diff --git a/2020/29xxx/CVE-2020-29374.json b/2020/29xxx/CVE-2020-29374.json index d58c25423cc..fb02c51d5f8 100644 --- a/2020/29xxx/CVE-2020-29374.json +++ b/2020/29xxx/CVE-2020-29374.json @@ -86,6 +86,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] } diff --git a/2020/36xxx/CVE-2020-36310.json b/2020/36xxx/CVE-2020-36310.json index c98203f2a9e..d7015ee928d 100644 --- a/2020/36xxx/CVE-2020-36310.json +++ b/2020/36xxx/CVE-2020-36310.json @@ -61,6 +61,11 @@ "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8", "refsource": "MISC", "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5095", + "url": "https://www.debian.org/security/2022/dsa-5095" } ] } diff --git a/2020/36xxx/CVE-2020-36322.json b/2020/36xxx/CVE-2020-36322.json index 73603b86bda..6836ae39738 100644 --- a/2020/36xxx/CVE-2020-36322.json +++ b/2020/36xxx/CVE-2020-36322.json @@ -66,6 +66,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] } diff --git a/2021/20xxx/CVE-2021-20317.json b/2021/20xxx/CVE-2021-20317.json index 81488daf5f2..1ef3db84ddd 100644 --- a/2021/20xxx/CVE-2021-20317.json +++ b/2021/20xxx/CVE-2021-20317.json @@ -58,6 +58,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] }, diff --git a/2021/20xxx/CVE-2021-20321.json b/2021/20xxx/CVE-2021-20321.json index 30868eaa1f2..1620663e2a8 100644 --- a/2021/20xxx/CVE-2021-20321.json +++ b/2021/20xxx/CVE-2021-20321.json @@ -53,6 +53,16 @@ "refsource": "MISC", "name": "https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/", "url": "https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] }, diff --git a/2021/20xxx/CVE-2021-20322.json b/2021/20xxx/CVE-2021-20322.json index ac0b11e1354..668f2ae4996 100644 --- a/2021/20xxx/CVE-2021-20322.json +++ b/2021/20xxx/CVE-2021-20322.json @@ -73,6 +73,16 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220303-0002/", "url": "https://security.netapp.com/advisory/ntap-20220303-0002/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] }, diff --git a/2021/22xxx/CVE-2021-22600.json b/2021/22xxx/CVE-2021-22600.json index 81bf05ca38c..3e405c79889 100644 --- a/2021/22xxx/CVE-2021-22600.json +++ b/2021/22xxx/CVE-2021-22600.json @@ -89,6 +89,16 @@ "refsource": "MISC", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] }, diff --git a/2021/28xxx/CVE-2021-28711.json b/2021/28xxx/CVE-2021-28711.json index 0f1cde8ee1a..59d1f409171 100644 --- a/2021/28xxx/CVE-2021-28711.json +++ b/2021/28xxx/CVE-2021-28711.json @@ -98,6 +98,21 @@ "refsource": "DEBIAN", "name": "DSA-5050", "url": "https://www.debian.org/security/2022/dsa-5050" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] }, diff --git a/2021/28xxx/CVE-2021-28712.json b/2021/28xxx/CVE-2021-28712.json index 0610d5e8328..b699bbfc579 100644 --- a/2021/28xxx/CVE-2021-28712.json +++ b/2021/28xxx/CVE-2021-28712.json @@ -98,6 +98,21 @@ "refsource": "DEBIAN", "name": "DSA-5050", "url": "https://www.debian.org/security/2022/dsa-5050" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] }, diff --git a/2021/28xxx/CVE-2021-28713.json b/2021/28xxx/CVE-2021-28713.json index 174ab8f8168..19af396e656 100644 --- a/2021/28xxx/CVE-2021-28713.json +++ b/2021/28xxx/CVE-2021-28713.json @@ -98,6 +98,21 @@ "refsource": "DEBIAN", "name": "DSA-5050", "url": "https://www.debian.org/security/2022/dsa-5050" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] }, diff --git a/2021/28xxx/CVE-2021-28714.json b/2021/28xxx/CVE-2021-28714.json index 04a1267df53..54c7c41332a 100644 --- a/2021/28xxx/CVE-2021-28714.json +++ b/2021/28xxx/CVE-2021-28714.json @@ -98,6 +98,21 @@ "refsource": "DEBIAN", "name": "DSA-5050", "url": "https://www.debian.org/security/2022/dsa-5050" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] }, diff --git a/2021/28xxx/CVE-2021-28715.json b/2021/28xxx/CVE-2021-28715.json index ce58b877c28..2503cb0fa1a 100644 --- a/2021/28xxx/CVE-2021-28715.json +++ b/2021/28xxx/CVE-2021-28715.json @@ -98,6 +98,21 @@ "refsource": "DEBIAN", "name": "DSA-5050", "url": "https://www.debian.org/security/2022/dsa-5050" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] }, diff --git a/2021/28xxx/CVE-2021-28950.json b/2021/28xxx/CVE-2021-28950.json index 49c20a37e16..2c90f2473e7 100644 --- a/2021/28xxx/CVE-2021-28950.json +++ b/2021/28xxx/CVE-2021-28950.json @@ -76,6 +76,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] } diff --git a/2021/38xxx/CVE-2021-38300.json b/2021/38xxx/CVE-2021-38300.json index 99c5ab28d9c..a95beacab2d 100644 --- a/2021/38xxx/CVE-2021-38300.json +++ b/2021/38xxx/CVE-2021-38300.json @@ -71,6 +71,16 @@ "refsource": "CONFIRM", "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10", "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] } diff --git a/2021/3xxx/CVE-2021-3640.json b/2021/3xxx/CVE-2021-3640.json index f8fdbc71274..c3fc0db1a2b 100644 --- a/2021/3xxx/CVE-2021-3640.json +++ b/2021/3xxx/CVE-2021-3640.json @@ -68,6 +68,21 @@ "refsource": "MISC", "name": "https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951", "url": "https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] }, diff --git a/2021/3xxx/CVE-2021-3744.json b/2021/3xxx/CVE-2021-3744.json index 6ac14611b1d..55e8a464fdf 100644 --- a/2021/3xxx/CVE-2021-3744.json +++ b/2021/3xxx/CVE-2021-3744.json @@ -63,6 +63,16 @@ "refsource": "MISC", "name": "https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680", "url": "https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] }, diff --git a/2021/3xxx/CVE-2021-3752.json b/2021/3xxx/CVE-2021-3752.json index 3d4c39a726b..255a7e64541 100644 --- a/2021/3xxx/CVE-2021-3752.json +++ b/2021/3xxx/CVE-2021-3752.json @@ -58,6 +58,21 @@ "refsource": "MISC", "name": "https://www.openwall.com/lists/oss-security/2021/09/15/4", "url": "https://www.openwall.com/lists/oss-security/2021/09/15/4" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] }, diff --git a/2021/3xxx/CVE-2021-3760.json b/2021/3xxx/CVE-2021-3760.json index 641df1b1869..38e4e946508 100644 --- a/2021/3xxx/CVE-2021-3760.json +++ b/2021/3xxx/CVE-2021-3760.json @@ -48,6 +48,16 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2000585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000585" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] }, diff --git a/2021/3xxx/CVE-2021-3772.json b/2021/3xxx/CVE-2021-3772.json index 0e504bf994d..66967a76226 100644 --- a/2021/3xxx/CVE-2021-3772.json +++ b/2021/3xxx/CVE-2021-3772.json @@ -63,6 +63,16 @@ "refsource": "MISC", "name": "https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df", "url": "https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] }, diff --git a/2021/41xxx/CVE-2021-41864.json b/2021/41xxx/CVE-2021-41864.json index 0593e50ffd7..e2027d60342 100644 --- a/2021/41xxx/CVE-2021-41864.json +++ b/2021/41xxx/CVE-2021-41864.json @@ -91,6 +91,16 @@ "refsource": "CONFIRM", "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12", "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] } diff --git a/2021/42xxx/CVE-2021-42739.json b/2021/42xxx/CVE-2021-42739.json index 8b19279c607..60c1cbc007d 100644 --- a/2021/42xxx/CVE-2021-42739.json +++ b/2021/42xxx/CVE-2021-42739.json @@ -86,6 +86,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] } diff --git a/2021/43xxx/CVE-2021-43389.json b/2021/43xxx/CVE-2021-43389.json index 400ec553138..57b6995b67a 100644 --- a/2021/43xxx/CVE-2021-43389.json +++ b/2021/43xxx/CVE-2021-43389.json @@ -86,6 +86,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] } diff --git a/2021/43xxx/CVE-2021-43975.json b/2021/43xxx/CVE-2021-43975.json index 334abd84303..14135f6e61e 100644 --- a/2021/43xxx/CVE-2021-43975.json +++ b/2021/43xxx/CVE-2021-43975.json @@ -76,6 +76,16 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20211210-0001/", "url": "https://security.netapp.com/advisory/ntap-20211210-0001/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] } diff --git a/2021/43xxx/CVE-2021-43976.json b/2021/43xxx/CVE-2021-43976.json index d849366481a..6ae88386ae6 100644 --- a/2021/43xxx/CVE-2021-43976.json +++ b/2021/43xxx/CVE-2021-43976.json @@ -76,6 +76,21 @@ "refsource": "DEBIAN", "name": "DSA-5092", "url": "https://www.debian.org/security/2022/dsa-5092" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] } diff --git a/2021/44xxx/CVE-2021-44733.json b/2021/44xxx/CVE-2021-44733.json index 394d27db642..478ae2a73de 100644 --- a/2021/44xxx/CVE-2021-44733.json +++ b/2021/44xxx/CVE-2021-44733.json @@ -71,6 +71,16 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220114-0003/", "url": "https://security.netapp.com/advisory/ntap-20220114-0003/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] } diff --git a/2021/45xxx/CVE-2021-45095.json b/2021/45xxx/CVE-2021-45095.json index 7c825beb67b..9f64874de23 100644 --- a/2021/45xxx/CVE-2021-45095.json +++ b/2021/45xxx/CVE-2021-45095.json @@ -66,6 +66,21 @@ "refsource": "DEBIAN", "name": "DSA-5050", "url": "https://www.debian.org/security/2022/dsa-5050" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] } diff --git a/2021/45xxx/CVE-2021-45469.json b/2021/45xxx/CVE-2021-45469.json index 7c07989f841..487322a5cd6 100644 --- a/2021/45xxx/CVE-2021-45469.json +++ b/2021/45xxx/CVE-2021-45469.json @@ -86,6 +86,16 @@ "refsource": "DEBIAN", "name": "DSA-5050", "url": "https://www.debian.org/security/2022/dsa-5050" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] } diff --git a/2021/45xxx/CVE-2021-45480.json b/2021/45xxx/CVE-2021-45480.json index 972f80b34ba..0a9bf19360f 100644 --- a/2021/45xxx/CVE-2021-45480.json +++ b/2021/45xxx/CVE-2021-45480.json @@ -66,6 +66,16 @@ "refsource": "DEBIAN", "name": "DSA-5050", "url": "https://www.debian.org/security/2022/dsa-5050" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] } diff --git a/2021/4xxx/CVE-2021-4002.json b/2021/4xxx/CVE-2021-4002.json index 9af8750d521..7e65a14a899 100644 --- a/2021/4xxx/CVE-2021-4002.json +++ b/2021/4xxx/CVE-2021-4002.json @@ -63,6 +63,21 @@ "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] }, diff --git a/2021/4xxx/CVE-2021-4083.json b/2021/4xxx/CVE-2021-4083.json index 8231dabdb24..3aeb08524f0 100644 --- a/2021/4xxx/CVE-2021-4083.json +++ b/2021/4xxx/CVE-2021-4083.json @@ -58,6 +58,21 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220217-0005/", "url": "https://security.netapp.com/advisory/ntap-20220217-0005/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] }, diff --git a/2022/0xxx/CVE-2022-0487.json b/2022/0xxx/CVE-2022-0487.json index 2c4658e9af6..af5dd03855c 100644 --- a/2022/0xxx/CVE-2022-0487.json +++ b/2022/0xxx/CVE-2022-0487.json @@ -53,6 +53,26 @@ "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5095", + "url": "https://www.debian.org/security/2022/dsa-5095" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] }, diff --git a/2022/0xxx/CVE-2022-0492.json b/2022/0xxx/CVE-2022-0492.json index 00d5119f4df..cdda13e985b 100644 --- a/2022/0xxx/CVE-2022-0492.json +++ b/2022/0xxx/CVE-2022-0492.json @@ -53,6 +53,26 @@ "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5095", + "url": "https://www.debian.org/security/2022/dsa-5095" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] }, diff --git a/2022/0xxx/CVE-2022-0617.json b/2022/0xxx/CVE-2022-0617.json index 1d0a2796e11..0f484b7b479 100644 --- a/2022/0xxx/CVE-2022-0617.json +++ b/2022/0xxx/CVE-2022-0617.json @@ -58,6 +58,26 @@ "refsource": "MISC", "name": "https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/", "url": "https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5095", + "url": "https://www.debian.org/security/2022/dsa-5095" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] }, diff --git a/2022/0xxx/CVE-2022-0890.json b/2022/0xxx/CVE-2022-0890.json index 1dba0b28e9d..55d0a8e27cf 100644 --- a/2022/0xxx/CVE-2022-0890.json +++ b/2022/0xxx/CVE-2022-0890.json @@ -1,18 +1,89 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-0890", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "NULL Pointer Dereference in mruby/mruby" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "mruby/mruby", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "3.2" + } + ] + } + } + ] + }, + "vendor_name": "mruby" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NULL Pointer Dereference in GitHub repository mruby/mruby prior to 3.2." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-476 NULL Pointer Dereference" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://huntr.dev/bounties/68e09ec1-6cc7-48b8-981d-30f478c70276", + "refsource": "CONFIRM", + "url": "https://huntr.dev/bounties/68e09ec1-6cc7-48b8-981d-30f478c70276" + }, + { + "name": "https://github.com/mruby/mruby/commit/da48e7dbb20024c198493b8724adae1b842083aa", + "refsource": "MISC", + "url": "https://github.com/mruby/mruby/commit/da48e7dbb20024c198493b8724adae1b842083aa" + } + ] + }, + "source": { + "advisory": "68e09ec1-6cc7-48b8-981d-30f478c70276", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0891.json b/2022/0xxx/CVE-2022-0891.json index 2061329aa79..215050b1859 100644 --- a/2022/0xxx/CVE-2022-0891.json +++ b/2022/0xxx/CVE-2022-0891.json @@ -4,15 +4,96 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-0891", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "libtiff", + "product": { + "product_data": [ + { + "product_name": "libtiff", + "version": { + "version_data": [ + { + "version_value": ">=3.9.0, <=4.3.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Heap-based buffer overflow in libtiff" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/libtiff/libtiff/-/issues/380", + "url": "https://gitlab.com/libtiff/libtiff/-/issues/380", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/libtiff/libtiff/-/issues/382", + "url": "https://gitlab.com/libtiff/libtiff/-/issues/382", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c", + "url": "https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact" } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "shahchintanh@gmail.com" + } + ] } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0901.json b/2022/0xxx/CVE-2022-0901.json new file mode 100644 index 00000000000..c24329cd511 --- /dev/null +++ b/2022/0xxx/CVE-2022-0901.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0901", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0902.json b/2022/0xxx/CVE-2022-0902.json new file mode 100644 index 00000000000..85e4b37251a --- /dev/null +++ b/2022/0xxx/CVE-2022-0902.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0902", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0907.json b/2022/0xxx/CVE-2022-0907.json new file mode 100644 index 00000000000..648bbbd7a9c --- /dev/null +++ b/2022/0xxx/CVE-2022-0907.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0907", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0908.json b/2022/0xxx/CVE-2022-0908.json new file mode 100644 index 00000000000..3222878f73d --- /dev/null +++ b/2022/0xxx/CVE-2022-0908.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0908", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0909.json b/2022/0xxx/CVE-2022-0909.json new file mode 100644 index 00000000000..87b3139441a --- /dev/null +++ b/2022/0xxx/CVE-2022-0909.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0909", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0910.json b/2022/0xxx/CVE-2022-0910.json new file mode 100644 index 00000000000..5efaa3cfe6e --- /dev/null +++ b/2022/0xxx/CVE-2022-0910.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0910", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/22xxx/CVE-2022-22795.json b/2022/22xxx/CVE-2022-22795.json index f1031399b5b..a574a2da04b 100644 --- a/2022/22xxx/CVE-2022-22795.json +++ b/2022/22xxx/CVE-2022-22795.json @@ -1,18 +1,115 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cna@cyber.gov.il", + "DATE_PUBLIC": "2022-03-02T16:21:00.000Z", "ID": "CVE-2022-22795", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Signiant - Manager+Agents XML External Entity (XXE)" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Signiant", + "version": { + "version_data": [ + { + "version_name": "Signiant ", + "version_value": "Build 78045 13.5.0 " + }, + { + "version_name": "Signiant ", + "version_value": "Build 79008,14.0.0" + }, + { + "version_name": "Signiant ", + "version_value": "Build 79687 14.1.0" + }, + { + "version_name": "Signiant ", + "version_value": "Build 79687 15.0.0 " + } + ] + } + } + ] + }, + "vendor_name": "Signiant" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Anton Golotin" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Signiant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "PHYSICAL", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-611 Improper Restriction of XML External Entity Reference ('XXE')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.gov.il/en/departments/faq/cve_advisories", + "name": "https://www.gov.il/en/departments/faq/cve_advisories" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "All of 13.5, 14.1, and 15.1 have an update available.\nThe mitigation involved adding a filter that validates for external dtd." + } + ], + "source": { + "advisory": "ILVN-2022-0016", + "defect": [ + "ILVN-2022-0016" + ], + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23410.json b/2022/23xxx/CVE-2022-23410.json index 657150c6e41..3d1614f9b27 100644 --- a/2022/23xxx/CVE-2022-23410.json +++ b/2022/23xxx/CVE-2022-23410.json @@ -15,11 +15,11 @@ "product": { "product_data": [ { - "product_name": "AXIS IP Utility", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "All version prior to 4.17.0" + "version_value": "All version prior to 4.18.0" } ] } @@ -55,7 +55,7 @@ "description_data": [ { "lang": "eng", - "value": "AXIS IP Utility prior to 4.17.0 allows for remote code execution and local privilege escalation by the means of DLL hijacking. IPUtility.exe would attempt to load DLLs from its current working directory which could allow for remote code execution if a compromised DLL would be placed in the same folder." + "value": "AXIS IP Utility before 4.18.0 allows for remote code execution and local privilege escalation by the means of DLL hijacking. IPUtility.exe would attempt to load DLLs from its current working directory which could allow for remote code execution if a compromised DLL would be placed in the same folder." } ] } diff --git a/2022/24xxx/CVE-2022-24448.json b/2022/24xxx/CVE-2022-24448.json index bf8abd380c3..c757e8d9774 100644 --- a/2022/24xxx/CVE-2022-24448.json +++ b/2022/24xxx/CVE-2022-24448.json @@ -76,6 +76,21 @@ "refsource": "DEBIAN", "name": "DSA-5092", "url": "https://www.debian.org/security/2022/dsa-5092" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] } diff --git a/2022/24xxx/CVE-2022-24605.json b/2022/24xxx/CVE-2022-24605.json index d7f7d4af327..458a1dca625 100644 --- a/2022/24xxx/CVE-2022-24605.json +++ b/2022/24xxx/CVE-2022-24605.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-24605", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-24605", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Luocms v2.0 is affected by SQL Injection in /admin/link/link_ok.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/jsjbcyber/bug_report/blob/main/bug_l", + "refsource": "MISC", + "name": "https://github.com/jsjbcyber/bug_report/blob/main/bug_l" } ] } diff --git a/2022/24xxx/CVE-2022-24606.json b/2022/24xxx/CVE-2022-24606.json index b8e5a1e1ca3..81594f67fb8 100644 --- a/2022/24xxx/CVE-2022-24606.json +++ b/2022/24xxx/CVE-2022-24606.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-24606", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-24606", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Luocms v2.0 is affected by SQL Injection in /admin/news/sort_ok.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/jsjbcyber/bug_report/blob/main/bug_m", + "refsource": "MISC", + "name": "https://github.com/jsjbcyber/bug_report/blob/main/bug_m" } ] } diff --git a/2022/24xxx/CVE-2022-24607.json b/2022/24xxx/CVE-2022-24607.json index f001ac50313..5a45be3f6bb 100644 --- a/2022/24xxx/CVE-2022-24607.json +++ b/2022/24xxx/CVE-2022-24607.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-24607", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-24607", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Luocms v2.0 is affected by SQL Injection in /admin/news/news_ok.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/jsjbcyber/bug_report/blob/main/bug_n", + "refsource": "MISC", + "name": "https://github.com/jsjbcyber/bug_report/blob/main/bug_n" } ] } diff --git a/2022/24xxx/CVE-2022-24608.json b/2022/24xxx/CVE-2022-24608.json index c8389a7fca5..19d0488f790 100644 --- a/2022/24xxx/CVE-2022-24608.json +++ b/2022/24xxx/CVE-2022-24608.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-24608", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-24608", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Luocms v2.0 is affected by Cross Site Scripting (XSS) in /admin/news/sort_add.php and /inc/function.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/jsjbcyber/bug_report/blob/main/bug_o", + "refsource": "MISC", + "name": "https://github.com/jsjbcyber/bug_report/blob/main/bug_o" } ] } diff --git a/2022/24xxx/CVE-2022-24609.json b/2022/24xxx/CVE-2022-24609.json index e3c47ce3061..23d9fcbb8da 100644 --- a/2022/24xxx/CVE-2022-24609.json +++ b/2022/24xxx/CVE-2022-24609.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-24609", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-24609", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Luocms v2.0 is affected by an incorrect access control vulnerability. Through /admin/templates/template_manage.php, an attacker can write an arbitrary shell file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/jsjbcyber/bug_report/blob/main/bug_p", + "refsource": "MISC", + "name": "https://github.com/jsjbcyber/bug_report/blob/main/bug_p" } ] } diff --git a/2022/24xxx/CVE-2022-24959.json b/2022/24xxx/CVE-2022-24959.json index f8430cbe684..1bb8557e33e 100644 --- a/2022/24xxx/CVE-2022-24959.json +++ b/2022/24xxx/CVE-2022-24959.json @@ -66,6 +66,16 @@ "refsource": "DEBIAN", "name": "DSA-5092", "url": "https://www.debian.org/security/2022/dsa-5092" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] } diff --git a/2022/25xxx/CVE-2022-25258.json b/2022/25xxx/CVE-2022-25258.json index 6454b5b8224..53ef538aaba 100644 --- a/2022/25xxx/CVE-2022-25258.json +++ b/2022/25xxx/CVE-2022-25258.json @@ -76,6 +76,21 @@ "refsource": "DEBIAN", "name": "DSA-5092", "url": "https://www.debian.org/security/2022/dsa-5092" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] } diff --git a/2022/25xxx/CVE-2022-25375.json b/2022/25xxx/CVE-2022-25375.json index 1d90f65e9c9..94edf5db146 100644 --- a/2022/25xxx/CVE-2022-25375.json +++ b/2022/25xxx/CVE-2022-25375.json @@ -76,6 +76,21 @@ "refsource": "DEBIAN", "name": "DSA-5092", "url": "https://www.debian.org/security/2022/dsa-5092" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5096", + "url": "https://www.debian.org/security/2022/dsa-5096" } ] } diff --git a/2022/25xxx/CVE-2022-25636.json b/2022/25xxx/CVE-2022-25636.json index c08e68c867a..e2a1f4915d8 100644 --- a/2022/25xxx/CVE-2022-25636.json +++ b/2022/25xxx/CVE-2022-25636.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[oss-security] 20220222 Re: Linux kernel: heap out of bounds write in nf_dup_netdev.c since 5.4", "url": "http://www.openwall.com/lists/oss-security/2022/02/22/1" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5095", + "url": "https://www.debian.org/security/2022/dsa-5095" } ] } diff --git a/2022/25xxx/CVE-2022-25915.json b/2022/25xxx/CVE-2022-25915.json new file mode 100644 index 00000000000..51724df0979 --- /dev/null +++ b/2022/25xxx/CVE-2022-25915.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25915", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26009.json b/2022/26xxx/CVE-2022-26009.json new file mode 100644 index 00000000000..9a3a5963cad --- /dev/null +++ b/2022/26xxx/CVE-2022-26009.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26009", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26342.json b/2022/26xxx/CVE-2022-26342.json new file mode 100644 index 00000000000..6b8a0d5150c --- /dev/null +++ b/2022/26xxx/CVE-2022-26342.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26342", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26355.json b/2022/26xxx/CVE-2022-26355.json index a08b826c6ed..3d0f545b2d7 100644 --- a/2022/26xxx/CVE-2022-26355.json +++ b/2022/26xxx/CVE-2022-26355.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "secure@citrix.com", "ID": "CVE-2022-26355", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Citrix Federated Authentication Service (FAS) " }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Federated Authentication Service (FAS)", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "10.6" + }, + { + "version_affected": ">=", + "version_value": "7.17" + } + ] + } + } + ] + }, + "vendor_name": "Citrix" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Citrix Federated Authentication Service (FAS) 7.17 - 10.6 causes deployments that have been configured to store a registration authority certificate's private key in a Trusted Platform Module (TPM) to incorrectly store that key in the Microsoft Software Key Storage Provider (MSKSP). This issue only occurs if PowerShell was used when configuring FAS to store the registration authority certificate\u2019s private key in the TPM. It does not occur if the TPM was not selected for use or if the FAS administration console was used for configuration." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-668 Exposure of Resource to Wrong Sphere" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.citrix.com/article/CTX341587", + "name": "https://support.citrix.com/article/CTX341587" + } + ] + }, + "source": { + "advisory": "CTX341587", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26652.json b/2022/26xxx/CVE-2022-26652.json index c6b60cfba3e..aa8e98bf298 100644 --- a/2022/26xxx/CVE-2022-26652.json +++ b/2022/26xxx/CVE-2022-26652.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-26652", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-26652", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NATS nats-server before 2.7.4 allows Directory Traversal (with write access) via an element in a ZIP archive for JetStream streams. nats-streaming-server before 0.24.3 is also affected." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nats-io/nats-server/releases", + "refsource": "MISC", + "name": "https://github.com/nats-io/nats-server/releases" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/nats-io/nats-server/security/advisories/GHSA-6h3m-36w8-hv68", + "url": "https://github.com/nats-io/nats-server/security/advisories/GHSA-6h3m-36w8-hv68" + }, + { + "refsource": "CONFIRM", + "name": "https://advisories.nats.io/CVE/CVE-2022-26652.txt", + "url": "https://advisories.nats.io/CVE/CVE-2022-26652.txt" } ] } diff --git a/2022/26xxx/CVE-2022-26846.json b/2022/26xxx/CVE-2022-26846.json new file mode 100644 index 00000000000..a632d1a231b --- /dev/null +++ b/2022/26xxx/CVE-2022-26846.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2022-26846", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SPIP before 3.2.14 and 4.x before 4.0.5 allows remote authenticated editors to execute arbitrary code." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lists.debian.org/debian-security-announce/2022/msg00060.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-security-announce/2022/msg00060.html" + }, + { + "url": "https://blog.spip.net/Mise-a-jour-critique-de-securite-sorties-de-SPIP-4-0-5-et-SPIP-3-2-14.html", + "refsource": "MISC", + "name": "https://blog.spip.net/Mise-a-jour-critique-de-securite-sorties-de-SPIP-4-0-5-et-SPIP-3-2-14.html" + }, + { + "url": "https://git.spip.net/spip/medias/commit/3014b845da2dd8ad15ff04b50fd9dbba388a9ca2", + "refsource": "MISC", + "name": "https://git.spip.net/spip/medias/commit/3014b845da2dd8ad15ff04b50fd9dbba388a9ca2" + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26847.json b/2022/26xxx/CVE-2022-26847.json new file mode 100644 index 00000000000..c77e77a9677 --- /dev/null +++ b/2022/26xxx/CVE-2022-26847.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2022-26847", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SPIP before 3.2.14 and 4.x before 4.0.5 allows unauthenticated access to information about editorial objects." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lists.debian.org/debian-security-announce/2022/msg00060.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-security-announce/2022/msg00060.html" + }, + { + "url": "https://blog.spip.net/Mise-a-jour-critique-de-securite-sorties-de-SPIP-4-0-5-et-SPIP-3-2-14.html", + "refsource": "MISC", + "name": "https://blog.spip.net/Mise-a-jour-critique-de-securite-sorties-de-SPIP-4-0-5-et-SPIP-3-2-14.html" + }, + { + "url": "https://git.spip.net/spip/medias/commit/3014b845da2dd8ad15ff04b50fd9dbba388a9ca2", + "refsource": "MISC", + "name": "https://git.spip.net/spip/medias/commit/3014b845da2dd8ad15ff04b50fd9dbba388a9ca2" + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26848.json b/2022/26xxx/CVE-2022-26848.json new file mode 100644 index 00000000000..31a0bcae4cd --- /dev/null +++ b/2022/26xxx/CVE-2022-26848.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26848", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26849.json b/2022/26xxx/CVE-2022-26849.json new file mode 100644 index 00000000000..0f530df3a03 --- /dev/null +++ b/2022/26xxx/CVE-2022-26849.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26849", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file