From 10bedc93261f0044f23b8ac734a71984126cd73f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 27 Jun 2023 21:00:41 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/18xxx/CVE-2020-18404.json | 56 +++++++++++++++++--- 2020/18xxx/CVE-2020-18409.json | 56 +++++++++++++++++--- 2020/18xxx/CVE-2020-18414.json | 56 +++++++++++++++++--- 2023/36xxx/CVE-2023-36865.json | 18 +++++++ 2023/36xxx/CVE-2023-36866.json | 18 +++++++ 2023/36xxx/CVE-2023-36867.json | 18 +++++++ 2023/36xxx/CVE-2023-36868.json | 18 +++++++ 2023/36xxx/CVE-2023-36869.json | 18 +++++++ 2023/36xxx/CVE-2023-36870.json | 18 +++++++ 2023/36xxx/CVE-2023-36871.json | 18 +++++++ 2023/36xxx/CVE-2023-36872.json | 18 +++++++ 2023/36xxx/CVE-2023-36873.json | 18 +++++++ 2023/36xxx/CVE-2023-36874.json | 18 +++++++ 2023/36xxx/CVE-2023-36875.json | 18 +++++++ 2023/36xxx/CVE-2023-36876.json | 18 +++++++ 2023/36xxx/CVE-2023-36877.json | 18 +++++++ 2023/36xxx/CVE-2023-36878.json | 18 +++++++ 2023/36xxx/CVE-2023-36879.json | 18 +++++++ 2023/36xxx/CVE-2023-36880.json | 18 +++++++ 2023/36xxx/CVE-2023-36881.json | 18 +++++++ 2023/36xxx/CVE-2023-36882.json | 18 +++++++ 2023/36xxx/CVE-2023-36883.json | 18 +++++++ 2023/36xxx/CVE-2023-36884.json | 18 +++++++ 2023/36xxx/CVE-2023-36885.json | 18 +++++++ 2023/36xxx/CVE-2023-36886.json | 18 +++++++ 2023/36xxx/CVE-2023-36887.json | 18 +++++++ 2023/36xxx/CVE-2023-36888.json | 18 +++++++ 2023/36xxx/CVE-2023-36889.json | 18 +++++++ 2023/36xxx/CVE-2023-36890.json | 18 +++++++ 2023/36xxx/CVE-2023-36891.json | 18 +++++++ 2023/36xxx/CVE-2023-36892.json | 18 +++++++ 2023/36xxx/CVE-2023-36893.json | 18 +++++++ 2023/36xxx/CVE-2023-36894.json | 18 +++++++ 2023/36xxx/CVE-2023-36895.json | 18 +++++++ 2023/36xxx/CVE-2023-36896.json | 18 +++++++ 2023/36xxx/CVE-2023-36897.json | 18 +++++++ 2023/36xxx/CVE-2023-36898.json | 18 +++++++ 2023/36xxx/CVE-2023-36899.json | 18 +++++++ 2023/36xxx/CVE-2023-36900.json | 18 +++++++ 2023/36xxx/CVE-2023-36901.json | 18 +++++++ 2023/36xxx/CVE-2023-36902.json | 18 +++++++ 2023/36xxx/CVE-2023-36903.json | 18 +++++++ 2023/36xxx/CVE-2023-36904.json | 18 +++++++ 2023/36xxx/CVE-2023-36905.json | 18 +++++++ 2023/36xxx/CVE-2023-36906.json | 18 +++++++ 2023/36xxx/CVE-2023-36907.json | 18 +++++++ 2023/36xxx/CVE-2023-36908.json | 18 +++++++ 2023/36xxx/CVE-2023-36909.json | 18 +++++++ 2023/36xxx/CVE-2023-36910.json | 18 +++++++ 2023/36xxx/CVE-2023-36911.json | 18 +++++++ 2023/36xxx/CVE-2023-36912.json | 18 +++++++ 2023/36xxx/CVE-2023-36913.json | 18 +++++++ 2023/36xxx/CVE-2023-36914.json | 18 +++++++ 2023/3xxx/CVE-2023-3436.json | 94 ++++++++++++++++++++++++++++++++++ 54 files changed, 1144 insertions(+), 18 deletions(-) create mode 100644 2023/36xxx/CVE-2023-36865.json create mode 100644 2023/36xxx/CVE-2023-36866.json create mode 100644 2023/36xxx/CVE-2023-36867.json create mode 100644 2023/36xxx/CVE-2023-36868.json create mode 100644 2023/36xxx/CVE-2023-36869.json create mode 100644 2023/36xxx/CVE-2023-36870.json create mode 100644 2023/36xxx/CVE-2023-36871.json create mode 100644 2023/36xxx/CVE-2023-36872.json create mode 100644 2023/36xxx/CVE-2023-36873.json create mode 100644 2023/36xxx/CVE-2023-36874.json create mode 100644 2023/36xxx/CVE-2023-36875.json create mode 100644 2023/36xxx/CVE-2023-36876.json create mode 100644 2023/36xxx/CVE-2023-36877.json create mode 100644 2023/36xxx/CVE-2023-36878.json create mode 100644 2023/36xxx/CVE-2023-36879.json create mode 100644 2023/36xxx/CVE-2023-36880.json create mode 100644 2023/36xxx/CVE-2023-36881.json create mode 100644 2023/36xxx/CVE-2023-36882.json create mode 100644 2023/36xxx/CVE-2023-36883.json create mode 100644 2023/36xxx/CVE-2023-36884.json create mode 100644 2023/36xxx/CVE-2023-36885.json create mode 100644 2023/36xxx/CVE-2023-36886.json create mode 100644 2023/36xxx/CVE-2023-36887.json create mode 100644 2023/36xxx/CVE-2023-36888.json create mode 100644 2023/36xxx/CVE-2023-36889.json create mode 100644 2023/36xxx/CVE-2023-36890.json create mode 100644 2023/36xxx/CVE-2023-36891.json create mode 100644 2023/36xxx/CVE-2023-36892.json create mode 100644 2023/36xxx/CVE-2023-36893.json create mode 100644 2023/36xxx/CVE-2023-36894.json create mode 100644 2023/36xxx/CVE-2023-36895.json create mode 100644 2023/36xxx/CVE-2023-36896.json create mode 100644 2023/36xxx/CVE-2023-36897.json create mode 100644 2023/36xxx/CVE-2023-36898.json create mode 100644 2023/36xxx/CVE-2023-36899.json create mode 100644 2023/36xxx/CVE-2023-36900.json create mode 100644 2023/36xxx/CVE-2023-36901.json create mode 100644 2023/36xxx/CVE-2023-36902.json create mode 100644 2023/36xxx/CVE-2023-36903.json create mode 100644 2023/36xxx/CVE-2023-36904.json create mode 100644 2023/36xxx/CVE-2023-36905.json create mode 100644 2023/36xxx/CVE-2023-36906.json create mode 100644 2023/36xxx/CVE-2023-36907.json create mode 100644 2023/36xxx/CVE-2023-36908.json create mode 100644 2023/36xxx/CVE-2023-36909.json create mode 100644 2023/36xxx/CVE-2023-36910.json create mode 100644 2023/36xxx/CVE-2023-36911.json create mode 100644 2023/36xxx/CVE-2023-36912.json create mode 100644 2023/36xxx/CVE-2023-36913.json create mode 100644 2023/36xxx/CVE-2023-36914.json create mode 100644 2023/3xxx/CVE-2023-3436.json diff --git a/2020/18xxx/CVE-2020-18404.json b/2020/18xxx/CVE-2020-18404.json index 6c1ca83cd00..3ae2b38dcdf 100644 --- a/2020/18xxx/CVE-2020-18404.json +++ b/2020/18xxx/CVE-2020-18404.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-18404", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-18404", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in espcms version P8.18101601. There is a cross site scripting (XSS) vulnerability that allows arbitrary code to be executed via the title parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/source-hunter/espcms/issues/1", + "refsource": "MISC", + "name": "https://github.com/source-hunter/espcms/issues/1" } ] } diff --git a/2020/18xxx/CVE-2020-18409.json b/2020/18xxx/CVE-2020-18409.json index 05ae40a87b7..63ec0d61de2 100644 --- a/2020/18xxx/CVE-2020-18409.json +++ b/2020/18xxx/CVE-2020-18409.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-18409", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-18409", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Request Forgery (CSRF) vulnerability was discovered in CatfishCMS 4.8.63 that would allow attackers to obtain administrator permissions via /index.php/admin/index/modifymanage.html." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/xwlrbh/Catfish/issues/5", + "refsource": "MISC", + "name": "https://github.com/xwlrbh/Catfish/issues/5" } ] } diff --git a/2020/18xxx/CVE-2020-18414.json b/2020/18xxx/CVE-2020-18414.json index 91c0caafb60..56569b79943 100644 --- a/2020/18xxx/CVE-2020-18414.json +++ b/2020/18xxx/CVE-2020-18414.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-18414", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-18414", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stored cross site scripting (XSS) vulnerability in Chaoji CMS v2.18 that allows attackers to execute arbitrary code via /index.php?admin-master-webset." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/GodEpic/chaojicms/issues/3", + "url": "https://github.com/GodEpic/chaojicms/issues/3" } ] } diff --git a/2023/36xxx/CVE-2023-36865.json b/2023/36xxx/CVE-2023-36865.json new file mode 100644 index 00000000000..476df5d7108 --- /dev/null +++ b/2023/36xxx/CVE-2023-36865.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36865", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36866.json b/2023/36xxx/CVE-2023-36866.json new file mode 100644 index 00000000000..2221d34b374 --- /dev/null +++ b/2023/36xxx/CVE-2023-36866.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36866", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36867.json b/2023/36xxx/CVE-2023-36867.json new file mode 100644 index 00000000000..77980cff7b1 --- /dev/null +++ b/2023/36xxx/CVE-2023-36867.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36867", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36868.json b/2023/36xxx/CVE-2023-36868.json new file mode 100644 index 00000000000..6d1dc725715 --- /dev/null +++ b/2023/36xxx/CVE-2023-36868.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36868", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36869.json b/2023/36xxx/CVE-2023-36869.json new file mode 100644 index 00000000000..d5db8dff33b --- /dev/null +++ b/2023/36xxx/CVE-2023-36869.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36869", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36870.json b/2023/36xxx/CVE-2023-36870.json new file mode 100644 index 00000000000..4c9736eaef1 --- /dev/null +++ b/2023/36xxx/CVE-2023-36870.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36870", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36871.json b/2023/36xxx/CVE-2023-36871.json new file mode 100644 index 00000000000..b01d946511b --- /dev/null +++ b/2023/36xxx/CVE-2023-36871.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36871", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36872.json b/2023/36xxx/CVE-2023-36872.json new file mode 100644 index 00000000000..f67ef1296f3 --- /dev/null +++ b/2023/36xxx/CVE-2023-36872.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36872", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36873.json b/2023/36xxx/CVE-2023-36873.json new file mode 100644 index 00000000000..fd925e71401 --- /dev/null +++ b/2023/36xxx/CVE-2023-36873.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36873", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36874.json b/2023/36xxx/CVE-2023-36874.json new file mode 100644 index 00000000000..2eaa423e327 --- /dev/null +++ b/2023/36xxx/CVE-2023-36874.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36874", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36875.json b/2023/36xxx/CVE-2023-36875.json new file mode 100644 index 00000000000..def39504062 --- /dev/null +++ b/2023/36xxx/CVE-2023-36875.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36875", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36876.json b/2023/36xxx/CVE-2023-36876.json new file mode 100644 index 00000000000..3bb77d36e25 --- /dev/null +++ b/2023/36xxx/CVE-2023-36876.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36876", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36877.json b/2023/36xxx/CVE-2023-36877.json new file mode 100644 index 00000000000..6a0a40b742d --- /dev/null +++ b/2023/36xxx/CVE-2023-36877.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36877", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36878.json b/2023/36xxx/CVE-2023-36878.json new file mode 100644 index 00000000000..812d77aa7c1 --- /dev/null +++ b/2023/36xxx/CVE-2023-36878.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36878", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36879.json b/2023/36xxx/CVE-2023-36879.json new file mode 100644 index 00000000000..679bcb54526 --- /dev/null +++ b/2023/36xxx/CVE-2023-36879.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36879", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36880.json b/2023/36xxx/CVE-2023-36880.json new file mode 100644 index 00000000000..54863a60d1b --- /dev/null +++ b/2023/36xxx/CVE-2023-36880.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36880", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36881.json b/2023/36xxx/CVE-2023-36881.json new file mode 100644 index 00000000000..86770c53b24 --- /dev/null +++ b/2023/36xxx/CVE-2023-36881.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36881", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36882.json b/2023/36xxx/CVE-2023-36882.json new file mode 100644 index 00000000000..e40e9166f8e --- /dev/null +++ b/2023/36xxx/CVE-2023-36882.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36882", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36883.json b/2023/36xxx/CVE-2023-36883.json new file mode 100644 index 00000000000..1c2c8d6c3ce --- /dev/null +++ b/2023/36xxx/CVE-2023-36883.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36883", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36884.json b/2023/36xxx/CVE-2023-36884.json new file mode 100644 index 00000000000..f495e7fb5f3 --- /dev/null +++ b/2023/36xxx/CVE-2023-36884.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36884", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36885.json b/2023/36xxx/CVE-2023-36885.json new file mode 100644 index 00000000000..bed3e771fbe --- /dev/null +++ b/2023/36xxx/CVE-2023-36885.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36885", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36886.json b/2023/36xxx/CVE-2023-36886.json new file mode 100644 index 00000000000..b03ae179716 --- /dev/null +++ b/2023/36xxx/CVE-2023-36886.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36886", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36887.json b/2023/36xxx/CVE-2023-36887.json new file mode 100644 index 00000000000..449c907a6a5 --- /dev/null +++ b/2023/36xxx/CVE-2023-36887.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36887", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36888.json b/2023/36xxx/CVE-2023-36888.json new file mode 100644 index 00000000000..6f87f5080a5 --- /dev/null +++ b/2023/36xxx/CVE-2023-36888.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36888", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36889.json b/2023/36xxx/CVE-2023-36889.json new file mode 100644 index 00000000000..aac325f1374 --- /dev/null +++ b/2023/36xxx/CVE-2023-36889.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36889", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36890.json b/2023/36xxx/CVE-2023-36890.json new file mode 100644 index 00000000000..9016d85e9fe --- /dev/null +++ b/2023/36xxx/CVE-2023-36890.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36890", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36891.json b/2023/36xxx/CVE-2023-36891.json new file mode 100644 index 00000000000..d4a9e71df7c --- /dev/null +++ b/2023/36xxx/CVE-2023-36891.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36891", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36892.json b/2023/36xxx/CVE-2023-36892.json new file mode 100644 index 00000000000..d48ad5d4861 --- /dev/null +++ b/2023/36xxx/CVE-2023-36892.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36892", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36893.json b/2023/36xxx/CVE-2023-36893.json new file mode 100644 index 00000000000..1c0ce031472 --- /dev/null +++ b/2023/36xxx/CVE-2023-36893.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36893", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36894.json b/2023/36xxx/CVE-2023-36894.json new file mode 100644 index 00000000000..2b511497476 --- /dev/null +++ b/2023/36xxx/CVE-2023-36894.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36894", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36895.json b/2023/36xxx/CVE-2023-36895.json new file mode 100644 index 00000000000..986c399cf73 --- /dev/null +++ b/2023/36xxx/CVE-2023-36895.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36895", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36896.json b/2023/36xxx/CVE-2023-36896.json new file mode 100644 index 00000000000..41e8e0ed98a --- /dev/null +++ b/2023/36xxx/CVE-2023-36896.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36896", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36897.json b/2023/36xxx/CVE-2023-36897.json new file mode 100644 index 00000000000..7325360b864 --- /dev/null +++ b/2023/36xxx/CVE-2023-36897.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36897", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36898.json b/2023/36xxx/CVE-2023-36898.json new file mode 100644 index 00000000000..85488196171 --- /dev/null +++ b/2023/36xxx/CVE-2023-36898.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36898", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36899.json b/2023/36xxx/CVE-2023-36899.json new file mode 100644 index 00000000000..67da99f6cc5 --- /dev/null +++ b/2023/36xxx/CVE-2023-36899.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36899", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36900.json b/2023/36xxx/CVE-2023-36900.json new file mode 100644 index 00000000000..f8b1f5130c4 --- /dev/null +++ b/2023/36xxx/CVE-2023-36900.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36900", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36901.json b/2023/36xxx/CVE-2023-36901.json new file mode 100644 index 00000000000..164b8eb0625 --- /dev/null +++ b/2023/36xxx/CVE-2023-36901.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36901", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36902.json b/2023/36xxx/CVE-2023-36902.json new file mode 100644 index 00000000000..ed1a09985aa --- /dev/null +++ b/2023/36xxx/CVE-2023-36902.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36902", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36903.json b/2023/36xxx/CVE-2023-36903.json new file mode 100644 index 00000000000..3a9c5286da5 --- /dev/null +++ b/2023/36xxx/CVE-2023-36903.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36903", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36904.json b/2023/36xxx/CVE-2023-36904.json new file mode 100644 index 00000000000..b732d837f2b --- /dev/null +++ b/2023/36xxx/CVE-2023-36904.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36904", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36905.json b/2023/36xxx/CVE-2023-36905.json new file mode 100644 index 00000000000..cc8e9310b0d --- /dev/null +++ b/2023/36xxx/CVE-2023-36905.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36905", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36906.json b/2023/36xxx/CVE-2023-36906.json new file mode 100644 index 00000000000..ec32ab5c285 --- /dev/null +++ b/2023/36xxx/CVE-2023-36906.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36906", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36907.json b/2023/36xxx/CVE-2023-36907.json new file mode 100644 index 00000000000..cc367cc9763 --- /dev/null +++ b/2023/36xxx/CVE-2023-36907.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36907", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36908.json b/2023/36xxx/CVE-2023-36908.json new file mode 100644 index 00000000000..eee41327aea --- /dev/null +++ b/2023/36xxx/CVE-2023-36908.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36908", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36909.json b/2023/36xxx/CVE-2023-36909.json new file mode 100644 index 00000000000..f2e848883df --- /dev/null +++ b/2023/36xxx/CVE-2023-36909.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36909", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36910.json b/2023/36xxx/CVE-2023-36910.json new file mode 100644 index 00000000000..db48af97691 --- /dev/null +++ b/2023/36xxx/CVE-2023-36910.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36910", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36911.json b/2023/36xxx/CVE-2023-36911.json new file mode 100644 index 00000000000..620c1403e1e --- /dev/null +++ b/2023/36xxx/CVE-2023-36911.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36911", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36912.json b/2023/36xxx/CVE-2023-36912.json new file mode 100644 index 00000000000..319d421c6d5 --- /dev/null +++ b/2023/36xxx/CVE-2023-36912.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36912", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36913.json b/2023/36xxx/CVE-2023-36913.json new file mode 100644 index 00000000000..a465190f3a3 --- /dev/null +++ b/2023/36xxx/CVE-2023-36913.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36913", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36914.json b/2023/36xxx/CVE-2023-36914.json new file mode 100644 index 00000000000..ac6dd4ddbfa --- /dev/null +++ b/2023/36xxx/CVE-2023-36914.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36914", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/3xxx/CVE-2023-3436.json b/2023/3xxx/CVE-2023-3436.json new file mode 100644 index 00000000000..b2db8f9ee92 --- /dev/null +++ b/2023/3xxx/CVE-2023-3436.json @@ -0,0 +1,94 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2023-3436", + "ASSIGNER": "xpdf@xpdfreader.com", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Xpdf 4.04 will deadlock on a PDF object stream whose \"Length\" field is itself in another object stream.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-833 Deadlock", + "cweId": "CWE-833" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Xpdf", + "product": { + "product_data": [ + { + "product_name": "Xpdf", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.04" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://forum.xpdfreader.com/viewtopic.php?t=42618", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?t=42618" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Jiahao Liu" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 3.3, + "baseSeverity": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "version": "3.1" + } + ] + } +} \ No newline at end of file