diff --git a/2023/26xxx/CVE-2023-26430.json b/2023/26xxx/CVE-2023-26430.json index 2fe14f3e59e..ad06c24dc83 100644 --- a/2023/26xxx/CVE-2023-26430.json +++ b/2023/26xxx/CVE-2023-26430.json @@ -69,6 +69,11 @@ "url": "http://seclists.org/fulldisclosure/2023/Aug/8", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2023/Aug/8" + }, + { + "url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html" } ] }, diff --git a/2023/26xxx/CVE-2023-26438.json b/2023/26xxx/CVE-2023-26438.json index 2f2c2451fb1..7fd74cfb4c5 100644 --- a/2023/26xxx/CVE-2023-26438.json +++ b/2023/26xxx/CVE-2023-26438.json @@ -69,6 +69,11 @@ "url": "http://seclists.org/fulldisclosure/2023/Aug/8", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2023/Aug/8" + }, + { + "url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html" } ] }, diff --git a/2023/26xxx/CVE-2023-26439.json b/2023/26xxx/CVE-2023-26439.json index 9f6c4a1488a..7c8b0bcc58e 100644 --- a/2023/26xxx/CVE-2023-26439.json +++ b/2023/26xxx/CVE-2023-26439.json @@ -69,6 +69,11 @@ "url": "http://seclists.org/fulldisclosure/2023/Aug/8", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2023/Aug/8" + }, + { + "url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html" } ] }, diff --git a/2023/26xxx/CVE-2023-26440.json b/2023/26xxx/CVE-2023-26440.json index a6d06325c24..ad7fa7665a4 100644 --- a/2023/26xxx/CVE-2023-26440.json +++ b/2023/26xxx/CVE-2023-26440.json @@ -69,6 +69,11 @@ "url": "http://seclists.org/fulldisclosure/2023/Aug/8", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2023/Aug/8" + }, + { + "url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html" } ] }, diff --git a/2023/26xxx/CVE-2023-26441.json b/2023/26xxx/CVE-2023-26441.json index ad71ef7a0ba..ca6409d5629 100644 --- a/2023/26xxx/CVE-2023-26441.json +++ b/2023/26xxx/CVE-2023-26441.json @@ -69,6 +69,11 @@ "url": "http://seclists.org/fulldisclosure/2023/Aug/8", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2023/Aug/8" + }, + { + "url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html" } ] }, diff --git a/2023/26xxx/CVE-2023-26442.json b/2023/26xxx/CVE-2023-26442.json index 33f98cb6996..2a8d2dc60ca 100644 --- a/2023/26xxx/CVE-2023-26442.json +++ b/2023/26xxx/CVE-2023-26442.json @@ -69,6 +69,11 @@ "url": "http://seclists.org/fulldisclosure/2023/Aug/8", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2023/Aug/8" + }, + { + "url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html" } ] }, diff --git a/2023/26xxx/CVE-2023-26443.json b/2023/26xxx/CVE-2023-26443.json index 97a27a90fe8..ba3f22c2f6c 100644 --- a/2023/26xxx/CVE-2023-26443.json +++ b/2023/26xxx/CVE-2023-26443.json @@ -69,6 +69,11 @@ "url": "http://seclists.org/fulldisclosure/2023/Aug/8", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2023/Aug/8" + }, + { + "url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html" } ] }, diff --git a/2023/26xxx/CVE-2023-26445.json b/2023/26xxx/CVE-2023-26445.json index 82f8edcd214..10bc4843c2f 100644 --- a/2023/26xxx/CVE-2023-26445.json +++ b/2023/26xxx/CVE-2023-26445.json @@ -69,6 +69,11 @@ "url": "http://seclists.org/fulldisclosure/2023/Aug/8", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2023/Aug/8" + }, + { + "url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html" } ] }, diff --git a/2023/26xxx/CVE-2023-26446.json b/2023/26xxx/CVE-2023-26446.json index b964b99deb7..64e32059d0c 100644 --- a/2023/26xxx/CVE-2023-26446.json +++ b/2023/26xxx/CVE-2023-26446.json @@ -69,6 +69,11 @@ "url": "http://seclists.org/fulldisclosure/2023/Aug/8", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2023/Aug/8" + }, + { + "url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html" } ] }, diff --git a/2023/26xxx/CVE-2023-26447.json b/2023/26xxx/CVE-2023-26447.json index 965af0ad31e..16d42e438bf 100644 --- a/2023/26xxx/CVE-2023-26447.json +++ b/2023/26xxx/CVE-2023-26447.json @@ -69,6 +69,11 @@ "url": "http://seclists.org/fulldisclosure/2023/Aug/8", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2023/Aug/8" + }, + { + "url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html" } ] }, diff --git a/2023/26xxx/CVE-2023-26448.json b/2023/26xxx/CVE-2023-26448.json index 8ab1249eb74..ed34c6bac6d 100644 --- a/2023/26xxx/CVE-2023-26448.json +++ b/2023/26xxx/CVE-2023-26448.json @@ -69,6 +69,11 @@ "url": "http://seclists.org/fulldisclosure/2023/Aug/8", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2023/Aug/8" + }, + { + "url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html" } ] }, diff --git a/2023/26xxx/CVE-2023-26449.json b/2023/26xxx/CVE-2023-26449.json index daeab293d0e..4096432f468 100644 --- a/2023/26xxx/CVE-2023-26449.json +++ b/2023/26xxx/CVE-2023-26449.json @@ -69,6 +69,11 @@ "url": "http://seclists.org/fulldisclosure/2023/Aug/8", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2023/Aug/8" + }, + { + "url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html" } ] }, diff --git a/2023/26xxx/CVE-2023-26450.json b/2023/26xxx/CVE-2023-26450.json index 78c2d3350b7..fc2741d4d2a 100644 --- a/2023/26xxx/CVE-2023-26450.json +++ b/2023/26xxx/CVE-2023-26450.json @@ -69,6 +69,11 @@ "url": "http://seclists.org/fulldisclosure/2023/Aug/8", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2023/Aug/8" + }, + { + "url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html" } ] }, diff --git a/2023/26xxx/CVE-2023-26451.json b/2023/26xxx/CVE-2023-26451.json index 69fc361c716..42750bc7e73 100644 --- a/2023/26xxx/CVE-2023-26451.json +++ b/2023/26xxx/CVE-2023-26451.json @@ -69,6 +69,11 @@ "url": "http://seclists.org/fulldisclosure/2023/Aug/8", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2023/Aug/8" + }, + { + "url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html" } ] }, diff --git a/2023/33xxx/CVE-2023-33363.json b/2023/33xxx/CVE-2023-33363.json index 5ec314c40f2..d7b9a151545 100644 --- a/2023/33xxx/CVE-2023-33363.json +++ b/2023/33xxx/CVE-2023-33363.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-33363", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-33363", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An authentication bypass vulnerability exists in Suprema BioStar 2 before 2.9.1, which allows unauthenticated users to access some functionality on BioStar 2 servers." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.supremainc.com/knowledge/doku.php?id=en:release_note_291", + "refsource": "MISC", + "name": "https://kb.supremainc.com/knowledge/doku.php?id=en:release_note_291" + }, + { + "refsource": "MISC", + "name": "https://claroty.com/team82/disclosure-dashboard/cve-2023-33363", + "url": "https://claroty.com/team82/disclosure-dashboard/cve-2023-33363" } ] } diff --git a/2023/33xxx/CVE-2023-33364.json b/2023/33xxx/CVE-2023-33364.json index a9c528a4fb0..79b919ace06 100644 --- a/2023/33xxx/CVE-2023-33364.json +++ b/2023/33xxx/CVE-2023-33364.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-33364", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-33364", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An OS Command injection vulnerability exists in Suprema BioStar 2 before V2.9.1, which allows authenticated users to execute arbitrary OS commands on the BioStar 2 server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.supremainc.com/knowledge/doku.php?id=en:release_note_291", + "refsource": "MISC", + "name": "https://kb.supremainc.com/knowledge/doku.php?id=en:release_note_291" + }, + { + "refsource": "MISC", + "name": "https://claroty.com/team82/disclosure-dashboard/cve-2023-33364", + "url": "https://claroty.com/team82/disclosure-dashboard/cve-2023-33364" } ] } diff --git a/2023/33xxx/CVE-2023-33365.json b/2023/33xxx/CVE-2023-33365.json index a59b2c3b889..dcc6b7234b4 100644 --- a/2023/33xxx/CVE-2023-33365.json +++ b/2023/33xxx/CVE-2023-33365.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-33365", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-33365", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A path traversal vulnerability exists in Suprema BioStar 2 before 2.9.1, which allows unauthenticated attackers to fetch arbitrary files from the server's web server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.supremainc.com/knowledge/doku.php?id=en:release_note_291", + "refsource": "MISC", + "name": "https://kb.supremainc.com/knowledge/doku.php?id=en:release_note_291" + }, + { + "refsource": "MISC", + "name": "https://claroty.com/team82/disclosure-dashboard/cve-2023-33365", + "url": "https://claroty.com/team82/disclosure-dashboard/cve-2023-33365" } ] } diff --git a/2023/33xxx/CVE-2023-33366.json b/2023/33xxx/CVE-2023-33366.json index fe9b72c3c41..d90893efc75 100644 --- a/2023/33xxx/CVE-2023-33366.json +++ b/2023/33xxx/CVE-2023-33366.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-33366", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-33366", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A SQL injection vulnerability exists in Suprema BioStar 2 before 2.9.1, which allows authenticated users to inject arbitrary SQL directives into an SQL statement and execute arbitrary SQL commands." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.supremainc.com/knowledge/doku.php?id=en:release_note_291", + "refsource": "MISC", + "name": "https://kb.supremainc.com/knowledge/doku.php?id=en:release_note_291" + }, + { + "refsource": "MISC", + "name": "https://claroty.com/team82/disclosure-dashboard/cve-2023-33366", + "url": "https://claroty.com/team82/disclosure-dashboard/cve-2023-33366" } ] } diff --git a/2023/38xxx/CVE-2023-38947.json b/2023/38xxx/CVE-2023-38947.json index ea914f1aebd..11a8518f137 100644 --- a/2023/38xxx/CVE-2023-38947.json +++ b/2023/38xxx/CVE-2023-38947.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-38947", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-38947", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An arbitrary file upload vulnerability in the /languages/install.php component of WBCE CMS v1.6.1 allows attackers to execute arbitrary code via a crafted PHP file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gitee.com/CTF-hacker/pwn/issues/I7LH2N", + "refsource": "MISC", + "name": "https://gitee.com/CTF-hacker/pwn/issues/I7LH2N" } ] } diff --git a/2023/38xxx/CVE-2023-38948.json b/2023/38xxx/CVE-2023-38948.json index a88b9d8be02..cb956d546fe 100644 --- a/2023/38xxx/CVE-2023-38948.json +++ b/2023/38xxx/CVE-2023-38948.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-38948", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-38948", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An arbitrary file download vulnerability in the /c/PluginsController.php component of jizhi CMS 1.9.5 allows attackers to execute arbitrary code via downloading a crafted plugin." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gitee.com/CTF-hacker/pwn/issues/I7LI4E", + "refsource": "MISC", + "name": "https://gitee.com/CTF-hacker/pwn/issues/I7LI4E" } ] } diff --git a/2023/4xxx/CVE-2023-4110.json b/2023/4xxx/CVE-2023-4110.json index 3a0f7363fc9..5222e4b9995 100644 --- a/2023/4xxx/CVE-2023-4110.json +++ b/2023/4xxx/CVE-2023-4110.json @@ -67,6 +67,11 @@ "url": "https://vuldb.com/?ctiid.235957", "refsource": "MISC", "name": "https://vuldb.com/?ctiid.235957" + }, + { + "url": "http://packetstormsecurity.com/files/173926/PHPJabbers-Availability-Booking-Calendar-5.0-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173926/PHPJabbers-Availability-Booking-Calendar-5.0-Cross-Site-Scripting.html" } ] }, diff --git a/2023/4xxx/CVE-2023-4111.json b/2023/4xxx/CVE-2023-4111.json index 7abdd44bac0..19514e75595 100644 --- a/2023/4xxx/CVE-2023-4111.json +++ b/2023/4xxx/CVE-2023-4111.json @@ -67,6 +67,16 @@ "url": "https://vuldb.com/?ctiid.235958", "refsource": "MISC", "name": "https://vuldb.com/?ctiid.235958" + }, + { + "url": "http://packetstormsecurity.com/files/173945/PHPJabbers-Bus-Reservation-System-1.1-SQL-Injection.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173945/PHPJabbers-Bus-Reservation-System-1.1-SQL-Injection.html" + }, + { + "url": "http://packetstormsecurity.com/files/173927/PHPJabbers-Bus-Reservation-System-1.1-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173927/PHPJabbers-Bus-Reservation-System-1.1-Cross-Site-Scripting.html" } ] }, diff --git a/2023/4xxx/CVE-2023-4112.json b/2023/4xxx/CVE-2023-4112.json index c4ca7577b8b..cbf0fb19d09 100644 --- a/2023/4xxx/CVE-2023-4112.json +++ b/2023/4xxx/CVE-2023-4112.json @@ -67,6 +67,11 @@ "url": "https://vuldb.com/?ctiid.235959", "refsource": "MISC", "name": "https://vuldb.com/?ctiid.235959" + }, + { + "url": "http://packetstormsecurity.com/files/173930/PHPJabbers-Shuttle-Booking-Software-1.0-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173930/PHPJabbers-Shuttle-Booking-Software-1.0-Cross-Site-Scripting.html" } ] }, diff --git a/2023/4xxx/CVE-2023-4113.json b/2023/4xxx/CVE-2023-4113.json index 62682d8cec5..9d66749fc53 100644 --- a/2023/4xxx/CVE-2023-4113.json +++ b/2023/4xxx/CVE-2023-4113.json @@ -67,6 +67,11 @@ "url": "https://vuldb.com/?ctiid.235960", "refsource": "MISC", "name": "https://vuldb.com/?ctiid.235960" + }, + { + "url": "http://packetstormsecurity.com/files/173931/PHPJabbers-Service-Booking-Script-1.0-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173931/PHPJabbers-Service-Booking-Script-1.0-Cross-Site-Scripting.html" } ] }, diff --git a/2023/4xxx/CVE-2023-4114.json b/2023/4xxx/CVE-2023-4114.json index d3757b214fa..368f3186bb0 100644 --- a/2023/4xxx/CVE-2023-4114.json +++ b/2023/4xxx/CVE-2023-4114.json @@ -67,6 +67,11 @@ "url": "https://vuldb.com/?ctiid.235961", "refsource": "MISC", "name": "https://vuldb.com/?ctiid.235961" + }, + { + "url": "http://packetstormsecurity.com/files/173932/PHPJabbers-Night-Club-Booking-1.0-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173932/PHPJabbers-Night-Club-Booking-1.0-Cross-Site-Scripting.html" } ] }, diff --git a/2023/4xxx/CVE-2023-4115.json b/2023/4xxx/CVE-2023-4115.json index e63ef27fe77..635eb250eca 100644 --- a/2023/4xxx/CVE-2023-4115.json +++ b/2023/4xxx/CVE-2023-4115.json @@ -67,6 +67,11 @@ "url": "https://vuldb.com/?ctiid.235962", "refsource": "MISC", "name": "https://vuldb.com/?ctiid.235962" + }, + { + "url": "http://packetstormsecurity.com/files/173936/PHPJabbers-Cleaning-Business-1.0-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173936/PHPJabbers-Cleaning-Business-1.0-Cross-Site-Scripting.html" } ] }, diff --git a/2023/4xxx/CVE-2023-4116.json b/2023/4xxx/CVE-2023-4116.json index e9dac3783ee..8194d9eb46e 100644 --- a/2023/4xxx/CVE-2023-4116.json +++ b/2023/4xxx/CVE-2023-4116.json @@ -67,6 +67,11 @@ "url": "https://vuldb.com/?ctiid.235963", "refsource": "MISC", "name": "https://vuldb.com/?ctiid.235963" + }, + { + "url": "http://packetstormsecurity.com/files/173937/PHPJabbers-Taxi-Booking-2.0-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173937/PHPJabbers-Taxi-Booking-2.0-Cross-Site-Scripting.html" } ] }, diff --git a/2023/4xxx/CVE-2023-4117.json b/2023/4xxx/CVE-2023-4117.json index d0be0700187..8fee7b7d075 100644 --- a/2023/4xxx/CVE-2023-4117.json +++ b/2023/4xxx/CVE-2023-4117.json @@ -67,6 +67,11 @@ "url": "https://vuldb.com/?ctiid.235964", "refsource": "MISC", "name": "https://vuldb.com/?ctiid.235964" + }, + { + "url": "http://packetstormsecurity.com/files/173939/PHPJabbers-Rental-Property-Booking-2.0-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173939/PHPJabbers-Rental-Property-Booking-2.0-Cross-Site-Scripting.html" } ] }, diff --git a/2023/4xxx/CVE-2023-4119.json b/2023/4xxx/CVE-2023-4119.json index 6ef6af8bd36..a27dce459e4 100644 --- a/2023/4xxx/CVE-2023-4119.json +++ b/2023/4xxx/CVE-2023-4119.json @@ -67,6 +67,11 @@ "url": "https://vuldb.com/?ctiid.235966", "refsource": "MISC", "name": "https://vuldb.com/?ctiid.235966" + }, + { + "url": "http://packetstormsecurity.com/files/173941/Academy-LMS-6.0-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173941/Academy-LMS-6.0-Cross-Site-Scripting.html" } ] }, diff --git a/2023/4xxx/CVE-2023-4144.json b/2023/4xxx/CVE-2023-4144.json new file mode 100644 index 00000000000..5a57408912c --- /dev/null +++ b/2023/4xxx/CVE-2023-4144.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-4144", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file