From 0c833797c5598174b565e8e4775555d26f6f1b2c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 9 Mar 2023 06:00:36 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/27xxx/CVE-2023-27975.json | 18 +++++++++ 2023/27xxx/CVE-2023-27976.json | 18 +++++++++ 2023/27xxx/CVE-2023-27977.json | 18 +++++++++ 2023/27xxx/CVE-2023-27978.json | 18 +++++++++ 2023/27xxx/CVE-2023-27979.json | 18 +++++++++ 2023/27xxx/CVE-2023-27980.json | 18 +++++++++ 2023/27xxx/CVE-2023-27981.json | 18 +++++++++ 2023/27xxx/CVE-2023-27982.json | 18 +++++++++ 2023/27xxx/CVE-2023-27983.json | 18 +++++++++ 2023/27xxx/CVE-2023-27984.json | 18 +++++++++ 2023/27xxx/CVE-2023-27985.json | 72 ++++++++++++++++++++++++++++++++++ 2023/27xxx/CVE-2023-27986.json | 67 +++++++++++++++++++++++++++++++ 12 files changed, 319 insertions(+) create mode 100644 2023/27xxx/CVE-2023-27975.json create mode 100644 2023/27xxx/CVE-2023-27976.json create mode 100644 2023/27xxx/CVE-2023-27977.json create mode 100644 2023/27xxx/CVE-2023-27978.json create mode 100644 2023/27xxx/CVE-2023-27979.json create mode 100644 2023/27xxx/CVE-2023-27980.json create mode 100644 2023/27xxx/CVE-2023-27981.json create mode 100644 2023/27xxx/CVE-2023-27982.json create mode 100644 2023/27xxx/CVE-2023-27983.json create mode 100644 2023/27xxx/CVE-2023-27984.json create mode 100644 2023/27xxx/CVE-2023-27985.json create mode 100644 2023/27xxx/CVE-2023-27986.json diff --git a/2023/27xxx/CVE-2023-27975.json b/2023/27xxx/CVE-2023-27975.json new file mode 100644 index 00000000000..9ee652bcd1f --- /dev/null +++ b/2023/27xxx/CVE-2023-27975.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-27975", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/27xxx/CVE-2023-27976.json b/2023/27xxx/CVE-2023-27976.json new file mode 100644 index 00000000000..68683b16c6f --- /dev/null +++ b/2023/27xxx/CVE-2023-27976.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-27976", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/27xxx/CVE-2023-27977.json b/2023/27xxx/CVE-2023-27977.json new file mode 100644 index 00000000000..4c86c708301 --- /dev/null +++ b/2023/27xxx/CVE-2023-27977.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-27977", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/27xxx/CVE-2023-27978.json b/2023/27xxx/CVE-2023-27978.json new file mode 100644 index 00000000000..e7ee0eafbd4 --- /dev/null +++ b/2023/27xxx/CVE-2023-27978.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-27978", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/27xxx/CVE-2023-27979.json b/2023/27xxx/CVE-2023-27979.json new file mode 100644 index 00000000000..6321e772188 --- /dev/null +++ b/2023/27xxx/CVE-2023-27979.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-27979", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/27xxx/CVE-2023-27980.json b/2023/27xxx/CVE-2023-27980.json new file mode 100644 index 00000000000..db757bb7338 --- /dev/null +++ b/2023/27xxx/CVE-2023-27980.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-27980", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/27xxx/CVE-2023-27981.json b/2023/27xxx/CVE-2023-27981.json new file mode 100644 index 00000000000..06f2fbf7610 --- /dev/null +++ b/2023/27xxx/CVE-2023-27981.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-27981", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/27xxx/CVE-2023-27982.json b/2023/27xxx/CVE-2023-27982.json new file mode 100644 index 00000000000..f01ffa11159 --- /dev/null +++ b/2023/27xxx/CVE-2023-27982.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-27982", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/27xxx/CVE-2023-27983.json b/2023/27xxx/CVE-2023-27983.json new file mode 100644 index 00000000000..173abe54e14 --- /dev/null +++ b/2023/27xxx/CVE-2023-27983.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-27983", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/27xxx/CVE-2023-27984.json b/2023/27xxx/CVE-2023-27984.json new file mode 100644 index 00000000000..b86d089d7e6 --- /dev/null +++ b/2023/27xxx/CVE-2023-27984.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-27984", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/27xxx/CVE-2023-27985.json b/2023/27xxx/CVE-2023-27985.json new file mode 100644 index 00000000000..e2b131aa4f1 --- /dev/null +++ b/2023/27xxx/CVE-2023-27985.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2023-27985", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.openwall.com/lists/oss-security/2023/03/08/2", + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2023/03/08/2" + }, + { + "url": "http://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=d32091199ae5de590a83f1542a01d75fba000467", + "refsource": "MISC", + "name": "http://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=d32091199ae5de590a83f1542a01d75fba000467" + }, + { + "url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=60204", + "refsource": "MISC", + "name": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=60204" + } + ] + } +} \ No newline at end of file diff --git a/2023/27xxx/CVE-2023-27986.json b/2023/27xxx/CVE-2023-27986.json new file mode 100644 index 00000000000..0a8b7cdb15c --- /dev/null +++ b/2023/27xxx/CVE-2023-27986.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2023-27986", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to Emacs Lisp code injections through a crafted mailto: URI with unescaped double-quote characters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.openwall.com/lists/oss-security/2023/03/08/2", + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2023/03/08/2" + }, + { + "url": "http://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=3c1693d08b0a71d40a77e7b40c0ebc42dca2d2cc", + "refsource": "MISC", + "name": "http://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=3c1693d08b0a71d40a77e7b40c0ebc42dca2d2cc" + } + ] + } +} \ No newline at end of file