{"document":{"acknowledgments":[{"urls":["https://bigvince-devtest-kb.testdit.org/vuls/id/670446#acknowledgements"]}],"category":"CERT/CC Vulnerability Note","csaf_version":"2.0","notes":[{"category":"summary","text":"### Overview\r\nVulnote test\r\n\r\n### Description\r\nTesting bleach upgrade <a onclick=\"dosomething()\">test test</a>\r\n\r\n### Impact\r\nThe complete impact of this vulnerability is not yet known.\r\n\r\n### Solution\r\nThe CERT/CC is currently unaware of a practical solution to this problem.\r\n\r\n### Acknowledgements\r\nThanks to the reporter who wishes to remain anonymous.","title":"Summary"},{"category":"legal_disclaimer","text":"THIS DOCUMENT IS PROVIDED ON AN 'AS IS' BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. ","title":"Legal Disclaimer"},{"category":"other","text":"CERT/CC Vulnerability Note is a limited advisory. It primarily identifies vendors impacted by the advisory and not specific products. We only support \"known_affected\" and \"known_not_affected\" status. Please consult the vendor's statements and advisory URL if provided by the vendor for more details ","title":"Limitations of Advisory"},{"category":"other","text":"WE have never seen or used YETI","title":"Vendor statment from Rapid 7"}],"publisher":{"category":"coordinator","contact_details":"Email: cert@cert.org, Phone: +1412 268 5800","issuing_authority":"CERT/CC under DHS/CISA https://www.cisa.gov/cybersecurity also see https://kb.cert.org/ ","name":"CERT/CC","namespace":"https://kb.cert.org/"},"references":[{"url":"https://certcc.github.io/certcc_disclosure_policy","summary":"CERT/CC vulnerability disclosure policy"},{"summary":"CERT/CC document released","category":"self","url":"https://bigvince-devtest-kb.testdit.org/vuls/id/670446"}],"title":"YETI","tracking":{"current_release_date":"2022-09-06T20:18:46+00:00","generator":{"engine":{"name":"VINCE","version":"3.0.38"}},"id":"VU#670446","initial_release_date":"2022-02-03 05:00:00+00:00","revision_history":[{"date":"2022-09-06T20:18:46+00:00","number":"1.20220906201846.4","summary":"Released on 2022-09-06T20:18:46+00:00"}],"status":"final","version":"1.20220906201846.4"}},"vulnerabilities":[{"title":"test sldkjfalsdfomething \"thisdfljsdf\" add some quotes.","notes":[{"category":"summary","text":"test sldkjfalsdfomething \"thisdfljsdf\" add some quotes"}],"cve":"CVE-2022-0142","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#670446"}],"product_status":{"known_not_affected":["CSAFPID-98f4c1ac-4945-11f1-a807-0ea81a109b21"]}}],"product_tree":{"branches":[{"category":"vendor","name":"Rapid 7","product":{"name":"Rapid 7 Products","product_id":"CSAFPID-98f4c1ac-4945-11f1-a807-0ea81a109b21"}}]}}