From 22f18cab5b68c8d31e0a0ebb0a703e558c15c6db Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 21 Oct 2023 01:00:39 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/36xxx/CVE-2023-36321.json | 2 +- 2023/36xxx/CVE-2023-36806.json | 5 +++ 2023/38xxx/CVE-2023-38190.json | 61 ++++++++++++++++++++++++++++++---- 2023/38xxx/CVE-2023-38192.json | 61 ++++++++++++++++++++++++++++++---- 2023/38xxx/CVE-2023-38193.json | 61 ++++++++++++++++++++++++++++++---- 2023/38xxx/CVE-2023-38194.json | 61 ++++++++++++++++++++++++++++++---- 2023/46xxx/CVE-2023-46003.json | 61 ++++++++++++++++++++++++++++++---- 7 files changed, 281 insertions(+), 31 deletions(-) diff --git a/2023/36xxx/CVE-2023-36321.json b/2023/36xxx/CVE-2023-36321.json index 4c70a1cc90d..4eea7059c68 100644 --- a/2023/36xxx/CVE-2023-36321.json +++ b/2023/36xxx/CVE-2023-36321.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Connected Vehicle Systems Alliance (COVESA) up to v2.18.8 wwas discovered to contain a buffer overflow via the component /shared/dlt_common.c." + "value": "Connected Vehicle Systems Alliance (COVESA) up to v2.18.8 was discovered to contain a buffer overflow via the component /shared/dlt_common.c." } ] }, diff --git a/2023/36xxx/CVE-2023-36806.json b/2023/36xxx/CVE-2023-36806.json index c6288a328a2..226c7f0f9e1 100644 --- a/2023/36xxx/CVE-2023-36806.json +++ b/2023/36xxx/CVE-2023-36806.json @@ -81,6 +81,11 @@ "url": "https://github.com/contao/contao/commit/ccb64c777eb0f9c0e6490c9135d80e915d37cd32", "refsource": "MISC", "name": "https://github.com/contao/contao/commit/ccb64c777eb0f9c0e6490c9135d80e915d37cd32" + }, + { + "url": "https://herolab.usd.de/security-advisories/usd-2023-0020/", + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/usd-2023-0020/" } ] }, diff --git a/2023/38xxx/CVE-2023-38190.json b/2023/38xxx/CVE-2023-38190.json index 2681465f142..1229f70fb74 100644 --- a/2023/38xxx/CVE-2023-38190.json +++ b/2023/38xxx/CVE-2023-38190.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-38190", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-38190", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in SuperWebMailer 9.00.0.01710. It allows Export SQL Injection via the size parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://herolab.usd.de/security-advisories/", + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/" + }, + { + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/usd-2023-0014/", + "url": "https://herolab.usd.de/security-advisories/usd-2023-0014/" } ] } diff --git a/2023/38xxx/CVE-2023-38192.json b/2023/38xxx/CVE-2023-38192.json index eb3650691fd..790badd630f 100644 --- a/2023/38xxx/CVE-2023-38192.json +++ b/2023/38xxx/CVE-2023-38192.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-38192", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-38192", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in SuperWebMailer 9.00.0.01710. It allows superadmincreate.php XSS via crafted incorrect passwords." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://herolab.usd.de/security-advisories/", + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/" + }, + { + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/usd-2023-0011/", + "url": "https://herolab.usd.de/security-advisories/usd-2023-0011/" } ] } diff --git a/2023/38xxx/CVE-2023-38193.json b/2023/38xxx/CVE-2023-38193.json index 0cad9c85ca9..3dd61e3a1e0 100644 --- a/2023/38xxx/CVE-2023-38193.json +++ b/2023/38xxx/CVE-2023-38193.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-38193", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-38193", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in SuperWebMailer 9.00.0.01710. It allows Remote Code Execution via a crafted sendmail command line." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://herolab.usd.de/security-advisories/", + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/" + }, + { + "refsource": "MISC", + "name": "https://herolab.usd.de/en/security-advisories/usd-2023-0015/", + "url": "https://herolab.usd.de/en/security-advisories/usd-2023-0015/" } ] } diff --git a/2023/38xxx/CVE-2023-38194.json b/2023/38xxx/CVE-2023-38194.json index 5df459ef44c..0a5f22ec338 100644 --- a/2023/38xxx/CVE-2023-38194.json +++ b/2023/38xxx/CVE-2023-38194.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-38194", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-38194", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in SuperWebMailer 9.00.0.01710. It allows keepalive.php XSS via a GET parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://herolab.usd.de/security-advisories/", + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/" + }, + { + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/usd-2023-0013/", + "url": "https://herolab.usd.de/security-advisories/usd-2023-0013/" } ] } diff --git a/2023/46xxx/CVE-2023-46003.json b/2023/46xxx/CVE-2023-46003.json index 43d97934cc9..9b773b8743f 100644 --- a/2023/46xxx/CVE-2023-46003.json +++ b/2023/46xxx/CVE-2023-46003.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-46003", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-46003", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "I-doit pro 25 and below is vulnerable to Cross Site Scripting (XSS) via index.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.i-doit.com/", + "refsource": "MISC", + "name": "https://www.i-doit.com/" + }, + { + "refsource": "MISC", + "name": "https://medium.com/@ray.999/stored-xss-in-i-doit-pro-25-and-below-cve-2023-46003-17fb8d6fe2e9", + "url": "https://medium.com/@ray.999/stored-xss-in-i-doit-pro-25-and-below-cve-2023-46003-17fb8d6fe2e9" } ] }