From b26349214ccdaf3a6050395dc2526e11b9b7f28e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 19 Feb 2022 00:01:16 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/14xxx/CVE-2020-14523.json | 10 ++++++ 2021/44xxx/CVE-2021-44302.json | 56 +++++++++++++++++++++++++++---- 2021/45xxx/CVE-2021-45082.json | 61 ++++++++++++++++++++++++++++++---- 2021/46xxx/CVE-2021-46361.json | 5 +++ 2022/25xxx/CVE-2022-25130.json | 56 +++++++++++++++++++++++++++---- 2022/25xxx/CVE-2022-25131.json | 56 +++++++++++++++++++++++++++---- 2022/25xxx/CVE-2022-25132.json | 56 +++++++++++++++++++++++++++---- 2022/25xxx/CVE-2022-25133.json | 56 +++++++++++++++++++++++++++---- 2022/25xxx/CVE-2022-25134.json | 56 +++++++++++++++++++++++++++---- 2022/25xxx/CVE-2022-25135.json | 56 +++++++++++++++++++++++++++---- 2022/25xxx/CVE-2022-25136.json | 56 +++++++++++++++++++++++++++---- 2022/25xxx/CVE-2022-25137.json | 56 +++++++++++++++++++++++++++---- 2022/25xxx/CVE-2022-25360.json | 18 ++++++++++ 2022/25xxx/CVE-2022-25361.json | 18 ++++++++++ 2022/25xxx/CVE-2022-25362.json | 18 ++++++++++ 2022/25xxx/CVE-2022-25363.json | 18 ++++++++++ 2022/25xxx/CVE-2022-25364.json | 18 ++++++++++ 17 files changed, 610 insertions(+), 60 deletions(-) create mode 100644 2022/25xxx/CVE-2022-25360.json create mode 100644 2022/25xxx/CVE-2022-25361.json create mode 100644 2022/25xxx/CVE-2022-25362.json create mode 100644 2022/25xxx/CVE-2022-25363.json create mode 100644 2022/25xxx/CVE-2022-25364.json diff --git a/2020/14xxx/CVE-2020-14523.json b/2020/14xxx/CVE-2020-14523.json index 925a3b3f1ab..4722854f2b7 100644 --- a/2020/14xxx/CVE-2020-14523.json +++ b/2020/14xxx/CVE-2020-14523.json @@ -205,6 +205,16 @@ "refsource": "MISC", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-212-03", "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-212-03" + }, + { + "refsource": "MISC", + "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-008_en.pdf", + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-008_en.pdf" + }, + { + "refsource": "MISC", + "name": "https://jvn.jp/vu/JVNVU90224831/", + "url": "https://jvn.jp/vu/JVNVU90224831/" } ] }, diff --git a/2021/44xxx/CVE-2021-44302.json b/2021/44xxx/CVE-2021-44302.json index d0a8452c2e1..cef9c71f931 100644 --- a/2021/44xxx/CVE-2021-44302.json +++ b/2021/44xxx/CVE-2021-44302.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-44302", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-44302", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "BaiCloud-cms v2.5.7 was discovered to contain multiple SQL injection vulnerabilities via the tongji and baidu_map parameters in /user/ztconfig.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/relightsec/BaiCloud/blob/main/README.md", + "refsource": "MISC", + "name": "https://github.com/relightsec/BaiCloud/blob/main/README.md" } ] } diff --git a/2021/45xxx/CVE-2021-45082.json b/2021/45xxx/CVE-2021-45082.json index 70c6acaaad5..e9ca2b98bca 100644 --- a/2021/45xxx/CVE-2021-45082.json +++ b/2021/45xxx/CVE-2021-45082.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-45082", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-45082", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Cobbler through 3.3.0. In the templar.py file, the function check_for_invalid_imports can allow Cheetah code to import Python modules via the \"#from MODULE import\" substring. (Only lines beginning with #import are blocked.)" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/cobbler/cobbler/releases", + "refsource": "MISC", + "name": "https://github.com/cobbler/cobbler/releases" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.suse.com/show_bug.cgi?id=1193678", + "url": "https://bugzilla.suse.com/show_bug.cgi?id=1193678" } ] } diff --git a/2021/46xxx/CVE-2021-46361.json b/2021/46xxx/CVE-2021-46361.json index 844883e0be1..55e4e271be8 100644 --- a/2021/46xxx/CVE-2021-46361.json +++ b/2021/46xxx/CVE-2021-46361.json @@ -56,6 +56,11 @@ "url": "https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.12.html#_security_advisory", "refsource": "MISC", "name": "https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.12.html#_security_advisory" + }, + { + "refsource": "MISC", + "name": "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46361-FreeMarker%20Bypass-Magnolia%20CMS", + "url": "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46361-FreeMarker%20Bypass-Magnolia%20CMS" } ] } diff --git a/2022/25xxx/CVE-2022-25130.json b/2022/25xxx/CVE-2022-25130.json index 9f282d79951..13d35b97a81 100644 --- a/2022/25xxx/CVE-2022-25130.json +++ b/2022/25xxx/CVE-2022-25130.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25130", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25130", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A command injection vulnerability in the function updateWifiInfo of TOTOLINK Technology routers T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 and T10 V2_Firmware V4.1.8cu.5207_B20210320 allows attackers to execute arbitrary commands via a crafted MQTT packet." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_18/18.md", + "refsource": "MISC", + "name": "https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_18/18.md" } ] } diff --git a/2022/25xxx/CVE-2022-25131.json b/2022/25xxx/CVE-2022-25131.json index dccfeecc782..8f069bd9d3c 100644 --- a/2022/25xxx/CVE-2022-25131.json +++ b/2022/25xxx/CVE-2022-25131.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25131", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25131", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A command injection vulnerability in the function recvSlaveCloudCheckStatus of TOTOLINK Technology routers T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 and T10 V2_Firmware V4.1.8cu.5207_B20210320 allows attackers to execute arbitrary commands via a crafted MQTT packet." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_14/14.md", + "refsource": "MISC", + "name": "https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_14/14.md" } ] } diff --git a/2022/25xxx/CVE-2022-25132.json b/2022/25xxx/CVE-2022-25132.json index 8c16f719758..3c818c28e45 100644 --- a/2022/25xxx/CVE-2022-25132.json +++ b/2022/25xxx/CVE-2022-25132.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25132", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25132", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A command injection vulnerability in the function meshSlaveDlfw of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_16/16.md", + "refsource": "MISC", + "name": "https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_16/16.md" } ] } diff --git a/2022/25xxx/CVE-2022-25133.json b/2022/25xxx/CVE-2022-25133.json index 146084fdf65..569f169dd3a 100644 --- a/2022/25xxx/CVE-2022-25133.json +++ b/2022/25xxx/CVE-2022-25133.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25133", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25133", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A command injection vulnerability in the function isAssocPriDevice of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_20/20.md", + "refsource": "MISC", + "name": "https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_20/20.md" } ] } diff --git a/2022/25xxx/CVE-2022-25134.json b/2022/25xxx/CVE-2022-25134.json index 290080b5819..6dc905962fc 100644 --- a/2022/25xxx/CVE-2022-25134.json +++ b/2022/25xxx/CVE-2022-25134.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25134", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25134", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A command injection vulnerability in the function setUpgradeFW of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_13/13.md", + "refsource": "MISC", + "name": "https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_13/13.md" } ] } diff --git a/2022/25xxx/CVE-2022-25135.json b/2022/25xxx/CVE-2022-25135.json index cf5c8b72ef0..d0a7e1f73cd 100644 --- a/2022/25xxx/CVE-2022-25135.json +++ b/2022/25xxx/CVE-2022-25135.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25135", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25135", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A command injection vulnerability in the function recv_mesh_info_sync of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_19/19.md", + "refsource": "MISC", + "name": "https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_19/19.md" } ] } diff --git a/2022/25xxx/CVE-2022-25136.json b/2022/25xxx/CVE-2022-25136.json index 21bf00ad022..85a51c7022d 100644 --- a/2022/25xxx/CVE-2022-25136.json +++ b/2022/25xxx/CVE-2022-25136.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25136", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25136", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A command injection vulnerability in the function meshSlaveUpdate of TOTOLINK Technology routers T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 and T10 V2_Firmware V4.1.8cu.5207_B20210320 allows attackers to execute arbitrary commands via a crafted MQTT packet." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_17/17.md", + "refsource": "MISC", + "name": "https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_17/17.md" } ] } diff --git a/2022/25xxx/CVE-2022-25137.json b/2022/25xxx/CVE-2022-25137.json index fc89a2baf35..76494e0c3bd 100644 --- a/2022/25xxx/CVE-2022-25137.json +++ b/2022/25xxx/CVE-2022-25137.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25137", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25137", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A command injection vulnerability in the function recvSlaveUpgstatus of TOTOLINK Technology routers T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 and T10 V2_Firmware V4.1.8cu.5207_B20210320 allows attackers to execute arbitrary commands via a crafted MQTT packet." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_15/15.md", + "refsource": "MISC", + "name": "https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_15/15.md" } ] } diff --git a/2022/25xxx/CVE-2022-25360.json b/2022/25xxx/CVE-2022-25360.json new file mode 100644 index 00000000000..9a787f0deea --- /dev/null +++ b/2022/25xxx/CVE-2022-25360.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25360", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25361.json b/2022/25xxx/CVE-2022-25361.json new file mode 100644 index 00000000000..7316b89c542 --- /dev/null +++ b/2022/25xxx/CVE-2022-25361.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25361", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25362.json b/2022/25xxx/CVE-2022-25362.json new file mode 100644 index 00000000000..2057d15976e --- /dev/null +++ b/2022/25xxx/CVE-2022-25362.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25362", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25363.json b/2022/25xxx/CVE-2022-25363.json new file mode 100644 index 00000000000..5cf337b61e7 --- /dev/null +++ b/2022/25xxx/CVE-2022-25363.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25363", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25364.json b/2022/25xxx/CVE-2022-25364.json new file mode 100644 index 00000000000..be0e7dc053c --- /dev/null +++ b/2022/25xxx/CVE-2022-25364.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25364", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file