data/reports: add GO-2022-1188.yaml

Aliases: CVE-2022-4741, GHSA-qvx2-59g8-8hph

Fixes golang/vulndb#1188

Change-Id: Icd70cd8eccf86515f6019e028a0952765a5a1af3
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/461636
Reviewed-by: Damien Neil <dneil@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Run-TryBot: Tim King <taking@google.com>
diff --git a/data/osv/GO-2022-1188.json b/data/osv/GO-2022-1188.json
new file mode 100644
index 0000000..217a2e3
--- /dev/null
+++ b/data/osv/GO-2022-1188.json
@@ -0,0 +1,52 @@
+{
+  "id": "GO-2022-1188",
+  "published": "0001-01-01T00:00:00Z",
+  "modified": "0001-01-01T00:00:00Z",
+  "aliases": [
+    "CVE-2022-4741",
+    "GHSA-qvx2-59g8-8hph"
+  ],
+  "details": "An attacker can remotely supply a specially crafted input that causes uncontrolled memory allocation.",
+  "affected": [
+    {
+      "package": {
+        "name": "code.sajari.com/docconv",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "0"
+            },
+            {
+              "fixed": "1.2.1"
+            }
+          ]
+        }
+      ],
+      "database_specific": {
+        "url": "https://pkg.go.dev/vuln/GO-2022-1188"
+      },
+      "ecosystem_specific": {
+        "imports": [
+          {
+            "path": "code.sajari.com/docconv/docd",
+            "symbols": [
+              "main",
+              "serve"
+            ]
+          }
+        ]
+      }
+    }
+  ],
+  "references": [
+    {
+      "type": "FIX",
+      "url": "https://github.com/sajari/docconv/commit/42bcff666855ab978e67a9041d0cdea552f20301"
+    }
+  ],
+  "schema_version": "1.3.1"
+}
\ No newline at end of file
diff --git a/data/reports/GO-2022-1188.yaml b/data/reports/GO-2022-1188.yaml
new file mode 100644
index 0000000..ed7ab10
--- /dev/null
+++ b/data/reports/GO-2022-1188.yaml
@@ -0,0 +1,20 @@
+modules:
+  - module: code.sajari.com/docconv
+    versions:
+      - fixed: 1.2.1
+    vulnerable_at: 1.2.0
+    packages:
+      - package: code.sajari.com/docconv/docd
+        symbols:
+          - serve
+        derived_symbols:
+          - main
+description: |
+    An attacker can remotely supply a specially crafted input that causes
+    uncontrolled memory allocation.
+cves:
+  - CVE-2022-4741
+ghsas:
+  - GHSA-qvx2-59g8-8hph
+references:
+  - fix: https://github.com/sajari/docconv/commit/42bcff666855ab978e67a9041d0cdea552f20301