From 822fb9bd644b1755901250fb0419662c61fe5c82 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 25 Mar 2022 08:01:26 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/14xxx/CVE-2019-14844.json | 5 + 2020/25xxx/CVE-2020-25632.json | 5 + 2020/25xxx/CVE-2020-25647.json | 5 + 2020/27xxx/CVE-2020-27749.json | 5 + 2020/27xxx/CVE-2020-27779.json | 5 + 2021/20xxx/CVE-2021-20225.json | 5 + 2021/20xxx/CVE-2021-20233.json | 5 + 2021/21xxx/CVE-2021-21708.json | 5 + 2021/25xxx/CVE-2021-25217.json | 5 + 2021/44xxx/CVE-2021-44531.json | 5 + 2021/44xxx/CVE-2021-44532.json | 5 + 2021/44xxx/CVE-2021-44533.json | 5 + 2022/0xxx/CVE-2022-0686.json | 171 +++++++++++++++++---------------- 2022/0xxx/CVE-2022-0691.json | 171 +++++++++++++++++---------------- 2022/0xxx/CVE-2022-0847.json | 5 + 2022/1xxx/CVE-2022-1072.json | 18 ++++ 2022/1xxx/CVE-2022-1073.json | 18 ++++ 2022/1xxx/CVE-2022-1074.json | 18 ++++ 2022/1xxx/CVE-2022-1075.json | 18 ++++ 2022/1xxx/CVE-2022-1076.json | 18 ++++ 2022/1xxx/CVE-2022-1077.json | 18 ++++ 2022/1xxx/CVE-2022-1078.json | 18 ++++ 2022/1xxx/CVE-2022-1079.json | 18 ++++ 2022/1xxx/CVE-2022-1080.json | 18 ++++ 2022/1xxx/CVE-2022-1081.json | 18 ++++ 2022/1xxx/CVE-2022-1082.json | 18 ++++ 2022/1xxx/CVE-2022-1083.json | 18 ++++ 2022/1xxx/CVE-2022-1084.json | 18 ++++ 2022/1xxx/CVE-2022-1085.json | 18 ++++ 2022/1xxx/CVE-2022-1086.json | 18 ++++ 2022/1xxx/CVE-2022-1087.json | 18 ++++ 2022/21xxx/CVE-2022-21824.json | 5 + 2022/23xxx/CVE-2022-23395.json | 5 + 2022/23xxx/CVE-2022-23710.json | 5 + 2022/24xxx/CVE-2022-24921.json | 5 + 2022/25xxx/CVE-2022-25636.json | 5 + 36 files changed, 554 insertions(+), 166 deletions(-) create mode 100644 2022/1xxx/CVE-2022-1072.json create mode 100644 2022/1xxx/CVE-2022-1073.json create mode 100644 2022/1xxx/CVE-2022-1074.json create mode 100644 2022/1xxx/CVE-2022-1075.json create mode 100644 2022/1xxx/CVE-2022-1076.json create mode 100644 2022/1xxx/CVE-2022-1077.json create mode 100644 2022/1xxx/CVE-2022-1078.json create mode 100644 2022/1xxx/CVE-2022-1079.json create mode 100644 2022/1xxx/CVE-2022-1080.json create mode 100644 2022/1xxx/CVE-2022-1081.json create mode 100644 2022/1xxx/CVE-2022-1082.json create mode 100644 2022/1xxx/CVE-2022-1083.json create mode 100644 2022/1xxx/CVE-2022-1084.json create mode 100644 2022/1xxx/CVE-2022-1085.json create mode 100644 2022/1xxx/CVE-2022-1086.json create mode 100644 2022/1xxx/CVE-2022-1087.json diff --git a/2019/14xxx/CVE-2019-14844.json b/2019/14xxx/CVE-2019-14844.json index 2c4bc48106a..f7e957aae43 100644 --- a/2019/14xxx/CVE-2019-14844.json +++ b/2019/14xxx/CVE-2019-14844.json @@ -68,6 +68,11 @@ "refsource": "FEDORA", "name": "FEDORA-2019-dc4e1d0fb6", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/54ZYKEJZ77BXZWGF4NEVKC33ESVROEYC/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0003/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0003/" } ] }, diff --git a/2020/25xxx/CVE-2020-25632.json b/2020/25xxx/CVE-2020-25632.json index 3b1bcc38798..4b4282672a0 100644 --- a/2020/25xxx/CVE-2020-25632.json +++ b/2020/25xxx/CVE-2020-25632.json @@ -58,6 +58,11 @@ "refsource": "GENTOO", "name": "GLSA-202104-05", "url": "https://security.gentoo.org/glsa/202104-05" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0001/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0001/" } ] }, diff --git a/2020/25xxx/CVE-2020-25647.json b/2020/25xxx/CVE-2020-25647.json index 49a70db1886..3d9b78f77f7 100644 --- a/2020/25xxx/CVE-2020-25647.json +++ b/2020/25xxx/CVE-2020-25647.json @@ -58,6 +58,11 @@ "refsource": "GENTOO", "name": "GLSA-202104-05", "url": "https://security.gentoo.org/glsa/202104-05" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0001/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0001/" } ] }, diff --git a/2020/27xxx/CVE-2020-27749.json b/2020/27xxx/CVE-2020-27749.json index 6eac4993c5d..3aecc649349 100644 --- a/2020/27xxx/CVE-2020-27749.json +++ b/2020/27xxx/CVE-2020-27749.json @@ -58,6 +58,11 @@ "refsource": "GENTOO", "name": "GLSA-202104-05", "url": "https://security.gentoo.org/glsa/202104-05" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0001/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0001/" } ] }, diff --git a/2020/27xxx/CVE-2020-27779.json b/2020/27xxx/CVE-2020-27779.json index 7e25dad0eb7..4f8567191a7 100644 --- a/2020/27xxx/CVE-2020-27779.json +++ b/2020/27xxx/CVE-2020-27779.json @@ -58,6 +58,11 @@ "refsource": "GENTOO", "name": "GLSA-202104-05", "url": "https://security.gentoo.org/glsa/202104-05" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0001/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0001/" } ] }, diff --git a/2021/20xxx/CVE-2021-20225.json b/2021/20xxx/CVE-2021-20225.json index 057b0181807..3ba4a8d2d5a 100644 --- a/2021/20xxx/CVE-2021-20225.json +++ b/2021/20xxx/CVE-2021-20225.json @@ -58,6 +58,11 @@ "refsource": "GENTOO", "name": "GLSA-202104-05", "url": "https://security.gentoo.org/glsa/202104-05" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0001/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0001/" } ] }, diff --git a/2021/20xxx/CVE-2021-20233.json b/2021/20xxx/CVE-2021-20233.json index 84abcaef6ea..365c186921d 100644 --- a/2021/20xxx/CVE-2021-20233.json +++ b/2021/20xxx/CVE-2021-20233.json @@ -58,6 +58,11 @@ "refsource": "GENTOO", "name": "GLSA-202104-05", "url": "https://security.gentoo.org/glsa/202104-05" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0001/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0001/" } ] }, diff --git a/2021/21xxx/CVE-2021-21708.json b/2021/21xxx/CVE-2021-21708.json index 31fed799e3e..588581939fa 100644 --- a/2021/21xxx/CVE-2021-21708.json +++ b/2021/21xxx/CVE-2021-21708.json @@ -95,6 +95,11 @@ "refsource": "MISC", "url": "https://bugs.php.net/bug.php?id=81708", "name": "https://bugs.php.net/bug.php?id=81708" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0004/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0004/" } ] }, diff --git a/2021/25xxx/CVE-2021-25217.json b/2021/25xxx/CVE-2021-25217.json index 0c1034d89aa..64f8fd99179 100644 --- a/2021/25xxx/CVE-2021-25217.json +++ b/2021/25xxx/CVE-2021-25217.json @@ -121,6 +121,11 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-406691.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-406691.pdf" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0011/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0011/" } ] }, diff --git a/2021/44xxx/CVE-2021-44531.json b/2021/44xxx/CVE-2021-44531.json index 6296917d721..79c995646de 100644 --- a/2021/44xxx/CVE-2021-44531.json +++ b/2021/44xxx/CVE-2021-44531.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0007/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0007/" } ] }, diff --git a/2021/44xxx/CVE-2021-44532.json b/2021/44xxx/CVE-2021-44532.json index 8ddecfc2c85..b902eff9ecf 100644 --- a/2021/44xxx/CVE-2021-44532.json +++ b/2021/44xxx/CVE-2021-44532.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0007/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0007/" } ] }, diff --git a/2021/44xxx/CVE-2021-44533.json b/2021/44xxx/CVE-2021-44533.json index 41eb127ff61..d610c79a0ca 100644 --- a/2021/44xxx/CVE-2021-44533.json +++ b/2021/44xxx/CVE-2021-44533.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0007/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0007/" } ] }, diff --git a/2022/0xxx/CVE-2022-0686.json b/2022/0xxx/CVE-2022-0686.json index 282d4a00aa2..8233ba71d0c 100644 --- a/2022/0xxx/CVE-2022-0686.json +++ b/2022/0xxx/CVE-2022-0686.json @@ -1,89 +1,94 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@huntr.dev", - "ID": "CVE-2022-0686", - "STATE": "PUBLIC", - "TITLE": "Authorization Bypass Through User-Controlled Key in unshiftio/url-parse" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "unshiftio/url-parse", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "1.5.8" - } - ] + "CVE_data_meta": { + "ASSIGNER": "security@huntr.dev", + "ID": "CVE-2022-0686", + "STATE": "PUBLIC", + "TITLE": "Authorization Bypass Through User-Controlled Key in unshiftio/url-parse" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "unshiftio/url-parse", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "1.5.8" + } + ] + } + } + ] + }, + "vendor_name": "unshiftio" } - } ] - }, - "vendor_name": "unshiftio" } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.8." - } - ] - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "NONE", - "baseScore": 6.5, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-639 Authorization Bypass Through User-Controlled Key" - } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.8." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://huntr.dev/bounties/55fd06cd-9054-4d80-83be-eb5a454be78c", - "refsource": "CONFIRM", - "url": "https://huntr.dev/bounties/55fd06cd-9054-4d80-83be-eb5a454be78c" - }, - { - "name": "https://github.com/unshiftio/url-parse/commit/d5c64791ef496ca5459ae7f2176a31ea53b127e5", - "refsource": "MISC", - "url": "https://github.com/unshiftio/url-parse/commit/d5c64791ef496ca5459ae7f2176a31ea53b127e5" - } - ] - }, - "source": { - "advisory": "55fd06cd-9054-4d80-83be-eb5a454be78c", - "discovery": "EXTERNAL" - } + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-639 Authorization Bypass Through User-Controlled Key" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://huntr.dev/bounties/55fd06cd-9054-4d80-83be-eb5a454be78c", + "refsource": "CONFIRM", + "url": "https://huntr.dev/bounties/55fd06cd-9054-4d80-83be-eb5a454be78c" + }, + { + "name": "https://github.com/unshiftio/url-parse/commit/d5c64791ef496ca5459ae7f2176a31ea53b127e5", + "refsource": "MISC", + "url": "https://github.com/unshiftio/url-parse/commit/d5c64791ef496ca5459ae7f2176a31ea53b127e5" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0006/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0006/" + } + ] + }, + "source": { + "advisory": "55fd06cd-9054-4d80-83be-eb5a454be78c", + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0691.json b/2022/0xxx/CVE-2022-0691.json index 0290ae98d0f..3648d0f4299 100644 --- a/2022/0xxx/CVE-2022-0691.json +++ b/2022/0xxx/CVE-2022-0691.json @@ -1,89 +1,94 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@huntr.dev", - "ID": "CVE-2022-0691", - "STATE": "PUBLIC", - "TITLE": "Authorization Bypass Through User-Controlled Key in unshiftio/url-parse" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "unshiftio/url-parse", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "1.5.9" - } - ] + "CVE_data_meta": { + "ASSIGNER": "security@huntr.dev", + "ID": "CVE-2022-0691", + "STATE": "PUBLIC", + "TITLE": "Authorization Bypass Through User-Controlled Key in unshiftio/url-parse" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "unshiftio/url-parse", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "1.5.9" + } + ] + } + } + ] + }, + "vendor_name": "unshiftio" } - } ] - }, - "vendor_name": "unshiftio" } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9." - } - ] - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "NONE", - "baseScore": 6.5, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-639 Authorization Bypass Through User-Controlled Key" - } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4", - "refsource": "CONFIRM", - "url": "https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4" - }, - { - "name": "https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63", - "refsource": "MISC", - "url": "https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63" - } - ] - }, - "source": { - "advisory": "57124ed5-4b68-4934-8325-2c546257f2e4", - "discovery": "EXTERNAL" - } + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-639 Authorization Bypass Through User-Controlled Key" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4", + "refsource": "CONFIRM", + "url": "https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4" + }, + { + "name": "https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63", + "refsource": "MISC", + "url": "https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0006/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0006/" + } + ] + }, + "source": { + "advisory": "57124ed5-4b68-4934-8325-2c546257f2e4", + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0847.json b/2022/0xxx/CVE-2022-0847.json index 88adf18102d..ca5ac5ae261 100644 --- a/2022/0xxx/CVE-2022-0847.json +++ b/2022/0xxx/CVE-2022-0847.json @@ -73,6 +73,11 @@ "refsource": "MISC", "name": "https://www.suse.com/support/kb/doc/?id=000020603", "url": "https://www.suse.com/support/kb/doc/?id=000020603" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0005/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0005/" } ] }, diff --git a/2022/1xxx/CVE-2022-1072.json b/2022/1xxx/CVE-2022-1072.json new file mode 100644 index 00000000000..ef7b3567c1d --- /dev/null +++ b/2022/1xxx/CVE-2022-1072.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-1072", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1073.json b/2022/1xxx/CVE-2022-1073.json new file mode 100644 index 00000000000..187e47e2f64 --- /dev/null +++ b/2022/1xxx/CVE-2022-1073.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-1073", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1074.json b/2022/1xxx/CVE-2022-1074.json new file mode 100644 index 00000000000..b468a110294 --- /dev/null +++ b/2022/1xxx/CVE-2022-1074.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-1074", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1075.json b/2022/1xxx/CVE-2022-1075.json new file mode 100644 index 00000000000..cb69a45b43a --- /dev/null +++ b/2022/1xxx/CVE-2022-1075.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-1075", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1076.json b/2022/1xxx/CVE-2022-1076.json new file mode 100644 index 00000000000..a9b8b5c2263 --- /dev/null +++ b/2022/1xxx/CVE-2022-1076.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-1076", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1077.json b/2022/1xxx/CVE-2022-1077.json new file mode 100644 index 00000000000..809f58cc5a8 --- /dev/null +++ b/2022/1xxx/CVE-2022-1077.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-1077", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1078.json b/2022/1xxx/CVE-2022-1078.json new file mode 100644 index 00000000000..1c8b9a1768d --- /dev/null +++ b/2022/1xxx/CVE-2022-1078.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-1078", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1079.json b/2022/1xxx/CVE-2022-1079.json new file mode 100644 index 00000000000..cbfee5cead9 --- /dev/null +++ b/2022/1xxx/CVE-2022-1079.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-1079", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1080.json b/2022/1xxx/CVE-2022-1080.json new file mode 100644 index 00000000000..f159d3c4877 --- /dev/null +++ b/2022/1xxx/CVE-2022-1080.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-1080", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1081.json b/2022/1xxx/CVE-2022-1081.json new file mode 100644 index 00000000000..94572a2eea1 --- /dev/null +++ b/2022/1xxx/CVE-2022-1081.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-1081", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1082.json b/2022/1xxx/CVE-2022-1082.json new file mode 100644 index 00000000000..216125a28ba --- /dev/null +++ b/2022/1xxx/CVE-2022-1082.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-1082", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1083.json b/2022/1xxx/CVE-2022-1083.json new file mode 100644 index 00000000000..28acbe45eee --- /dev/null +++ b/2022/1xxx/CVE-2022-1083.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-1083", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1084.json b/2022/1xxx/CVE-2022-1084.json new file mode 100644 index 00000000000..8d442fa81d9 --- /dev/null +++ b/2022/1xxx/CVE-2022-1084.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-1084", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1085.json b/2022/1xxx/CVE-2022-1085.json new file mode 100644 index 00000000000..bd6c4651385 --- /dev/null +++ b/2022/1xxx/CVE-2022-1085.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-1085", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1086.json b/2022/1xxx/CVE-2022-1086.json new file mode 100644 index 00000000000..2965558fab2 --- /dev/null +++ b/2022/1xxx/CVE-2022-1086.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-1086", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1087.json b/2022/1xxx/CVE-2022-1087.json new file mode 100644 index 00000000000..843c9a109b3 --- /dev/null +++ b/2022/1xxx/CVE-2022-1087.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-1087", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21824.json b/2022/21xxx/CVE-2022-21824.json index f6f6874e1dc..57119760ff4 100644 --- a/2022/21xxx/CVE-2022-21824.json +++ b/2022/21xxx/CVE-2022-21824.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://hackerone.com/reports/1431042", "url": "https://hackerone.com/reports/1431042" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0007/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0007/" } ] }, diff --git a/2022/23xxx/CVE-2022-23395.json b/2022/23xxx/CVE-2022-23395.json index dcb323784b3..019b2ed74bf 100644 --- a/2022/23xxx/CVE-2022-23395.json +++ b/2022/23xxx/CVE-2022-23395.json @@ -56,6 +56,11 @@ "url": "https://snyk.io/test/npm/jquery.cookie/1.4.1?tab=issues", "refsource": "MISC", "name": "https://snyk.io/test/npm/jquery.cookie/1.4.1?tab=issues" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0008/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0008/" } ] } diff --git a/2022/23xxx/CVE-2022-23710.json b/2022/23xxx/CVE-2022-23710.json index 6fcf6beff7c..c5ed8517d87 100644 --- a/2022/23xxx/CVE-2022-23710.json +++ b/2022/23xxx/CVE-2022-23710.json @@ -48,6 +48,11 @@ "url": "https://discuss.elastic.co/t/elastic-stack-7-17-1-security-update/298447", "refsource": "MISC", "name": "https://discuss.elastic.co/t/elastic-stack-7-17-1-security-update/298447" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0009/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0009/" } ] }, diff --git a/2022/24xxx/CVE-2022-24921.json b/2022/24xxx/CVE-2022-24921.json index 83b555bfefb..2c4efdeaa4e 100644 --- a/2022/24xxx/CVE-2022-24921.json +++ b/2022/24xxx/CVE-2022-24921.json @@ -56,6 +56,11 @@ "refsource": "CONFIRM", "name": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk", "url": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0010/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0010/" } ] } diff --git a/2022/25xxx/CVE-2022-25636.json b/2022/25xxx/CVE-2022-25636.json index 29967ea684e..e56e8d2c218 100644 --- a/2022/25xxx/CVE-2022-25636.json +++ b/2022/25xxx/CVE-2022-25636.json @@ -86,6 +86,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html", "url": "http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220325-0002/", + "url": "https://security.netapp.com/advisory/ntap-20220325-0002/" } ] }