diff --git a/2021/1xxx/CVE-2021-1056.json b/2021/1xxx/CVE-2021-1056.json index 9ee4bdabb4c..3f667026dd6 100644 --- a/2021/1xxx/CVE-2021-1056.json +++ b/2021/1xxx/CVE-2021-1056.json @@ -1,62 +1,67 @@ { - "data_type" : "CVE", - "data_format" : "MITRE", - "data_version" : "4.0", - "CVE_data_meta" : { - "ID" : "CVE-2021-1056", - "ASSIGNER" : "psirt@nvidia.com", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "vendor_name" : "NVIDIA", - "product" : { - "product_data" : [ - { - "product_name" : "NVIDIA GPU Display Driver", - "version" : { - "version_data" : [ - { - "version_value" : "All" - } - ] - } - } - ] - } - } - ] - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "denial of service or information disclosure" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5142", - "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5142" - } - ] - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "NVIDIA GPU Display Driver for Linux, all versions, contains a vulnerability in the kernel mode layer (nvidia.ko) in which it does not completely honor operating system file system permissions to provide GPU device-level isolation, which may lead to denial of service or information disclosure." - } - ] - } -} + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1056", + "ASSIGNER": "psirt@nvidia.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NVIDIA", + "product": { + "product_data": [ + { + "product_name": "NVIDIA GPU Display Driver", + "version": { + "version_data": [ + { + "version_value": "All" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "denial of service or information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5142", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5142" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220118 [SECURITY] [DLA 2888-1] nvidia-graphics-drivers security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00013.html" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "NVIDIA GPU Display Driver for Linux, all versions, contains a vulnerability in the kernel mode layer (nvidia.ko) in which it does not completely honor operating system file system permissions to provide GPU device-level isolation, which may lead to denial of service or information disclosure." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1076.json b/2021/1xxx/CVE-2021-1076.json index 31934a38cca..5a7db386d50 100644 --- a/2021/1xxx/CVE-2021-1076.json +++ b/2021/1xxx/CVE-2021-1076.json @@ -1,84 +1,89 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "psirt@nvidia.com", - "ID" : "CVE-2021-1076", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "NVIDIA GPU Display Driver", - "version" : { - "version_data" : [ - { - "version_value" : "All" - } - ] - } - } - ] - }, - "vendor_name" : "NVIDIA" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "NVIDIA GPU Display Driver for Windows and Linux, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys or nvidia.ko) where improper access control may lead to denial of service, information disclosure, or data corruption." - } - ] - }, - "generator" : { - "engine" : "Vulnogram 0.0.9" - }, - "impact" : { - "cvss" : { - "attackComplexity" : "LOW", - "attackVector" : "LOCAL", - "availabilityImpact" : "HIGH", - "baseScore" : 6.6, - "baseSeverity" : "MEDIUM", - "confidentialityImpact" : "LOW", - "integrityImpact" : "LOW", - "privilegesRequired" : "LOW", - "scope" : "UNCHANGED", - "userInteraction" : "NONE", - "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", - "version" : "3.1" - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "denial of service , escalation of privileges, data loss" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172", - "refsource" : "CONFIRM", - "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172" - } - ] - }, - "source" : { - "discovery" : "UNKNOWN" - } -} + "CVE_data_meta": { + "ASSIGNER": "psirt@nvidia.com", + "ID": "CVE-2021-1076", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "NVIDIA GPU Display Driver", + "version": { + "version_data": [ + { + "version_value": "All" + } + ] + } + } + ] + }, + "vendor_name": "NVIDIA" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "NVIDIA GPU Display Driver for Windows and Linux, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys or nvidia.ko) where improper access control may lead to denial of service, information disclosure, or data corruption." + } + ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "denial of service , escalation of privileges, data loss" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5172", + "refsource": "CONFIRM", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5172" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220118 [SECURITY] [DLA 2888-1] nvidia-graphics-drivers security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00013.html" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1093.json b/2021/1xxx/CVE-2021-1093.json index 95179daacb0..a11cdbebaaa 100644 --- a/2021/1xxx/CVE-2021-1093.json +++ b/2021/1xxx/CVE-2021-1093.json @@ -75,6 +75,11 @@ "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5211", "refsource": "CONFIRM", "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5211" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220118 [SECURITY] [DLA 2888-1] nvidia-graphics-drivers security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00013.html" } ] }, diff --git a/2021/1xxx/CVE-2021-1094.json b/2021/1xxx/CVE-2021-1094.json index 0ae73b8a0c7..18bb9cde5a0 100644 --- a/2021/1xxx/CVE-2021-1094.json +++ b/2021/1xxx/CVE-2021-1094.json @@ -75,6 +75,11 @@ "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5211", "refsource": "CONFIRM", "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5211" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220118 [SECURITY] [DLA 2888-1] nvidia-graphics-drivers security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00013.html" } ] }, diff --git a/2021/1xxx/CVE-2021-1095.json b/2021/1xxx/CVE-2021-1095.json index 0c737327e48..d4dc3e0dc2e 100644 --- a/2021/1xxx/CVE-2021-1095.json +++ b/2021/1xxx/CVE-2021-1095.json @@ -75,6 +75,11 @@ "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5211", "refsource": "CONFIRM", "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5211" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220118 [SECURITY] [DLA 2888-1] nvidia-graphics-drivers security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00013.html" } ] }, diff --git a/2022/0xxx/CVE-2022-0276.json b/2022/0xxx/CVE-2022-0276.json new file mode 100644 index 00000000000..37aaf90243e --- /dev/null +++ b/2022/0xxx/CVE-2022-0276.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0276", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21689.json b/2022/21xxx/CVE-2022-21689.json index b210e0aed74..b0b3ff48c09 100644 --- a/2022/21xxx/CVE-2022-21689.json +++ b/2022/21xxx/CVE-2022-21689.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions the receive mode limits concurrent uploads to 100 per second and blocks other uploads in the same second, which can be triggered by a simple script. An adversary with access to the receive mode can block file upload for others. There is no way to block this attack in public mode due to the anonymity properties of the tor network.\n" + "value": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions the receive mode limits concurrent uploads to 100 per second and blocks other uploads in the same second, which can be triggered by a simple script. An adversary with access to the receive mode can block file upload for others. There is no way to block this attack in public mode due to the anonymity properties of the tor network." } ] }, @@ -69,15 +69,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/onionshare/onionshare/security/advisories/GHSA-jh82-c5jw-pxpc", - "refsource": "CONFIRM", - "url": "https://github.com/onionshare/onionshare/security/advisories/GHSA-jh82-c5jw-pxpc" - }, { "name": "https://github.com/onionshare/onionshare/releases/tag/v2.5", "refsource": "MISC", "url": "https://github.com/onionshare/onionshare/releases/tag/v2.5" + }, + { + "name": "https://github.com/onionshare/onionshare/security/advisories/GHSA-jh82-c5jw-pxpc", + "refsource": "CONFIRM", + "url": "https://github.com/onionshare/onionshare/security/advisories/GHSA-jh82-c5jw-pxpc" } ] }, diff --git a/2022/21xxx/CVE-2022-21690.json b/2022/21xxx/CVE-2022-21690.json index e33489798b1..f5bcf301768 100644 --- a/2022/21xxx/CVE-2022-21690.json +++ b/2022/21xxx/CVE-2022-21690.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions The path parameter of the requested URL is not sanitized before being passed to the QT frontend. This path is used in all components for displaying the server access history. This leads to a rendered HTML4 Subset (QT RichText editor) in the Onionshare frontend. " + "value": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions The path parameter of the requested URL is not sanitized before being passed to the QT frontend. This path is used in all components for displaying the server access history. This leads to a rendered HTML4 Subset (QT RichText editor) in the Onionshare frontend." } ] }, @@ -69,15 +69,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/onionshare/onionshare/security/advisories/GHSA-ch22-x2v3-v6vq", - "refsource": "CONFIRM", - "url": "https://github.com/onionshare/onionshare/security/advisories/GHSA-ch22-x2v3-v6vq" - }, { "name": "https://github.com/onionshare/onionshare/releases/tag/v2.5", "refsource": "MISC", "url": "https://github.com/onionshare/onionshare/releases/tag/v2.5" + }, + { + "name": "https://github.com/onionshare/onionshare/security/advisories/GHSA-ch22-x2v3-v6vq", + "refsource": "CONFIRM", + "url": "https://github.com/onionshare/onionshare/security/advisories/GHSA-ch22-x2v3-v6vq" } ] }, diff --git a/2022/21xxx/CVE-2022-21691.json b/2022/21xxx/CVE-2022-21691.json index 83b13937d79..ac43ffdff65 100644 --- a/2022/21xxx/CVE-2022-21691.json +++ b/2022/21xxx/CVE-2022-21691.json @@ -69,15 +69,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/onionshare/onionshare/security/advisories/GHSA-w9m4-7w72-r766", - "refsource": "CONFIRM", - "url": "https://github.com/onionshare/onionshare/security/advisories/GHSA-w9m4-7w72-r766" - }, { "name": "https://github.com/onionshare/onionshare/releases/tag/v2.5", "refsource": "MISC", "url": "https://github.com/onionshare/onionshare/releases/tag/v2.5" + }, + { + "name": "https://github.com/onionshare/onionshare/security/advisories/GHSA-w9m4-7w72-r766", + "refsource": "CONFIRM", + "url": "https://github.com/onionshare/onionshare/security/advisories/GHSA-w9m4-7w72-r766" } ] }, diff --git a/2022/21xxx/CVE-2022-21692.json b/2022/21xxx/CVE-2022-21692.json index 9a0f06031c8..0218038725e 100644 --- a/2022/21xxx/CVE-2022-21692.json +++ b/2022/21xxx/CVE-2022-21692.json @@ -69,15 +69,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v", - "refsource": "CONFIRM", - "url": "https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v" - }, { "name": "https://github.com/onionshare/onionshare/releases/tag/v2.5", "refsource": "MISC", "url": "https://github.com/onionshare/onionshare/releases/tag/v2.5" + }, + { + "name": "https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v", + "refsource": "CONFIRM", + "url": "https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v" } ] }, diff --git a/2022/21xxx/CVE-2022-21693.json b/2022/21xxx/CVE-2022-21693.json index 661740b70dd..685c90f823f 100644 --- a/2022/21xxx/CVE-2022-21693.json +++ b/2022/21xxx/CVE-2022-21693.json @@ -69,15 +69,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/onionshare/onionshare/security/advisories/GHSA-jgm9-xpfj-4fq6", - "refsource": "CONFIRM", - "url": "https://github.com/onionshare/onionshare/security/advisories/GHSA-jgm9-xpfj-4fq6" - }, { "name": "https://github.com/onionshare/onionshare/releases/tag/v2.5", "refsource": "MISC", "url": "https://github.com/onionshare/onionshare/releases/tag/v2.5" + }, + { + "name": "https://github.com/onionshare/onionshare/security/advisories/GHSA-jgm9-xpfj-4fq6", + "refsource": "CONFIRM", + "url": "https://github.com/onionshare/onionshare/security/advisories/GHSA-jgm9-xpfj-4fq6" } ] }, diff --git a/2022/21xxx/CVE-2022-21694.json b/2022/21xxx/CVE-2022-21694.json index cce0ca70051..cea3b9e7625 100644 --- a/2022/21xxx/CVE-2022-21694.json +++ b/2022/21xxx/CVE-2022-21694.json @@ -69,6 +69,11 @@ }, "references": { "reference_data": [ + { + "name": "https://github.com/onionshare/onionshare/releases/tag/v2.5", + "refsource": "MISC", + "url": "https://github.com/onionshare/onionshare/releases/tag/v2.5" + }, { "name": "https://github.com/onionshare/onionshare/security/advisories/GHSA-h29c-wcm8-883h", "refsource": "CONFIRM", @@ -78,11 +83,6 @@ "name": "https://github.com/onionshare/onionshare/issues/1389", "refsource": "MISC", "url": "https://github.com/onionshare/onionshare/issues/1389" - }, - { - "name": "https://github.com/onionshare/onionshare/releases/tag/v2.5", - "refsource": "MISC", - "url": "https://github.com/onionshare/onionshare/releases/tag/v2.5" } ] }, @@ -90,4 +90,4 @@ "advisory": "GHSA-h29c-wcm8-883h", "discovery": "UNKNOWN" } -} +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21700.json b/2022/21xxx/CVE-2022-21700.json index 13d5e9c5c53..7636b02026e 100644 --- a/2022/21xxx/CVE-2022-21700.json +++ b/2022/21xxx/CVE-2022-21700.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Micronaut is a JVM-based, full stack Java framework designed for building JVM web applications with support for Java, Kotlin and the Groovy language. In affected versions sending an invalid Content Type header leads to memory leak in DefaultArgumentConversionContext as this type is erroneously used in static state.\n\n### Impact\n\nSending an invalid Content Type header leads to memory leak in `DefaultArgumentConversionContext` as this type is erroneously used in static state.\n\n### Patches\n\nThe problem is patched in Micronaut 3.2.7 and above.\n\n### Workarounds\n\nThe default content type binder can be replaced in an existing Micronaut application to mitigate the issue:\n\n```java\npackage example;\n\nimport java.util.List;\nimport io.micronaut.context.annotation.Replaces;\nimport io.micronaut.core.convert.ConversionService;\nimport io.micronaut.http.MediaType;\nimport io.micronaut.http.bind.DefaultRequestBinderRegistry;\nimport io.micronaut.http.bind.binders.RequestArgumentBinder;\nimport jakarta.inject.Singleton;\n\n@Singleton\n@Replaces(DefaultRequestBinderRegistry.class)\nclass FixedRequestBinderRegistry extends DefaultRequestBinderRegistry {\n\n public FixedRequestBinderRegistry(ConversionService conversionService,\n List binders) {\n super(conversionService, binders);\n }\n\n @Override\n protected void registerDefaultConverters(ConversionService conversionService) {\n super.registerDefaultConverters(conversionService);\n conversionService.addConverter(CharSequence.class, MediaType.class, charSequence -> {\n try {\n return MediaType.of(charSequence);\n } catch (IllegalArgumentException e) {\n return null;\n }\n });\n }\n}\n```\n\n### References\n\nCommit that introduced the vulnerability https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Open an issue in [Micronaut Core](https://github.com/micronaut-projects/micronaut-core/issues)\n* Email us at [info@micronaut.io](mailto:info@micronaut.io)\n" + "value": "Micronaut is a JVM-based, full stack Java framework designed for building JVM web applications with support for Java, Kotlin and the Groovy language. In affected versions sending an invalid Content Type header leads to memory leak in DefaultArgumentConversionContext as this type is erroneously used in static state. ### Impact Sending an invalid Content Type header leads to memory leak in `DefaultArgumentConversionContext` as this type is erroneously used in static state. ### Patches The problem is patched in Micronaut 3.2.7 and above. ### Workarounds The default content type binder can be replaced in an existing Micronaut application to mitigate the issue: ```java package example; import java.util.List; import io.micronaut.context.annotation.Replaces; import io.micronaut.core.convert.ConversionService; import io.micronaut.http.MediaType; import io.micronaut.http.bind.DefaultRequestBinderRegistry; import io.micronaut.http.bind.binders.RequestArgumentBinder; import jakarta.inject.Singleton; @Singleton @Replaces(DefaultRequestBinderRegistry.class) class FixedRequestBinderRegistry extends DefaultRequestBinderRegistry { public FixedRequestBinderRegistry(ConversionService conversionService, List binders) { super(conversionService, binders); } @Override protected void registerDefaultConverters(ConversionService conversionService) { super.registerDefaultConverters(conversionService); conversionService.addConverter(CharSequence.class, MediaType.class, charSequence -> { try { return MediaType.of(charSequence); } catch (IllegalArgumentException e) { return null; } }); } } ``` ### References Commit that introduced the vulnerability https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Micronaut Core](https://github.com/micronaut-projects/micronaut-core/issues) * Email us at [info@micronaut.io](mailto:info@micronaut.io)" } ] }, diff --git a/2022/23xxx/CVE-2022-23410.json b/2022/23xxx/CVE-2022-23410.json new file mode 100644 index 00000000000..e88918b1e27 --- /dev/null +++ b/2022/23xxx/CVE-2022-23410.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23410", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23411.json b/2022/23xxx/CVE-2022-23411.json new file mode 100644 index 00000000000..48e425ffaa2 --- /dev/null +++ b/2022/23xxx/CVE-2022-23411.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23411", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23412.json b/2022/23xxx/CVE-2022-23412.json new file mode 100644 index 00000000000..5d16efc4ce2 --- /dev/null +++ b/2022/23xxx/CVE-2022-23412.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23412", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23413.json b/2022/23xxx/CVE-2022-23413.json new file mode 100644 index 00000000000..ddf5a4adde9 --- /dev/null +++ b/2022/23xxx/CVE-2022-23413.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23413", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23414.json b/2022/23xxx/CVE-2022-23414.json new file mode 100644 index 00000000000..c7ef7e0019a --- /dev/null +++ b/2022/23xxx/CVE-2022-23414.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23414", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23415.json b/2022/23xxx/CVE-2022-23415.json new file mode 100644 index 00000000000..d155d8fdb98 --- /dev/null +++ b/2022/23xxx/CVE-2022-23415.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23415", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23416.json b/2022/23xxx/CVE-2022-23416.json new file mode 100644 index 00000000000..0e96a68f735 --- /dev/null +++ b/2022/23xxx/CVE-2022-23416.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23416", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23417.json b/2022/23xxx/CVE-2022-23417.json new file mode 100644 index 00000000000..0a7e69ae509 --- /dev/null +++ b/2022/23xxx/CVE-2022-23417.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23417", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23418.json b/2022/23xxx/CVE-2022-23418.json new file mode 100644 index 00000000000..fbb234bc898 --- /dev/null +++ b/2022/23xxx/CVE-2022-23418.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23418", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23419.json b/2022/23xxx/CVE-2022-23419.json new file mode 100644 index 00000000000..369a55b3334 --- /dev/null +++ b/2022/23xxx/CVE-2022-23419.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23419", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23420.json b/2022/23xxx/CVE-2022-23420.json new file mode 100644 index 00000000000..75196d78b72 --- /dev/null +++ b/2022/23xxx/CVE-2022-23420.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23420", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23421.json b/2022/23xxx/CVE-2022-23421.json new file mode 100644 index 00000000000..bc78c1dbfcd --- /dev/null +++ b/2022/23xxx/CVE-2022-23421.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23421", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23422.json b/2022/23xxx/CVE-2022-23422.json new file mode 100644 index 00000000000..6b017291a9a --- /dev/null +++ b/2022/23xxx/CVE-2022-23422.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23422", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23423.json b/2022/23xxx/CVE-2022-23423.json new file mode 100644 index 00000000000..7ebd9deafbd --- /dev/null +++ b/2022/23xxx/CVE-2022-23423.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23423", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23424.json b/2022/23xxx/CVE-2022-23424.json new file mode 100644 index 00000000000..14a7e4b253e --- /dev/null +++ b/2022/23xxx/CVE-2022-23424.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23424", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23425.json b/2022/23xxx/CVE-2022-23425.json new file mode 100644 index 00000000000..63fd136bc01 --- /dev/null +++ b/2022/23xxx/CVE-2022-23425.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23425", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23426.json b/2022/23xxx/CVE-2022-23426.json new file mode 100644 index 00000000000..65e127074ad --- /dev/null +++ b/2022/23xxx/CVE-2022-23426.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23426", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23427.json b/2022/23xxx/CVE-2022-23427.json new file mode 100644 index 00000000000..152e9a26b60 --- /dev/null +++ b/2022/23xxx/CVE-2022-23427.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23427", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23428.json b/2022/23xxx/CVE-2022-23428.json new file mode 100644 index 00000000000..0c36e17037f --- /dev/null +++ b/2022/23xxx/CVE-2022-23428.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23428", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23429.json b/2022/23xxx/CVE-2022-23429.json new file mode 100644 index 00000000000..4e301ae7223 --- /dev/null +++ b/2022/23xxx/CVE-2022-23429.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23429", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23430.json b/2022/23xxx/CVE-2022-23430.json new file mode 100644 index 00000000000..c264cae35e8 --- /dev/null +++ b/2022/23xxx/CVE-2022-23430.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23430", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23431.json b/2022/23xxx/CVE-2022-23431.json new file mode 100644 index 00000000000..b02701abfba --- /dev/null +++ b/2022/23xxx/CVE-2022-23431.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23431", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23432.json b/2022/23xxx/CVE-2022-23432.json new file mode 100644 index 00000000000..2d71fa3cfeb --- /dev/null +++ b/2022/23xxx/CVE-2022-23432.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23432", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23433.json b/2022/23xxx/CVE-2022-23433.json new file mode 100644 index 00000000000..939074b942c --- /dev/null +++ b/2022/23xxx/CVE-2022-23433.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23433", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23434.json b/2022/23xxx/CVE-2022-23434.json new file mode 100644 index 00000000000..51e61fdcc7e --- /dev/null +++ b/2022/23xxx/CVE-2022-23434.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23434", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file