From a6f12f3ce445c0bab7f40303791dad2a646d7d58 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 14 Jun 2022 11:02:18 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/40xxx/CVE-2021-40658.json | 56 ++++++++++++++++++++++++++++++---- 2022/2xxx/CVE-2022-2077.json | 2 +- 2022/33xxx/CVE-2022-33210.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33212.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33213.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33214.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33216.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33219.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33222.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33224.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33226.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33227.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33228.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33230.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33231.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33233.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33238.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33239.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33240.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33241.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33242.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33243.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33244.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33246.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33247.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33248.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33250.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33254.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33257.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33258.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33261.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33264.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33267.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33268.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33270.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33273.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33275.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33276.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33277.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33278.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33279.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33280.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33281.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33283.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33286.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33287.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33288.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33290.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33291.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33292.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33293.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33294.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33295.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33297.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33298.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33299.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33300.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33305.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33306.json | 18 +++++++++++ 2022/33xxx/CVE-2022-33309.json | 18 +++++++++++ 60 files changed, 1095 insertions(+), 7 deletions(-) create mode 100644 2022/33xxx/CVE-2022-33210.json create mode 100644 2022/33xxx/CVE-2022-33212.json create mode 100644 2022/33xxx/CVE-2022-33213.json create mode 100644 2022/33xxx/CVE-2022-33214.json create mode 100644 2022/33xxx/CVE-2022-33216.json create mode 100644 2022/33xxx/CVE-2022-33219.json create mode 100644 2022/33xxx/CVE-2022-33222.json create mode 100644 2022/33xxx/CVE-2022-33224.json create mode 100644 2022/33xxx/CVE-2022-33226.json create mode 100644 2022/33xxx/CVE-2022-33227.json create mode 100644 2022/33xxx/CVE-2022-33228.json create mode 100644 2022/33xxx/CVE-2022-33230.json create mode 100644 2022/33xxx/CVE-2022-33231.json create mode 100644 2022/33xxx/CVE-2022-33233.json create mode 100644 2022/33xxx/CVE-2022-33238.json create mode 100644 2022/33xxx/CVE-2022-33239.json create mode 100644 2022/33xxx/CVE-2022-33240.json create mode 100644 2022/33xxx/CVE-2022-33241.json create mode 100644 2022/33xxx/CVE-2022-33242.json create mode 100644 2022/33xxx/CVE-2022-33243.json create mode 100644 2022/33xxx/CVE-2022-33244.json create mode 100644 2022/33xxx/CVE-2022-33246.json create mode 100644 2022/33xxx/CVE-2022-33247.json create mode 100644 2022/33xxx/CVE-2022-33248.json create mode 100644 2022/33xxx/CVE-2022-33250.json create mode 100644 2022/33xxx/CVE-2022-33254.json create mode 100644 2022/33xxx/CVE-2022-33257.json create mode 100644 2022/33xxx/CVE-2022-33258.json create mode 100644 2022/33xxx/CVE-2022-33261.json create mode 100644 2022/33xxx/CVE-2022-33264.json create mode 100644 2022/33xxx/CVE-2022-33267.json create mode 100644 2022/33xxx/CVE-2022-33268.json create mode 100644 2022/33xxx/CVE-2022-33270.json create mode 100644 2022/33xxx/CVE-2022-33273.json create mode 100644 2022/33xxx/CVE-2022-33275.json create mode 100644 2022/33xxx/CVE-2022-33276.json create mode 100644 2022/33xxx/CVE-2022-33277.json create mode 100644 2022/33xxx/CVE-2022-33278.json create mode 100644 2022/33xxx/CVE-2022-33279.json create mode 100644 2022/33xxx/CVE-2022-33280.json create mode 100644 2022/33xxx/CVE-2022-33281.json create mode 100644 2022/33xxx/CVE-2022-33283.json create mode 100644 2022/33xxx/CVE-2022-33286.json create mode 100644 2022/33xxx/CVE-2022-33287.json create mode 100644 2022/33xxx/CVE-2022-33288.json create mode 100644 2022/33xxx/CVE-2022-33290.json create mode 100644 2022/33xxx/CVE-2022-33291.json create mode 100644 2022/33xxx/CVE-2022-33292.json create mode 100644 2022/33xxx/CVE-2022-33293.json create mode 100644 2022/33xxx/CVE-2022-33294.json create mode 100644 2022/33xxx/CVE-2022-33295.json create mode 100644 2022/33xxx/CVE-2022-33297.json create mode 100644 2022/33xxx/CVE-2022-33298.json create mode 100644 2022/33xxx/CVE-2022-33299.json create mode 100644 2022/33xxx/CVE-2022-33300.json create mode 100644 2022/33xxx/CVE-2022-33305.json create mode 100644 2022/33xxx/CVE-2022-33306.json create mode 100644 2022/33xxx/CVE-2022-33309.json diff --git a/2021/40xxx/CVE-2021-40658.json b/2021/40xxx/CVE-2021-40658.json index e862752dd5d..04ecd293b5b 100644 --- a/2021/40xxx/CVE-2021-40658.json +++ b/2021/40xxx/CVE-2021-40658.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40658", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40658", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Textpattern 4.8.7 is affected by a HTML injection vulnerability through \u201cContent>Write>Body\u201d." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://tanmay26.medium.com/textpattern-4-8-7-is-affected-by-html-injection-in-the-body-parameter-1a7be2441b70", + "refsource": "MISC", + "name": "https://tanmay26.medium.com/textpattern-4-8-7-is-affected-by-html-injection-in-the-body-parameter-1a7be2441b70" } ] } diff --git a/2022/2xxx/CVE-2022-2077.json b/2022/2xxx/CVE-2022-2077.json index 3699fdb9dd2..8807e82a2f4 100644 --- a/2022/2xxx/CVE-2022-2077.json +++ b/2022/2xxx/CVE-2022-2077.json @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "** DISPUTED ** A vulnerability was found in Microsoft O365 and classified as critical. This issue affects the Conditional Access Policy which leads to improper access controls. By default the policy is not verified for every request. The attack may be initiated remotely. Exploit details have been disclosed to the public. It is recommended to change the configuration settings. NOTE: Vendor claims that pre-requisites are very high, the feature works as intended, and that configuration settings might mitigate the issue." + "value": "A vulnerability was found in Microsoft O365 and classified as critical. This issue affects the Conditional Access Policy which leads to improper access controls. By default the policy is not verified for every request. The attack may be initiated remotely. Exploit details have been disclosed to the public. It is recommended to change the configuration settings. NOTE: Vendor claims that pre-requisites are very high, the feature works as intended, and that configuration settings might mitigate the issue." } ] }, diff --git a/2022/33xxx/CVE-2022-33210.json b/2022/33xxx/CVE-2022-33210.json new file mode 100644 index 00000000000..883383b0d71 --- /dev/null +++ b/2022/33xxx/CVE-2022-33210.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33210", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33212.json b/2022/33xxx/CVE-2022-33212.json new file mode 100644 index 00000000000..6062e941e40 --- /dev/null +++ b/2022/33xxx/CVE-2022-33212.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33212", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33213.json b/2022/33xxx/CVE-2022-33213.json new file mode 100644 index 00000000000..d36d5769d42 --- /dev/null +++ b/2022/33xxx/CVE-2022-33213.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33213", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33214.json b/2022/33xxx/CVE-2022-33214.json new file mode 100644 index 00000000000..ed466b2fcba --- /dev/null +++ b/2022/33xxx/CVE-2022-33214.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33214", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33216.json b/2022/33xxx/CVE-2022-33216.json new file mode 100644 index 00000000000..6ea9222981d --- /dev/null +++ b/2022/33xxx/CVE-2022-33216.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33216", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33219.json b/2022/33xxx/CVE-2022-33219.json new file mode 100644 index 00000000000..0946a251bca --- /dev/null +++ b/2022/33xxx/CVE-2022-33219.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33219", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33222.json b/2022/33xxx/CVE-2022-33222.json new file mode 100644 index 00000000000..0ec396852f5 --- /dev/null +++ b/2022/33xxx/CVE-2022-33222.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33222", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33224.json b/2022/33xxx/CVE-2022-33224.json new file mode 100644 index 00000000000..8e361f8c6bb --- /dev/null +++ b/2022/33xxx/CVE-2022-33224.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33224", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33226.json b/2022/33xxx/CVE-2022-33226.json new file mode 100644 index 00000000000..158113f53c3 --- /dev/null +++ b/2022/33xxx/CVE-2022-33226.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33226", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33227.json b/2022/33xxx/CVE-2022-33227.json new file mode 100644 index 00000000000..94090df0845 --- /dev/null +++ b/2022/33xxx/CVE-2022-33227.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33227", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33228.json b/2022/33xxx/CVE-2022-33228.json new file mode 100644 index 00000000000..b576ee120c3 --- /dev/null +++ b/2022/33xxx/CVE-2022-33228.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33228", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33230.json b/2022/33xxx/CVE-2022-33230.json new file mode 100644 index 00000000000..2df9648eb44 --- /dev/null +++ b/2022/33xxx/CVE-2022-33230.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33230", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33231.json b/2022/33xxx/CVE-2022-33231.json new file mode 100644 index 00000000000..c820d367d2d --- /dev/null +++ b/2022/33xxx/CVE-2022-33231.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33231", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33233.json b/2022/33xxx/CVE-2022-33233.json new file mode 100644 index 00000000000..448cdb3e21d --- /dev/null +++ b/2022/33xxx/CVE-2022-33233.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33233", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33238.json b/2022/33xxx/CVE-2022-33238.json new file mode 100644 index 00000000000..b39392ea75d --- /dev/null +++ b/2022/33xxx/CVE-2022-33238.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33238", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33239.json b/2022/33xxx/CVE-2022-33239.json new file mode 100644 index 00000000000..cb3d5fbd8a5 --- /dev/null +++ b/2022/33xxx/CVE-2022-33239.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33239", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33240.json b/2022/33xxx/CVE-2022-33240.json new file mode 100644 index 00000000000..f3e7d88cae5 --- /dev/null +++ b/2022/33xxx/CVE-2022-33240.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33240", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33241.json b/2022/33xxx/CVE-2022-33241.json new file mode 100644 index 00000000000..0d1e9df5148 --- /dev/null +++ b/2022/33xxx/CVE-2022-33241.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33241", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33242.json b/2022/33xxx/CVE-2022-33242.json new file mode 100644 index 00000000000..6dc737dbf8e --- /dev/null +++ b/2022/33xxx/CVE-2022-33242.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33242", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33243.json b/2022/33xxx/CVE-2022-33243.json new file mode 100644 index 00000000000..0c6eba108a1 --- /dev/null +++ b/2022/33xxx/CVE-2022-33243.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33243", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33244.json b/2022/33xxx/CVE-2022-33244.json new file mode 100644 index 00000000000..34e04520b31 --- /dev/null +++ b/2022/33xxx/CVE-2022-33244.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33244", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33246.json b/2022/33xxx/CVE-2022-33246.json new file mode 100644 index 00000000000..e5d286aac4b --- /dev/null +++ b/2022/33xxx/CVE-2022-33246.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33246", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33247.json b/2022/33xxx/CVE-2022-33247.json new file mode 100644 index 00000000000..13fb8caaf44 --- /dev/null +++ b/2022/33xxx/CVE-2022-33247.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33247", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33248.json b/2022/33xxx/CVE-2022-33248.json new file mode 100644 index 00000000000..75fe19fce62 --- /dev/null +++ b/2022/33xxx/CVE-2022-33248.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33248", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33250.json b/2022/33xxx/CVE-2022-33250.json new file mode 100644 index 00000000000..29f7bece976 --- /dev/null +++ b/2022/33xxx/CVE-2022-33250.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33250", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33254.json b/2022/33xxx/CVE-2022-33254.json new file mode 100644 index 00000000000..359ef3d8ef1 --- /dev/null +++ b/2022/33xxx/CVE-2022-33254.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33254", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33257.json b/2022/33xxx/CVE-2022-33257.json new file mode 100644 index 00000000000..56336016ba9 --- /dev/null +++ b/2022/33xxx/CVE-2022-33257.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33257", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33258.json b/2022/33xxx/CVE-2022-33258.json new file mode 100644 index 00000000000..8bfd572aa86 --- /dev/null +++ b/2022/33xxx/CVE-2022-33258.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33258", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33261.json b/2022/33xxx/CVE-2022-33261.json new file mode 100644 index 00000000000..5f8a65b8856 --- /dev/null +++ b/2022/33xxx/CVE-2022-33261.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33261", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33264.json b/2022/33xxx/CVE-2022-33264.json new file mode 100644 index 00000000000..0595118ac5e --- /dev/null +++ b/2022/33xxx/CVE-2022-33264.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33264", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33267.json b/2022/33xxx/CVE-2022-33267.json new file mode 100644 index 00000000000..b4cfce4c698 --- /dev/null +++ b/2022/33xxx/CVE-2022-33267.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33267", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33268.json b/2022/33xxx/CVE-2022-33268.json new file mode 100644 index 00000000000..8be6554708f --- /dev/null +++ b/2022/33xxx/CVE-2022-33268.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33268", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33270.json b/2022/33xxx/CVE-2022-33270.json new file mode 100644 index 00000000000..a37af5aa807 --- /dev/null +++ b/2022/33xxx/CVE-2022-33270.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33270", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33273.json b/2022/33xxx/CVE-2022-33273.json new file mode 100644 index 00000000000..3ad52980594 --- /dev/null +++ b/2022/33xxx/CVE-2022-33273.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33273", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33275.json b/2022/33xxx/CVE-2022-33275.json new file mode 100644 index 00000000000..807504ca5d3 --- /dev/null +++ b/2022/33xxx/CVE-2022-33275.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33275", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33276.json b/2022/33xxx/CVE-2022-33276.json new file mode 100644 index 00000000000..1bd8de08d53 --- /dev/null +++ b/2022/33xxx/CVE-2022-33276.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33276", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33277.json b/2022/33xxx/CVE-2022-33277.json new file mode 100644 index 00000000000..66da9bda9e6 --- /dev/null +++ b/2022/33xxx/CVE-2022-33277.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33277", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33278.json b/2022/33xxx/CVE-2022-33278.json new file mode 100644 index 00000000000..6a54bc7c95d --- /dev/null +++ b/2022/33xxx/CVE-2022-33278.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33278", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33279.json b/2022/33xxx/CVE-2022-33279.json new file mode 100644 index 00000000000..b4270890ccf --- /dev/null +++ b/2022/33xxx/CVE-2022-33279.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33279", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33280.json b/2022/33xxx/CVE-2022-33280.json new file mode 100644 index 00000000000..f62577a04c2 --- /dev/null +++ b/2022/33xxx/CVE-2022-33280.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33280", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33281.json b/2022/33xxx/CVE-2022-33281.json new file mode 100644 index 00000000000..094b9476769 --- /dev/null +++ b/2022/33xxx/CVE-2022-33281.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33281", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33283.json b/2022/33xxx/CVE-2022-33283.json new file mode 100644 index 00000000000..4f7fc59180b --- /dev/null +++ b/2022/33xxx/CVE-2022-33283.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33283", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33286.json b/2022/33xxx/CVE-2022-33286.json new file mode 100644 index 00000000000..cf5b97efddf --- /dev/null +++ b/2022/33xxx/CVE-2022-33286.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33286", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33287.json b/2022/33xxx/CVE-2022-33287.json new file mode 100644 index 00000000000..84a0da81628 --- /dev/null +++ b/2022/33xxx/CVE-2022-33287.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33287", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33288.json b/2022/33xxx/CVE-2022-33288.json new file mode 100644 index 00000000000..d0f816b15f0 --- /dev/null +++ b/2022/33xxx/CVE-2022-33288.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33288", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33290.json b/2022/33xxx/CVE-2022-33290.json new file mode 100644 index 00000000000..e03338d4fad --- /dev/null +++ b/2022/33xxx/CVE-2022-33290.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33290", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33291.json b/2022/33xxx/CVE-2022-33291.json new file mode 100644 index 00000000000..a465b49ce60 --- /dev/null +++ b/2022/33xxx/CVE-2022-33291.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33291", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33292.json b/2022/33xxx/CVE-2022-33292.json new file mode 100644 index 00000000000..880cd4cc3b2 --- /dev/null +++ b/2022/33xxx/CVE-2022-33292.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33292", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33293.json b/2022/33xxx/CVE-2022-33293.json new file mode 100644 index 00000000000..69e0f0285e6 --- /dev/null +++ b/2022/33xxx/CVE-2022-33293.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33293", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33294.json b/2022/33xxx/CVE-2022-33294.json new file mode 100644 index 00000000000..d2a5aaa07ef --- /dev/null +++ b/2022/33xxx/CVE-2022-33294.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33294", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33295.json b/2022/33xxx/CVE-2022-33295.json new file mode 100644 index 00000000000..f62445be64e --- /dev/null +++ b/2022/33xxx/CVE-2022-33295.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33295", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33297.json b/2022/33xxx/CVE-2022-33297.json new file mode 100644 index 00000000000..9337ff1cb3f --- /dev/null +++ b/2022/33xxx/CVE-2022-33297.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33297", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33298.json b/2022/33xxx/CVE-2022-33298.json new file mode 100644 index 00000000000..6e77ce6e147 --- /dev/null +++ b/2022/33xxx/CVE-2022-33298.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33298", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33299.json b/2022/33xxx/CVE-2022-33299.json new file mode 100644 index 00000000000..14b61f35cbd --- /dev/null +++ b/2022/33xxx/CVE-2022-33299.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33299", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33300.json b/2022/33xxx/CVE-2022-33300.json new file mode 100644 index 00000000000..bba57248840 --- /dev/null +++ b/2022/33xxx/CVE-2022-33300.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33300", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33305.json b/2022/33xxx/CVE-2022-33305.json new file mode 100644 index 00000000000..a5c6d94dc44 --- /dev/null +++ b/2022/33xxx/CVE-2022-33305.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33305", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33306.json b/2022/33xxx/CVE-2022-33306.json new file mode 100644 index 00000000000..da815dd3b7d --- /dev/null +++ b/2022/33xxx/CVE-2022-33306.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33306", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33309.json b/2022/33xxx/CVE-2022-33309.json new file mode 100644 index 00000000000..2a417737e1b --- /dev/null +++ b/2022/33xxx/CVE-2022-33309.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33309", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file