From fa1d5e114b4fd8ee5bf1010ec528dfce20e706e2 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 6 Dec 2022 16:00:37 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/10xxx/CVE-2020-10005.json | 5 +++ 2020/35xxx/CVE-2020-35576.json | 5 +++ 2022/38xxx/CVE-2022-38123.json | 81 ++++++++++++++++++++++++++++++++-- 2022/3xxx/CVE-2022-3088.json | 21 ++++++++- 2022/40xxx/CVE-2022-40259.json | 4 +- 2022/41xxx/CVE-2022-41325.json | 66 ++++++++++++++++++++++++--- 2022/43xxx/CVE-2022-43363.json | 61 ++++++++++++++++++++++--- 2022/44xxx/CVE-2022-44289.json | 56 ++++++++++++++++++++--- 2022/46xxx/CVE-2022-46382.json | 56 ++++++++++++++++++++--- 2022/46xxx/CVE-2022-46665.json | 18 ++++++++ 2022/46xxx/CVE-2022-46666.json | 18 ++++++++ 2022/46xxx/CVE-2022-46667.json | 18 ++++++++ 2022/46xxx/CVE-2022-46668.json | 18 ++++++++ 2022/46xxx/CVE-2022-46669.json | 18 ++++++++ 2022/46xxx/CVE-2022-46670.json | 18 ++++++++ 2022/46xxx/CVE-2022-46671.json | 18 ++++++++ 2022/46xxx/CVE-2022-46672.json | 18 ++++++++ 2022/46xxx/CVE-2022-46673.json | 18 ++++++++ 2022/46xxx/CVE-2022-46674.json | 18 ++++++++ 2022/4xxx/CVE-2022-4310.json | 18 ++++++++ 20 files changed, 522 insertions(+), 31 deletions(-) create mode 100644 2022/46xxx/CVE-2022-46665.json create mode 100644 2022/46xxx/CVE-2022-46666.json create mode 100644 2022/46xxx/CVE-2022-46667.json create mode 100644 2022/46xxx/CVE-2022-46668.json create mode 100644 2022/46xxx/CVE-2022-46669.json create mode 100644 2022/46xxx/CVE-2022-46670.json create mode 100644 2022/46xxx/CVE-2022-46671.json create mode 100644 2022/46xxx/CVE-2022-46672.json create mode 100644 2022/46xxx/CVE-2022-46673.json create mode 100644 2022/46xxx/CVE-2022-46674.json create mode 100644 2022/4xxx/CVE-2022-4310.json diff --git a/2020/10xxx/CVE-2020-10005.json b/2020/10xxx/CVE-2020-10005.json index fe7e8c8ac7e..e9ded91d996 100644 --- a/2020/10xxx/CVE-2020-10005.json +++ b/2020/10xxx/CVE-2020-10005.json @@ -49,6 +49,11 @@ "refsource": "MISC", "url": "https://support.apple.com/en-us/HT211931", "name": "https://support.apple.com/en-us/HT211931" + }, + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1246", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1246" } ] }, diff --git a/2020/35xxx/CVE-2020-35576.json b/2020/35xxx/CVE-2020-35576.json index 45aa52dfb3a..14ffd3c4e3d 100644 --- a/2020/35xxx/CVE-2020-35576.json +++ b/2020/35xxx/CVE-2020-35576.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://jvn.jp/en/vu/JVNVU92444096/", "url": "https://jvn.jp/en/vu/JVNVU92444096/" + }, + { + "refsource": "MISC", + "name": "https://www.tp-link.com/jp/support/download/tl-wr841n/v13/#Firmware", + "url": "https://www.tp-link.com/jp/support/download/tl-wr841n/v13/#Firmware" } ] } diff --git a/2022/38xxx/CVE-2022-38123.json b/2022/38xxx/CVE-2022-38123.json index 75d01ccdcc3..a8c21b0d304 100644 --- a/2022/38xxx/CVE-2022-38123.json +++ b/2022/38xxx/CVE-2022-38123.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-38123", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "VulnerabilityReporting@secomea.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Input Validation of plugin files in Administrator Interface of Secomea GateManager allows a server administrator to inject code into the GateManager interface. This issue affects: Secomea GateManager versions prior to 10.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Secomea", + "product": { + "product_data": [ + { + "product_name": "GateManager", + "version": { + "version_data": [ + { + "version_value": "0", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.secomea.com/support/cybersecurity-advisory/", + "refsource": "MISC", + "name": "https://www.secomea.com/support/cybersecurity-advisory/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "defect": [ + "RD-5851" + ], + "discovery": "EXTERNAL" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H", + "version": "3.1" } ] } diff --git a/2022/3xxx/CVE-2022-3088.json b/2022/3xxx/CVE-2022-3088.json index 3872ec11405..fd4dcfda34d 100644 --- a/2022/3xxx/CVE-2022-3088.json +++ b/2022/3xxx/CVE-2022-3088.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "UC-8100A-ME-T System Image: Versions v1.0 to v1.6, UC-2100 System Image: Versions v1.0 to v1.12, UC-2100-W System Image: Versions v1.0 to v 1.12, UC-3100 System Image: Versions v1.0 to v1.6, UC-5100 System Image: Versions v1.0 to v1.4, UC-8100 System Image: Versions v3.0 to v3.5, UC-8100-ME-T System Image: Versions v3.0 and v3.1, UC-8100A-ME-T System Image: Versions v1.0 to v1.6, UC-8200 System Image: v1.0 to v1.5, AIG-300 System Image: v1.0 to v1.4, UC-8410A with Debian 9 System Image: Versions v4.0.2 and v4.1.2, UC-8580 with Debian 9 System Image: Versions v2.0 and v2.1, UC-8540 with Debian 9 System Image: Versions v2.0 and v2.1, and DA-662C-16-LX (GLB) System Image: Versions v1.0.2 to v1.1.2 of Moxa's ARM-based computers have an execution with unnecessary privileges vulnerability, which could allow an attacker with user-level privileges to gain root privileges." + "value": "UC-8100A-ME-T System Image: Versions v1.0 to v1.6, UC-2100 System Image: Versions v1.0 to v1.12, UC-2100-W System Image: Versions v1.0 to v 1.12, UC-3100 System Image: Versions v1.0 to v1.6, UC-5100 System Image: Versions v1.0 to v1.4, UC-8100 System Image: Versions v3.0 to v3.5, UC-8100-ME-T System Image: Versions v3.0 and v3.1 UC-8200 System Image: v1.0 to v1.5, AIG-300 System Image: v1.0 to v1.4, UC-8410A with Debian 9 System Image: Versions v4.0.2 and v4.1.2, UC-8580 with Debian 9 System Image: Versions v2.0 and v2.1, UC-8540 with Debian 9 System Image: Versions v2.0 and v2.1, and DA-662C-16-LX (GLB) System Image: Versions v1.0.2 to v1.1.2 of Moxa's ARM-based computers have an execution with unnecessary privileges vulnerability, which could allow an attacker with user-level privileges to gain root privileges." } ] }, @@ -199,6 +199,25 @@ "source": { "discovery": "UNKNOWN" }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "\nMoxa developed updates to address this vulnerability. Users should follow the instructions in Moxa's security advisory to update their system image.  \n\n
" + } + ], + "value": "Moxa developed updates to address this vulnerability. Users should follow the instructions in Moxa's security advisory https://www.moxa.com/en/support/product-support/security-advisory/moxa-arm-based-computer-improper-privilege-management-vulnerability to update their system image. \u00a0\n\n\n" + } + ], + "credits": [ + { + "lang": "en", + "value": "En Garde ICSRange research team reported this vulnerability to CISA.\u00a0" + } + ], "impact": { "cvss": [ { diff --git a/2022/40xxx/CVE-2022-40259.json b/2022/40xxx/CVE-2022-40259.json index 18bdaa55b4c..b4cf1ef973b 100644 --- a/2022/40xxx/CVE-2022-40259.json +++ b/2022/40xxx/CVE-2022-40259.json @@ -75,9 +75,9 @@ "references": { "reference_data": [ { - "url": "https://cp.ami.com/MegaRAC%20Security%20Advisory/SP-X/AMI_MegaRAC_SPx_Redfish_Authentication_Vulnerabilities.pdf", + "url": "https://cp.ami.com/MegaRAC%20Security%20Advisory/SP-X/AMI_MegaRAC_SPx_Arbitrary_Code_via_Redfish_API.pdf", "refsource": "MISC", - "name": "https://cp.ami.com/MegaRAC%20Security%20Advisory/SP-X/AMI_MegaRAC_SPx_Redfish_Authentication_Vulnerabilities.pdf" + "name": "https://cp.ami.com/MegaRAC%20Security%20Advisory/SP-X/AMI_MegaRAC_SPx_Arbitrary_Code_via_Redfish_API.pdf" } ] }, diff --git a/2022/41xxx/CVE-2022-41325.json b/2022/41xxx/CVE-2022-41325.json index 43b6a76e50f..1022dbd6c8c 100644 --- a/2022/41xxx/CVE-2022-41325.json +++ b/2022/41xxx/CVE-2022-41325.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-41325", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-41325", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An integer overflow in the VNC module in VideoLAN VLC Media Player through 3.0.17.4 allows attackers, by tricking a user into opening a crafted playlist or connecting to a rogue VNC server, to crash VLC or execute code under some conditions." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://twitter.com/0xMitsurugi", + "refsource": "MISC", + "name": "https://twitter.com/0xMitsurugi" + }, + { + "refsource": "MISC", + "name": "https://www.synacktiv.com/sites/default/files/2022-11/vlc_vnc_int_overflow-CVE-2022-41325.pdf", + "url": "https://www.synacktiv.com/sites/default/files/2022-11/vlc_vnc_int_overflow-CVE-2022-41325.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.videolan.org/security/sb-vlc3018.html", + "url": "https://www.videolan.org/security/sb-vlc3018.html" } ] } diff --git a/2022/43xxx/CVE-2022-43363.json b/2022/43xxx/CVE-2022-43363.json index e76e2854bf7..f91c77ee48f 100644 --- a/2022/43xxx/CVE-2022-43363.json +++ b/2022/43xxx/CVE-2022-43363.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-43363", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-43363", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** DISPUTED ** Telegram Web 15.3.1 allows XSS via a certain payload derived from a Target Corporation website. NOTE: some third parties have been unable to discern any relationship between the Pastebin information and a possible XSS finding." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bugs.telegram.org/c/17831", + "refsource": "MISC", + "name": "https://bugs.telegram.org/c/17831" + }, + { + "refsource": "MISC", + "name": "https://pastebin.com/72MRwNXW", + "url": "https://pastebin.com/72MRwNXW" } ] } diff --git a/2022/44xxx/CVE-2022-44289.json b/2022/44xxx/CVE-2022-44289.json index 79f76e8d2cf..efbf2327d58 100644 --- a/2022/44xxx/CVE-2022-44289.json +++ b/2022/44xxx/CVE-2022-44289.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-44289", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-44289", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Thinkphp 5.1.41 and 5.0.24 has a code logic error which causes file upload getshell." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/top-think/framework/issues/2772", + "refsource": "MISC", + "name": "https://github.com/top-think/framework/issues/2772" } ] } diff --git a/2022/46xxx/CVE-2022-46382.json b/2022/46xxx/CVE-2022-46382.json index 0a7ea938b9c..e8507684d6f 100644 --- a/2022/46xxx/CVE-2022-46382.json +++ b/2022/46xxx/CVE-2022-46382.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-46382", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-46382", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "RackN Digital Rebar through 4.6.14, 4.7 through 4.7.22, 4.8 through 4.8.5, 4.9 through 4.9.12, and 4.10 through 4.10.8 has Insecure Permissions. After signing into Digital Rebar, users are issued authentication tokens tied to their account to perform actions within Digital Rebar. During the validation process of these tokens, Digital Rebar did not check if the user account still exists. Deleted Digital Rebar users could still use their tokens to perform actions within Digital Rebar." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rackn.com/products/rebar/", + "refsource": "MISC", + "name": "https://rackn.com/products/rebar/" } ] } diff --git a/2022/46xxx/CVE-2022-46665.json b/2022/46xxx/CVE-2022-46665.json new file mode 100644 index 00000000000..63db6444250 --- /dev/null +++ b/2022/46xxx/CVE-2022-46665.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46665", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46666.json b/2022/46xxx/CVE-2022-46666.json new file mode 100644 index 00000000000..215ffc1f13c --- /dev/null +++ b/2022/46xxx/CVE-2022-46666.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46666", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46667.json b/2022/46xxx/CVE-2022-46667.json new file mode 100644 index 00000000000..de7b9af62d6 --- /dev/null +++ b/2022/46xxx/CVE-2022-46667.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46667", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46668.json b/2022/46xxx/CVE-2022-46668.json new file mode 100644 index 00000000000..2d5a85e628a --- /dev/null +++ b/2022/46xxx/CVE-2022-46668.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46668", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46669.json b/2022/46xxx/CVE-2022-46669.json new file mode 100644 index 00000000000..ae2d96917af --- /dev/null +++ b/2022/46xxx/CVE-2022-46669.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46669", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46670.json b/2022/46xxx/CVE-2022-46670.json new file mode 100644 index 00000000000..c6506093e24 --- /dev/null +++ b/2022/46xxx/CVE-2022-46670.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46670", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46671.json b/2022/46xxx/CVE-2022-46671.json new file mode 100644 index 00000000000..175883c8f90 --- /dev/null +++ b/2022/46xxx/CVE-2022-46671.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46671", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46672.json b/2022/46xxx/CVE-2022-46672.json new file mode 100644 index 00000000000..c691c827da9 --- /dev/null +++ b/2022/46xxx/CVE-2022-46672.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46672", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46673.json b/2022/46xxx/CVE-2022-46673.json new file mode 100644 index 00000000000..0675476251e --- /dev/null +++ b/2022/46xxx/CVE-2022-46673.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46673", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46674.json b/2022/46xxx/CVE-2022-46674.json new file mode 100644 index 00000000000..6946bcf62b0 --- /dev/null +++ b/2022/46xxx/CVE-2022-46674.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46674", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/4xxx/CVE-2022-4310.json b/2022/4xxx/CVE-2022-4310.json new file mode 100644 index 00000000000..7f055c6aa0b --- /dev/null +++ b/2022/4xxx/CVE-2022-4310.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-4310", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file