diff --git a/2020/4xxx/CVE-2020-4875.json b/2020/4xxx/CVE-2020-4875.json index 48a594b3c79..846cb118708 100644 --- a/2020/4xxx/CVE-2020-4875.json +++ b/2020/4xxx/CVE-2020-4875.json @@ -1,96 +1,96 @@ { - "impact" : { - "cvssv3" : { - "TM" : { - "E" : "U", - "RL" : "O", - "RC" : "C" - }, - "BM" : { - "UI" : "N", - "AV" : "N", - "AC" : "L", - "I" : "N", - "PR" : "L", - "S" : "U", - "SCORE" : "7.100", - "A" : "L", - "C" : "H" - } - } - }, - "data_format" : "MITRE", - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Cognos Controller", - "version" : { - "version_data" : [ - { - "version_value" : "10.4.0" - }, - { - "version_value" : "10.4.1" - }, - { - "version_value" : "10.4.2" - } - ] - } - } - ] - }, - "vendor_name" : "IBM" + "impact": { + "cvssv3": { + "TM": { + "E": "U", + "RL": "O", + "RC": "C" + }, + "BM": { + "UI": "N", + "AV": "N", + "AC": "L", + "I": "N", + "PR": "L", + "S": "U", + "SCORE": "7.100", + "A": "L", + "C": "H" } - ] - } - }, - "data_type" : "CVE", - "CVE_data_meta" : { - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC", - "ID" : "CVE-2020-4875", - "DATE_PUBLIC" : "2022-01-20T00:00:00" - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Obtain Information", - "lang" : "eng" - } + } + }, + "data_format": "MITRE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cognos Controller", + "version": { + "version_data": [ + { + "version_value": "10.4.0" + }, + { + "version_value": "10.4.1" + }, + { + "version_value": "10.4.2" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } ] - } - ] - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM Cognos Controller 10.4.0, 10.4.1, and 10.4.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 190838." - } - ] - }, - "references" : { - "reference_data" : [ - { - "url" : "https://www.ibm.com/support/pages/node/6509856", - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 6509856 (Cognos Controller)", - "name" : "https://www.ibm.com/support/pages/node/6509856" - }, - { - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190838", - "name" : "ibm-cognos-cve20204875-xxe (190838)", - "title" : "X-Force Vulnerability Report", - "refsource" : "XF" - } - ] - }, - "data_version" : "4.0" -} + } + }, + "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC", + "ID": "CVE-2020-4875", + "DATE_PUBLIC": "2022-01-20T00:00:00" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Obtain Information", + "lang": "eng" + } + ] + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM Cognos Controller 10.4.0, 10.4.1, and 10.4.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 190838." + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6509856", + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6509856 (Cognos Controller)", + "name": "https://www.ibm.com/support/pages/node/6509856" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/190838", + "name": "ibm-cognos-cve20204875-xxe (190838)", + "title": "X-Force Vulnerability Report", + "refsource": "XF" + } + ] + }, + "data_version": "4.0" +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4876.json b/2020/4xxx/CVE-2020-4876.json index e72abb6f6c3..d303b47378b 100644 --- a/2020/4xxx/CVE-2020-4876.json +++ b/2020/4xxx/CVE-2020-4876.json @@ -1,96 +1,96 @@ { - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM Cognos Controller 10.4.0, 10.4.1, and 10.4.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 190839." - } - ] - }, - "references" : { - "reference_data" : [ - { - "url" : "https://www.ibm.com/support/pages/node/6509856", - "name" : "https://www.ibm.com/support/pages/node/6509856", - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 6509856 (Cognos Controller)" - }, - { - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190839", - "title" : "X-Force Vulnerability Report", - "refsource" : "XF", - "name" : "ibm-cognos-cve20204876-xxe (190839)" - } - ] - }, - "CVE_data_meta" : { - "ID" : "CVE-2020-4876", - "DATE_PUBLIC" : "2022-01-20T00:00:00", - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC" - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Obtain Information" - } - ] - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_version": "4.0", + "description": { + "description_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "10.4.0" - }, - { - "version_value" : "10.4.1" - }, - { - "version_value" : "10.4.2" - } - ] - }, - "product_name" : "Cognos Controller" - } - ] - } + "lang": "eng", + "value": "IBM Cognos Controller 10.4.0, 10.4.1, and 10.4.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 190839." } - ] - } - }, - "data_type" : "CVE", - "data_format" : "MITRE", - "impact" : { - "cvssv3" : { - "TM" : { - "RC" : "C", - "RL" : "O", - "E" : "U" - }, - "BM" : { - "C" : "H", - "A" : "L", - "SCORE" : "7.100", - "PR" : "L", - "S" : "U", - "I" : "N", - "AC" : "L", - "AV" : "N", - "UI" : "N" - } - } - } -} + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6509856", + "name": "https://www.ibm.com/support/pages/node/6509856", + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6509856 (Cognos Controller)" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/190839", + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "name": "ibm-cognos-cve20204876-xxe (190839)" + } + ] + }, + "CVE_data_meta": { + "ID": "CVE-2020-4876", + "DATE_PUBLIC": "2022-01-20T00:00:00", + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "10.4.0" + }, + { + "version_value": "10.4.1" + }, + { + "version_value": "10.4.2" + } + ] + }, + "product_name": "Cognos Controller" + } + ] + } + } + ] + } + }, + "data_type": "CVE", + "data_format": "MITRE", + "impact": { + "cvssv3": { + "TM": { + "RC": "C", + "RL": "O", + "E": "U" + }, + "BM": { + "C": "H", + "A": "L", + "SCORE": "7.100", + "PR": "L", + "S": "U", + "I": "N", + "AC": "L", + "AV": "N", + "UI": "N" + } + } + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4877.json b/2020/4xxx/CVE-2020-4877.json index f3fee3c68b9..8106d2ee099 100644 --- a/2020/4xxx/CVE-2020-4877.json +++ b/2020/4xxx/CVE-2020-4877.json @@ -1,96 +1,96 @@ { - "data_version" : "4.0", - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 6509856 (Cognos Controller)", - "name" : "https://www.ibm.com/support/pages/node/6509856", - "url" : "https://www.ibm.com/support/pages/node/6509856" - }, - { - "refsource" : "XF", - "title" : "X-Force Vulnerability Report", - "name" : "ibm-cognos-cve20204877-priv-escalation (190843)", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190843" - } - ] - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM Cognos Controller 10.4.0, 10.4.1, and 10.4.2 could be vulnerable to unauthorized modifications by using public fields in public classes. IBM X-Force ID: 190843." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Gain Privileges", - "lang" : "eng" - } - ] - } - ] - }, - "CVE_data_meta" : { - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC", - "DATE_PUBLIC" : "2022-01-20T00:00:00", - "ID" : "CVE-2020-4877" - }, - "data_type" : "CVE", - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_version": "4.0", + "references": { + "reference_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "10.4.0" - }, - { - "version_value" : "10.4.1" - }, - { - "version_value" : "10.4.2" - } - ] - }, - "product_name" : "Cognos Controller" - } - ] - } + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6509856 (Cognos Controller)", + "name": "https://www.ibm.com/support/pages/node/6509856", + "url": "https://www.ibm.com/support/pages/node/6509856" + }, + { + "refsource": "XF", + "title": "X-Force Vulnerability Report", + "name": "ibm-cognos-cve20204877-priv-escalation (190843)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/190843" } - ] - } - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RC" : "C", - "E" : "U", - "RL" : "O" - }, - "BM" : { - "I" : "L", - "UI" : "N", - "AV" : "N", - "AC" : "L", - "A" : "L", - "C" : "L", - "S" : "U", - "PR" : "N", - "SCORE" : "7.300" - } - } - }, - "data_format" : "MITRE" -} + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM Cognos Controller 10.4.0, 10.4.1, and 10.4.2 could be vulnerable to unauthorized modifications by using public fields in public classes. IBM X-Force ID: 190843." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Gain Privileges", + "lang": "eng" + } + ] + } + ] + }, + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC", + "DATE_PUBLIC": "2022-01-20T00:00:00", + "ID": "CVE-2020-4877" + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "10.4.0" + }, + { + "version_value": "10.4.1" + }, + { + "version_value": "10.4.2" + } + ] + }, + "product_name": "Cognos Controller" + } + ] + } + } + ] + } + }, + "impact": { + "cvssv3": { + "TM": { + "RC": "C", + "E": "U", + "RL": "O" + }, + "BM": { + "I": "L", + "UI": "N", + "AV": "N", + "AC": "L", + "A": "L", + "C": "L", + "S": "U", + "PR": "N", + "SCORE": "7.300" + } + } + }, + "data_format": "MITRE" +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4879.json b/2020/4xxx/CVE-2020-4879.json index 863e7af530c..b8d08590070 100644 --- a/2020/4xxx/CVE-2020-4879.json +++ b/2020/4xxx/CVE-2020-4879.json @@ -1,96 +1,96 @@ { - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Gain Privileges", - "lang" : "eng" - } - ] - } - ] - }, - "CVE_data_meta" : { - "DATE_PUBLIC" : "2022-01-20T00:00:00", - "ID" : "CVE-2020-4879", - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC" - }, - "impact" : { - "cvssv3" : { - "BM" : { - "C" : "L", - "A" : "L", - "SCORE" : "7.300", - "S" : "U", - "PR" : "N", - "I" : "L", - "AC" : "L", - "AV" : "N", - "UI" : "N" - }, - "TM" : { - "E" : "U", - "RL" : "O", - "RC" : "C" - } - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "affects" : { - "vendor" : { - "vendor_data" : [ + "problemtype": { + "problemtype_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "10.4.0" - }, - { - "version_value" : "10.4.1" - }, - { - "version_value" : "10.4.2" - } - ] - }, - "product_name" : "Cognos Controller" - } - ] - } + "description": [ + { + "value": "Gain Privileges", + "lang": "eng" + } + ] } - ] - } - }, - "data_version" : "4.0", - "references" : { - "reference_data" : [ - { - "url" : "https://www.ibm.com/support/pages/node/6509856", - "name" : "https://www.ibm.com/support/pages/node/6509856", - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 6509856 (Cognos Controller)" - }, - { - "title" : "X-Force Vulnerability Report", - "refsource" : "XF", - "name" : "ibm-cognos-cve20204879-priv-escalation (190847)", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190847" - } - ] - }, - "description" : { - "description_data" : [ - { - "value" : "IBM Cognos Controller 10.4.0, 10.4.1, and 10.4.2 could allow a remote attacker to bypass security restrictions, caused by improper validation of authentication cookies. IBM X-Force ID: 190847.", - "lang" : "eng" - } - ] - } -} + ] + }, + "CVE_data_meta": { + "DATE_PUBLIC": "2022-01-20T00:00:00", + "ID": "CVE-2020-4879", + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" + }, + "impact": { + "cvssv3": { + "BM": { + "C": "L", + "A": "L", + "SCORE": "7.300", + "S": "U", + "PR": "N", + "I": "L", + "AC": "L", + "AV": "N", + "UI": "N" + }, + "TM": { + "E": "U", + "RL": "O", + "RC": "C" + } + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "10.4.0" + }, + { + "version_value": "10.4.1" + }, + { + "version_value": "10.4.2" + } + ] + }, + "product_name": "Cognos Controller" + } + ] + } + } + ] + } + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6509856", + "name": "https://www.ibm.com/support/pages/node/6509856", + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6509856 (Cognos Controller)" + }, + { + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "name": "ibm-cognos-cve20204879-priv-escalation (190847)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/190847" + } + ] + }, + "description": { + "description_data": [ + { + "value": "IBM Cognos Controller 10.4.0, 10.4.1, and 10.4.2 could allow a remote attacker to bypass security restrictions, caused by improper validation of authentication cookies. IBM X-Force ID: 190847.", + "lang": "eng" + } + ] + } +} \ No newline at end of file diff --git a/2021/45xxx/CVE-2021-45930.json b/2021/45xxx/CVE-2021-45930.json index 36dfa39d516..ab1ffa60095 100644 --- a/2021/45xxx/CVE-2021-45930.json +++ b/2021/45xxx/CVE-2021-45930.json @@ -81,6 +81,11 @@ "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37306", "refsource": "MISC", "name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37306" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2022-8e3fbc74e9", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V75XNX4GDB64N5BSOAN474RUXXS5OHRU/" } ] } diff --git a/2022/0xxx/CVE-2022-0332.json b/2022/0xxx/CVE-2022-0332.json new file mode 100644 index 00000000000..b1be00dd2d9 --- /dev/null +++ b/2022/0xxx/CVE-2022-0332.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0332", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0333.json b/2022/0xxx/CVE-2022-0333.json new file mode 100644 index 00000000000..bde2a9004a9 --- /dev/null +++ b/2022/0xxx/CVE-2022-0333.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0333", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0334.json b/2022/0xxx/CVE-2022-0334.json new file mode 100644 index 00000000000..327651d30c5 --- /dev/null +++ b/2022/0xxx/CVE-2022-0334.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0334", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0335.json b/2022/0xxx/CVE-2022-0335.json new file mode 100644 index 00000000000..63b34e3c51d --- /dev/null +++ b/2022/0xxx/CVE-2022-0335.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0335", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23813.json b/2022/23xxx/CVE-2022-23813.json new file mode 100644 index 00000000000..b900f325801 --- /dev/null +++ b/2022/23xxx/CVE-2022-23813.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23813", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23814.json b/2022/23xxx/CVE-2022-23814.json new file mode 100644 index 00000000000..ca320696332 --- /dev/null +++ b/2022/23xxx/CVE-2022-23814.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23814", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23815.json b/2022/23xxx/CVE-2022-23815.json new file mode 100644 index 00000000000..a80fa1ce7a2 --- /dev/null +++ b/2022/23xxx/CVE-2022-23815.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23815", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23816.json b/2022/23xxx/CVE-2022-23816.json new file mode 100644 index 00000000000..b7f658fd227 --- /dev/null +++ b/2022/23xxx/CVE-2022-23816.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23816", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23817.json b/2022/23xxx/CVE-2022-23817.json new file mode 100644 index 00000000000..114212d86b4 --- /dev/null +++ b/2022/23xxx/CVE-2022-23817.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23817", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23818.json b/2022/23xxx/CVE-2022-23818.json new file mode 100644 index 00000000000..4378927cf6c --- /dev/null +++ b/2022/23xxx/CVE-2022-23818.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23818", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23819.json b/2022/23xxx/CVE-2022-23819.json new file mode 100644 index 00000000000..8fb190710ac --- /dev/null +++ b/2022/23xxx/CVE-2022-23819.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23819", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23820.json b/2022/23xxx/CVE-2022-23820.json new file mode 100644 index 00000000000..2b3a9040186 --- /dev/null +++ b/2022/23xxx/CVE-2022-23820.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23820", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23821.json b/2022/23xxx/CVE-2022-23821.json new file mode 100644 index 00000000000..9ffbfb6c160 --- /dev/null +++ b/2022/23xxx/CVE-2022-23821.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23821", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23822.json b/2022/23xxx/CVE-2022-23822.json new file mode 100644 index 00000000000..ee2de5df902 --- /dev/null +++ b/2022/23xxx/CVE-2022-23822.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23822", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23823.json b/2022/23xxx/CVE-2022-23823.json new file mode 100644 index 00000000000..e3f4ea4df71 --- /dev/null +++ b/2022/23xxx/CVE-2022-23823.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23823", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23824.json b/2022/23xxx/CVE-2022-23824.json new file mode 100644 index 00000000000..e9fa1e02702 --- /dev/null +++ b/2022/23xxx/CVE-2022-23824.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23824", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23825.json b/2022/23xxx/CVE-2022-23825.json new file mode 100644 index 00000000000..824b3d30ee1 --- /dev/null +++ b/2022/23xxx/CVE-2022-23825.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23825", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23826.json b/2022/23xxx/CVE-2022-23826.json new file mode 100644 index 00000000000..d61a0dea06f --- /dev/null +++ b/2022/23xxx/CVE-2022-23826.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23826", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23827.json b/2022/23xxx/CVE-2022-23827.json new file mode 100644 index 00000000000..10639a550bd --- /dev/null +++ b/2022/23xxx/CVE-2022-23827.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23827", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23828.json b/2022/23xxx/CVE-2022-23828.json new file mode 100644 index 00000000000..3ed80898db0 --- /dev/null +++ b/2022/23xxx/CVE-2022-23828.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23828", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23829.json b/2022/23xxx/CVE-2022-23829.json new file mode 100644 index 00000000000..d70024063b0 --- /dev/null +++ b/2022/23xxx/CVE-2022-23829.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23829", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23830.json b/2022/23xxx/CVE-2022-23830.json new file mode 100644 index 00000000000..370a50f8446 --- /dev/null +++ b/2022/23xxx/CVE-2022-23830.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23830", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23831.json b/2022/23xxx/CVE-2022-23831.json new file mode 100644 index 00000000000..7de56d5d087 --- /dev/null +++ b/2022/23xxx/CVE-2022-23831.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23831", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23832.json b/2022/23xxx/CVE-2022-23832.json new file mode 100644 index 00000000000..4a27245d7fa --- /dev/null +++ b/2022/23xxx/CVE-2022-23832.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23832", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file