diff --git a/2022/43xxx/CVE-2022-43443.json b/2022/43xxx/CVE-2022-43443.json new file mode 100644 index 00000000000..db450507f97 --- /dev/null +++ b/2022/43xxx/CVE-2022-43443.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-43443", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/43xxx/CVE-2022-43466.json b/2022/43xxx/CVE-2022-43466.json new file mode 100644 index 00000000000..a4a298d9177 --- /dev/null +++ b/2022/43xxx/CVE-2022-43466.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-43466", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/43xxx/CVE-2022-43486.json b/2022/43xxx/CVE-2022-43486.json new file mode 100644 index 00000000000..d08c71a5839 --- /dev/null +++ b/2022/43xxx/CVE-2022-43486.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-43486", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/4xxx/CVE-2022-4282.json b/2022/4xxx/CVE-2022-4282.json index 779af8f9fca..89f2df512f7 100644 --- a/2022/4xxx/CVE-2022-4282.json +++ b/2022/4xxx/CVE-2022-4282.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "4.7", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:H\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/github.com\/Ha0Liu\/cveAdd\/blob\/developer\/JreCMS%20template%20injection%20vulnerability\/JreCMS%20template%20injection%20vulnerability.md" + "url": "https://github.com/Ha0Liu/cveAdd/blob/developer/JreCMS%20template%20injection%20vulnerability/JreCMS%20template%20injection%20vulnerability.md", + "refsource": "MISC", + "name": "https://github.com/Ha0Liu/cveAdd/blob/developer/JreCMS%20template%20injection%20vulnerability/JreCMS%20template%20injection%20vulnerability.md" }, { - "url": "https:\/\/vuldb.com\/?id.214790" + "url": "https://vuldb.com/?id.214790", + "refsource": "MISC", + "name": "https://vuldb.com/?id.214790" } ] } diff --git a/2022/4xxx/CVE-2022-4285.json b/2022/4xxx/CVE-2022-4285.json new file mode 100644 index 00000000000..e3d8be84a9a --- /dev/null +++ b/2022/4xxx/CVE-2022-4285.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-4285", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file