diff --git a/2019/8xxx/CVE-2019-8632.json b/2019/8xxx/CVE-2019-8632.json index fc31489a500..817b373e1e8 100644 --- a/2019/8xxx/CVE-2019-8632.json +++ b/2019/8xxx/CVE-2019-8632.json @@ -56,6 +56,11 @@ }, "references": { "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.info-sec.ca/advisories/Texture.html", + "url": "https://www.info-sec.ca/advisories/Texture.html" + }, { "url": "https://support.apple.com/HT210110", "refsource": "MISC", diff --git a/2021/3xxx/CVE-2021-3867.json b/2021/3xxx/CVE-2021-3867.json index ce5da33a1e3..bcd2a6756ec 100644 --- a/2021/3xxx/CVE-2021-3867.json +++ b/2021/3xxx/CVE-2021-3867.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." } ] } diff --git a/2021/3xxx/CVE-2021-3868.json b/2021/3xxx/CVE-2021-3868.json index 99791f016b1..bf7e5d291db 100644 --- a/2021/3xxx/CVE-2021-3868.json +++ b/2021/3xxx/CVE-2021-3868.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." } ] } diff --git a/2021/3xxx/CVE-2021-3870.json b/2021/3xxx/CVE-2021-3870.json index d27bffd6378..7a75f1f0f70 100644 --- a/2021/3xxx/CVE-2021-3870.json +++ b/2021/3xxx/CVE-2021-3870.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." } ] } diff --git a/2021/3xxx/CVE-2021-3871.json b/2021/3xxx/CVE-2021-3871.json index 2e22ead73c9..d326794ac38 100644 --- a/2021/3xxx/CVE-2021-3871.json +++ b/2021/3xxx/CVE-2021-3871.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." } ] } diff --git a/2021/3xxx/CVE-2021-3873.json b/2021/3xxx/CVE-2021-3873.json index 33dc9c7d5b2..9452c88495e 100644 --- a/2021/3xxx/CVE-2021-3873.json +++ b/2021/3xxx/CVE-2021-3873.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." } ] } diff --git a/2021/3xxx/CVE-2021-3876.json b/2021/3xxx/CVE-2021-3876.json index c9c4a3bea84..571bdeb12c4 100644 --- a/2021/3xxx/CVE-2021-3876.json +++ b/2021/3xxx/CVE-2021-3876.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." } ] } diff --git a/2021/3xxx/CVE-2021-3877.json b/2021/3xxx/CVE-2021-3877.json index 87ee7ea2e97..805eefc6cc0 100644 --- a/2021/3xxx/CVE-2021-3877.json +++ b/2021/3xxx/CVE-2021-3877.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." } ] } diff --git a/2021/3xxx/CVE-2021-3880.json b/2021/3xxx/CVE-2021-3880.json index 685d7e4c7e5..65fcf078008 100644 --- a/2021/3xxx/CVE-2021-3880.json +++ b/2021/3xxx/CVE-2021-3880.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." } ] } diff --git a/2021/3xxx/CVE-2021-3883.json b/2021/3xxx/CVE-2021-3883.json index 2ebc21b46d4..8e0fcc31f25 100644 --- a/2021/3xxx/CVE-2021-3883.json +++ b/2021/3xxx/CVE-2021-3883.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." } ] } diff --git a/2021/3xxx/CVE-2021-3884.json b/2021/3xxx/CVE-2021-3884.json index d1ab608704b..f0f4c7e6c7c 100644 --- a/2021/3xxx/CVE-2021-3884.json +++ b/2021/3xxx/CVE-2021-3884.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." } ] } diff --git a/2021/3xxx/CVE-2021-3886.json b/2021/3xxx/CVE-2021-3886.json index d6188bb98f7..ed0433d20ac 100644 --- a/2021/3xxx/CVE-2021-3886.json +++ b/2021/3xxx/CVE-2021-3886.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." } ] } diff --git a/2021/3xxx/CVE-2021-3887.json b/2021/3xxx/CVE-2021-3887.json index 04be628192f..4faef63b273 100644 --- a/2021/3xxx/CVE-2021-3887.json +++ b/2021/3xxx/CVE-2021-3887.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." } ] } diff --git a/2021/3xxx/CVE-2021-3893.json b/2021/3xxx/CVE-2021-3893.json index 1358de10333..0a80af75369 100644 --- a/2021/3xxx/CVE-2021-3893.json +++ b/2021/3xxx/CVE-2021-3893.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." } ] } diff --git a/2021/3xxx/CVE-2021-3937.json b/2021/3xxx/CVE-2021-3937.json index 55cc15ad3f4..2f152e13521 100644 --- a/2021/3xxx/CVE-2021-3937.json +++ b/2021/3xxx/CVE-2021-3937.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." } ] } diff --git a/2021/3xxx/CVE-2021-3940.json b/2021/3xxx/CVE-2021-3940.json index 394f9049a1d..fb456332a7d 100644 --- a/2021/3xxx/CVE-2021-3940.json +++ b/2021/3xxx/CVE-2021-3940.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none." } ] } diff --git a/2022/0xxx/CVE-2022-0745.json b/2022/0xxx/CVE-2022-0745.json new file mode 100644 index 00000000000..e68edc05537 --- /dev/null +++ b/2022/0xxx/CVE-2022-0745.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0745", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0746.json b/2022/0xxx/CVE-2022-0746.json new file mode 100644 index 00000000000..b40359293fe --- /dev/null +++ b/2022/0xxx/CVE-2022-0746.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0746", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0747.json b/2022/0xxx/CVE-2022-0747.json new file mode 100644 index 00000000000..0e823d629c6 --- /dev/null +++ b/2022/0xxx/CVE-2022-0747.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0747", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0750.json b/2022/0xxx/CVE-2022-0750.json new file mode 100644 index 00000000000..1e32e61022b --- /dev/null +++ b/2022/0xxx/CVE-2022-0750.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0750", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21129.json b/2022/21xxx/CVE-2022-21129.json new file mode 100644 index 00000000000..59dfd731c98 --- /dev/null +++ b/2022/21xxx/CVE-2022-21129.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-21129", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21142.json b/2022/21xxx/CVE-2022-21142.json index 0996c0d3e95..0a3bd09c4d2 100644 --- a/2022/21xxx/CVE-2022-21142.json +++ b/2022/21xxx/CVE-2022-21142.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-21142", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" + "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html", + "refsource": "MISC", + "name": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { - "url": "https://jvn.jp/en/jp/JVN14706307/index.html" + "url": "https://jvn.jp/en/jp/JVN14706307/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN14706307/index.html" } ] }, diff --git a/2022/21xxx/CVE-2022-21144.json b/2022/21xxx/CVE-2022-21144.json new file mode 100644 index 00000000000..0e472eff774 --- /dev/null +++ b/2022/21xxx/CVE-2022-21144.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-21144", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21167.json b/2022/21xxx/CVE-2022-21167.json new file mode 100644 index 00000000000..e73dec81458 --- /dev/null +++ b/2022/21xxx/CVE-2022-21167.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-21167", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21179.json b/2022/21xxx/CVE-2022-21179.json index 4f7b1e0abe3..01aec6ba2b0 100644 --- a/2022/21xxx/CVE-2022-21179.json +++ b/2022/21xxx/CVE-2022-21179.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-21179", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.ec-cube.net/info/weakness/20220221/mail_magazine_plugin.php" + "url": "https://www.ec-cube.net/info/weakness/20220221/mail_magazine_plugin.php", + "refsource": "MISC", + "name": "https://www.ec-cube.net/info/weakness/20220221/mail_magazine_plugin.php" }, { - "url": "https://jvn.jp/en/jp/JVN67108459/index.html" + "url": "https://jvn.jp/en/jp/JVN67108459/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN67108459/index.html" } ] }, diff --git a/2022/21xxx/CVE-2022-21211.json b/2022/21xxx/CVE-2022-21211.json new file mode 100644 index 00000000000..79048b5b019 --- /dev/null +++ b/2022/21xxx/CVE-2022-21211.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-21211", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21227.json b/2022/21xxx/CVE-2022-21227.json new file mode 100644 index 00000000000..9f0db21f878 --- /dev/null +++ b/2022/21xxx/CVE-2022-21227.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-21227", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21230.json b/2022/21xxx/CVE-2022-21230.json new file mode 100644 index 00000000000..6a4eb01f2f8 --- /dev/null +++ b/2022/21xxx/CVE-2022-21230.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-21230", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21232.json b/2022/21xxx/CVE-2022-21232.json new file mode 100644 index 00000000000..46d64f79544 --- /dev/null +++ b/2022/21xxx/CVE-2022-21232.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-21232", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21802.json b/2022/21xxx/CVE-2022-21802.json new file mode 100644 index 00000000000..7562a8eca4f --- /dev/null +++ b/2022/21xxx/CVE-2022-21802.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-21802", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21810.json b/2022/21xxx/CVE-2022-21810.json new file mode 100644 index 00000000000..f48efafa0db --- /dev/null +++ b/2022/21xxx/CVE-2022-21810.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-21810", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/22xxx/CVE-2022-22138.json b/2022/22xxx/CVE-2022-22138.json new file mode 100644 index 00000000000..bde724ceb58 --- /dev/null +++ b/2022/22xxx/CVE-2022-22138.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-22138", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/22xxx/CVE-2022-22984.json b/2022/22xxx/CVE-2022-22984.json new file mode 100644 index 00000000000..06d8ba804fd --- /dev/null +++ b/2022/22xxx/CVE-2022-22984.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-22984", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23810.json b/2022/23xxx/CVE-2022-23810.json index 189fde841b2..f04d7edfa88 100644 --- a/2022/23xxx/CVE-2022-23810.json +++ b/2022/23xxx/CVE-2022-23810.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23810", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" + "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html", + "refsource": "MISC", + "name": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { - "url": "https://jvn.jp/en/jp/JVN14706307/index.html" + "url": "https://jvn.jp/en/jp/JVN14706307/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN14706307/index.html" } ] }, diff --git a/2022/23xxx/CVE-2022-23916.json b/2022/23xxx/CVE-2022-23916.json index 8b6d675ad1d..99a6587e1d6 100644 --- a/2022/23xxx/CVE-2022-23916.json +++ b/2022/23xxx/CVE-2022-23916.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23916", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" + "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html", + "refsource": "MISC", + "name": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { - "url": "https://jvn.jp/en/jp/JVN14706307/index.html" + "url": "https://jvn.jp/en/jp/JVN14706307/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN14706307/index.html" } ] }, diff --git a/2022/23xxx/CVE-2022-23920.json b/2022/23xxx/CVE-2022-23920.json new file mode 100644 index 00000000000..306e37c2832 --- /dev/null +++ b/2022/23xxx/CVE-2022-23920.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23920", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23923.json b/2022/23xxx/CVE-2022-23923.json new file mode 100644 index 00000000000..75d260d1300 --- /dev/null +++ b/2022/23xxx/CVE-2022-23923.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-23923", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23986.json b/2022/23xxx/CVE-2022-23986.json index 6a356a27ff6..6ec076c3758 100644 --- a/2022/23xxx/CVE-2022-23986.json +++ b/2022/23xxx/CVE-2022-23986.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23986", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://github.com/shimosyan/phpUploader/releases/tag/v1.2.1" + "url": "https://github.com/shimosyan/phpUploader/releases/tag/v1.2.1", + "refsource": "MISC", + "name": "https://github.com/shimosyan/phpUploader/releases/tag/v1.2.1" }, { - "url": "https://jvn.jp/en/jp/JVN00095004/index.html" + "url": "https://jvn.jp/en/jp/JVN00095004/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN00095004/index.html" } ] }, diff --git a/2022/24xxx/CVE-2022-24374.json b/2022/24xxx/CVE-2022-24374.json index c5410b3b542..61759c3fd32 100644 --- a/2022/24xxx/CVE-2022-24374.json +++ b/2022/24xxx/CVE-2022-24374.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-24374", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" + "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html", + "refsource": "MISC", + "name": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { - "url": "https://jvn.jp/en/jp/JVN14706307/index.html" + "url": "https://jvn.jp/en/jp/JVN14706307/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN14706307/index.html" } ] }, diff --git a/2022/24xxx/CVE-2022-24376.json b/2022/24xxx/CVE-2022-24376.json new file mode 100644 index 00000000000..6be4bf22728 --- /dev/null +++ b/2022/24xxx/CVE-2022-24376.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24376", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24377.json b/2022/24xxx/CVE-2022-24377.json new file mode 100644 index 00000000000..e3137d31bc0 --- /dev/null +++ b/2022/24xxx/CVE-2022-24377.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24377", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24430.json b/2022/24xxx/CVE-2022-24430.json new file mode 100644 index 00000000000..5fa31594bef --- /dev/null +++ b/2022/24xxx/CVE-2022-24430.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24430", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24435.json b/2022/24xxx/CVE-2022-24435.json index 26d3d5e8da1..1f10061ea32 100644 --- a/2022/24xxx/CVE-2022-24435.json +++ b/2022/24xxx/CVE-2022-24435.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-24435", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://github.com/shimosyan/phpUploader/releases/tag/v1.2.1" + "url": "https://github.com/shimosyan/phpUploader/releases/tag/v1.2.1", + "refsource": "MISC", + "name": "https://github.com/shimosyan/phpUploader/releases/tag/v1.2.1" }, { - "url": "https://jvn.jp/en/jp/JVN00095004/index.html" + "url": "https://jvn.jp/en/jp/JVN00095004/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN00095004/index.html" } ] }, diff --git a/2022/24xxx/CVE-2022-24439.json b/2022/24xxx/CVE-2022-24439.json new file mode 100644 index 00000000000..da2637f16ed --- /dev/null +++ b/2022/24xxx/CVE-2022-24439.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24439", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24441.json b/2022/24xxx/CVE-2022-24441.json new file mode 100644 index 00000000000..dbc0513223f --- /dev/null +++ b/2022/24xxx/CVE-2022-24441.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24441", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24610.json b/2022/24xxx/CVE-2022-24610.json index 1745455bad3..de8427603b8 100644 --- a/2022/24xxx/CVE-2022-24610.json +++ b/2022/24xxx/CVE-2022-24610.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-24610", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-24610", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Settings/network settings/wireless settings on the Alecto DVC-215IP 63.1.1.0148 camera shows the Wi-Fi passphrase hidden, but by editing/removing the style of the password field the password becomes visible which grants access to an internal network connected to the camera." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://support.alecto.nl/nl/support/solutions/articles/48001210271-kwetsbaarheid-vulnerability-firmware-below-version-63-1-1-173", + "url": "https://support.alecto.nl/nl/support/solutions/articles/48001210271-kwetsbaarheid-vulnerability-firmware-below-version-63-1-1-173" } ] } diff --git a/2022/24xxx/CVE-2022-24613.json b/2022/24xxx/CVE-2022-24613.json index c346616f7b2..756b9ff0ee2 100644 --- a/2022/24xxx/CVE-2022-24613.json +++ b/2022/24xxx/CVE-2022-24613.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-24613", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-24613", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "metadata-extractor up to 2.16.0 can throw various uncaught exceptions while parsing a specially crafted JPEG file, which could result in an application crash. This could be used to mount a denial of service attack against services that use metadata-extractor library." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/drewnoakes/metadata-extractor/issues/561", + "refsource": "MISC", + "name": "https://github.com/drewnoakes/metadata-extractor/issues/561" } ] } diff --git a/2022/24xxx/CVE-2022-24614.json b/2022/24xxx/CVE-2022-24614.json index b14f81cfc8c..9cfb4225fba 100644 --- a/2022/24xxx/CVE-2022-24614.json +++ b/2022/24xxx/CVE-2022-24614.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-24614", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-24614", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When reading a specially crafted JPEG file, metadata-extractor up to 2.16.0 can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use metadata-extractor library." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/drewnoakes/metadata-extractor/issues/561", + "refsource": "MISC", + "name": "https://github.com/drewnoakes/metadata-extractor/issues/561" } ] } diff --git a/2022/24xxx/CVE-2022-24615.json b/2022/24xxx/CVE-2022-24615.json index 3ac2c1808c5..0acd0edbde3 100644 --- a/2022/24xxx/CVE-2022-24615.json +++ b/2022/24xxx/CVE-2022-24615.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-24615", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-24615", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "zip4j up to 2.9.0 can throw various uncaught exceptions while parsing a specially crafted ZIP file, which could result in an application crash. This could be used to mount a denial of service attack against services that use zip4j library." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/srikanth-lingala/zip4j/issues/377", + "refsource": "MISC", + "name": "https://github.com/srikanth-lingala/zip4j/issues/377" } ] } diff --git a/2022/24xxx/CVE-2022-24912.json b/2022/24xxx/CVE-2022-24912.json new file mode 100644 index 00000000000..d55d1705b19 --- /dev/null +++ b/2022/24xxx/CVE-2022-24912.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24912", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24913.json b/2022/24xxx/CVE-2022-24913.json new file mode 100644 index 00000000000..24cab6dcab7 --- /dev/null +++ b/2022/24xxx/CVE-2022-24913.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24913", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25231.json b/2022/25xxx/CVE-2022-25231.json new file mode 100644 index 00000000000..0f3a6347d10 --- /dev/null +++ b/2022/25xxx/CVE-2022-25231.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25231", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25233.json b/2022/25xxx/CVE-2022-25233.json new file mode 100644 index 00000000000..6a5948d18eb --- /dev/null +++ b/2022/25xxx/CVE-2022-25233.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25233", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25301.json b/2022/25xxx/CVE-2022-25301.json new file mode 100644 index 00000000000..e366992fc8d --- /dev/null +++ b/2022/25xxx/CVE-2022-25301.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25301", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25324.json b/2022/25xxx/CVE-2022-25324.json new file mode 100644 index 00000000000..c13be309574 --- /dev/null +++ b/2022/25xxx/CVE-2022-25324.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25324", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25355.json b/2022/25xxx/CVE-2022-25355.json index 7e55edf1f1c..b7f7a53b43a 100644 --- a/2022/25xxx/CVE-2022-25355.json +++ b/2022/25xxx/CVE-2022-25355.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-25355", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.ec-cube.net/info/weakness/20220221/" + "url": "https://www.ec-cube.net/info/weakness/20220221/", + "refsource": "MISC", + "name": "https://www.ec-cube.net/info/weakness/20220221/" }, { - "url": "https://jvn.jp/en/jp/JVN53871926/index.html" + "url": "https://jvn.jp/en/jp/JVN53871926/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN53871926/index.html" } ] }, diff --git a/2022/25xxx/CVE-2022-25645.json b/2022/25xxx/CVE-2022-25645.json new file mode 100644 index 00000000000..167c01d7640 --- /dev/null +++ b/2022/25xxx/CVE-2022-25645.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25645", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25760.json b/2022/25xxx/CVE-2022-25760.json new file mode 100644 index 00000000000..4d67569105b --- /dev/null +++ b/2022/25xxx/CVE-2022-25760.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25760", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25849.json b/2022/25xxx/CVE-2022-25849.json new file mode 100644 index 00000000000..d037b2bfb16 --- /dev/null +++ b/2022/25xxx/CVE-2022-25849.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25849", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25873.json b/2022/25xxx/CVE-2022-25873.json new file mode 100644 index 00000000000..d9a2e6343ba --- /dev/null +++ b/2022/25xxx/CVE-2022-25873.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25873", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25882.json b/2022/25xxx/CVE-2022-25882.json new file mode 100644 index 00000000000..7faf0ea38ed --- /dev/null +++ b/2022/25xxx/CVE-2022-25882.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25882", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25883.json b/2022/25xxx/CVE-2022-25883.json new file mode 100644 index 00000000000..6ad78e1ef95 --- /dev/null +++ b/2022/25xxx/CVE-2022-25883.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25883", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25893.json b/2022/25xxx/CVE-2022-25893.json new file mode 100644 index 00000000000..153551cd3d6 --- /dev/null +++ b/2022/25xxx/CVE-2022-25893.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25893", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25896.json b/2022/25xxx/CVE-2022-25896.json new file mode 100644 index 00000000000..8989c08f657 --- /dev/null +++ b/2022/25xxx/CVE-2022-25896.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25896", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25911.json b/2022/25xxx/CVE-2022-25911.json new file mode 100644 index 00000000000..77a773d0a16 --- /dev/null +++ b/2022/25xxx/CVE-2022-25911.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25911", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25916.json b/2022/25xxx/CVE-2022-25916.json new file mode 100644 index 00000000000..1401077a575 --- /dev/null +++ b/2022/25xxx/CVE-2022-25916.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25916", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25923.json b/2022/25xxx/CVE-2022-25923.json new file mode 100644 index 00000000000..cec7fa3ce04 --- /dev/null +++ b/2022/25xxx/CVE-2022-25923.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25923", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25928.json b/2022/25xxx/CVE-2022-25928.json new file mode 100644 index 00000000000..5ef7c1c3ebf --- /dev/null +++ b/2022/25xxx/CVE-2022-25928.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25928", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25929.json b/2022/25xxx/CVE-2022-25929.json new file mode 100644 index 00000000000..7b15f08d34c --- /dev/null +++ b/2022/25xxx/CVE-2022-25929.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25929", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25934.json b/2022/25xxx/CVE-2022-25934.json new file mode 100644 index 00000000000..4c6eac3fcdf --- /dev/null +++ b/2022/25xxx/CVE-2022-25934.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25934", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25938.json b/2022/25xxx/CVE-2022-25938.json new file mode 100644 index 00000000000..81d2c4ff14b --- /dev/null +++ b/2022/25xxx/CVE-2022-25938.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25938", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25948.json b/2022/25xxx/CVE-2022-25948.json new file mode 100644 index 00000000000..e0f8e0751ec --- /dev/null +++ b/2022/25xxx/CVE-2022-25948.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25948", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25950.json b/2022/25xxx/CVE-2022-25950.json new file mode 100644 index 00000000000..8edc6030d3d --- /dev/null +++ b/2022/25xxx/CVE-2022-25950.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25950", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25953.json b/2022/25xxx/CVE-2022-25953.json new file mode 100644 index 00000000000..377bf6dc0dc --- /dev/null +++ b/2022/25xxx/CVE-2022-25953.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25953", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25964.json b/2022/25xxx/CVE-2022-25964.json new file mode 100644 index 00000000000..abab897f4ea --- /dev/null +++ b/2022/25xxx/CVE-2022-25964.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25964", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25967.json b/2022/25xxx/CVE-2022-25967.json new file mode 100644 index 00000000000..8fa75a39dd4 --- /dev/null +++ b/2022/25xxx/CVE-2022-25967.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25967", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25970.json b/2022/25xxx/CVE-2022-25970.json new file mode 100644 index 00000000000..4be7eebb4a4 --- /dev/null +++ b/2022/25xxx/CVE-2022-25970.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25970", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25973.json b/2022/25xxx/CVE-2022-25973.json new file mode 100644 index 00000000000..8af710efa0e --- /dev/null +++ b/2022/25xxx/CVE-2022-25973.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25973", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25982.json b/2022/25xxx/CVE-2022-25982.json new file mode 100644 index 00000000000..914766e7368 --- /dev/null +++ b/2022/25xxx/CVE-2022-25982.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25982", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25993.json b/2022/25xxx/CVE-2022-25993.json new file mode 100644 index 00000000000..1f3ed0f5066 --- /dev/null +++ b/2022/25xxx/CVE-2022-25993.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25993", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26001.json b/2022/26xxx/CVE-2022-26001.json new file mode 100644 index 00000000000..da74bfc8c7c --- /dev/null +++ b/2022/26xxx/CVE-2022-26001.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26001", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26020.json b/2022/26xxx/CVE-2022-26020.json new file mode 100644 index 00000000000..5a481b8e76e --- /dev/null +++ b/2022/26xxx/CVE-2022-26020.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26020", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26049.json b/2022/26xxx/CVE-2022-26049.json new file mode 100644 index 00000000000..055a01fce78 --- /dev/null +++ b/2022/26xxx/CVE-2022-26049.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26049", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26068.json b/2022/26xxx/CVE-2022-26068.json new file mode 100644 index 00000000000..5711f83fac2 --- /dev/null +++ b/2022/26xxx/CVE-2022-26068.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26068", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26085.json b/2022/26xxx/CVE-2022-26085.json new file mode 100644 index 00000000000..e361e6885ab --- /dev/null +++ b/2022/26xxx/CVE-2022-26085.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26085", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file