diff --git a/data/cve/CVE-2022-50069.json b/data/cve/CVE-2022-50069.json new file mode 100644 index 0000000000000000000000000000000000000000..bdeabc0ab39076535d0b16cee21d53c1ab1f0700 --- /dev/null +++ b/data/cve/CVE-2022-50069.json @@ -0,0 +1,45 @@ +{ + "id": 29024, + "cve_id": "CVE-2022-50069", + "creator": null, + "publisher": "cve-center", + "publish_third_party_token": "cve-center", + "publish_date": "2025-06-18 00:00:00", + "cvss": { + "nvd_cvss": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "openanolis_cvss": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + "product": [ + { + "product_id": 5, + "name_version": "Anolis OS 8", + "product_package_info": { + "src": [ + { + "rpm_name": "kernel:4.18", + "rpm_status": "affected" + } + ] + } + } + ], + "affected_packages": [ + "kernel:4.18" + ], + "score": 7.0, + "severity": "Moderate", + "status": 1, + "source": "Mitre", + "cve_source_link": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50069", + "abstract": "No description is available for this CVE.", + "description": null, + "issue": null, + "acknowledgements": null, + "acknowledgements_en": null, + "reference": null, + "diagnose": null, + "statement": null, + "mitigation": null, + "update_user": null, + "errata": [] +} \ No newline at end of file