From 6fc00ede175dddf25886b0b00d4b8387e4d1bde7 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 13 May 2022 14:01:33 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/22xxx/CVE-2021-22234.json | 8 ++--- 2021/39xxx/CVE-2021-39888.json | 8 ++--- 2021/39xxx/CVE-2021-39904.json | 8 ++--- 2021/39xxx/CVE-2021-39909.json | 8 ++--- 2022/0xxx/CVE-2022-0136.json | 6 ++-- 2022/0xxx/CVE-2022-0249.json | 8 ++--- 2022/0xxx/CVE-2022-0549.json | 6 ++-- 2022/0xxx/CVE-2022-0741.json | 4 +-- 2022/0xxx/CVE-2022-0751.json | 4 +-- 2022/1xxx/CVE-2022-1713.json | 18 ++++++++++ 2022/29xxx/CVE-2022-29854.json | 61 ++++++++++++++++++++++++++++++---- 2022/30xxx/CVE-2022-30367.json | 56 +++++++++++++++++++++++++++---- 2022/30xxx/CVE-2022-30375.json | 56 +++++++++++++++++++++++++++---- 2022/30xxx/CVE-2022-30376.json | 56 +++++++++++++++++++++++++++---- 2022/30xxx/CVE-2022-30378.json | 56 +++++++++++++++++++++++++++---- 2022/30xxx/CVE-2022-30379.json | 56 +++++++++++++++++++++++++++---- 2022/30xxx/CVE-2022-30695.json | 18 ++++++++++ 2022/30xxx/CVE-2022-30696.json | 18 ++++++++++ 2022/30xxx/CVE-2022-30697.json | 18 ++++++++++ 2022/30xxx/CVE-2022-30698.json | 18 ++++++++++ 2022/30xxx/CVE-2022-30699.json | 18 ++++++++++ 21 files changed, 443 insertions(+), 66 deletions(-) create mode 100644 2022/1xxx/CVE-2022-1713.json create mode 100644 2022/30xxx/CVE-2022-30695.json create mode 100644 2022/30xxx/CVE-2022-30696.json create mode 100644 2022/30xxx/CVE-2022-30697.json create mode 100644 2022/30xxx/CVE-2022-30698.json create mode 100644 2022/30xxx/CVE-2022-30699.json diff --git a/2021/22xxx/CVE-2021-22234.json b/2021/22xxx/CVE-2021-22234.json index 4bf7d58686a..e37d6d7f101 100644 --- a/2021/22xxx/CVE-2021-22234.json +++ b/2021/22xxx/CVE-2021-22234.json @@ -19,13 +19,13 @@ "version": { "version_data": [ { - "version_value": ">=14.0, <=14.0.4" + "version_value": ">=14.0, <14.0.4" }, { - "version_value": ">=13.12, <=13.12.8" + "version_value": ">=13.12, <13.12.8" }, { - "version_value": ">=13.11, <=13.11.7" + "version_value": ">=13.11, <13.11.7" } ] } @@ -71,7 +71,7 @@ "description_data": [ { "lang": "eng", - "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting with 13.11, 13.12 and 14.0. A specially crafted design image allowed attackers to read arbitrary files on the server." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.11 before 13.11.7, all versions starting from 13.12 before 13.12.8, and all versions starting from 14.0 before 14.0.4. A specially crafted design image allowed attackers to read arbitrary files on the server." } ] }, diff --git a/2021/39xxx/CVE-2021-39888.json b/2021/39xxx/CVE-2021-39888.json index bb707e2175f..c3b095668de 100644 --- a/2021/39xxx/CVE-2021-39888.json +++ b/2021/39xxx/CVE-2021-39888.json @@ -19,13 +19,13 @@ "version": { "version_data": [ { - "version_value": ">=13.10, <14.3.1" + "version_value": ">=13.10, <14.1.7" }, { - "version_value": ">=13.9, <14.2.5" + "version_value": ">=14.2, <14.2.5" }, { - "version_value": ">=13.8, <14.1.7" + "version_value": ">=14.3, <14.3.1" } ] } @@ -71,7 +71,7 @@ "description_data": [ { "lang": "eng", - "value": "In all versions of GitLab EE since version 13.10, a specific API endpoint may reveal details about a private group and other sensitive info inside issue and merge request templates." + "value": "In all versions of GitLab EE starting from 13.10 before 14.1.7, all versions starting from 14.2 before 14.2.5, and all versions starting from 14.3 before 14.3.1 a specific API endpoint may reveal details about a private group and other sensitive info inside issue and merge request templates." } ] }, diff --git a/2021/39xxx/CVE-2021-39904.json b/2021/39xxx/CVE-2021-39904.json index 242f79f6e37..37c0c9e1614 100644 --- a/2021/39xxx/CVE-2021-39904.json +++ b/2021/39xxx/CVE-2021-39904.json @@ -19,13 +19,13 @@ "version": { "version_data": [ { - "version_value": ">=13.1, <14.4.1" + "version_value": ">=13.1, <14.2.6" }, { - "version_value": ">=13.0, <14.3.4" + "version_value": ">=14.3, <14.3.4" }, { - "version_value": ">=12.10, <14.2.6" + "version_value": ">=14.4, <14.4.1" } ] } @@ -71,7 +71,7 @@ "description_data": [ { "lang": "eng", - "value": "An Improper Access Control vulnerability in the GraphQL API in GitLab CE/EE since version 13.1 allows a Merge Request creator to resolve discussions and apply suggestions after a project owner has locked the Merge Request" + "value": "An Improper Access Control vulnerability in the GraphQL API in all versions of GitLab CE/EE starting from 13.1 before 14.2.6, all versions starting from 14.3 before 14.3.4, and all versions starting from 14.4 before 14.4.1 allows a Merge Request creator to resolve discussions and apply suggestions after a project owner has locked the Merge Request" } ] }, diff --git a/2021/39xxx/CVE-2021-39909.json b/2021/39xxx/CVE-2021-39909.json index b513b5bdad6..54fd9a09f4d 100644 --- a/2021/39xxx/CVE-2021-39909.json +++ b/2021/39xxx/CVE-2021-39909.json @@ -19,13 +19,13 @@ "version": { "version_data": [ { - "version_value": ">=11.3, <14.4.1" + "version_value": ">=11.3, <14.2.6" }, { - "version_value": ">=11.2, <14.3.4" + "version_value": ">=14.3, <14.3.4" }, { - "version_value": ">=11.1, <14.2.6" + "version_value": ">=14.4, <14.4.1" } ] } @@ -71,7 +71,7 @@ "description_data": [ { "lang": "eng", - "value": "Lack of email address ownership verification in the CODEOWNERS feature in all versions of GitLab EE since version 11.3 allows an attacker to bypass CODEOWNERS Merge Request approval requirement under rare circumstances" + "value": "Lack of email address ownership verification in the CODEOWNERS feature in all versions of GitLab EE starting from 11.3 before 14.2.6, all versions starting from 14.3 before 14.3.4, and all versions starting from 14.4 before 14.4.1 allows an attacker to bypass CODEOWNERS Merge Request approval requirement under rare circumstances" } ] }, diff --git a/2022/0xxx/CVE-2022-0136.json b/2022/0xxx/CVE-2022-0136.json index cb37282ffdc..bd25ce1465e 100644 --- a/2022/0xxx/CVE-2022-0136.json +++ b/2022/0xxx/CVE-2022-0136.json @@ -19,13 +19,13 @@ "version": { "version_data": [ { - "version_value": ">=14.7, <=14.7.1" + "version_value": ">=14.7, <14.7.1" }, { - "version_value": ">=14.6, <=14.6.4" + "version_value": ">=14.6, <14.6.4" }, { - "version_value": ">=10.5, <=14.5.4" + "version_value": ">=10.5, <14.5.4" } ] } diff --git a/2022/0xxx/CVE-2022-0249.json b/2022/0xxx/CVE-2022-0249.json index de3a9405afa..ed8466108af 100644 --- a/2022/0xxx/CVE-2022-0249.json +++ b/2022/0xxx/CVE-2022-0249.json @@ -19,13 +19,13 @@ "version": { "version_data": [ { - "version_value": ">=14.7, <=14.7.1" + "version_value": ">=14.7, <14.7.1" }, { - "version_value": ">=14.6, <=14.6.4" + "version_value": ">=14.6, <14.6.4" }, { - "version_value": ">=12.0, <=14.5.4" + "version_value": ">=12.0, <14.5.4" } ] } @@ -87,7 +87,7 @@ "scope": "UNCHANGED", "userInteraction": "NONE", "version": "3.1", - "baseScore": 3.0, + "baseScore": 3, "baseSeverity": "LOW" } }, diff --git a/2022/0xxx/CVE-2022-0549.json b/2022/0xxx/CVE-2022-0549.json index eb05837de28..03cb849dfea 100644 --- a/2022/0xxx/CVE-2022-0549.json +++ b/2022/0xxx/CVE-2022-0549.json @@ -19,13 +19,13 @@ "version": { "version_data": [ { - "version_value": ">=14.5, <14.8.2" + "version_value": ">=14.5, <14.5.2" }, { - "version_value": ">=14.4, <14.7.4" + "version_value": ">=14.4, <14.4.4" }, { - "version_value": ">=13.2, <14.6.5" + "version_value": ">=13.2, <14.3.6" } ] } diff --git a/2022/0xxx/CVE-2022-0741.json b/2022/0xxx/CVE-2022-0741.json index a78548517b2..ee47dd0323d 100644 --- a/2022/0xxx/CVE-2022-0741.json +++ b/2022/0xxx/CVE-2022-0741.json @@ -22,10 +22,10 @@ "version_value": ">=10.0, <14.6.5" }, { - "version_value": ">=10.1, <14.7.4" + "version_value": ">=14.7, <14.7.4" }, { - "version_value": ">=10.2, <14.8.2" + "version_value": ">=14.8, <14.8.2" } ] } diff --git a/2022/0xxx/CVE-2022-0751.json b/2022/0xxx/CVE-2022-0751.json index ab6630bb19b..2b51c6e9935 100644 --- a/2022/0xxx/CVE-2022-0751.json +++ b/2022/0xxx/CVE-2022-0751.json @@ -22,10 +22,10 @@ "version_value": ">=10.0, <14.6.5" }, { - "version_value": ">=10.1, <14.7.4" + "version_value": ">=14.7, <14.7.4" }, { - "version_value": ">=10.2, <14.8.2" + "version_value": ">=14.8, <14.8.2" } ] } diff --git a/2022/1xxx/CVE-2022-1713.json b/2022/1xxx/CVE-2022-1713.json new file mode 100644 index 00000000000..5298583d5d3 --- /dev/null +++ b/2022/1xxx/CVE-2022-1713.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-1713", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29854.json b/2022/29xxx/CVE-2022-29854.json index 64b9b488e3e..d3c385ce0e6 100644 --- a/2022/29xxx/CVE-2022-29854.json +++ b/2022/29xxx/CVE-2022-29854.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-29854", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-29854", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in Mitel 6900 Series IP (MiNet) phones excluding 6970, versions 1.8 (1.8.0.12) and earlier, could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.mitel.com/support/security-advisories", + "refsource": "MISC", + "name": "https://www.mitel.com/support/security-advisories" + }, + { + "refsource": "CONFIRM", + "name": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0003", + "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0003" } ] } diff --git a/2022/30xxx/CVE-2022-30367.json b/2022/30xxx/CVE-2022-30367.json index 2419374a345..93984df6ed3 100644 --- a/2022/30xxx/CVE-2022-30367.json +++ b/2022/30xxx/CVE-2022-30367.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-30367", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-30367", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Air Cargo Management System v1.0 is vulnerable to file deletion via /acms/classes/Master.php?f=delete_img." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/air-cargo-management-system/delet-file-1.md", + "url": "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/air-cargo-management-system/delet-file-1.md" } ] } diff --git a/2022/30xxx/CVE-2022-30375.json b/2022/30xxx/CVE-2022-30375.json index c21f7fecf84..ef185a36244 100644 --- a/2022/30xxx/CVE-2022-30375.json +++ b/2022/30xxx/CVE-2022-30375.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-30375", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-30375", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sourcecodester Simple Social Networking Site v1.0 is vulnerable to file deletion via /sns/classes/Master.php?f=delete_img." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/simple-social-networking-site/delet-file-1.md", + "url": "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/simple-social-networking-site/delet-file-1.md" } ] } diff --git a/2022/30xxx/CVE-2022-30376.json b/2022/30xxx/CVE-2022-30376.json index f227eb47f74..d2a02ee24c3 100644 --- a/2022/30xxx/CVE-2022-30376.json +++ b/2022/30xxx/CVE-2022-30376.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-30376", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-30376", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sourcecodester Simple Social Networking Site v1.0 is vulnerable to SQL Injection via /sns/admin/members/view_member.php?id=." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/simple-social-networking-site/SQLi-1.md", + "url": "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/simple-social-networking-site/SQLi-1.md" } ] } diff --git a/2022/30xxx/CVE-2022-30378.json b/2022/30xxx/CVE-2022-30378.json index eedebbe983a..0350a2d16a5 100644 --- a/2022/30xxx/CVE-2022-30378.json +++ b/2022/30xxx/CVE-2022-30378.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-30378", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-30378", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sourcecodester Simple Social Networking Site v1.0 is vulnerable to SQL Injection via /sns/admin/?page=posts/view_post&id=." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/simple-social-networking-site/SQLi-2.md", + "url": "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/simple-social-networking-site/SQLi-2.md" } ] } diff --git a/2022/30xxx/CVE-2022-30379.json b/2022/30xxx/CVE-2022-30379.json index a2c36c621b5..d8aa5f0e817 100644 --- a/2022/30xxx/CVE-2022-30379.json +++ b/2022/30xxx/CVE-2022-30379.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-30379", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-30379", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sourcecodester Simple Social Networking Site v1.0 is vulnerable to SQL Injection via /sns/admin/?page=user/manage_user&id=." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/simple-social-networking-site/SQLi-3.md", + "url": "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/simple-social-networking-site/SQLi-3.md" } ] } diff --git a/2022/30xxx/CVE-2022-30695.json b/2022/30xxx/CVE-2022-30695.json new file mode 100644 index 00000000000..5ab3506a403 --- /dev/null +++ b/2022/30xxx/CVE-2022-30695.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-30695", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/30xxx/CVE-2022-30696.json b/2022/30xxx/CVE-2022-30696.json new file mode 100644 index 00000000000..3e4f2ff57d8 --- /dev/null +++ b/2022/30xxx/CVE-2022-30696.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-30696", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/30xxx/CVE-2022-30697.json b/2022/30xxx/CVE-2022-30697.json new file mode 100644 index 00000000000..4cc5737553b --- /dev/null +++ b/2022/30xxx/CVE-2022-30697.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-30697", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/30xxx/CVE-2022-30698.json b/2022/30xxx/CVE-2022-30698.json new file mode 100644 index 00000000000..b9ae5e94449 --- /dev/null +++ b/2022/30xxx/CVE-2022-30698.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-30698", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/30xxx/CVE-2022-30699.json b/2022/30xxx/CVE-2022-30699.json new file mode 100644 index 00000000000..6e76e0baf73 --- /dev/null +++ b/2022/30xxx/CVE-2022-30699.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-30699", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file