diff --git a/2020/28xxx/CVE-2020-28423.json b/2020/28xxx/CVE-2020-28423.json index b785fffbef2..26b9b33e050 100644 --- a/2020/28xxx/CVE-2020-28423.json +++ b/2020/28xxx/CVE-2020-28423.json @@ -48,8 +48,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://security.snyk.io/vuln/SNYK-JS-MONOREPOBUILD-1050392" + "refsource": "MISC", + "url": "https://security.snyk.io/vuln/SNYK-JS-MONOREPOBUILD-1050392", + "name": "https://security.snyk.io/vuln/SNYK-JS-MONOREPOBUILD-1050392" } ] }, @@ -57,7 +58,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects all versions of package monorepo-build.\n " + "value": "This affects all versions of package monorepo-build." } ] }, diff --git a/2020/28xxx/CVE-2020-28424.json b/2020/28xxx/CVE-2020-28424.json index 2ef0ce57932..77c41aae2ae 100644 --- a/2020/28xxx/CVE-2020-28424.json +++ b/2020/28xxx/CVE-2020-28424.json @@ -48,8 +48,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://security.snyk.io/vuln/SNYK-JS-S3KILATSTORAGE-1050396" + "refsource": "MISC", + "url": "https://security.snyk.io/vuln/SNYK-JS-S3KILATSTORAGE-1050396", + "name": "https://security.snyk.io/vuln/SNYK-JS-S3KILATSTORAGE-1050396" } ] }, @@ -57,7 +58,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects all versions of package s3-kilatstorage.\n " + "value": "This affects all versions of package s3-kilatstorage." } ] }, diff --git a/2020/28xxx/CVE-2020-28425.json b/2020/28xxx/CVE-2020-28425.json index 4a9c5ee954f..e8f529bf292 100644 --- a/2020/28xxx/CVE-2020-28425.json +++ b/2020/28xxx/CVE-2020-28425.json @@ -48,8 +48,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://security.snyk.io/vuln/SNYK-JS-CURLJS-1050404" + "refsource": "MISC", + "url": "https://security.snyk.io/vuln/SNYK-JS-CURLJS-1050404", + "name": "https://security.snyk.io/vuln/SNYK-JS-CURLJS-1050404" } ] }, @@ -57,7 +58,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects all versions of package curljs.\n " + "value": "This affects all versions of package curljs." } ] }, diff --git a/2020/28xxx/CVE-2020-28433.json b/2020/28xxx/CVE-2020-28433.json index aa3097bb783..5b33e432182 100644 --- a/2020/28xxx/CVE-2020-28433.json +++ b/2020/28xxx/CVE-2020-28433.json @@ -48,8 +48,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://security.snyk.io/vuln/SNYK-JS-NODELATEXPDF-1050426" + "refsource": "MISC", + "url": "https://security.snyk.io/vuln/SNYK-JS-NODELATEXPDF-1050426", + "name": "https://security.snyk.io/vuln/SNYK-JS-NODELATEXPDF-1050426" } ] }, @@ -57,7 +58,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects all versions of package node-latex-pdf.\n " + "value": "This affects all versions of package node-latex-pdf." } ] }, diff --git a/2020/28xxx/CVE-2020-28434.json b/2020/28xxx/CVE-2020-28434.json index 3640bdbb0ad..59427062900 100644 --- a/2020/28xxx/CVE-2020-28434.json +++ b/2020/28xxx/CVE-2020-28434.json @@ -48,8 +48,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://security.snyk.io/vuln/SNYK-JS-GITBLAME-1050430" + "refsource": "MISC", + "url": "https://security.snyk.io/vuln/SNYK-JS-GITBLAME-1050430", + "name": "https://security.snyk.io/vuln/SNYK-JS-GITBLAME-1050430" } ] }, @@ -57,7 +58,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects all versions of package gitblame.\n The injection point is located in line 15 in lib/gitblame.js.\r\n\r\n" + "value": "This affects all versions of package gitblame. The injection point is located in line 15 in lib/gitblame.js." } ] }, diff --git a/2020/28xxx/CVE-2020-28437.json b/2020/28xxx/CVE-2020-28437.json index cd76156b4ff..ffba6fc5be2 100644 --- a/2020/28xxx/CVE-2020-28437.json +++ b/2020/28xxx/CVE-2020-28437.json @@ -48,8 +48,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://security.snyk.io/vuln/SNYK-JS-HEROKUENV-1050432" + "refsource": "MISC", + "url": "https://security.snyk.io/vuln/SNYK-JS-HEROKUENV-1050432", + "name": "https://security.snyk.io/vuln/SNYK-JS-HEROKUENV-1050432" } ] }, @@ -57,7 +58,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects all versions of package heroku-env.\n The injection point is located in lib/get.js which is required by index.js.\r\n\r\n" + "value": "This affects all versions of package heroku-env. The injection point is located in lib/get.js which is required by index.js." } ] }, diff --git a/2020/28xxx/CVE-2020-28451.json b/2020/28xxx/CVE-2020-28451.json index 51aae9ad4e3..ed651a994dc 100644 --- a/2020/28xxx/CVE-2020-28451.json +++ b/2020/28xxx/CVE-2020-28451.json @@ -48,12 +48,14 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://security.snyk.io/vuln/SNYK-JS-IMAGETILER-1051029" + "refsource": "MISC", + "url": "https://security.snyk.io/vuln/SNYK-JS-IMAGETILER-1051029", + "name": "https://security.snyk.io/vuln/SNYK-JS-IMAGETILER-1051029" }, { - "refsource": "CONFIRM", - "url": "https://github.com/MrP/image-tiler/commit/f4a0b13a4bf43655fc4013e04bbceaf77aecbeb8" + "refsource": "MISC", + "url": "https://github.com/MrP/image-tiler/commit/f4a0b13a4bf43655fc4013e04bbceaf77aecbeb8", + "name": "https://github.com/MrP/image-tiler/commit/f4a0b13a4bf43655fc4013e04bbceaf77aecbeb8" } ] }, @@ -61,7 +63,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects the package image-tiler before 2.0.2.\n " + "value": "This affects the package image-tiler before 2.0.2." } ] }, diff --git a/2020/28xxx/CVE-2020-28453.json b/2020/28xxx/CVE-2020-28453.json index c8b7bb42d76..a594388091b 100644 --- a/2020/28xxx/CVE-2020-28453.json +++ b/2020/28xxx/CVE-2020-28453.json @@ -48,8 +48,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://security.snyk.io/vuln/SNYK-JS-NPOSTESSERACT-1051031" + "refsource": "MISC", + "url": "https://security.snyk.io/vuln/SNYK-JS-NPOSTESSERACT-1051031", + "name": "https://security.snyk.io/vuln/SNYK-JS-NPOSTESSERACT-1051031" } ] }, @@ -57,7 +58,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects all versions of package npos-tesseract.\n The injection point is located in line 55 in lib/ocr.js.\r\n\r\n" + "value": "This affects all versions of package npos-tesseract. The injection point is located in line 55 in lib/ocr.js." } ] }, diff --git a/2020/7xxx/CVE-2020-7795.json b/2020/7xxx/CVE-2020-7795.json index ee0dfc37e43..3a70fe1a5aa 100644 --- a/2020/7xxx/CVE-2020-7795.json +++ b/2020/7xxx/CVE-2020-7795.json @@ -48,20 +48,24 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://security.snyk.io/vuln/SNYK-JS-GETNPMPACKAGEVERSION-1050390" + "refsource": "MISC", + "url": "https://security.snyk.io/vuln/SNYK-JS-GETNPMPACKAGEVERSION-1050390", + "name": "https://security.snyk.io/vuln/SNYK-JS-GETNPMPACKAGEVERSION-1050390" }, { - "refsource": "CONFIRM", - "url": "https://www.npmjs.com/package/get-npm-package-version/v/1.0.6" + "refsource": "MISC", + "url": "https://www.npmjs.com/package/get-npm-package-version/v/1.0.6", + "name": "https://www.npmjs.com/package/get-npm-package-version/v/1.0.6" }, { - "refsource": "CONFIRM", - "url": "https://github.com/hoperyy/get-npm-package-version/blob/338a5882298eb2c2194538db41166cae13c39e03/index.js%23L17" + "refsource": "MISC", + "url": "https://github.com/hoperyy/get-npm-package-version/blob/338a5882298eb2c2194538db41166cae13c39e03/index.js%23L17", + "name": "https://github.com/hoperyy/get-npm-package-version/blob/338a5882298eb2c2194538db41166cae13c39e03/index.js%23L17" }, { - "refsource": "CONFIRM", - "url": "https://github.com/hoperyy/get-npm-package-version/commit/40b1cf31a0607ea66f9e30a0c3af1383b52b2dec" + "refsource": "MISC", + "url": "https://github.com/hoperyy/get-npm-package-version/commit/40b1cf31a0607ea66f9e30a0c3af1383b52b2dec", + "name": "https://github.com/hoperyy/get-npm-package-version/commit/40b1cf31a0607ea66f9e30a0c3af1383b52b2dec" } ] }, @@ -69,7 +73,7 @@ "description_data": [ { "lang": "eng", - "value": "The package get-npm-package-version before 1.0.7 are vulnerable to Command Injection via main function in index.js.\r\n\r\n" + "value": "The package get-npm-package-version before 1.0.7 are vulnerable to Command Injection via main function in index.js." } ] }, diff --git a/2021/23xxx/CVE-2021-23385.json b/2021/23xxx/CVE-2021-23385.json index d2081704914..b76deaab385 100644 --- a/2021/23xxx/CVE-2021-23385.json +++ b/2021/23xxx/CVE-2021-23385.json @@ -48,16 +48,19 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://security.snyk.io/vuln/SNYK-PYTHON-FLASKSECURITY-1293234" + "refsource": "MISC", + "url": "https://security.snyk.io/vuln/SNYK-PYTHON-FLASKSECURITY-1293234", + "name": "https://security.snyk.io/vuln/SNYK-PYTHON-FLASKSECURITY-1293234" }, { - "refsource": "CONFIRM", - "url": "https://github.com/mattupstate/flask-security" + "refsource": "MISC", + "url": "https://github.com/mattupstate/flask-security", + "name": "https://github.com/mattupstate/flask-security" }, { - "refsource": "CONFIRM", - "url": "https://snyk.io/blog/url-confusion-vulnerabilities/" + "refsource": "MISC", + "url": "https://snyk.io/blog/url-confusion-vulnerabilities/", + "name": "https://snyk.io/blog/url-confusion-vulnerabilities/" } ] }, @@ -65,7 +68,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects all versions of package Flask-Security.\n When using the get_post_logout_redirect and get_post_login_redirect functions, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\\\\evil.com/path.\r\n\r\nThis vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.\r\n\r\n**Note:** Flask-Security is not maintained anymore.\n" + "value": "This affects all versions of package Flask-Security. When using the get_post_logout_redirect and get_post_login_redirect functions, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\\\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. **Note:** Flask-Security is not maintained anymore." } ] }, diff --git a/2022/25xxx/CVE-2022-25867.json b/2022/25xxx/CVE-2022-25867.json index a815da49127..39fe2977752 100644 --- a/2022/25xxx/CVE-2022-25867.json +++ b/2022/25xxx/CVE-2022-25867.json @@ -48,24 +48,29 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://security.snyk.io/vuln/SNYK-JAVA-IOSOCKET-2949738" + "refsource": "MISC", + "url": "https://security.snyk.io/vuln/SNYK-JAVA-IOSOCKET-2949738", + "name": "https://security.snyk.io/vuln/SNYK-JAVA-IOSOCKET-2949738" }, { - "refsource": "CONFIRM", - "url": "https://github.com/socketio/socket.io-client-java/issues/508%23issuecomment-1179817361" + "refsource": "MISC", + "url": "https://github.com/socketio/socket.io-client-java/issues/508%23issuecomment-1179817361", + "name": "https://github.com/socketio/socket.io-client-java/issues/508%23issuecomment-1179817361" }, { - "refsource": "CONFIRM", - "url": "https://github.com/socketio/socket.io-client-java/commit/e8ffe9d1383736f6a21090ab959a2f4fa5a41284" + "refsource": "MISC", + "url": "https://github.com/socketio/socket.io-client-java/commit/e8ffe9d1383736f6a21090ab959a2f4fa5a41284", + "name": "https://github.com/socketio/socket.io-client-java/commit/e8ffe9d1383736f6a21090ab959a2f4fa5a41284" }, { - "refsource": "CONFIRM", - "url": "https://github.com/socketio/socket.io-client-java/commit/8664499b6f31154f49783531f778dac5387b766b" + "refsource": "MISC", + "url": "https://github.com/socketio/socket.io-client-java/commit/8664499b6f31154f49783531f778dac5387b766b", + "name": "https://github.com/socketio/socket.io-client-java/commit/8664499b6f31154f49783531f778dac5387b766b" }, { - "refsource": "CONFIRM", - "url": "https://github.com/socketio/socket.io-client-java/releases/tag/socket.io-client-2.0.1" + "refsource": "MISC", + "url": "https://github.com/socketio/socket.io-client-java/releases/tag/socket.io-client-2.0.1", + "name": "https://github.com/socketio/socket.io-client-java/releases/tag/socket.io-client-2.0.1" } ] }, @@ -73,7 +78,7 @@ "description_data": [ { "lang": "eng", - "value": "The package io.socket:socket.io-client before 2.0.1 are vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format.\n" + "value": "The package io.socket:socket.io-client before 2.0.1 are vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format." } ] }, diff --git a/2022/2xxx/CVE-2022-2630.json b/2022/2xxx/CVE-2022-2630.json new file mode 100644 index 00000000000..81b11171409 --- /dev/null +++ b/2022/2xxx/CVE-2022-2630.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2630", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37349.json b/2022/37xxx/CVE-2022-37349.json new file mode 100644 index 00000000000..07ea26bb3e3 --- /dev/null +++ b/2022/37xxx/CVE-2022-37349.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37349", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37350.json b/2022/37xxx/CVE-2022-37350.json new file mode 100644 index 00000000000..162ff9cc341 --- /dev/null +++ b/2022/37xxx/CVE-2022-37350.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37350", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37351.json b/2022/37xxx/CVE-2022-37351.json new file mode 100644 index 00000000000..d0fed36691a --- /dev/null +++ b/2022/37xxx/CVE-2022-37351.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37351", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37352.json b/2022/37xxx/CVE-2022-37352.json new file mode 100644 index 00000000000..72f817095b4 --- /dev/null +++ b/2022/37xxx/CVE-2022-37352.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37352", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37353.json b/2022/37xxx/CVE-2022-37353.json new file mode 100644 index 00000000000..2bb07152d49 --- /dev/null +++ b/2022/37xxx/CVE-2022-37353.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37353", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37354.json b/2022/37xxx/CVE-2022-37354.json new file mode 100644 index 00000000000..94931db8fb1 --- /dev/null +++ b/2022/37xxx/CVE-2022-37354.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37354", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37355.json b/2022/37xxx/CVE-2022-37355.json new file mode 100644 index 00000000000..e7722aa5dc7 --- /dev/null +++ b/2022/37xxx/CVE-2022-37355.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37355", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37356.json b/2022/37xxx/CVE-2022-37356.json new file mode 100644 index 00000000000..a5f816eb07f --- /dev/null +++ b/2022/37xxx/CVE-2022-37356.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37356", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37357.json b/2022/37xxx/CVE-2022-37357.json new file mode 100644 index 00000000000..035b26033bb --- /dev/null +++ b/2022/37xxx/CVE-2022-37357.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37357", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37358.json b/2022/37xxx/CVE-2022-37358.json new file mode 100644 index 00000000000..a91502c7118 --- /dev/null +++ b/2022/37xxx/CVE-2022-37358.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37358", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37359.json b/2022/37xxx/CVE-2022-37359.json new file mode 100644 index 00000000000..7395497231e --- /dev/null +++ b/2022/37xxx/CVE-2022-37359.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37359", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37360.json b/2022/37xxx/CVE-2022-37360.json new file mode 100644 index 00000000000..3911a959fb0 --- /dev/null +++ b/2022/37xxx/CVE-2022-37360.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37360", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37361.json b/2022/37xxx/CVE-2022-37361.json new file mode 100644 index 00000000000..4ceff1a9c89 --- /dev/null +++ b/2022/37xxx/CVE-2022-37361.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37361", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37362.json b/2022/37xxx/CVE-2022-37362.json new file mode 100644 index 00000000000..a5441da5b3b --- /dev/null +++ b/2022/37xxx/CVE-2022-37362.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37362", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37363.json b/2022/37xxx/CVE-2022-37363.json new file mode 100644 index 00000000000..921fd69321f --- /dev/null +++ b/2022/37xxx/CVE-2022-37363.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37363", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37364.json b/2022/37xxx/CVE-2022-37364.json new file mode 100644 index 00000000000..80e832f0a8f --- /dev/null +++ b/2022/37xxx/CVE-2022-37364.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37364", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37365.json b/2022/37xxx/CVE-2022-37365.json new file mode 100644 index 00000000000..992be55a053 --- /dev/null +++ b/2022/37xxx/CVE-2022-37365.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37365", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37366.json b/2022/37xxx/CVE-2022-37366.json new file mode 100644 index 00000000000..75a16559990 --- /dev/null +++ b/2022/37xxx/CVE-2022-37366.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37366", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37367.json b/2022/37xxx/CVE-2022-37367.json new file mode 100644 index 00000000000..8b949854bc0 --- /dev/null +++ b/2022/37xxx/CVE-2022-37367.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37367", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37368.json b/2022/37xxx/CVE-2022-37368.json new file mode 100644 index 00000000000..057ced16b66 --- /dev/null +++ b/2022/37xxx/CVE-2022-37368.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37368", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37369.json b/2022/37xxx/CVE-2022-37369.json new file mode 100644 index 00000000000..932784c98f8 --- /dev/null +++ b/2022/37xxx/CVE-2022-37369.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37369", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37370.json b/2022/37xxx/CVE-2022-37370.json new file mode 100644 index 00000000000..0140410a13a --- /dev/null +++ b/2022/37xxx/CVE-2022-37370.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37370", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37371.json b/2022/37xxx/CVE-2022-37371.json new file mode 100644 index 00000000000..ee3893dbcbe --- /dev/null +++ b/2022/37xxx/CVE-2022-37371.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37371", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37372.json b/2022/37xxx/CVE-2022-37372.json new file mode 100644 index 00000000000..b02b01eb68f --- /dev/null +++ b/2022/37xxx/CVE-2022-37372.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37372", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37373.json b/2022/37xxx/CVE-2022-37373.json new file mode 100644 index 00000000000..095f4c0ae3e --- /dev/null +++ b/2022/37xxx/CVE-2022-37373.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37373", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37374.json b/2022/37xxx/CVE-2022-37374.json new file mode 100644 index 00000000000..918f234d407 --- /dev/null +++ b/2022/37xxx/CVE-2022-37374.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37374", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37375.json b/2022/37xxx/CVE-2022-37375.json new file mode 100644 index 00000000000..414b6dc9ec7 --- /dev/null +++ b/2022/37xxx/CVE-2022-37375.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37375", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37376.json b/2022/37xxx/CVE-2022-37376.json new file mode 100644 index 00000000000..4440cfb5105 --- /dev/null +++ b/2022/37xxx/CVE-2022-37376.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37376", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37377.json b/2022/37xxx/CVE-2022-37377.json new file mode 100644 index 00000000000..880b8ce8eae --- /dev/null +++ b/2022/37xxx/CVE-2022-37377.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37377", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37378.json b/2022/37xxx/CVE-2022-37378.json new file mode 100644 index 00000000000..6cc1b3e5403 --- /dev/null +++ b/2022/37xxx/CVE-2022-37378.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37378", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37379.json b/2022/37xxx/CVE-2022-37379.json new file mode 100644 index 00000000000..1d21ca90672 --- /dev/null +++ b/2022/37xxx/CVE-2022-37379.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37379", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37380.json b/2022/37xxx/CVE-2022-37380.json new file mode 100644 index 00000000000..6d36a64eec2 --- /dev/null +++ b/2022/37xxx/CVE-2022-37380.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37380", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37381.json b/2022/37xxx/CVE-2022-37381.json new file mode 100644 index 00000000000..4dfcef05f25 --- /dev/null +++ b/2022/37xxx/CVE-2022-37381.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37381", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37382.json b/2022/37xxx/CVE-2022-37382.json new file mode 100644 index 00000000000..a3de9cf583d --- /dev/null +++ b/2022/37xxx/CVE-2022-37382.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37382", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37383.json b/2022/37xxx/CVE-2022-37383.json new file mode 100644 index 00000000000..34d3d3333e1 --- /dev/null +++ b/2022/37xxx/CVE-2022-37383.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37383", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37384.json b/2022/37xxx/CVE-2022-37384.json new file mode 100644 index 00000000000..a5c03fc2627 --- /dev/null +++ b/2022/37xxx/CVE-2022-37384.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37384", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37385.json b/2022/37xxx/CVE-2022-37385.json new file mode 100644 index 00000000000..9838c51d70d --- /dev/null +++ b/2022/37xxx/CVE-2022-37385.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37385", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37386.json b/2022/37xxx/CVE-2022-37386.json new file mode 100644 index 00000000000..22a027fb31f --- /dev/null +++ b/2022/37xxx/CVE-2022-37386.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37386", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37387.json b/2022/37xxx/CVE-2022-37387.json new file mode 100644 index 00000000000..4857101e34c --- /dev/null +++ b/2022/37xxx/CVE-2022-37387.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37387", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37388.json b/2022/37xxx/CVE-2022-37388.json new file mode 100644 index 00000000000..afe8f414a83 --- /dev/null +++ b/2022/37xxx/CVE-2022-37388.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37388", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37389.json b/2022/37xxx/CVE-2022-37389.json new file mode 100644 index 00000000000..d6c96eb3f2d --- /dev/null +++ b/2022/37xxx/CVE-2022-37389.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37389", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37390.json b/2022/37xxx/CVE-2022-37390.json new file mode 100644 index 00000000000..e61c6220f25 --- /dev/null +++ b/2022/37xxx/CVE-2022-37390.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37390", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37391.json b/2022/37xxx/CVE-2022-37391.json new file mode 100644 index 00000000000..205b532c23e --- /dev/null +++ b/2022/37xxx/CVE-2022-37391.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37391", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file