fb619 --- /dev/null +++ b/2022/29xxx/CVE-2022-29256.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29256", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29257.json b/2022/29xxx/CVE-2022-29257.json new file mode 100644 index 00000000000..8c29625066c --- /dev/null +++ b/2022/29xxx/CVE-2022-29257.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29257", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file