diff --git a/2022/2xxx/CVE-2022-2396.json b/2022/2xxx/CVE-2022-2396.json new file mode 100644 index 00000000000..9684ad89015 --- /dev/null +++ b/2022/2xxx/CVE-2022-2396.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2396", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2397.json b/2022/2xxx/CVE-2022-2397.json new file mode 100644 index 00000000000..928578240ed --- /dev/null +++ b/2022/2xxx/CVE-2022-2397.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2397", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/31xxx/CVE-2022-31781.json b/2022/31xxx/CVE-2022-31781.json index f392f2b7476..ac35a680bdc 100644 --- a/2022/31xxx/CVE-2022-31781.json +++ b/2022/31xxx/CVE-2022-31781.json @@ -43,7 +43,7 @@ "description_data": [ { "lang": "eng", - "value": "Apache Tapestry up to version 5.8.1 is vulnerable to Regular Expression Denial of Service (ReDoS) in the way it handles Content Types. Specially crafted Content Types may cause catastrophic backtracking, taking exponential time to complete. \n\nSpecifically, this is about the regular expression used on the parameter of the org.apache.tapestry5.http.ContentType class.\n\nApache Tapestry 5.8.2 has a fix for this vulnerability. \n\nNotice the vulnerability cannot be triggered by web requests in Tapestry code alone. It would only happen if there's some non-Tapestry codepath passing some outside input to the ContentType class constructor." + "value": "Apache Tapestry up to version 5.8.1 is vulnerable to Regular Expression Denial of Service (ReDoS) in the way it handles Content Types. Specially crafted Content Types may cause catastrophic backtracking, taking exponential time to complete. Specifically, this is about the regular expression used on the parameter of the org.apache.tapestry5.http.ContentType class. Apache Tapestry 5.8.2 has a fix for this vulnerability. Notice the vulnerability cannot be triggered by web requests in Tapestry code alone. It would only happen if there's some non-Tapestry codepath passing some outside input to the ContentType class constructor." } ] }, @@ -70,12 +70,13 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.openwall.com/lists/oss-security/2022/07/12/3" + "refsource": "MISC", + "url": "https://www.openwall.com/lists/oss-security/2022/07/12/3", + "name": "https://www.openwall.com/lists/oss-security/2022/07/12/3" } ] }, "source": { "discovery": "UNKNOWN" } -} +} \ No newline at end of file