diff --git a/2023/0xxx/CVE-2023-0215.json b/2023/0xxx/CVE-2023-0215.json index 16a844d8786..dc6427bab33 100644 --- a/2023/0xxx/CVE-2023-0215.json +++ b/2023/0xxx/CVE-2023-0215.json @@ -88,6 +88,11 @@ "url": "https://security.netapp.com/advisory/ntap-20230427-0007/", "refsource": "MISC", "name": "https://security.netapp.com/advisory/ntap-20230427-0007/" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230427-0009/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230427-0009/" } ] }, diff --git a/2023/21xxx/CVE-2023-21930.json b/2023/21xxx/CVE-2023-21930.json index b82d1e81df3..e756b03d2f6 100644 --- a/2023/21xxx/CVE-2023-21930.json +++ b/2023/21xxx/CVE-2023-21930.json @@ -85,6 +85,11 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2023.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2023.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230427-0008/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230427-0008/" } ] }, diff --git a/2023/21xxx/CVE-2023-21937.json b/2023/21xxx/CVE-2023-21937.json index 32409e54907..d1a4505af62 100644 --- a/2023/21xxx/CVE-2023-21937.json +++ b/2023/21xxx/CVE-2023-21937.json @@ -85,6 +85,11 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2023.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2023.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230427-0008/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230427-0008/" } ] }, diff --git a/2023/21xxx/CVE-2023-21938.json b/2023/21xxx/CVE-2023-21938.json index 36492fb544e..ad05ab7ae57 100644 --- a/2023/21xxx/CVE-2023-21938.json +++ b/2023/21xxx/CVE-2023-21938.json @@ -85,6 +85,11 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2023.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2023.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230427-0008/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230427-0008/" } ] }, diff --git a/2023/21xxx/CVE-2023-21939.json b/2023/21xxx/CVE-2023-21939.json index c331d2cf6c8..245010bdfa4 100644 --- a/2023/21xxx/CVE-2023-21939.json +++ b/2023/21xxx/CVE-2023-21939.json @@ -85,6 +85,11 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2023.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2023.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230427-0008/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230427-0008/" } ] }, diff --git a/2023/21xxx/CVE-2023-21954.json b/2023/21xxx/CVE-2023-21954.json index e0b5c12e63a..a286ace89a6 100644 --- a/2023/21xxx/CVE-2023-21954.json +++ b/2023/21xxx/CVE-2023-21954.json @@ -81,6 +81,11 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2023.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2023.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230427-0008/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230427-0008/" } ] }, diff --git a/2023/21xxx/CVE-2023-21967.json b/2023/21xxx/CVE-2023-21967.json index 1bcd08873d3..e307b9d14bd 100644 --- a/2023/21xxx/CVE-2023-21967.json +++ b/2023/21xxx/CVE-2023-21967.json @@ -85,6 +85,11 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2023.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2023.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230427-0008/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230427-0008/" } ] }, diff --git a/2023/21xxx/CVE-2023-21968.json b/2023/21xxx/CVE-2023-21968.json index 6f4fa05c643..0c1da0f7f79 100644 --- a/2023/21xxx/CVE-2023-21968.json +++ b/2023/21xxx/CVE-2023-21968.json @@ -85,6 +85,11 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2023.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2023.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230427-0008/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230427-0008/" } ] }, diff --git a/2023/21xxx/CVE-2023-21971.json b/2023/21xxx/CVE-2023-21971.json index 5b167b204ee..6b418fedec6 100644 --- a/2023/21xxx/CVE-2023-21971.json +++ b/2023/21xxx/CVE-2023-21971.json @@ -62,6 +62,11 @@ "url": "https://security.netapp.com/advisory/ntap-20230427-0007/", "refsource": "MISC", "name": "https://security.netapp.com/advisory/ntap-20230427-0007/" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230427-0010/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230427-0010/" } ] }, diff --git a/2023/28xxx/CVE-2023-28466.json b/2023/28xxx/CVE-2023-28466.json index 3c9f3070ea0..dadef533421 100644 --- a/2023/28xxx/CVE-2023-28466.json +++ b/2023/28xxx/CVE-2023-28466.json @@ -56,6 +56,11 @@ "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962", "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230427-0006/", + "url": "https://security.netapp.com/advisory/ntap-20230427-0006/" } ] } diff --git a/2023/2xxx/CVE-2023-2346.json b/2023/2xxx/CVE-2023-2346.json index 6abd864836c..c23aefd6d3f 100644 --- a/2023/2xxx/CVE-2023-2346.json +++ b/2023/2xxx/CVE-2023-2346.json @@ -1,17 +1,105 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-2346", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in SourceCodester Service Provider Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/inquiries/view_inquiry.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227589 was assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "Es wurde eine Schwachstelle in SourceCodester Service Provider Management System 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Datei /admin/inquiries/view_inquiry.php. Durch Beeinflussen des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SourceCodester", + "product": { + "product_data": [ + { + "product_name": "Service Provider Management System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.227589", + "refsource": "MISC", + "name": "https://vuldb.com/?id.227589" + }, + { + "url": "https://vuldb.com/?ctiid.227589", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.227589" + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Service%20Provider%20Management%20System/Service%20Provider%20Management%20System%20-%20vuln%201.pdf", + "refsource": "MISC", + "name": "https://github.com/E1CHO/cve_hub/blob/main/Service%20Provider%20Management%20System/Service%20Provider%20Management%20System%20-%20vuln%201.pdf" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseSeverity": "MEDIUM" } ] } diff --git a/2023/2xxx/CVE-2023-2347.json b/2023/2xxx/CVE-2023-2347.json index ecc1f153033..78edfcc557d 100644 --- a/2023/2xxx/CVE-2023-2347.json +++ b/2023/2xxx/CVE-2023-2347.json @@ -1,17 +1,105 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-2347", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in SourceCodester Service Provider Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/services/manage_service.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227590 is the identifier assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "In SourceCodester Service Provider Management System 1.0 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Es geht um eine nicht n\u00e4her bekannte Funktion der Datei /admin/services/manage_service.php. Dank der Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SourceCodester", + "product": { + "product_data": [ + { + "product_name": "Service Provider Management System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.227590", + "refsource": "MISC", + "name": "https://vuldb.com/?id.227590" + }, + { + "url": "https://vuldb.com/?ctiid.227590", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.227590" + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Service%20Provider%20Management%20System/Service%20Provider%20Management%20System%20-%20vuln%202.pdf", + "refsource": "MISC", + "name": "https://github.com/E1CHO/cve_hub/blob/main/Service%20Provider%20Management%20System/Service%20Provider%20Management%20System%20-%20vuln%202.pdf" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseSeverity": "MEDIUM" } ] } diff --git a/2023/2xxx/CVE-2023-2348.json b/2023/2xxx/CVE-2023-2348.json index e7a0074a3e7..bb159f0ddcb 100644 --- a/2023/2xxx/CVE-2023-2348.json +++ b/2023/2xxx/CVE-2023-2348.json @@ -1,17 +1,105 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-2348", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in SourceCodester Service Provider Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227591." + }, + { + "lang": "deu", + "value": "Eine Schwachstelle wurde in SourceCodester Service Provider Management System 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Es geht hierbei um eine nicht n\u00e4her spezifizierte Funktion der Datei /admin/user/manage_user.php. Dank Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SourceCodester", + "product": { + "product_data": [ + { + "product_name": "Service Provider Management System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.227591", + "refsource": "MISC", + "name": "https://vuldb.com/?id.227591" + }, + { + "url": "https://vuldb.com/?ctiid.227591", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.227591" + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Service%20Provider%20Management%20System/Service%20Provider%20Management%20System%20-%20vuln%203.pdf", + "refsource": "MISC", + "name": "https://github.com/E1CHO/cve_hub/blob/main/Service%20Provider%20Management%20System/Service%20Provider%20Management%20System%20-%20vuln%203.pdf" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseSeverity": "MEDIUM" } ] } diff --git a/2023/2xxx/CVE-2023-2351.json b/2023/2xxx/CVE-2023-2351.json new file mode 100644 index 00000000000..eccd50b350e --- /dev/null +++ b/2023/2xxx/CVE-2023-2351.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-2351", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30338.json b/2023/30xxx/CVE-2023-30338.json index 7df3c22e66f..e1857519aa8 100644 --- a/2023/30xxx/CVE-2023-30338.json +++ b/2023/30xxx/CVE-2023-30338.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-30338", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-30338", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in Emlog Pro v2.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Article Title or Article Summary parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/emlog/emlog/issues/229", + "refsource": "MISC", + "name": "https://github.com/emlog/emlog/issues/229" } ] } diff --git a/2023/30xxx/CVE-2023-30847.json b/2023/30xxx/CVE-2023-30847.json index ca99a8c172e..50ba49eba63 100644 --- a/2023/30xxx/CVE-2023-30847.json +++ b/2023/30xxx/CVE-2023-30847.json @@ -1,17 +1,95 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-30847", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "H2O is an HTTP server. In versions 2.3.0-beta2 and prior, when the reverse proxy handler tries to processes a certain type of invalid HTTP request, it tries to build an upstream URL by reading from uninitialized pointer. This behavior can lead to crashes or leak of information to back end HTTP servers. Pull request number 3229 fixes the issue. The pull request has been merged to the `master` branch in commit f010336. Users should upgrade to commit f010336 or later." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-824: Access of Uninitialized Pointer", + "cweId": "CWE-824" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "h2o", + "product": { + "product_data": [ + { + "product_name": "h2o", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "<= 2.3.0-beta2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/h2o/h2o/security/advisories/GHSA-p5hj-phwj-hrvx", + "refsource": "MISC", + "name": "https://github.com/h2o/h2o/security/advisories/GHSA-p5hj-phwj-hrvx" + }, + { + "url": "https://github.com/h2o/h2o/pull/3229", + "refsource": "MISC", + "name": "https://github.com/h2o/h2o/pull/3229" + }, + { + "url": "https://github.com/h2o/h2o/commit/f010336bab162839df43d9e87570897466c97e33", + "refsource": "MISC", + "name": "https://github.com/h2o/h2o/commit/f010336bab162839df43d9e87570897466c97e33" + } + ] + }, + "source": { + "advisory": "GHSA-p5hj-phwj-hrvx", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "version": "3.1" } ] } diff --git a/2023/31xxx/CVE-2023-31291.json b/2023/31xxx/CVE-2023-31291.json new file mode 100644 index 00000000000..bd749223c8e --- /dev/null +++ b/2023/31xxx/CVE-2023-31291.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31291", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file