From 24901f9bde47a49e76018b2037d97b521741538a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 20 Nov 2023 09:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/46xxx/CVE-2022-46337.json | 71 ++++++++++++++++++++++++++--- 2023/46xxx/CVE-2023-46302.json | 82 +++++++++++++++++++++++++++++++--- 2023/48xxx/CVE-2023-48935.json | 18 ++++++++ 2023/48xxx/CVE-2023-48936.json | 18 ++++++++ 2023/48xxx/CVE-2023-48937.json | 18 ++++++++ 2023/48xxx/CVE-2023-48938.json | 18 ++++++++ 2023/48xxx/CVE-2023-48939.json | 18 ++++++++ 2023/48xxx/CVE-2023-48940.json | 18 ++++++++ 2023/48xxx/CVE-2023-48941.json | 18 ++++++++ 2023/48xxx/CVE-2023-48942.json | 18 ++++++++ 2023/48xxx/CVE-2023-48943.json | 18 ++++++++ 2023/48xxx/CVE-2023-48944.json | 18 ++++++++ 2023/48xxx/CVE-2023-48945.json | 18 ++++++++ 2023/48xxx/CVE-2023-48946.json | 18 ++++++++ 2023/48xxx/CVE-2023-48947.json | 18 ++++++++ 2023/48xxx/CVE-2023-48948.json | 18 ++++++++ 2023/48xxx/CVE-2023-48949.json | 18 ++++++++ 2023/48xxx/CVE-2023-48950.json | 18 ++++++++ 2023/48xxx/CVE-2023-48951.json | 18 ++++++++ 2023/48xxx/CVE-2023-48952.json | 18 ++++++++ 2023/48xxx/CVE-2023-48953.json | 18 ++++++++ 2023/48xxx/CVE-2023-48954.json | 18 ++++++++ 2023/48xxx/CVE-2023-48955.json | 18 ++++++++ 2023/48xxx/CVE-2023-48956.json | 18 ++++++++ 2023/48xxx/CVE-2023-48957.json | 18 ++++++++ 2023/48xxx/CVE-2023-48958.json | 18 ++++++++ 2023/48xxx/CVE-2023-48959.json | 18 ++++++++ 2023/48xxx/CVE-2023-48960.json | 18 ++++++++ 2023/48xxx/CVE-2023-48961.json | 18 ++++++++ 2023/48xxx/CVE-2023-48962.json | 18 ++++++++ 2023/48xxx/CVE-2023-48963.json | 18 ++++++++ 2023/48xxx/CVE-2023-48964.json | 18 ++++++++ 2023/48xxx/CVE-2023-48965.json | 18 ++++++++ 2023/48xxx/CVE-2023-48966.json | 18 ++++++++ 2023/48xxx/CVE-2023-48967.json | 18 ++++++++ 2023/48xxx/CVE-2023-48968.json | 18 ++++++++ 2023/48xxx/CVE-2023-48969.json | 18 ++++++++ 2023/48xxx/CVE-2023-48996.json | 18 ++++++++ 2023/48xxx/CVE-2023-48997.json | 18 ++++++++ 2023/48xxx/CVE-2023-48998.json | 18 ++++++++ 2023/48xxx/CVE-2023-48999.json | 18 ++++++++ 2023/49xxx/CVE-2023-49000.json | 18 ++++++++ 2023/49xxx/CVE-2023-49001.json | 18 ++++++++ 2023/49xxx/CVE-2023-49002.json | 18 ++++++++ 2023/49xxx/CVE-2023-49003.json | 18 ++++++++ 2023/49xxx/CVE-2023-49004.json | 18 ++++++++ 2023/49xxx/CVE-2023-49005.json | 18 ++++++++ 2023/49xxx/CVE-2023-49006.json | 18 ++++++++ 2023/49xxx/CVE-2023-49007.json | 18 ++++++++ 2023/49xxx/CVE-2023-49008.json | 18 ++++++++ 2023/49xxx/CVE-2023-49009.json | 18 ++++++++ 2023/49xxx/CVE-2023-49010.json | 18 ++++++++ 2023/49xxx/CVE-2023-49011.json | 18 ++++++++ 2023/49xxx/CVE-2023-49012.json | 18 ++++++++ 2023/49xxx/CVE-2023-49013.json | 18 ++++++++ 2023/49xxx/CVE-2023-49014.json | 18 ++++++++ 2023/49xxx/CVE-2023-49015.json | 18 ++++++++ 2023/49xxx/CVE-2023-49016.json | 18 ++++++++ 2023/49xxx/CVE-2023-49017.json | 18 ++++++++ 2023/49xxx/CVE-2023-49018.json | 18 ++++++++ 2023/49xxx/CVE-2023-49019.json | 18 ++++++++ 2023/49xxx/CVE-2023-49020.json | 18 ++++++++ 2023/49xxx/CVE-2023-49021.json | 18 ++++++++ 2023/49xxx/CVE-2023-49022.json | 18 ++++++++ 2023/49xxx/CVE-2023-49023.json | 18 ++++++++ 2023/49xxx/CVE-2023-49024.json | 18 ++++++++ 2023/49xxx/CVE-2023-49025.json | 18 ++++++++ 2023/49xxx/CVE-2023-49026.json | 18 ++++++++ 2023/49xxx/CVE-2023-49027.json | 18 ++++++++ 2023/49xxx/CVE-2023-49028.json | 18 ++++++++ 2023/49xxx/CVE-2023-49029.json | 18 ++++++++ 2023/49xxx/CVE-2023-49030.json | 18 ++++++++ 2023/49xxx/CVE-2023-49031.json | 18 ++++++++ 2023/49xxx/CVE-2023-49032.json | 18 ++++++++ 2023/49xxx/CVE-2023-49033.json | 18 ++++++++ 2023/49xxx/CVE-2023-49034.json | 18 ++++++++ 2023/49xxx/CVE-2023-49035.json | 18 ++++++++ 2023/49xxx/CVE-2023-49036.json | 18 ++++++++ 2023/49xxx/CVE-2023-49037.json | 18 ++++++++ 2023/49xxx/CVE-2023-49038.json | 18 ++++++++ 2023/49xxx/CVE-2023-49039.json | 18 ++++++++ 2023/49xxx/CVE-2023-49040.json | 18 ++++++++ 2023/49xxx/CVE-2023-49041.json | 18 ++++++++ 2023/49xxx/CVE-2023-49042.json | 18 ++++++++ 2023/49xxx/CVE-2023-49043.json | 18 ++++++++ 2023/49xxx/CVE-2023-49044.json | 18 ++++++++ 2023/49xxx/CVE-2023-49045.json | 18 ++++++++ 2023/49xxx/CVE-2023-49046.json | 18 ++++++++ 2023/49xxx/CVE-2023-49047.json | 18 ++++++++ 2023/49xxx/CVE-2023-49048.json | 18 ++++++++ 2023/49xxx/CVE-2023-49049.json | 18 ++++++++ 2023/49xxx/CVE-2023-49050.json | 18 ++++++++ 2023/49xxx/CVE-2023-49051.json | 18 ++++++++ 2023/49xxx/CVE-2023-49052.json | 18 ++++++++ 2023/49xxx/CVE-2023-49053.json | 18 ++++++++ 2023/49xxx/CVE-2023-49054.json | 18 ++++++++ 96 files changed, 1835 insertions(+), 10 deletions(-) create mode 100644 2023/48xxx/CVE-2023-48935.json create mode 100644 2023/48xxx/CVE-2023-48936.json create mode 100644 2023/48xxx/CVE-2023-48937.json create mode 100644 2023/48xxx/CVE-2023-48938.json create mode 100644 2023/48xxx/CVE-2023-48939.json create mode 100644 2023/48xxx/CVE-2023-48940.json create mode 100644 2023/48xxx/CVE-2023-48941.json create mode 100644 2023/48xxx/CVE-2023-48942.json create mode 100644 2023/48xxx/CVE-2023-48943.json create mode 100644 2023/48xxx/CVE-2023-48944.json create mode 100644 2023/48xxx/CVE-2023-48945.json create mode 100644 2023/48xxx/CVE-2023-48946.json create mode 100644 2023/48xxx/CVE-2023-48947.json create mode 100644 2023/48xxx/CVE-2023-48948.json create mode 100644 2023/48xxx/CVE-2023-48949.json create mode 100644 2023/48xxx/CVE-2023-48950.json create mode 100644 2023/48xxx/CVE-2023-48951.json create mode 100644 2023/48xxx/CVE-2023-48952.json create mode 100644 2023/48xxx/CVE-2023-48953.json create mode 100644 2023/48xxx/CVE-2023-48954.json create mode 100644 2023/48xxx/CVE-2023-48955.json create mode 100644 2023/48xxx/CVE-2023-48956.json create mode 100644 2023/48xxx/CVE-2023-48957.json create mode 100644 2023/48xxx/CVE-2023-48958.json create mode 100644 2023/48xxx/CVE-2023-48959.json create mode 100644 2023/48xxx/CVE-2023-48960.json create mode 100644 2023/48xxx/CVE-2023-48961.json create mode 100644 2023/48xxx/CVE-2023-48962.json create mode 100644 2023/48xxx/CVE-2023-48963.json create mode 100644 2023/48xxx/CVE-2023-48964.json create mode 100644 2023/48xxx/CVE-2023-48965.json create mode 100644 2023/48xxx/CVE-2023-48966.json create mode 100644 2023/48xxx/CVE-2023-48967.json create mode 100644 2023/48xxx/CVE-2023-48968.json create mode 100644 2023/48xxx/CVE-2023-48969.json create mode 100644 2023/48xxx/CVE-2023-48996.json create mode 100644 2023/48xxx/CVE-2023-48997.json create mode 100644 2023/48xxx/CVE-2023-48998.json create mode 100644 2023/48xxx/CVE-2023-48999.json create mode 100644 2023/49xxx/CVE-2023-49000.json create mode 100644 2023/49xxx/CVE-2023-49001.json create mode 100644 2023/49xxx/CVE-2023-49002.json create mode 100644 2023/49xxx/CVE-2023-49003.json create mode 100644 2023/49xxx/CVE-2023-49004.json create mode 100644 2023/49xxx/CVE-2023-49005.json create mode 100644 2023/49xxx/CVE-2023-49006.json create mode 100644 2023/49xxx/CVE-2023-49007.json create mode 100644 2023/49xxx/CVE-2023-49008.json create mode 100644 2023/49xxx/CVE-2023-49009.json create mode 100644 2023/49xxx/CVE-2023-49010.json create mode 100644 2023/49xxx/CVE-2023-49011.json create mode 100644 2023/49xxx/CVE-2023-49012.json create mode 100644 2023/49xxx/CVE-2023-49013.json create mode 100644 2023/49xxx/CVE-2023-49014.json create mode 100644 2023/49xxx/CVE-2023-49015.json create mode 100644 2023/49xxx/CVE-2023-49016.json create mode 100644 2023/49xxx/CVE-2023-49017.json create mode 100644 2023/49xxx/CVE-2023-49018.json create mode 100644 2023/49xxx/CVE-2023-49019.json create mode 100644 2023/49xxx/CVE-2023-49020.json create mode 100644 2023/49xxx/CVE-2023-49021.json create mode 100644 2023/49xxx/CVE-2023-49022.json create mode 100644 2023/49xxx/CVE-2023-49023.json create mode 100644 2023/49xxx/CVE-2023-49024.json create mode 100644 2023/49xxx/CVE-2023-49025.json create mode 100644 2023/49xxx/CVE-2023-49026.json create mode 100644 2023/49xxx/CVE-2023-49027.json create mode 100644 2023/49xxx/CVE-2023-49028.json create mode 100644 2023/49xxx/CVE-2023-49029.json create mode 100644 2023/49xxx/CVE-2023-49030.json create mode 100644 2023/49xxx/CVE-2023-49031.json create mode 100644 2023/49xxx/CVE-2023-49032.json create mode 100644 2023/49xxx/CVE-2023-49033.json create mode 100644 2023/49xxx/CVE-2023-49034.json create mode 100644 2023/49xxx/CVE-2023-49035.json create mode 100644 2023/49xxx/CVE-2023-49036.json create mode 100644 2023/49xxx/CVE-2023-49037.json create mode 100644 2023/49xxx/CVE-2023-49038.json create mode 100644 2023/49xxx/CVE-2023-49039.json create mode 100644 2023/49xxx/CVE-2023-49040.json create mode 100644 2023/49xxx/CVE-2023-49041.json create mode 100644 2023/49xxx/CVE-2023-49042.json create mode 100644 2023/49xxx/CVE-2023-49043.json create mode 100644 2023/49xxx/CVE-2023-49044.json create mode 100644 2023/49xxx/CVE-2023-49045.json create mode 100644 2023/49xxx/CVE-2023-49046.json create mode 100644 2023/49xxx/CVE-2023-49047.json create mode 100644 2023/49xxx/CVE-2023-49048.json create mode 100644 2023/49xxx/CVE-2023-49049.json create mode 100644 2023/49xxx/CVE-2023-49050.json create mode 100644 2023/49xxx/CVE-2023-49051.json create mode 100644 2023/49xxx/CVE-2023-49052.json create mode 100644 2023/49xxx/CVE-2023-49053.json create mode 100644 2023/49xxx/CVE-2023-49054.json diff --git a/2022/46xxx/CVE-2022-46337.json b/2022/46xxx/CVE-2022-46337.json index 6f6559e9d0a..d3ac04e142f 100644 --- a/2022/46xxx/CVE-2022-46337.json +++ b/2022/46xxx/CVE-2022-46337.json @@ -1,18 +1,79 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-46337", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@apache.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cleverly devised username might bypass LDAP authentication checks. In \nLDAP-authenticated Derby installations, this could let an attacker fill \nup the disk by creating junk Derby databases. In LDAP-authenticated \nDerby installations, this could also allow the attacker to execute \nmalware which was visible to and executable by the account which booted \nthe Derby server. In LDAP-protected databases which weren't also \nprotected by SQL GRANT/REVOKE authorization, this vulnerability could \nalso let an attacker view and corrupt sensitive data and run sensitive \ndatabase functions and procedures.\n\nMitigation:\n\nUsers should upgrade to Java 21 and Derby 10.17.1.0.\n\nAlternatively, users who wish to remain on older Java versions should \nbuild their own Derby distribution from one of the release families to \nwhich the fix was backported: 10.16, 10.15, and 10.14. Those are the \nreleases which correspond, respectively, with Java LTS versions 17, 11, \nand 8.\n\n" } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "LDAP Injection" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apache Software Foundation", + "product": { + "product_data": [ + { + "product_name": "Apache Derby", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "10.1.1.0", + "version_value": "10.16.1.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://lists.apache.org/thread/q23kvvtoohgzwybxpwozmvvk17rp0td3", + "refsource": "MISC", + "name": "https://lists.apache.org/thread/q23kvvtoohgzwybxpwozmvvk17rp0td3" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "defect": [ + "DERBY-7147" + ], + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "This issue was discovered by \ufeff4ra1n and Y4tacker, who also proposed the fix." + } + ] } \ No newline at end of file diff --git a/2023/46xxx/CVE-2023-46302.json b/2023/46xxx/CVE-2023-46302.json index 8e88bacbe12..78e60d3c691 100644 --- a/2023/46xxx/CVE-2023-46302.json +++ b/2023/46xxx/CVE-2023-46302.json @@ -1,18 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-46302", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@apache.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Apache Software Foundation Apache Submarine has a bug when serializing against yaml. The bug is caused by snakeyaml https://nvd.nist.gov/vuln/detail/CVE-2022-1471 .\n\nApache Submarine uses JAXRS to define REST endpoints. In order to\nhandle YAML requests (using application/yaml content-type), it defines\na YamlEntityProvider entity provider that will process all incoming\nYAML requests. In order to unmarshal the request, the readFrom method\nis invoked, passing the entityStream containing the user-supplied data in `submarine-server/server-core/src/main/java/org/apache/submarine/server/utils/YamlUtils.java`.\n \nWe have now fixed this issue in the new version by replacing to `jackson-dataformat-yaml`.\nThis issue affects Apache Submarine: from 0.7.0 before 0.8.0.\u00a0Users are recommended to upgrade to version 0.8.0, which fixes this issue.\nIf using the version smaller than 0.8.0 and not want to upgrade, you can try cherry-pick PR https://github.com/apache/submarine/pull/1054 and rebuild the submart-server image to fix this.\n\n" } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-502 Deserialization of Untrusted Data", + "cweId": "CWE-502" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apache Software Foundation", + "product": { + "product_data": [ + { + "product_name": "Apache Submarine", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0.7.0", + "version_value": "0.8.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://issues.apache.org/jira/browse/SUBMARINE-1371", + "refsource": "MISC", + "name": "https://issues.apache.org/jira/browse/SUBMARINE-1371" + }, + { + "url": "https://github.com/apache/submarine/pull/1054", + "refsource": "MISC", + "name": "https://github.com/apache/submarine/pull/1054" + }, + { + "url": "https://lists.apache.org/thread/zf0wppzh239j4h131hm1dbswfnztxrr5", + "refsource": "MISC", + "name": "https://lists.apache.org/thread/zf0wppzh239j4h131hm1dbswfnztxrr5" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "defect": [ + "SUBMARINE-1371" + ], + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "GHSL team member @jorgectf (Jorge Rosillo)" + } + ] } \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48935.json b/2023/48xxx/CVE-2023-48935.json new file mode 100644 index 00000000000..92007419ac1 --- /dev/null +++ b/2023/48xxx/CVE-2023-48935.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48935", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48936.json b/2023/48xxx/CVE-2023-48936.json new file mode 100644 index 00000000000..8dc356f3c79 --- /dev/null +++ b/2023/48xxx/CVE-2023-48936.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48936", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48937.json b/2023/48xxx/CVE-2023-48937.json new file mode 100644 index 00000000000..ea25f0b1724 --- /dev/null +++ b/2023/48xxx/CVE-2023-48937.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48937", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48938.json b/2023/48xxx/CVE-2023-48938.json new file mode 100644 index 00000000000..94bc4652e62 --- /dev/null +++ b/2023/48xxx/CVE-2023-48938.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48938", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48939.json b/2023/48xxx/CVE-2023-48939.json new file mode 100644 index 00000000000..387090b42b2 --- /dev/null +++ b/2023/48xxx/CVE-2023-48939.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48939", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48940.json b/2023/48xxx/CVE-2023-48940.json new file mode 100644 index 00000000000..dac7e5c3103 --- /dev/null +++ b/2023/48xxx/CVE-2023-48940.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48940", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48941.json b/2023/48xxx/CVE-2023-48941.json new file mode 100644 index 00000000000..021a917cdd5 --- /dev/null +++ b/2023/48xxx/CVE-2023-48941.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48941", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48942.json b/2023/48xxx/CVE-2023-48942.json new file mode 100644 index 00000000000..ee65cb48460 --- /dev/null +++ b/2023/48xxx/CVE-2023-48942.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48942", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48943.json b/2023/48xxx/CVE-2023-48943.json new file mode 100644 index 00000000000..a3d75d6a2e6 --- /dev/null +++ b/2023/48xxx/CVE-2023-48943.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48943", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48944.json b/2023/48xxx/CVE-2023-48944.json new file mode 100644 index 00000000000..d7afd663a95 --- /dev/null +++ b/2023/48xxx/CVE-2023-48944.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48944", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48945.json b/2023/48xxx/CVE-2023-48945.json new file mode 100644 index 00000000000..1c6a3c89c17 --- /dev/null +++ b/2023/48xxx/CVE-2023-48945.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48945", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48946.json b/2023/48xxx/CVE-2023-48946.json new file mode 100644 index 00000000000..328d5e718da --- /dev/null +++ b/2023/48xxx/CVE-2023-48946.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48946", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48947.json b/2023/48xxx/CVE-2023-48947.json new file mode 100644 index 00000000000..f6593045e92 --- /dev/null +++ b/2023/48xxx/CVE-2023-48947.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48947", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48948.json b/2023/48xxx/CVE-2023-48948.json new file mode 100644 index 00000000000..072b7dc4958 --- /dev/null +++ b/2023/48xxx/CVE-2023-48948.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48948", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48949.json b/2023/48xxx/CVE-2023-48949.json new file mode 100644 index 00000000000..3846fa8229a --- /dev/null +++ b/2023/48xxx/CVE-2023-48949.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48949", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48950.json b/2023/48xxx/CVE-2023-48950.json new file mode 100644 index 00000000000..94a51d58202 --- /dev/null +++ b/2023/48xxx/CVE-2023-48950.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48950", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48951.json b/2023/48xxx/CVE-2023-48951.json new file mode 100644 index 00000000000..b0ab7bd2fa7 --- /dev/null +++ b/2023/48xxx/CVE-2023-48951.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48951", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48952.json b/2023/48xxx/CVE-2023-48952.json new file mode 100644 index 00000000000..7a08eaa9cc6 --- /dev/null +++ b/2023/48xxx/CVE-2023-48952.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48952", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48953.json b/2023/48xxx/CVE-2023-48953.json new file mode 100644 index 00000000000..08682667c50 --- /dev/null +++ b/2023/48xxx/CVE-2023-48953.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48953", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48954.json b/2023/48xxx/CVE-2023-48954.json new file mode 100644 index 00000000000..faa085b87a0 --- /dev/null +++ b/2023/48xxx/CVE-2023-48954.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48954", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48955.json b/2023/48xxx/CVE-2023-48955.json new file mode 100644 index 00000000000..8078da26d4f --- /dev/null +++ b/2023/48xxx/CVE-2023-48955.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48955", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48956.json b/2023/48xxx/CVE-2023-48956.json new file mode 100644 index 00000000000..478e27c4e6d --- /dev/null +++ b/2023/48xxx/CVE-2023-48956.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48956", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48957.json b/2023/48xxx/CVE-2023-48957.json new file mode 100644 index 00000000000..580c7b5e636 --- /dev/null +++ b/2023/48xxx/CVE-2023-48957.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48957", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48958.json b/2023/48xxx/CVE-2023-48958.json new file mode 100644 index 00000000000..675b9becf0a --- /dev/null +++ b/2023/48xxx/CVE-2023-48958.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48958", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48959.json b/2023/48xxx/CVE-2023-48959.json new file mode 100644 index 00000000000..eb84b08a9de --- /dev/null +++ b/2023/48xxx/CVE-2023-48959.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48959", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48960.json b/2023/48xxx/CVE-2023-48960.json new file mode 100644 index 00000000000..29ba8ef7efc --- /dev/null +++ b/2023/48xxx/CVE-2023-48960.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48960", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48961.json b/2023/48xxx/CVE-2023-48961.json new file mode 100644 index 00000000000..e385efadcfa --- /dev/null +++ b/2023/48xxx/CVE-2023-48961.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48961", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48962.json b/2023/48xxx/CVE-2023-48962.json new file mode 100644 index 00000000000..3a770161906 --- /dev/null +++ b/2023/48xxx/CVE-2023-48962.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48962", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48963.json b/2023/48xxx/CVE-2023-48963.json new file mode 100644 index 00000000000..0657f7639ee --- /dev/null +++ b/2023/48xxx/CVE-2023-48963.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48963", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48964.json b/2023/48xxx/CVE-2023-48964.json new file mode 100644 index 00000000000..275639bb6c8 --- /dev/null +++ b/2023/48xxx/CVE-2023-48964.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48964", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48965.json b/2023/48xxx/CVE-2023-48965.json new file mode 100644 index 00000000000..45b13d77214 --- /dev/null +++ b/2023/48xxx/CVE-2023-48965.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48965", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48966.json b/2023/48xxx/CVE-2023-48966.json new file mode 100644 index 00000000000..6e9d0cf17f4 --- /dev/null +++ b/2023/48xxx/CVE-2023-48966.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48966", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48967.json b/2023/48xxx/CVE-2023-48967.json new file mode 100644 index 00000000000..a3d81410f58 --- /dev/null +++ b/2023/48xxx/CVE-2023-48967.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48967", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48968.json b/2023/48xxx/CVE-2023-48968.json new file mode 100644 index 00000000000..0bc9e4be347 --- /dev/null +++ b/2023/48xxx/CVE-2023-48968.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48968", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48969.json b/2023/48xxx/CVE-2023-48969.json new file mode 100644 index 00000000000..746870a65b5 --- /dev/null +++ b/2023/48xxx/CVE-2023-48969.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48969", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48996.json b/2023/48xxx/CVE-2023-48996.json new file mode 100644 index 00000000000..736f330cedd --- /dev/null +++ b/2023/48xxx/CVE-2023-48996.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48996", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48997.json b/2023/48xxx/CVE-2023-48997.json new file mode 100644 index 00000000000..6fe29ed3587 --- /dev/null +++ b/2023/48xxx/CVE-2023-48997.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48997", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48998.json b/2023/48xxx/CVE-2023-48998.json new file mode 100644 index 00000000000..6c0058dbfa3 --- /dev/null +++ b/2023/48xxx/CVE-2023-48998.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48998", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48999.json b/2023/48xxx/CVE-2023-48999.json new file mode 100644 index 00000000000..684c1b66178 --- /dev/null +++ b/2023/48xxx/CVE-2023-48999.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48999", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49000.json b/2023/49xxx/CVE-2023-49000.json new file mode 100644 index 00000000000..a4caccb65f8 --- /dev/null +++ b/2023/49xxx/CVE-2023-49000.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49000", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49001.json b/2023/49xxx/CVE-2023-49001.json new file mode 100644 index 00000000000..70ff713f9aa --- /dev/null +++ b/2023/49xxx/CVE-2023-49001.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49001", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49002.json b/2023/49xxx/CVE-2023-49002.json new file mode 100644 index 00000000000..db9e21fe442 --- /dev/null +++ b/2023/49xxx/CVE-2023-49002.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49002", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49003.json b/2023/49xxx/CVE-2023-49003.json new file mode 100644 index 00000000000..666b0dea34e --- /dev/null +++ b/2023/49xxx/CVE-2023-49003.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49003", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49004.json b/2023/49xxx/CVE-2023-49004.json new file mode 100644 index 00000000000..f3c03284ea0 --- /dev/null +++ b/2023/49xxx/CVE-2023-49004.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49004", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49005.json b/2023/49xxx/CVE-2023-49005.json new file mode 100644 index 00000000000..cccdb144efe --- /dev/null +++ b/2023/49xxx/CVE-2023-49005.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49005", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49006.json b/2023/49xxx/CVE-2023-49006.json new file mode 100644 index 00000000000..7643616a836 --- /dev/null +++ b/2023/49xxx/CVE-2023-49006.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49006", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49007.json b/2023/49xxx/CVE-2023-49007.json new file mode 100644 index 00000000000..ae99eb37743 --- /dev/null +++ b/2023/49xxx/CVE-2023-49007.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49007", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49008.json b/2023/49xxx/CVE-2023-49008.json new file mode 100644 index 00000000000..69c63c08e09 --- /dev/null +++ b/2023/49xxx/CVE-2023-49008.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49008", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49009.json b/2023/49xxx/CVE-2023-49009.json new file mode 100644 index 00000000000..bff3b6cbf0a --- /dev/null +++ b/2023/49xxx/CVE-2023-49009.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49009", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49010.json b/2023/49xxx/CVE-2023-49010.json new file mode 100644 index 00000000000..d84fe8bb612 --- /dev/null +++ b/2023/49xxx/CVE-2023-49010.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49010", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49011.json b/2023/49xxx/CVE-2023-49011.json new file mode 100644 index 00000000000..267256e1a98 --- /dev/null +++ b/2023/49xxx/CVE-2023-49011.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49011", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49012.json b/2023/49xxx/CVE-2023-49012.json new file mode 100644 index 00000000000..2a4dd0a4706 --- /dev/null +++ b/2023/49xxx/CVE-2023-49012.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49012", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49013.json b/2023/49xxx/CVE-2023-49013.json new file mode 100644 index 00000000000..ad7f855149f --- /dev/null +++ b/2023/49xxx/CVE-2023-49013.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49013", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49014.json b/2023/49xxx/CVE-2023-49014.json new file mode 100644 index 00000000000..ea8247f857d --- /dev/null +++ b/2023/49xxx/CVE-2023-49014.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49014", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49015.json b/2023/49xxx/CVE-2023-49015.json new file mode 100644 index 00000000000..8f88b39e764 --- /dev/null +++ b/2023/49xxx/CVE-2023-49015.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49015", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49016.json b/2023/49xxx/CVE-2023-49016.json new file mode 100644 index 00000000000..0c35303b17d --- /dev/null +++ b/2023/49xxx/CVE-2023-49016.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49016", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49017.json b/2023/49xxx/CVE-2023-49017.json new file mode 100644 index 00000000000..3894d575aae --- /dev/null +++ b/2023/49xxx/CVE-2023-49017.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49017", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49018.json b/2023/49xxx/CVE-2023-49018.json new file mode 100644 index 00000000000..20348ba75fe --- /dev/null +++ b/2023/49xxx/CVE-2023-49018.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49018", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49019.json b/2023/49xxx/CVE-2023-49019.json new file mode 100644 index 00000000000..da1b535cc5b --- /dev/null +++ b/2023/49xxx/CVE-2023-49019.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49019", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49020.json b/2023/49xxx/CVE-2023-49020.json new file mode 100644 index 00000000000..c33c29c4d3c --- /dev/null +++ b/2023/49xxx/CVE-2023-49020.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49020", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49021.json b/2023/49xxx/CVE-2023-49021.json new file mode 100644 index 00000000000..d10d8b6c0b6 --- /dev/null +++ b/2023/49xxx/CVE-2023-49021.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49021", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49022.json b/2023/49xxx/CVE-2023-49022.json new file mode 100644 index 00000000000..78b8f4073f5 --- /dev/null +++ b/2023/49xxx/CVE-2023-49022.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49022", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49023.json b/2023/49xxx/CVE-2023-49023.json new file mode 100644 index 00000000000..18be714bab1 --- /dev/null +++ b/2023/49xxx/CVE-2023-49023.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49023", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49024.json b/2023/49xxx/CVE-2023-49024.json new file mode 100644 index 00000000000..d11f16ba7a9 --- /dev/null +++ b/2023/49xxx/CVE-2023-49024.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49024", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49025.json b/2023/49xxx/CVE-2023-49025.json new file mode 100644 index 00000000000..87eb8558acc --- /dev/null +++ b/2023/49xxx/CVE-2023-49025.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49025", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49026.json b/2023/49xxx/CVE-2023-49026.json new file mode 100644 index 00000000000..dcdec935157 --- /dev/null +++ b/2023/49xxx/CVE-2023-49026.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49026", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49027.json b/2023/49xxx/CVE-2023-49027.json new file mode 100644 index 00000000000..2c27611e8f3 --- /dev/null +++ b/2023/49xxx/CVE-2023-49027.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49027", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49028.json b/2023/49xxx/CVE-2023-49028.json new file mode 100644 index 00000000000..9aafff92442 --- /dev/null +++ b/2023/49xxx/CVE-2023-49028.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49028", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49029.json b/2023/49xxx/CVE-2023-49029.json new file mode 100644 index 00000000000..e4198a6e0e2 --- /dev/null +++ b/2023/49xxx/CVE-2023-49029.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49029", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49030.json b/2023/49xxx/CVE-2023-49030.json new file mode 100644 index 00000000000..cd6f7939881 --- /dev/null +++ b/2023/49xxx/CVE-2023-49030.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49030", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49031.json b/2023/49xxx/CVE-2023-49031.json new file mode 100644 index 00000000000..12495d2f665 --- /dev/null +++ b/2023/49xxx/CVE-2023-49031.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49031", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49032.json b/2023/49xxx/CVE-2023-49032.json new file mode 100644 index 00000000000..6753e6776f2 --- /dev/null +++ b/2023/49xxx/CVE-2023-49032.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49032", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49033.json b/2023/49xxx/CVE-2023-49033.json new file mode 100644 index 00000000000..eddea4f727f --- /dev/null +++ b/2023/49xxx/CVE-2023-49033.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49033", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49034.json b/2023/49xxx/CVE-2023-49034.json new file mode 100644 index 00000000000..92956129825 --- /dev/null +++ b/2023/49xxx/CVE-2023-49034.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49034", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49035.json b/2023/49xxx/CVE-2023-49035.json new file mode 100644 index 00000000000..17e0eb07f11 --- /dev/null +++ b/2023/49xxx/CVE-2023-49035.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49035", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49036.json b/2023/49xxx/CVE-2023-49036.json new file mode 100644 index 00000000000..e9556f63eb9 --- /dev/null +++ b/2023/49xxx/CVE-2023-49036.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49036", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49037.json b/2023/49xxx/CVE-2023-49037.json new file mode 100644 index 00000000000..314e2e8232d --- /dev/null +++ b/2023/49xxx/CVE-2023-49037.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49037", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49038.json b/2023/49xxx/CVE-2023-49038.json new file mode 100644 index 00000000000..b5ec61b68a3 --- /dev/null +++ b/2023/49xxx/CVE-2023-49038.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49038", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49039.json b/2023/49xxx/CVE-2023-49039.json new file mode 100644 index 00000000000..e00bd5adc54 --- /dev/null +++ b/2023/49xxx/CVE-2023-49039.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49039", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49040.json b/2023/49xxx/CVE-2023-49040.json new file mode 100644 index 00000000000..dc08dcd3fa6 --- /dev/null +++ b/2023/49xxx/CVE-2023-49040.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49040", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49041.json b/2023/49xxx/CVE-2023-49041.json new file mode 100644 index 00000000000..93b7d5d3281 --- /dev/null +++ b/2023/49xxx/CVE-2023-49041.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49041", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49042.json b/2023/49xxx/CVE-2023-49042.json new file mode 100644 index 00000000000..a51379606bb --- /dev/null +++ b/2023/49xxx/CVE-2023-49042.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49042", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49043.json b/2023/49xxx/CVE-2023-49043.json new file mode 100644 index 00000000000..eeed2817ff3 --- /dev/null +++ b/2023/49xxx/CVE-2023-49043.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49043", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49044.json b/2023/49xxx/CVE-2023-49044.json new file mode 100644 index 00000000000..3ef3e36d93e --- /dev/null +++ b/2023/49xxx/CVE-2023-49044.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49044", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49045.json b/2023/49xxx/CVE-2023-49045.json new file mode 100644 index 00000000000..21f9bd38ab4 --- /dev/null +++ b/2023/49xxx/CVE-2023-49045.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49045", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49046.json b/2023/49xxx/CVE-2023-49046.json new file mode 100644 index 00000000000..1be055eccc1 --- /dev/null +++ b/2023/49xxx/CVE-2023-49046.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49046", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49047.json b/2023/49xxx/CVE-2023-49047.json new file mode 100644 index 00000000000..09db1cd4437 --- /dev/null +++ b/2023/49xxx/CVE-2023-49047.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49047", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49048.json b/2023/49xxx/CVE-2023-49048.json new file mode 100644 index 00000000000..81aa96c2758 --- /dev/null +++ b/2023/49xxx/CVE-2023-49048.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49048", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49049.json b/2023/49xxx/CVE-2023-49049.json new file mode 100644 index 00000000000..498c60181ca --- /dev/null +++ b/2023/49xxx/CVE-2023-49049.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49049", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49050.json b/2023/49xxx/CVE-2023-49050.json new file mode 100644 index 00000000000..2aee30f0702 --- /dev/null +++ b/2023/49xxx/CVE-2023-49050.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49050", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49051.json b/2023/49xxx/CVE-2023-49051.json new file mode 100644 index 00000000000..b2a93b95fa8 --- /dev/null +++ b/2023/49xxx/CVE-2023-49051.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49051", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49052.json b/2023/49xxx/CVE-2023-49052.json new file mode 100644 index 00000000000..6c77fbaf7d3 --- /dev/null +++ b/2023/49xxx/CVE-2023-49052.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49052", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49053.json b/2023/49xxx/CVE-2023-49053.json new file mode 100644 index 00000000000..ad12a69cd25 --- /dev/null +++ b/2023/49xxx/CVE-2023-49053.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49053", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49054.json b/2023/49xxx/CVE-2023-49054.json new file mode 100644 index 00000000000..94c381fe714 --- /dev/null +++ b/2023/49xxx/CVE-2023-49054.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49054", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file