From 2e6ad3c9537e3802c8d6983b75fe61c9c0cde794 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 24 Feb 2022 15:04:37 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/25xxx/CVE-2019-25058.json | 72 +++++++++++++ 2022/0xxx/CVE-2022-0748.json | 18 ++++ 2022/0xxx/CVE-2022-0749.json | 18 ++++ 2022/21xxx/CVE-2022-21122.json | 18 ++++ 2022/21xxx/CVE-2022-21165.json | 18 ++++ 2022/21xxx/CVE-2022-21169.json | 18 ++++ 2022/21xxx/CVE-2022-21186.json | 18 ++++ 2022/21xxx/CVE-2022-21190.json | 18 ++++ 2022/21xxx/CVE-2022-21191.json | 18 ++++ 2022/21xxx/CVE-2022-21222.json | 18 ++++ 2022/21xxx/CVE-2022-21231.json | 18 ++++ 2022/23xxx/CVE-2022-23176.json | 61 +++++++++-- 2022/23xxx/CVE-2022-23812.json | 18 ++++ 2022/24xxx/CVE-2022-24298.json | 18 ++++ 2022/24xxx/CVE-2022-24429.json | 18 ++++ 2022/24xxx/CVE-2022-24433.json | 18 ++++ 2022/24xxx/CVE-2022-24437.json | 18 ++++ 2022/24xxx/CVE-2022-24440.json | 18 ++++ 2022/24xxx/CVE-2022-24671.json | 128 +++++++++++----------- 2022/24xxx/CVE-2022-24678.json | 156 ++++++++++++++------------- 2022/24xxx/CVE-2022-24679.json | 156 ++++++++++++++------------- 2022/24xxx/CVE-2022-24680.json | 156 ++++++++++++++------------- 2022/25xxx/CVE-2022-25232.json | 18 ++++ 2022/25xxx/CVE-2022-25300.json | 18 ++++ 2022/25xxx/CVE-2022-25329.json | 188 +++++++++++++++++---------------- 2022/25xxx/CVE-2022-25330.json | 188 +++++++++++++++++---------------- 2022/25xxx/CVE-2022-25331.json | 188 +++++++++++++++++---------------- 2022/25xxx/CVE-2022-25346.json | 18 ++++ 2022/25xxx/CVE-2022-25350.json | 18 ++++ 2022/25xxx/CVE-2022-25354.json | 18 ++++ 2022/25xxx/CVE-2022-25638.json | 61 +++++++++-- 2022/25xxx/CVE-2022-25640.json | 56 ++++++++-- 2022/25xxx/CVE-2022-25646.json | 18 ++++ 2022/25xxx/CVE-2022-25647.json | 18 ++++ 2022/25xxx/CVE-2022-25761.json | 18 ++++ 2022/25xxx/CVE-2022-25765.json | 18 ++++ 2022/25xxx/CVE-2022-25766.json | 18 ++++ 2022/25xxx/CVE-2022-25834.json | 18 ++++ 2022/25xxx/CVE-2022-25835.json | 18 ++++ 2022/25xxx/CVE-2022-25836.json | 18 ++++ 2022/25xxx/CVE-2022-25837.json | 18 ++++ 2022/25xxx/CVE-2022-25838.json | 62 +++++++++++ 2022/25xxx/CVE-2022-25846.json | 18 ++++ 2022/25xxx/CVE-2022-25852.json | 18 ++++ 2022/25xxx/CVE-2022-25854.json | 18 ++++ 2022/25xxx/CVE-2022-25856.json | 18 ++++ 2022/25xxx/CVE-2022-25857.json | 18 ++++ 2022/25xxx/CVE-2022-25865.json | 18 ++++ 2022/25xxx/CVE-2022-25871.json | 18 ++++ 2022/25xxx/CVE-2022-25879.json | 18 ++++ 2022/25xxx/CVE-2022-25884.json | 18 ++++ 2022/25xxx/CVE-2022-25890.json | 18 ++++ 2022/25xxx/CVE-2022-25901.json | 18 ++++ 2022/25xxx/CVE-2022-25907.json | 18 ++++ 2022/25xxx/CVE-2022-25908.json | 18 ++++ 2022/25xxx/CVE-2022-25913.json | 18 ++++ 2022/25xxx/CVE-2022-25918.json | 18 ++++ 2022/25xxx/CVE-2022-25921.json | 18 ++++ 2022/25xxx/CVE-2022-25926.json | 18 ++++ 2022/25xxx/CVE-2022-25927.json | 18 ++++ 2022/25xxx/CVE-2022-25930.json | 18 ++++ 2022/25xxx/CVE-2022-25933.json | 18 ++++ 2022/25xxx/CVE-2022-25936.json | 18 ++++ 2022/25xxx/CVE-2022-25937.json | 18 ++++ 2022/25xxx/CVE-2022-25939.json | 18 ++++ 2022/25xxx/CVE-2022-25941.json | 18 ++++ 2022/25xxx/CVE-2022-25944.json | 18 ++++ 2022/25xxx/CVE-2022-25945.json | 18 ++++ 2022/25xxx/CVE-2022-25947.json | 18 ++++ 2022/25xxx/CVE-2022-25951.json | 18 ++++ 2022/25xxx/CVE-2022-25954.json | 18 ++++ 2022/25xxx/CVE-2022-25955.json | 18 ++++ 2022/25xxx/CVE-2022-25956.json | 18 ++++ 2022/25xxx/CVE-2022-25961.json | 18 ++++ 2022/25xxx/CVE-2022-25963.json | 18 ++++ 2022/25xxx/CVE-2022-25965.json | 18 ++++ 2022/25xxx/CVE-2022-25975.json | 18 ++++ 2022/25xxx/CVE-2022-25983.json | 18 ++++ 2022/25xxx/CVE-2022-25984.json | 18 ++++ 2022/25xxx/CVE-2022-25988.json | 18 ++++ 2022/25xxx/CVE-2022-25991.json | 18 ++++ 2022/26xxx/CVE-2022-26008.json | 18 ++++ 2022/26xxx/CVE-2022-26018.json | 18 ++++ 2022/26xxx/CVE-2022-26030.json | 18 ++++ 2022/26xxx/CVE-2022-26033.json | 18 ++++ 2022/26xxx/CVE-2022-26044.json | 18 ++++ 2022/26xxx/CVE-2022-26046.json | 18 ++++ 2022/26xxx/CVE-2022-26050.json | 18 ++++ 2022/26xxx/CVE-2022-26060.json | 18 ++++ 89 files changed, 2277 insertions(+), 581 deletions(-) create mode 100644 2019/25xxx/CVE-2019-25058.json create mode 100644 2022/0xxx/CVE-2022-0748.json create mode 100644 2022/0xxx/CVE-2022-0749.json create mode 100644 2022/21xxx/CVE-2022-21122.json create mode 100644 2022/21xxx/CVE-2022-21165.json create mode 100644 2022/21xxx/CVE-2022-21169.json create mode 100644 2022/21xxx/CVE-2022-21186.json create mode 100644 2022/21xxx/CVE-2022-21190.json create mode 100644 2022/21xxx/CVE-2022-21191.json create mode 100644 2022/21xxx/CVE-2022-21222.json create mode 100644 2022/21xxx/CVE-2022-21231.json create mode 100644 2022/23xxx/CVE-2022-23812.json create mode 100644 2022/24xxx/CVE-2022-24298.json create mode 100644 2022/24xxx/CVE-2022-24429.json create mode 100644 2022/24xxx/CVE-2022-24433.json create mode 100644 2022/24xxx/CVE-2022-24437.json create mode 100644 2022/24xxx/CVE-2022-24440.json create mode 100644 2022/25xxx/CVE-2022-25232.json create mode 100644 2022/25xxx/CVE-2022-25300.json create mode 100644 2022/25xxx/CVE-2022-25346.json create mode 100644 2022/25xxx/CVE-2022-25350.json create mode 100644 2022/25xxx/CVE-2022-25354.json create mode 100644 2022/25xxx/CVE-2022-25646.json create mode 100644 2022/25xxx/CVE-2022-25647.json create mode 100644 2022/25xxx/CVE-2022-25761.json create mode 100644 2022/25xxx/CVE-2022-25765.json create mode 100644 2022/25xxx/CVE-2022-25766.json create mode 100644 2022/25xxx/CVE-2022-25834.json create mode 100644 2022/25xxx/CVE-2022-25835.json create mode 100644 2022/25xxx/CVE-2022-25836.json create mode 100644 2022/25xxx/CVE-2022-25837.json create mode 100644 2022/25xxx/CVE-2022-25838.json create mode 100644 2022/25xxx/CVE-2022-25846.json create mode 100644 2022/25xxx/CVE-2022-25852.json create mode 100644 2022/25xxx/CVE-2022-25854.json create mode 100644 2022/25xxx/CVE-2022-25856.json create mode 100644 2022/25xxx/CVE-2022-25857.json create mode 100644 2022/25xxx/CVE-2022-25865.json create mode 100644 2022/25xxx/CVE-2022-25871.json create mode 100644 2022/25xxx/CVE-2022-25879.json create mode 100644 2022/25xxx/CVE-2022-25884.json create mode 100644 2022/25xxx/CVE-2022-25890.json create mode 100644 2022/25xxx/CVE-2022-25901.json create mode 100644 2022/25xxx/CVE-2022-25907.json create mode 100644 2022/25xxx/CVE-2022-25908.json create mode 100644 2022/25xxx/CVE-2022-25913.json create mode 100644 2022/25xxx/CVE-2022-25918.json create mode 100644 2022/25xxx/CVE-2022-25921.json create mode 100644 2022/25xxx/CVE-2022-25926.json create mode 100644 2022/25xxx/CVE-2022-25927.json create mode 100644 2022/25xxx/CVE-2022-25930.json create mode 100644 2022/25xxx/CVE-2022-25933.json create mode 100644 2022/25xxx/CVE-2022-25936.json create mode 100644 2022/25xxx/CVE-2022-25937.json create mode 100644 2022/25xxx/CVE-2022-25939.json create mode 100644 2022/25xxx/CVE-2022-25941.json create mode 100644 2022/25xxx/CVE-2022-25944.json create mode 100644 2022/25xxx/CVE-2022-25945.json create mode 100644 2022/25xxx/CVE-2022-25947.json create mode 100644 2022/25xxx/CVE-2022-25951.json create mode 100644 2022/25xxx/CVE-2022-25954.json create mode 100644 2022/25xxx/CVE-2022-25955.json create mode 100644 2022/25xxx/CVE-2022-25956.json create mode 100644 2022/25xxx/CVE-2022-25961.json create mode 100644 2022/25xxx/CVE-2022-25963.json create mode 100644 2022/25xxx/CVE-2022-25965.json create mode 100644 2022/25xxx/CVE-2022-25975.json create mode 100644 2022/25xxx/CVE-2022-25983.json create mode 100644 2022/25xxx/CVE-2022-25984.json create mode 100644 2022/25xxx/CVE-2022-25988.json create mode 100644 2022/25xxx/CVE-2022-25991.json create mode 100644 2022/26xxx/CVE-2022-26008.json create mode 100644 2022/26xxx/CVE-2022-26018.json create mode 100644 2022/26xxx/CVE-2022-26030.json create mode 100644 2022/26xxx/CVE-2022-26033.json create mode 100644 2022/26xxx/CVE-2022-26044.json create mode 100644 2022/26xxx/CVE-2022-26046.json create mode 100644 2022/26xxx/CVE-2022-26050.json create mode 100644 2022/26xxx/CVE-2022-26060.json diff --git a/2019/25xxx/CVE-2019-25058.json b/2019/25xxx/CVE-2019-25058.json new file mode 100644 index 00000000000..27e4c30a4d7 --- /dev/null +++ b/2019/25xxx/CVE-2019-25058.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-25058", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in USBGuard before 1.1.0. On systems with the usbguard-dbus daemon running, an unprivileged user could make USBGuard allow all USB devices to be connected in the future." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/USBGuard/usbguard/issues/273", + "refsource": "MISC", + "name": "https://github.com/USBGuard/usbguard/issues/273" + }, + { + "url": "https://github.com/USBGuard/usbguard/issues/403", + "refsource": "MISC", + "name": "https://github.com/USBGuard/usbguard/issues/403" + }, + { + "url": "https://github.com/USBGuard/usbguard/pull/531", + "refsource": "MISC", + "name": "https://github.com/USBGuard/usbguard/pull/531" + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0748.json b/2022/0xxx/CVE-2022-0748.json new file mode 100644 index 00000000000..566ba672030 --- /dev/null +++ b/2022/0xxx/CVE-2022-0748.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0748", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0749.json b/2022/0xxx/CVE-2022-0749.json new file mode 100644 index 00000000000..1ca9b3fc02e --- /dev/null +++ b/2022/0xxx/CVE-2022-0749.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0749", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21122.json b/2022/21xxx/CVE-2022-21122.json new file mode 100644 index 00000000000..fc8482cf11b --- /dev/null +++ b/2022/21xxx/CVE-2022-21122.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-21122", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21165.json b/2022/21xxx/CVE-2022-21165.json new file mode 100644 index 00000000000..41f60b63208 --- /dev/null +++ b/2022/21xxx/CVE-2022-21165.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-21165", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21169.json b/2022/21xxx/CVE-2022-21169.json new file mode 100644 index 00000000000..8e875f84836 --- /dev/null +++ b/2022/21xxx/CVE-2022-21169.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-21169", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21186.json b/2022/21xxx/CVE-2022-21186.json new file mode 100644 index 00000000000..01b00f7b86d --- /dev/null +++ b/2022/21xxx/CVE-2022-21186.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-21186", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21190.json b/2022/21xxx/CVE-2022-21190.json new file mode 100644 index 00000000000..2f9694125d9 --- /dev/null +++ b/2022/21xxx/CVE-2022-21190.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-21190", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21191.json b/2022/21xxx/CVE-2022-21191.json new file mode 100644 index 00000000000..15ab9b4f28c --- /dev/null +++ b/2022/21xxx/CVE-2022-21191.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-21191", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21222.json b/2022/21xxx/CVE-2022-21222.json new file mode 100644 index 00000000000..1e24a30945d --- /dev/null +++ b/2022/21xxx/CVE-2022-21222.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-21222", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21231.json b/2022/21xxx/CVE-2022-21231.json new file mode 100644 index 00000000000..29fb710b1e2 --- /dev/null +++ b/2022/21xxx/CVE-2022-21231.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-21231", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23176.json b/2022/23xxx/CVE-2022-23176.json index 0efeb202e64..ae2f9690398 100644 --- a/2022/23xxx/CVE-2022-23176.json +++ b/2022/23xxx/CVE-2022-23176.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-23176", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-23176", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WatchGuard Firebox and XTM appliances allow a remote attacker with unprivileged credentials to access the system with a privileged management session via exposed management access. This vulnerability impacts Fireware OS before 11.7.2_U1, 12.x before 12.1.3_U3, and 12.2.x through 12.5.x before 12.5.7_U3." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://securityportal.watchguard.com", + "refsource": "MISC", + "name": "https://securityportal.watchguard.com" + }, + { + "refsource": "CONFIRM", + "name": "https://www.watchguard.com/support/release-notes/fireware/12/en-US/EN_ReleaseNotes_Fireware_12_7/index.html#Fireware/en-US/resolved_issues.html", + "url": "https://www.watchguard.com/support/release-notes/fireware/12/en-US/EN_ReleaseNotes_Fireware_12_7/index.html#Fireware/en-US/resolved_issues.html" } ] } diff --git a/2022/23xxx/CVE-2022-23812.json b/2022/23xxx/CVE-2022-23812.json new file mode 100644 index 00000000000..b730368d73f --- /dev/null +++ b/2022/23xxx/CVE-2022-23812.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23812", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24298.json b/2022/24xxx/CVE-2022-24298.json new file mode 100644 index 00000000000..d78a2729d59 --- /dev/null +++ b/2022/24xxx/CVE-2022-24298.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24298", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24429.json b/2022/24xxx/CVE-2022-24429.json new file mode 100644 index 00000000000..5443c491ac3 --- /dev/null +++ b/2022/24xxx/CVE-2022-24429.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24429", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24433.json b/2022/24xxx/CVE-2022-24433.json new file mode 100644 index 00000000000..b1b83a541ce --- /dev/null +++ b/2022/24xxx/CVE-2022-24433.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24433", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24437.json b/2022/24xxx/CVE-2022-24437.json new file mode 100644 index 00000000000..f31afc52ad7 --- /dev/null +++ b/2022/24xxx/CVE-2022-24437.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24437", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24440.json b/2022/24xxx/CVE-2022-24440.json new file mode 100644 index 00000000000..0265fd29c40 --- /dev/null +++ b/2022/24xxx/CVE-2022-24440.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24440", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24671.json b/2022/24xxx/CVE-2022-24671.json index 7c9d8f3245e..7d9cc6d364a 100644 --- a/2022/24xxx/CVE-2022-24671.json +++ b/2022/24xxx/CVE-2022-24671.json @@ -1,63 +1,67 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "security@trendmicro.com", - "ID" : "CVE-2022-24671", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Trend Micro Antivirus for Mac", - "version" : { - "version_data" : [ - { - "version_value" : "11.0.2150 and below" - } - ] - } - } - ] - }, - "vendor_name" : "Trend Micro" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "A link following privilege escalation vulnerability in Trend Micro Antivirus for Max 11.0.2150 and below could allow a local attacker to modify a file during the update process and escalate their privileges.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Link Following Privilege Escalation" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "url" : "https://helpcenter.trendmicro.com/en-us/article/TMKA-10937" - }, - { - "url" : "https://www.zerodayinitiative.com/advisories/ZDI-22-371/" - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "security@trendmicro.com", + "ID": "CVE-2022-24671", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Trend Micro Antivirus for Mac", + "version": { + "version_data": [ + { + "version_value": "11.0.2150 and below" + } + ] + } + } + ] + }, + "vendor_name": "Trend Micro" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A link following privilege escalation vulnerability in Trend Micro Antivirus for Max 11.0.2150 and below could allow a local attacker to modify a file during the update process and escalate their privileges. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Link Following Privilege Escalation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://helpcenter.trendmicro.com/en-us/article/TMKA-10937", + "refsource": "MISC", + "name": "https://helpcenter.trendmicro.com/en-us/article/TMKA-10937" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-371/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-371/" + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24678.json b/2022/24xxx/CVE-2022-24678.json index 2c70c975f56..eafab5ee273 100644 --- a/2022/24xxx/CVE-2022-24678.json +++ b/2022/24xxx/CVE-2022-24678.json @@ -1,76 +1,82 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "security@trendmicro.com", - "ID" : "CVE-2022-24678", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Trend Micro Apex One", - "version" : { - "version_data" : [ - { - "version_value" : "2019, SaaS" - } - ] - } - }, - { - "product_name" : "Trend Micro Worry-Free Business Security", - "version" : { - "version_data" : [ - { - "version_value" : "10.0 SP1, Services (SaaS)" - } - ] - } - } - ] - }, - "vendor_name" : "Trend Micro" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "An security agent resource exhaustion denial-of-service vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow an attacker to flood a temporary log location and consume all disk space on affected installations." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Resource Exhaustion Denial-of-Service" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "url" : "https://success.trendmicro.com/solution/000290464" - }, - { - "url" : "https://success.trendmicro.com/solution/000290486" - }, - { - "url" : "https://www.zerodayinitiative.com/advisories/ZDI-22-372/" - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "security@trendmicro.com", + "ID": "CVE-2022-24678", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Trend Micro Apex One", + "version": { + "version_data": [ + { + "version_value": "2019, SaaS" + } + ] + } + }, + { + "product_name": "Trend Micro Worry-Free Business Security", + "version": { + "version_data": [ + { + "version_value": "10.0 SP1, Services (SaaS)" + } + ] + } + } + ] + }, + "vendor_name": "Trend Micro" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An security agent resource exhaustion denial-of-service vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow an attacker to flood a temporary log location and consume all disk space on affected installations." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Resource Exhaustion Denial-of-Service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://success.trendmicro.com/solution/000290464", + "refsource": "MISC", + "name": "https://success.trendmicro.com/solution/000290464" + }, + { + "url": "https://success.trendmicro.com/solution/000290486", + "refsource": "MISC", + "name": "https://success.trendmicro.com/solution/000290486" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-372/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-372/" + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24679.json b/2022/24xxx/CVE-2022-24679.json index 9bcd149d12e..ac275c856c1 100644 --- a/2022/24xxx/CVE-2022-24679.json +++ b/2022/24xxx/CVE-2022-24679.json @@ -1,76 +1,82 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "security@trendmicro.com", - "ID" : "CVE-2022-24679", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Trend Micro Apex One", - "version" : { - "version_data" : [ - { - "version_value" : "2019, SaaS" - } - ] - } - }, - { - "product_name" : "Trend Micro Worry-Free Business Security", - "version" : { - "version_data" : [ - { - "version_value" : "10.0 SP1, Services (SaaS)" - } - ] - } - } - ] - }, - "vendor_name" : "Trend Micro" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "A security link following local privilege escalation vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow a local attacker to create an writable folder in an arbitrary location and escalate privileges affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Link Following Local Privilege Escalation" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "url" : "https://success.trendmicro.com/solution/000290464" - }, - { - "url" : "https://success.trendmicro.com/solution/000290486" - }, - { - "url" : "https://www.zerodayinitiative.com/advisories/ZDI-22-370/" - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "security@trendmicro.com", + "ID": "CVE-2022-24679", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Trend Micro Apex One", + "version": { + "version_data": [ + { + "version_value": "2019, SaaS" + } + ] + } + }, + { + "product_name": "Trend Micro Worry-Free Business Security", + "version": { + "version_data": [ + { + "version_value": "10.0 SP1, Services (SaaS)" + } + ] + } + } + ] + }, + "vendor_name": "Trend Micro" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A security link following local privilege escalation vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow a local attacker to create an writable folder in an arbitrary location and escalate privileges affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Link Following Local Privilege Escalation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://success.trendmicro.com/solution/000290464", + "refsource": "MISC", + "name": "https://success.trendmicro.com/solution/000290464" + }, + { + "url": "https://success.trendmicro.com/solution/000290486", + "refsource": "MISC", + "name": "https://success.trendmicro.com/solution/000290486" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-370/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-370/" + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24680.json b/2022/24xxx/CVE-2022-24680.json index 168b81a5318..96fc85bbe45 100644 --- a/2022/24xxx/CVE-2022-24680.json +++ b/2022/24xxx/CVE-2022-24680.json @@ -1,76 +1,82 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "security@trendmicro.com", - "ID" : "CVE-2022-24680", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Trend Micro Apex One", - "version" : { - "version_data" : [ - { - "version_value" : "2019, SaaS" - } - ] - } - }, - { - "product_name" : "Trend Micro Worry-Free Business Security", - "version" : { - "version_data" : [ - { - "version_value" : "10.0 SP1, Services (SaaS)" - } - ] - } - } - ] - }, - "vendor_name" : "Trend Micro" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "A security link following local privilege escalation vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow a local attacker to create a mount point and leverage this for arbitrary folder deletion, leading to escalated privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Link Following Local Privilege Escalation" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "url" : "https://success.trendmicro.com/solution/000290464" - }, - { - "url" : "https://success.trendmicro.com/solution/000290486" - }, - { - "url" : "https://www.zerodayinitiative.com/advisories/ZDI-22-369/" - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "security@trendmicro.com", + "ID": "CVE-2022-24680", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Trend Micro Apex One", + "version": { + "version_data": [ + { + "version_value": "2019, SaaS" + } + ] + } + }, + { + "product_name": "Trend Micro Worry-Free Business Security", + "version": { + "version_data": [ + { + "version_value": "10.0 SP1, Services (SaaS)" + } + ] + } + } + ] + }, + "vendor_name": "Trend Micro" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A security link following local privilege escalation vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow a local attacker to create a mount point and leverage this for arbitrary folder deletion, leading to escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Link Following Local Privilege Escalation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://success.trendmicro.com/solution/000290464", + "refsource": "MISC", + "name": "https://success.trendmicro.com/solution/000290464" + }, + { + "url": "https://success.trendmicro.com/solution/000290486", + "refsource": "MISC", + "name": "https://success.trendmicro.com/solution/000290486" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-369/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-369/" + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25232.json b/2022/25xxx/CVE-2022-25232.json new file mode 100644 index 00000000000..5cc113caa87 --- /dev/null +++ b/2022/25xxx/CVE-2022-25232.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25232", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25300.json b/2022/25xxx/CVE-2022-25300.json new file mode 100644 index 00000000000..faf69acaa11 --- /dev/null +++ b/2022/25xxx/CVE-2022-25300.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25300", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25329.json b/2022/25xxx/CVE-2022-25329.json index 747f891b1fa..a722e4a32ef 100644 --- a/2022/25xxx/CVE-2022-25329.json +++ b/2022/25xxx/CVE-2022-25329.json @@ -1,93 +1,97 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "security@trendmicro.com", - "ID" : "CVE-2022-25329", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Trend Micro ServerProtect for Storage", - "version" : { - "version_data" : [ - { - "version_value" : "6.0" - } - ] - } - }, - { - "product_name" : "Trend Micro ServerProtect for Microsoft Windows / Novell NetWare", - "version" : { - "version_data" : [ - { - "version_value" : "5.8" - } - ] - } - }, - { - "product_name" : "Trend Micro ServerProtect for EMC Celerra", - "version" : { - "version_data" : [ - { - "version_value" : "5.8" - } - ] - } - }, - { - "product_name" : "Trend Micro ServerProtect for Network Appliance Filers", - "version" : { - "version_data" : [ - { - "version_value" : "5.8" - } - ] - } - } - ] - }, - "vendor_name" : "Trend Micro" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Trend Micro ServerProtect 6.0/5.8 Information Server uses a static credential to perform authentication when a specific command is typed in the console. An unauthenticated remote attacker with access to the Information Server could exploit this to register to the server and perform authenticated actions." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Static Credential" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "url" : "https://success.trendmicro.com/solution/000290507" - }, - { - "url" : "https://www.tenable.com/security/research/tra-2022-05" - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "security@trendmicro.com", + "ID": "CVE-2022-25329", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Trend Micro ServerProtect for Storage", + "version": { + "version_data": [ + { + "version_value": "6.0" + } + ] + } + }, + { + "product_name": "Trend Micro ServerProtect for Microsoft Windows / Novell NetWare", + "version": { + "version_data": [ + { + "version_value": "5.8" + } + ] + } + }, + { + "product_name": "Trend Micro ServerProtect for EMC Celerra", + "version": { + "version_data": [ + { + "version_value": "5.8" + } + ] + } + }, + { + "product_name": "Trend Micro ServerProtect for Network Appliance Filers", + "version": { + "version_data": [ + { + "version_value": "5.8" + } + ] + } + } + ] + }, + "vendor_name": "Trend Micro" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Trend Micro ServerProtect 6.0/5.8 Information Server uses a static credential to perform authentication when a specific command is typed in the console. An unauthenticated remote attacker with access to the Information Server could exploit this to register to the server and perform authenticated actions." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Static Credential" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://success.trendmicro.com/solution/000290507", + "refsource": "MISC", + "name": "https://success.trendmicro.com/solution/000290507" + }, + { + "url": "https://www.tenable.com/security/research/tra-2022-05", + "refsource": "MISC", + "name": "https://www.tenable.com/security/research/tra-2022-05" + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25330.json b/2022/25xxx/CVE-2022-25330.json index f4f7be089d7..98e1974e851 100644 --- a/2022/25xxx/CVE-2022-25330.json +++ b/2022/25xxx/CVE-2022-25330.json @@ -1,93 +1,97 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "security@trendmicro.com", - "ID" : "CVE-2022-25330", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Trend Micro ServerProtect for Storage", - "version" : { - "version_data" : [ - { - "version_value" : "6.0" - } - ] - } - }, - { - "product_name" : "Trend Micro ServerProtect for Microsoft Windows / Novell NetWare", - "version" : { - "version_data" : [ - { - "version_value" : "5.8" - } - ] - } - }, - { - "product_name" : "Trend Micro ServerProtect for EMC Celerra", - "version" : { - "version_data" : [ - { - "version_value" : "5.8" - } - ] - } - }, - { - "product_name" : "Trend Micro ServerProtect for Network Appliance Filers", - "version" : { - "version_data" : [ - { - "version_value" : "5.8" - } - ] - } - } - ] - }, - "vendor_name" : "Trend Micro" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Integer overflow conditions that exist in Trend Micro ServerProtect 6.0/5.8 Information Server could allow a remote attacker to crash the process or achieve remote code execution." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Command Integer Overflow" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "url" : "https://success.trendmicro.com/solution/000290507" - }, - { - "url" : "https://www.tenable.com/security/research/tra-2022-05" - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "security@trendmicro.com", + "ID": "CVE-2022-25330", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Trend Micro ServerProtect for Storage", + "version": { + "version_data": [ + { + "version_value": "6.0" + } + ] + } + }, + { + "product_name": "Trend Micro ServerProtect for Microsoft Windows / Novell NetWare", + "version": { + "version_data": [ + { + "version_value": "5.8" + } + ] + } + }, + { + "product_name": "Trend Micro ServerProtect for EMC Celerra", + "version": { + "version_data": [ + { + "version_value": "5.8" + } + ] + } + }, + { + "product_name": "Trend Micro ServerProtect for Network Appliance Filers", + "version": { + "version_data": [ + { + "version_value": "5.8" + } + ] + } + } + ] + }, + "vendor_name": "Trend Micro" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Integer overflow conditions that exist in Trend Micro ServerProtect 6.0/5.8 Information Server could allow a remote attacker to crash the process or achieve remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Command Integer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://success.trendmicro.com/solution/000290507", + "refsource": "MISC", + "name": "https://success.trendmicro.com/solution/000290507" + }, + { + "url": "https://www.tenable.com/security/research/tra-2022-05", + "refsource": "MISC", + "name": "https://www.tenable.com/security/research/tra-2022-05" + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25331.json b/2022/25xxx/CVE-2022-25331.json index 53c24d4c4c3..5281faf83d8 100644 --- a/2022/25xxx/CVE-2022-25331.json +++ b/2022/25xxx/CVE-2022-25331.json @@ -1,93 +1,97 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "security@trendmicro.com", - "ID" : "CVE-2022-25331", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Trend Micro ServerProtect for Storage", - "version" : { - "version_data" : [ - { - "version_value" : "6.0" - } - ] - } - }, - { - "product_name" : "Trend Micro ServerProtect for Microsoft Windows / Novell NetWare", - "version" : { - "version_data" : [ - { - "version_value" : "5.8" - } - ] - } - }, - { - "product_name" : "Trend Micro ServerProtect for EMC Celerra", - "version" : { - "version_data" : [ - { - "version_value" : "5.8" - } - ] - } - }, - { - "product_name" : "Trend Micro ServerProtect for Network Appliance Filers", - "version" : { - "version_data" : [ - { - "version_value" : "5.8" - } - ] - } - } - ] - }, - "vendor_name" : "Trend Micro" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Uncaught exceptions that can be generated in Trend Micro ServerProtection 6.0/5.8 Information Server could allow a remote attacker to crash the process." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Command DoS" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "url" : "https://success.trendmicro.com/solution/000290507" - }, - { - "url" : "https://www.tenable.com/security/research/tra-2022-05" - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "security@trendmicro.com", + "ID": "CVE-2022-25331", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Trend Micro ServerProtect for Storage", + "version": { + "version_data": [ + { + "version_value": "6.0" + } + ] + } + }, + { + "product_name": "Trend Micro ServerProtect for Microsoft Windows / Novell NetWare", + "version": { + "version_data": [ + { + "version_value": "5.8" + } + ] + } + }, + { + "product_name": "Trend Micro ServerProtect for EMC Celerra", + "version": { + "version_data": [ + { + "version_value": "5.8" + } + ] + } + }, + { + "product_name": "Trend Micro ServerProtect for Network Appliance Filers", + "version": { + "version_data": [ + { + "version_value": "5.8" + } + ] + } + } + ] + }, + "vendor_name": "Trend Micro" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Uncaught exceptions that can be generated in Trend Micro ServerProtection 6.0/5.8 Information Server could allow a remote attacker to crash the process." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Command DoS" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://success.trendmicro.com/solution/000290507", + "refsource": "MISC", + "name": "https://success.trendmicro.com/solution/000290507" + }, + { + "url": "https://www.tenable.com/security/research/tra-2022-05", + "refsource": "MISC", + "name": "https://www.tenable.com/security/research/tra-2022-05" + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25346.json b/2022/25xxx/CVE-2022-25346.json new file mode 100644 index 00000000000..087685c5d49 --- /dev/null +++ b/2022/25xxx/CVE-2022-25346.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25346", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25350.json b/2022/25xxx/CVE-2022-25350.json new file mode 100644 index 00000000000..31d5aa7a078 --- /dev/null +++ b/2022/25xxx/CVE-2022-25350.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25350", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25354.json b/2022/25xxx/CVE-2022-25354.json new file mode 100644 index 00000000000..e2e02da256b --- /dev/null +++ b/2022/25xxx/CVE-2022-25354.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25354", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25638.json b/2022/25xxx/CVE-2022-25638.json index bb39ee366e4..55715e585e0 100644 --- a/2022/25xxx/CVE-2022-25638.json +++ b/2022/25xxx/CVE-2022-25638.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25638", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25638", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In wolfSSL before 5.2.0, certificate validation may be bypassed during attempted authentication by a TLS 1.3 client to a TLS 1.3 server. This occurs when the sig_algo field differs between the certificate_verify message and the certificate message." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/wolfSSL/wolfssl/pull/4813", + "url": "https://github.com/wolfSSL/wolfssl/pull/4813" + }, + { + "refsource": "CONFIRM", + "name": "https://www.wolfssl.com/docs/security-vulnerabilities/", + "url": "https://www.wolfssl.com/docs/security-vulnerabilities/" } ] } diff --git a/2022/25xxx/CVE-2022-25640.json b/2022/25xxx/CVE-2022-25640.json index 02cfe8a6aaf..6953b045ff5 100644 --- a/2022/25xxx/CVE-2022-25640.json +++ b/2022/25xxx/CVE-2022-25640.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25640", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25640", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In wolfSSL before 5.2.0, a TLS 1.3 server cannot properly enforce a requirement for mutual authentication. A client can simply omit the certificate_verify message from the handshake, and never present a certificate." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/wolfSSL/wolfssl/pull/4831", + "url": "https://github.com/wolfSSL/wolfssl/pull/4831" } ] } diff --git a/2022/25xxx/CVE-2022-25646.json b/2022/25xxx/CVE-2022-25646.json new file mode 100644 index 00000000000..37c4915f5f2 --- /dev/null +++ b/2022/25xxx/CVE-2022-25646.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25646", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25647.json b/2022/25xxx/CVE-2022-25647.json new file mode 100644 index 00000000000..93e141b794c --- /dev/null +++ b/2022/25xxx/CVE-2022-25647.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25647", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25761.json b/2022/25xxx/CVE-2022-25761.json new file mode 100644 index 00000000000..3d021b5428b --- /dev/null +++ b/2022/25xxx/CVE-2022-25761.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25761", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25765.json b/2022/25xxx/CVE-2022-25765.json new file mode 100644 index 00000000000..bedad70fb6f --- /dev/null +++ b/2022/25xxx/CVE-2022-25765.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25765", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25766.json b/2022/25xxx/CVE-2022-25766.json new file mode 100644 index 00000000000..93ec0111711 --- /dev/null +++ b/2022/25xxx/CVE-2022-25766.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25766", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25834.json b/2022/25xxx/CVE-2022-25834.json new file mode 100644 index 00000000000..81bec808a8d --- /dev/null +++ b/2022/25xxx/CVE-2022-25834.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25834", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25835.json b/2022/25xxx/CVE-2022-25835.json new file mode 100644 index 00000000000..93882e16701 --- /dev/null +++ b/2022/25xxx/CVE-2022-25835.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25835", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25836.json b/2022/25xxx/CVE-2022-25836.json new file mode 100644 index 00000000000..1aebcd31514 --- /dev/null +++ b/2022/25xxx/CVE-2022-25836.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25836", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25837.json b/2022/25xxx/CVE-2022-25837.json new file mode 100644 index 00000000000..a30e023472f --- /dev/null +++ b/2022/25xxx/CVE-2022-25837.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25837", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25838.json b/2022/25xxx/CVE-2022-25838.json new file mode 100644 index 00000000000..5e17cb44cac --- /dev/null +++ b/2022/25xxx/CVE-2022-25838.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2022-25838", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Laravel Fortify before 1.11.1 allows reuse within a short time window, thus calling into question the \"OT\" part of the \"TOTP\" concept." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/laravel/fortify/issues/201#issuecomment-1009282153", + "refsource": "MISC", + "name": "https://github.com/laravel/fortify/issues/201#issuecomment-1009282153" + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25846.json b/2022/25xxx/CVE-2022-25846.json new file mode 100644 index 00000000000..7f6dbd9acdf --- /dev/null +++ b/2022/25xxx/CVE-2022-25846.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25846", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25852.json b/2022/25xxx/CVE-2022-25852.json new file mode 100644 index 00000000000..48c1805b6eb --- /dev/null +++ b/2022/25xxx/CVE-2022-25852.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25852", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25854.json b/2022/25xxx/CVE-2022-25854.json new file mode 100644 index 00000000000..be2055f7b3d --- /dev/null +++ b/2022/25xxx/CVE-2022-25854.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25854", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25856.json b/2022/25xxx/CVE-2022-25856.json new file mode 100644 index 00000000000..a104b0fd96d --- /dev/null +++ b/2022/25xxx/CVE-2022-25856.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25856", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25857.json b/2022/25xxx/CVE-2022-25857.json new file mode 100644 index 00000000000..f71b08e1b86 --- /dev/null +++ b/2022/25xxx/CVE-2022-25857.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25857", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25865.json b/2022/25xxx/CVE-2022-25865.json new file mode 100644 index 00000000000..0a2e72e0f0b --- /dev/null +++ b/2022/25xxx/CVE-2022-25865.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25865", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25871.json b/2022/25xxx/CVE-2022-25871.json new file mode 100644 index 00000000000..ddc8d4df819 --- /dev/null +++ b/2022/25xxx/CVE-2022-25871.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25871", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25879.json b/2022/25xxx/CVE-2022-25879.json new file mode 100644 index 00000000000..8bd55d06e4c --- /dev/null +++ b/2022/25xxx/CVE-2022-25879.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25879", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25884.json b/2022/25xxx/CVE-2022-25884.json new file mode 100644 index 00000000000..fbaafa073e6 --- /dev/null +++ b/2022/25xxx/CVE-2022-25884.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25884", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25890.json b/2022/25xxx/CVE-2022-25890.json new file mode 100644 index 00000000000..b6f31a477e1 --- /dev/null +++ b/2022/25xxx/CVE-2022-25890.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25890", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25901.json b/2022/25xxx/CVE-2022-25901.json new file mode 100644 index 00000000000..4b773f906a1 --- /dev/null +++ b/2022/25xxx/CVE-2022-25901.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25901", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25907.json b/2022/25xxx/CVE-2022-25907.json new file mode 100644 index 00000000000..f00b0ba5a36 --- /dev/null +++ b/2022/25xxx/CVE-2022-25907.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25907", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25908.json b/2022/25xxx/CVE-2022-25908.json new file mode 100644 index 00000000000..953a97c7cb8 --- /dev/null +++ b/2022/25xxx/CVE-2022-25908.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25908", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25913.json b/2022/25xxx/CVE-2022-25913.json new file mode 100644 index 00000000000..591a21e62c1 --- /dev/null +++ b/2022/25xxx/CVE-2022-25913.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25913", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25918.json b/2022/25xxx/CVE-2022-25918.json new file mode 100644 index 00000000000..715cb2033ed --- /dev/null +++ b/2022/25xxx/CVE-2022-25918.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25918", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25921.json b/2022/25xxx/CVE-2022-25921.json new file mode 100644 index 00000000000..3a6b13b882f --- /dev/null +++ b/2022/25xxx/CVE-2022-25921.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25921", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25926.json b/2022/25xxx/CVE-2022-25926.json new file mode 100644 index 00000000000..199e347d5ad --- /dev/null +++ b/2022/25xxx/CVE-2022-25926.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25926", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25927.json b/2022/25xxx/CVE-2022-25927.json new file mode 100644 index 00000000000..ae4eab90b94 --- /dev/null +++ b/2022/25xxx/CVE-2022-25927.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25927", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25930.json b/2022/25xxx/CVE-2022-25930.json new file mode 100644 index 00000000000..66a4d87457c --- /dev/null +++ b/2022/25xxx/CVE-2022-25930.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25930", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25933.json b/2022/25xxx/CVE-2022-25933.json new file mode 100644 index 00000000000..045d873a5a7 --- /dev/null +++ b/2022/25xxx/CVE-2022-25933.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25933", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25936.json b/2022/25xxx/CVE-2022-25936.json new file mode 100644 index 00000000000..16d9f636bc8 --- /dev/null +++ b/2022/25xxx/CVE-2022-25936.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25936", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25937.json b/2022/25xxx/CVE-2022-25937.json new file mode 100644 index 00000000000..85acfad0437 --- /dev/null +++ b/2022/25xxx/CVE-2022-25937.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25937", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25939.json b/2022/25xxx/CVE-2022-25939.json new file mode 100644 index 00000000000..dc5193bb2b0 --- /dev/null +++ b/2022/25xxx/CVE-2022-25939.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25939", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25941.json b/2022/25xxx/CVE-2022-25941.json new file mode 100644 index 00000000000..11d6ec28c09 --- /dev/null +++ b/2022/25xxx/CVE-2022-25941.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25941", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25944.json b/2022/25xxx/CVE-2022-25944.json new file mode 100644 index 00000000000..8cf311e5d13 --- /dev/null +++ b/2022/25xxx/CVE-2022-25944.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25944", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25945.json b/2022/25xxx/CVE-2022-25945.json new file mode 100644 index 00000000000..7f619303cee --- /dev/null +++ b/2022/25xxx/CVE-2022-25945.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25945", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25947.json b/2022/25xxx/CVE-2022-25947.json new file mode 100644 index 00000000000..2f49052ffdf --- /dev/null +++ b/2022/25xxx/CVE-2022-25947.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25947", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25951.json b/2022/25xxx/CVE-2022-25951.json new file mode 100644 index 00000000000..dfb80974533 --- /dev/null +++ b/2022/25xxx/CVE-2022-25951.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25951", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25954.json b/2022/25xxx/CVE-2022-25954.json new file mode 100644 index 00000000000..febc0fb8dbf --- /dev/null +++ b/2022/25xxx/CVE-2022-25954.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25954", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25955.json b/2022/25xxx/CVE-2022-25955.json new file mode 100644 index 00000000000..88f99f22f80 --- /dev/null +++ b/2022/25xxx/CVE-2022-25955.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25955", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25956.json b/2022/25xxx/CVE-2022-25956.json new file mode 100644 index 00000000000..c74f27d412d --- /dev/null +++ b/2022/25xxx/CVE-2022-25956.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25956", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25961.json b/2022/25xxx/CVE-2022-25961.json new file mode 100644 index 00000000000..58b19fc23e4 --- /dev/null +++ b/2022/25xxx/CVE-2022-25961.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25961", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25963.json b/2022/25xxx/CVE-2022-25963.json new file mode 100644 index 00000000000..cd7ee4f7bc4 --- /dev/null +++ b/2022/25xxx/CVE-2022-25963.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25963", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25965.json b/2022/25xxx/CVE-2022-25965.json new file mode 100644 index 00000000000..bce37a740e0 --- /dev/null +++ b/2022/25xxx/CVE-2022-25965.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25965", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25975.json b/2022/25xxx/CVE-2022-25975.json new file mode 100644 index 00000000000..45b6dcc6b08 --- /dev/null +++ b/2022/25xxx/CVE-2022-25975.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25975", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25983.json b/2022/25xxx/CVE-2022-25983.json new file mode 100644 index 00000000000..1baad2465f6 --- /dev/null +++ b/2022/25xxx/CVE-2022-25983.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25983", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25984.json b/2022/25xxx/CVE-2022-25984.json new file mode 100644 index 00000000000..91f223d6be2 --- /dev/null +++ b/2022/25xxx/CVE-2022-25984.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25984", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25988.json b/2022/25xxx/CVE-2022-25988.json new file mode 100644 index 00000000000..488f608f893 --- /dev/null +++ b/2022/25xxx/CVE-2022-25988.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25988", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25991.json b/2022/25xxx/CVE-2022-25991.json new file mode 100644 index 00000000000..75c03390d56 --- /dev/null +++ b/2022/25xxx/CVE-2022-25991.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25991", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26008.json b/2022/26xxx/CVE-2022-26008.json new file mode 100644 index 00000000000..40038157f8c --- /dev/null +++ b/2022/26xxx/CVE-2022-26008.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26008", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26018.json b/2022/26xxx/CVE-2022-26018.json new file mode 100644 index 00000000000..4ac168e4c48 --- /dev/null +++ b/2022/26xxx/CVE-2022-26018.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26018", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26030.json b/2022/26xxx/CVE-2022-26030.json new file mode 100644 index 00000000000..c75725a44c1 --- /dev/null +++ b/2022/26xxx/CVE-2022-26030.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26030", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26033.json b/2022/26xxx/CVE-2022-26033.json new file mode 100644 index 00000000000..a4185c40192 --- /dev/null +++ b/2022/26xxx/CVE-2022-26033.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26033", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26044.json b/2022/26xxx/CVE-2022-26044.json new file mode 100644 index 00000000000..866584ce5f3 --- /dev/null +++ b/2022/26xxx/CVE-2022-26044.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26044", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26046.json b/2022/26xxx/CVE-2022-26046.json new file mode 100644 index 00000000000..cb50a625df5 --- /dev/null +++ b/2022/26xxx/CVE-2022-26046.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26046", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26050.json b/2022/26xxx/CVE-2022-26050.json new file mode 100644 index 00000000000..2dacbe5ed18 --- /dev/null +++ b/2022/26xxx/CVE-2022-26050.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26050", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26060.json b/2022/26xxx/CVE-2022-26060.json new file mode 100644 index 00000000000..e6dd903264d --- /dev/null +++ b/2022/26xxx/CVE-2022-26060.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26060", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file