From 15da3e2a1b5e0c625987f28c5c7cbd7af9a2e5e8 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 14 Sep 2022 21:00:33 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/2xxx/CVE-2022-2977.json | 50 ++++++++++++++++++++++++-- 2022/37xxx/CVE-2022-37724.json | 61 +++++++++++++++++++++++++++---- 2022/38xxx/CVE-2022-38301.json | 61 +++++++++++++++++++++++++++---- 2022/38xxx/CVE-2022-38308.json | 56 +++++++++++++++++++++++++---- 2022/3xxx/CVE-2022-3216.json | 12 ++++--- 2022/3xxx/CVE-2022-3218.json | 18 ++++++++++ 2022/40xxx/CVE-2022-40365.json | 61 +++++++++++++++++++++++++++---- 2022/40xxx/CVE-2022-40438.json | 56 +++++++++++++++++++++++++---- 2022/40xxx/CVE-2022-40439.json | 56 +++++++++++++++++++++++++---- 2022/40xxx/CVE-2022-40476.json | 66 ++++++++++++++++++++++++++++++---- 2022/40xxx/CVE-2022-40721.json | 18 ++++++++++ 2022/40xxx/CVE-2022-40722.json | 18 ++++++++++ 2022/40xxx/CVE-2022-40723.json | 18 ++++++++++ 2022/40xxx/CVE-2022-40724.json | 18 ++++++++++ 2022/40xxx/CVE-2022-40725.json | 18 ++++++++++ 2022/40xxx/CVE-2022-40726.json | 18 ++++++++++ 2022/40xxx/CVE-2022-40727.json | 18 ++++++++++ 2022/40xxx/CVE-2022-40728.json | 18 ++++++++++ 2022/40xxx/CVE-2022-40729.json | 18 ++++++++++ 2022/40xxx/CVE-2022-40730.json | 18 ++++++++++ 2022/40xxx/CVE-2022-40731.json | 18 ++++++++++ 21 files changed, 646 insertions(+), 49 deletions(-) create mode 100644 2022/3xxx/CVE-2022-3218.json create mode 100644 2022/40xxx/CVE-2022-40721.json create mode 100644 2022/40xxx/CVE-2022-40722.json create mode 100644 2022/40xxx/CVE-2022-40723.json create mode 100644 2022/40xxx/CVE-2022-40724.json create mode 100644 2022/40xxx/CVE-2022-40725.json create mode 100644 2022/40xxx/CVE-2022-40726.json create mode 100644 2022/40xxx/CVE-2022-40727.json create mode 100644 2022/40xxx/CVE-2022-40728.json create mode 100644 2022/40xxx/CVE-2022-40729.json create mode 100644 2022/40xxx/CVE-2022-40730.json create mode 100644 2022/40xxx/CVE-2022-40731.json diff --git a/2022/2xxx/CVE-2022-2977.json b/2022/2xxx/CVE-2022-2977.json index a38cef54037..bb1a8f50af8 100644 --- a/2022/2xxx/CVE-2022-2977.json +++ b/2022/2xxx/CVE-2022-2977.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-2977", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Linux kernel", + "version": { + "version_data": [ + { + "version_value": "Linux kernel versions prior to 5.18" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-416" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d8e7007dc7c4d7c8366739bbcd3f5e51dcd470f", + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d8e7007dc7c4d7c8366739bbcd3f5e51dcd470f" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system." } ] } diff --git a/2022/37xxx/CVE-2022-37724.json b/2022/37xxx/CVE-2022-37724.json index 584991645b1..97144ea590d 100644 --- a/2022/37xxx/CVE-2022-37724.json +++ b/2022/37xxx/CVE-2022-37724.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-37724", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-37724", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Project Wonder WebObjects 1.0 through 5.4.3 is vulnerable to Arbitrary HTTP Header injection and URL- or Header-based XSS reflection in all web-server adaptor interfaces." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://xmit.xyz/security/webobjects-url-tomfoolery/", + "refsource": "MISC", + "name": "https://xmit.xyz/security/webobjects-url-tomfoolery/" + }, + { + "refsource": "MISC", + "name": "https://github.com/wocommunity/wonder/pull/992", + "url": "https://github.com/wocommunity/wonder/pull/992" } ] } diff --git a/2022/38xxx/CVE-2022-38301.json b/2022/38xxx/CVE-2022-38301.json index 85df5cc71a6..ce0c5dcbcf9 100644 --- a/2022/38xxx/CVE-2022-38301.json +++ b/2022/38xxx/CVE-2022-38301.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-38301", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-38301", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Onedev v7.4.14 contains a path traversal vulnerability which allows attackers to access restricted files and directories via uploading a crafted JAR file into the directory /opt/onedev/lib." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/theonedev/onedev/commit/5b6a19c1f7fe9c271acc4268bcd261a9a1cbb3ea", + "refsource": "MISC", + "name": "https://github.com/theonedev/onedev/commit/5b6a19c1f7fe9c271acc4268bcd261a9a1cbb3ea" + }, + { + "url": "https://research.loginsoft.com/vulnerability/path-traversal-in-onedev-v7-4-14/", + "refsource": "MISC", + "name": "https://research.loginsoft.com/vulnerability/path-traversal-in-onedev-v7-4-14/" } ] } diff --git a/2022/38xxx/CVE-2022-38308.json b/2022/38xxx/CVE-2022-38308.json index 0d2f416232b..55b9daaed98 100644 --- a/2022/38xxx/CVE-2022-38308.json +++ b/2022/38xxx/CVE-2022-38308.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-38308", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-38308", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "TOTOLink A700RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the lang parameter in the function cstesystem. This vulnerability allows attackers to execute arbitrary commands via a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/WhoisZkuan/TOTOlink-A700RU", + "refsource": "MISC", + "name": "https://github.com/WhoisZkuan/TOTOlink-A700RU" } ] } diff --git a/2022/3xxx/CVE-2022-3216.json b/2022/3xxx/CVE-2022-3216.json index 1d73970fc5f..1ab7f6db754 100644 --- a/2022/3xxx/CVE-2022-3216.json +++ b/2022/3xxx/CVE-2022-3216.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -58,16 +58,20 @@ "cvss": { "version": "3.1", "baseScore": "5.0", - "vectorString": "CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/xcellerator.github.io\/posts\/tetsuji\/" + "url": "https://xcellerator.github.io/posts/tetsuji/", + "refsource": "MISC", + "name": "https://xcellerator.github.io/posts/tetsuji/" }, { - "url": "https:\/\/vuldb.com\/?id.208606" + "url": "https://vuldb.com/?id.208606", + "refsource": "MISC", + "name": "https://vuldb.com/?id.208606" } ] } diff --git a/2022/3xxx/CVE-2022-3218.json b/2022/3xxx/CVE-2022-3218.json new file mode 100644 index 00000000000..c53ae4c45be --- /dev/null +++ b/2022/3xxx/CVE-2022-3218.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3218", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40365.json b/2022/40xxx/CVE-2022-40365.json index 72a221d806c..2cec18b11e4 100644 --- a/2022/40xxx/CVE-2022-40365.json +++ b/2022/40xxx/CVE-2022-40365.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-40365", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-40365", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross site scripting (XSS) vulnerability in ouqiang gocron through 1.5.3, allows attackers to execute arbitrary code via scope.row.hostname in web/vue/src/pages/taskLog/list.vue." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ouqiang/gocron", + "refsource": "MISC", + "name": "https://github.com/ouqiang/gocron" + }, + { + "url": "https://github.com/ouqiang/gocron/issues/362", + "refsource": "MISC", + "name": "https://github.com/ouqiang/gocron/issues/362" } ] } diff --git a/2022/40xxx/CVE-2022-40438.json b/2022/40xxx/CVE-2022-40438.json index de94ef8575e..393684a0f74 100644 --- a/2022/40xxx/CVE-2022-40438.json +++ b/2022/40xxx/CVE-2022-40438.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-40438", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-40438", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Buffer overflow vulnerability in function AP4_MemoryByteStream::WritePartial in mp42aac in Bento4 v1.6.0-639, allows attackers to cause a denial of service via a crafted file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/axiomatic-systems/Bento4/issues/751", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/issues/751" } ] } diff --git a/2022/40xxx/CVE-2022-40439.json b/2022/40xxx/CVE-2022-40439.json index 21af29923bd..7a12340594c 100644 --- a/2022/40xxx/CVE-2022-40439.json +++ b/2022/40xxx/CVE-2022-40439.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-40439", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-40439", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An memory leak issue was discovered in AP4_StdcFileByteStream::Create in mp42ts in Bento4 v1.6.0-639, allows attackers to cause a denial of service via a crafted file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/axiomatic-systems/Bento4/issues/750", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/issues/750" } ] } diff --git a/2022/40xxx/CVE-2022-40476.json b/2022/40xxx/CVE-2022-40476.json index 3439c675483..65527e54ebe 100644 --- a/2022/40xxx/CVE-2022-40476.json +++ b/2022/40xxx/CVE-2022-40476.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-40476", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-40476", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A null pointer dereference issue was discovered in fs/io_uring.c in the Linux kernel before 5.15.62. A local user could use this flaw to crash the system or potentially cause a denial of service." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lore.kernel.org/lkml/CAO4S-mdVW5GkODk0+vbQexNAAJZopwzFJ9ACvRCJ989fQ4A6Ow@mail.gmail.com/", + "refsource": "MISC", + "name": "https://lore.kernel.org/lkml/CAO4S-mdVW5GkODk0+vbQexNAAJZopwzFJ9ACvRCJ989fQ4A6Ow@mail.gmail.com/" + }, + { + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/io_uring.c?h=v5.15.61&id=3746d62ecf1c872a520c4866118edccb121c44fd", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/io_uring.c?h=v5.15.61&id=3746d62ecf1c872a520c4866118edccb121c44fd" + }, + { + "url": "https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.62", + "refsource": "MISC", + "name": "https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.62" } ] } diff --git a/2022/40xxx/CVE-2022-40721.json b/2022/40xxx/CVE-2022-40721.json new file mode 100644 index 00000000000..440c972db72 --- /dev/null +++ b/2022/40xxx/CVE-2022-40721.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40721", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40722.json b/2022/40xxx/CVE-2022-40722.json new file mode 100644 index 00000000000..3a7e4bfb99f --- /dev/null +++ b/2022/40xxx/CVE-2022-40722.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40722", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40723.json b/2022/40xxx/CVE-2022-40723.json new file mode 100644 index 00000000000..09fa3d24686 --- /dev/null +++ b/2022/40xxx/CVE-2022-40723.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40723", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40724.json b/2022/40xxx/CVE-2022-40724.json new file mode 100644 index 00000000000..439e4722eae --- /dev/null +++ b/2022/40xxx/CVE-2022-40724.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40724", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40725.json b/2022/40xxx/CVE-2022-40725.json new file mode 100644 index 00000000000..bc30ab1b12f --- /dev/null +++ b/2022/40xxx/CVE-2022-40725.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40725", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40726.json b/2022/40xxx/CVE-2022-40726.json new file mode 100644 index 00000000000..86047bc921e --- /dev/null +++ b/2022/40xxx/CVE-2022-40726.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40726", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40727.json b/2022/40xxx/CVE-2022-40727.json new file mode 100644 index 00000000000..4983dd2ea12 --- /dev/null +++ b/2022/40xxx/CVE-2022-40727.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40727", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40728.json b/2022/40xxx/CVE-2022-40728.json new file mode 100644 index 00000000000..3a60b135dab --- /dev/null +++ b/2022/40xxx/CVE-2022-40728.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40728", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40729.json b/2022/40xxx/CVE-2022-40729.json new file mode 100644 index 00000000000..bdd445f17ef --- /dev/null +++ b/2022/40xxx/CVE-2022-40729.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40729", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40730.json b/2022/40xxx/CVE-2022-40730.json new file mode 100644 index 00000000000..5521f59bbab --- /dev/null +++ b/2022/40xxx/CVE-2022-40730.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40730", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40731.json b/2022/40xxx/CVE-2022-40731.json new file mode 100644 index 00000000000..02b9093dadd --- /dev/null +++ b/2022/40xxx/CVE-2022-40731.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40731", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file