From 125deaccab8be3147899c666845e39c1438fd075 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 27 Jul 2022 14:00:44 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/23xxx/CVE-2022-23099.json | 61 ++++++++++++++++++--- 2022/23xxx/CVE-2022-23100.json | 61 ++++++++++++++++++--- 2022/23xxx/CVE-2022-23101.json | 61 ++++++++++++++++++--- 2022/24xxx/CVE-2022-24405.json | 61 ++++++++++++++++++--- 2022/24xxx/CVE-2022-24406.json | 61 ++++++++++++++++++--- 2022/2xxx/CVE-2022-2553.json | 18 +++++++ 2022/33xxx/CVE-2022-33970.json | 99 +++++++++++++++++++++++++++++++--- 2022/34xxx/CVE-2022-34529.json | 56 ++++++++++++++++--- 2022/34xxx/CVE-2022-34549.json | 61 ++++++++++++++++++--- 2022/34xxx/CVE-2022-34550.json | 61 ++++++++++++++++++--- 2022/34xxx/CVE-2022-34551.json | 61 ++++++++++++++++++--- 2022/35xxx/CVE-2022-35291.json | 85 ++++++++++++++++++++++++++--- 2022/36xxx/CVE-2022-36923.json | 18 +++++++ 13 files changed, 698 insertions(+), 66 deletions(-) create mode 100644 2022/2xxx/CVE-2022-2553.json create mode 100644 2022/36xxx/CVE-2022-36923.json diff --git a/2022/23xxx/CVE-2022-23099.json b/2022/23xxx/CVE-2022-23099.json index 5aabb242a5d..fb1907e5145 100644 --- a/2022/23xxx/CVE-2022-23099.json +++ b/2022/23xxx/CVE-2022-23099.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-23099", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-23099", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "OX App Suite through 7.10.6 allows XSS by forcing block-wise read." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://open-xchange.com", + "refsource": "MISC", + "name": "https://open-xchange.com" + }, + { + "refsource": "CONFIRM", + "name": "https://seclists.org/fulldisclosure/2022/Jul/11", + "url": "https://seclists.org/fulldisclosure/2022/Jul/11" } ] } diff --git a/2022/23xxx/CVE-2022-23100.json b/2022/23xxx/CVE-2022-23100.json index 26a59269007..1bf839f58f4 100644 --- a/2022/23xxx/CVE-2022-23100.json +++ b/2022/23xxx/CVE-2022-23100.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-23100", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-23100", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "OX App Suite through 7.10.6 allows OS Command Injection via Documentconverter (e.g., through an email attachment)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://open-xchange.com", + "refsource": "MISC", + "name": "https://open-xchange.com" + }, + { + "refsource": "CONFIRM", + "name": "https://seclists.org/fulldisclosure/2022/Jul/11", + "url": "https://seclists.org/fulldisclosure/2022/Jul/11" } ] } diff --git a/2022/23xxx/CVE-2022-23101.json b/2022/23xxx/CVE-2022-23101.json index 018e9421d13..73932ee8cbc 100644 --- a/2022/23xxx/CVE-2022-23101.json +++ b/2022/23xxx/CVE-2022-23101.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-23101", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-23101", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "OX App Suite through 7.10.6 allows XSS via appHandler in a deep link in an e-mail message." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://open-xchange.com", + "refsource": "MISC", + "name": "https://open-xchange.com" + }, + { + "refsource": "CONFIRM", + "name": "https://seclists.org/fulldisclosure/2022/Jul/11", + "url": "https://seclists.org/fulldisclosure/2022/Jul/11" } ] } diff --git a/2022/24xxx/CVE-2022-24405.json b/2022/24xxx/CVE-2022-24405.json index fef622fcef0..2aca8956f30 100644 --- a/2022/24xxx/CVE-2022-24405.json +++ b/2022/24xxx/CVE-2022-24405.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-24405", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-24405", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "OX App Suite through 7.10.6 allows OS Command Injection via a serialized Java class to the Documentconverter API." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://open-xchange.com", + "refsource": "MISC", + "name": "https://open-xchange.com" + }, + { + "refsource": "CONFIRM", + "name": "https://seclists.org/fulldisclosure/2022/Jul/11", + "url": "https://seclists.org/fulldisclosure/2022/Jul/11" } ] } diff --git a/2022/24xxx/CVE-2022-24406.json b/2022/24xxx/CVE-2022-24406.json index cfd8b778aa9..0221af91b8c 100644 --- a/2022/24xxx/CVE-2022-24406.json +++ b/2022/24xxx/CVE-2022-24406.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-24406", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-24406", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "OX App Suite through 7.10.6 allows SSRF because multipart/form-data boundaries are predictable, and this can lead to injection into internal Documentconverter API calls." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://open-xchange.com", + "refsource": "MISC", + "name": "https://open-xchange.com" + }, + { + "refsource": "CONFIRM", + "name": "https://seclists.org/fulldisclosure/2022/Jul/11", + "url": "https://seclists.org/fulldisclosure/2022/Jul/11" } ] } diff --git a/2022/2xxx/CVE-2022-2553.json b/2022/2xxx/CVE-2022-2553.json new file mode 100644 index 00000000000..1229668bec7 --- /dev/null +++ b/2022/2xxx/CVE-2022-2553.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2553", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33970.json b/2022/33xxx/CVE-2022-33970.json index 0062a4146f1..a67142c11bd 100644 --- a/2022/33xxx/CVE-2022-33970.json +++ b/2022/33xxx/CVE-2022-33970.json @@ -1,18 +1,105 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "audit@patchstack.com", + "DATE_PUBLIC": "2022-07-25T09:20:00.000Z", "ID": "CVE-2022-33970", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "WordPress Shortcode Addons plugin <= 3.1.2 - Authenticated WordPress Options Change vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Shortcode Addons (WordPress plugin)", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "<= 3.1.2", + "version_value": "3.1.2" + } + ] + } + } + ] + }, + "vendor_name": "Biplob018" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Vulnerability discovered by m0ze (Patchstack)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Authenticated WordPress Options Change vulnerability in Biplob018 Shortcode Addons plugin <= 3.1.2 at WordPress." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-264 Permissions, Privileges, and Access Controls" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://wordpress.org/plugins/shortcode-addons/#developers", + "refsource": "CONFIRM", + "url": "https://wordpress.org/plugins/shortcode-addons/#developers" + }, + { + "name": "https://patchstack.com/database/vulnerability/shortcode-addons/wordpress-shortcode-addons-plugin-3-1-2-authenticated-wordpress-options-change-vulnerability", + "refsource": "CONFIRM", + "url": "https://patchstack.com/database/vulnerability/shortcode-addons/wordpress-shortcode-addons-plugin-3-1-2-authenticated-wordpress-options-change-vulnerability" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update to 3.2.0 or higher version." + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34529.json b/2022/34xxx/CVE-2022-34529.json index 20f7c59a7fc..42a88291ed8 100644 --- a/2022/34xxx/CVE-2022-34529.json +++ b/2022/34xxx/CVE-2022-34529.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34529", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34529", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WASM3 v0.5.0 was discovered to contain a segmentation fault via the component Compile_Memory_CopyFill." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/wasm3/wasm3/issues/337", + "refsource": "MISC", + "name": "https://github.com/wasm3/wasm3/issues/337" } ] } diff --git a/2022/34xxx/CVE-2022-34549.json b/2022/34xxx/CVE-2022-34549.json index c0c5746cd9f..d4b0beb90f5 100644 --- a/2022/34xxx/CVE-2022-34549.json +++ b/2022/34xxx/CVE-2022-34549.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34549", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34549", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sims v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /uploadServlet. This vulnerability allows attackers to escalate privileges and execute arbitrary commands via a crafted file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/rawchen/sims/issues/6", + "refsource": "MISC", + "name": "https://github.com/rawchen/sims/issues/6" + }, + { + "url": "http://cwe.mitre.org/data/definitions/434.html", + "refsource": "MISC", + "name": "http://cwe.mitre.org/data/definitions/434.html" } ] } diff --git a/2022/34xxx/CVE-2022-34550.json b/2022/34xxx/CVE-2022-34550.json index 3005ec092f5..e1f7eb15a4f 100644 --- a/2022/34xxx/CVE-2022-34550.json +++ b/2022/34xxx/CVE-2022-34550.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34550", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34550", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sims v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /addNotifyServlet. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the notifyInfo parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/rawchen/sims/issues/8", + "refsource": "MISC", + "name": "https://github.com/rawchen/sims/issues/8" + }, + { + "url": "http://cwe.mitre.org/data/definitions/79.html", + "refsource": "MISC", + "name": "http://cwe.mitre.org/data/definitions/79.html" } ] } diff --git a/2022/34xxx/CVE-2022-34551.json b/2022/34xxx/CVE-2022-34551.json index e6b3c109854..a10620d8ec6 100644 --- a/2022/34xxx/CVE-2022-34551.json +++ b/2022/34xxx/CVE-2022-34551.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34551", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34551", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sims v1.0 was discovered to allow path traversal when downloading attachments." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/rawchen/sims/issues/7", + "refsource": "MISC", + "name": "https://github.com/rawchen/sims/issues/7" + }, + { + "url": "http://cwe.mitre.org/data/definitions/23.html", + "refsource": "MISC", + "name": "http://cwe.mitre.org/data/definitions/23.html" } ] } diff --git a/2022/35xxx/CVE-2022-35291.json b/2022/35xxx/CVE-2022-35291.json index 05a2e3440d8..ce904a9d6cd 100644 --- a/2022/35xxx/CVE-2022-35291.json +++ b/2022/35xxx/CVE-2022-35291.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cna@sap.com", "ID": "CVE-2022-35291", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Privilege escalation vulnerability in SAP SuccessFactors attachment API for Mobile Application(Android & iOS)" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SAP SuccessFactors Mobile Application for Android & iOS devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "V8.0.5" + } + ] + } + } + ] + }, + "vendor_name": "SAP SuccessFactors" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Due to misconfigured application endpoints, SAP SuccessFactors attachment APIs allow attackers with user privileges to perform activities with admin privileges over the network. These APIs were consumed in the SF Mobile application for Time Off, Time Sheet, EC Workflow, and Benefits. On successful exploitation, the attacker can read/write attachments. Thus, compromising the confidentiality and integrity of the application" } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-269 Improper Privilege Management" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", + "name": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" + }, + { + "refsource": "MISC", + "url": "https://launchpad.support.sap.com/#/notes/3226411", + "name": "https://launchpad.support.sap.com/#/notes/3226411" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2022/36xxx/CVE-2022-36923.json b/2022/36xxx/CVE-2022-36923.json new file mode 100644 index 00000000000..f100d38b5bd --- /dev/null +++ b/2022/36xxx/CVE-2022-36923.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-36923", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file