From 32881351a373eafc6e51b0e221f911b698b38179 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 18 Jan 2023 16:00:41 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2011/10xxx/CVE-2011-10001.json | 96 ++++++++++++++++++++++++++++++++-- 2012/10xxx/CVE-2012-10006.json | 96 ++++++++++++++++++++++++++++++++-- 2017/20xxx/CVE-2017-20173.json | 96 ++++++++++++++++++++++++++++++++-- 2020/20xxx/CVE-2020-20412.json | 2 +- 2021/4xxx/CVE-2021-4314.json | 64 +++++++++++++++++++++++ 2022/43xxx/CVE-2022-43440.json | 18 +++++++ 2022/46xxx/CVE-2022-46302.json | 18 +++++++ 2022/46xxx/CVE-2022-46303.json | 18 +++++++ 2022/46xxx/CVE-2022-46463.json | 12 ++++- 2022/46xxx/CVE-2022-46505.json | 61 ++++++++++++++++++--- 2022/46xxx/CVE-2022-46836.json | 18 +++++++ 2022/47xxx/CVE-2022-47909.json | 18 +++++++ 2023/0xxx/CVE-2023-0386.json | 18 +++++++ 2023/0xxx/CVE-2023-0387.json | 18 +++++++ 2023/0xxx/CVE-2023-0388.json | 18 +++++++ 2023/22xxx/CVE-2023-22288.json | 18 +++++++ 2023/22xxx/CVE-2023-22294.json | 18 +++++++ 2023/22xxx/CVE-2023-22307.json | 18 +++++++ 2023/22xxx/CVE-2023-22309.json | 18 +++++++ 2023/22xxx/CVE-2023-22318.json | 18 +++++++ 2023/22xxx/CVE-2023-22348.json | 18 +++++++ 2023/22xxx/CVE-2023-22359.json | 18 +++++++ 2023/23xxx/CVE-2023-23548.json | 18 +++++++ 2023/23xxx/CVE-2023-23549.json | 18 +++++++ 24 files changed, 713 insertions(+), 20 deletions(-) create mode 100644 2021/4xxx/CVE-2021-4314.json create mode 100644 2022/43xxx/CVE-2022-43440.json create mode 100644 2022/46xxx/CVE-2022-46302.json create mode 100644 2022/46xxx/CVE-2022-46303.json create mode 100644 2022/46xxx/CVE-2022-46836.json create mode 100644 2022/47xxx/CVE-2022-47909.json create mode 100644 2023/0xxx/CVE-2023-0386.json create mode 100644 2023/0xxx/CVE-2023-0387.json create mode 100644 2023/0xxx/CVE-2023-0388.json create mode 100644 2023/22xxx/CVE-2023-22288.json create mode 100644 2023/22xxx/CVE-2023-22294.json create mode 100644 2023/22xxx/CVE-2023-22307.json create mode 100644 2023/22xxx/CVE-2023-22309.json create mode 100644 2023/22xxx/CVE-2023-22318.json create mode 100644 2023/22xxx/CVE-2023-22348.json create mode 100644 2023/22xxx/CVE-2023-22359.json create mode 100644 2023/23xxx/CVE-2023-23548.json create mode 100644 2023/23xxx/CVE-2023-23549.json diff --git a/2011/10xxx/CVE-2011-10001.json b/2011/10xxx/CVE-2011-10001.json index 479e97203de..376c03f3bac 100644 --- a/2011/10xxx/CVE-2011-10001.json +++ b/2011/10xxx/CVE-2011-10001.json @@ -1,17 +1,105 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2011-10001", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in iamdroppy phoenixcf. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file content/2-Community/articles.cfm. The manipulation leads to sql injection. The name of the patch is d156faf8bc36cd49c3b10d3697ef14167ad451d8. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218491." + }, + { + "lang": "deu", + "value": "In iamdroppy phoenixcf wurde eine kritische Schwachstelle ausgemacht. Das betrifft eine unbekannte Funktionalit\u00e4t der Datei content/2-Community/articles.cfm. Durch das Beeinflussen mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Patch wird als d156faf8bc36cd49c3b10d3697ef14167ad451d8 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "iamdroppy", + "product": { + "product_data": [ + { + "product_name": "phoenixcf", + "version": { + "version_data": [ + { + "version_value": "n/a", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.218491", + "refsource": "MISC", + "name": "https://vuldb.com/?id.218491" + }, + { + "url": "https://vuldb.com/?ctiid.218491", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.218491" + }, + { + "url": "https://github.com/iamdroppy/phoenixcf/commit/d156faf8bc36cd49c3b10d3697ef14167ad451d8", + "refsource": "MISC", + "name": "https://github.com/iamdroppy/phoenixcf/commit/d156faf8bc36cd49c3b10d3697ef14167ad451d8" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "VulDB GitHub Commit Analyzer" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 5.5, + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 5.5, + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 5.2, + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", + "baseSeverity": "MEDIUM" } ] } diff --git a/2012/10xxx/CVE-2012-10006.json b/2012/10xxx/CVE-2012-10006.json index 479c8a8de77..d64731247e9 100644 --- a/2012/10xxx/CVE-2012-10006.json +++ b/2012/10xxx/CVE-2012-10006.json @@ -1,17 +1,105 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2012-10006", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as critical has been found in ale7714 sigeprosi. This affects an unknown part. The manipulation leads to sql injection. The name of the patch is 5291886f6c992316407c376145d331169c55f25b. It is recommended to apply a patch to fix this issue. The identifier VDB-218493 was assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "Es wurde eine Schwachstelle in ale7714 sigeprosi entdeckt. Sie wurde als kritisch eingestuft. Dabei betrifft es einen unbekannter Codeteil. Dank der Manipulation mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Patch wird als 5291886f6c992316407c376145d331169c55f25b bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "ale7714", + "product": { + "product_data": [ + { + "product_name": "sigeprosi", + "version": { + "version_data": [ + { + "version_value": "n/a", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.218493", + "refsource": "MISC", + "name": "https://vuldb.com/?id.218493" + }, + { + "url": "https://vuldb.com/?ctiid.218493", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.218493" + }, + { + "url": "https://github.com/ale7714/sigeprosi/commit/5291886f6c992316407c376145d331169c55f25b", + "refsource": "MISC", + "name": "https://github.com/ale7714/sigeprosi/commit/5291886f6c992316407c376145d331169c55f25b" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "VulDB GitHub Commit Analyzer" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 5.5, + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 5.5, + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 5.2, + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", + "baseSeverity": "MEDIUM" } ] } diff --git a/2017/20xxx/CVE-2017-20173.json b/2017/20xxx/CVE-2017-20173.json index b6b21e11505..540eaff68b5 100644 --- a/2017/20xxx/CVE-2017-20173.json +++ b/2017/20xxx/CVE-2017-20173.json @@ -1,17 +1,105 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2017-20173", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in AlexRed contentmap. It has been rated as critical. Affected by this issue is the function Load of the file contentmap.php. The manipulation of the argument contentid leads to sql injection. The name of the patch is dd265d23ff4abac97422835002c6a47f45ae2a66. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218492." + }, + { + "lang": "deu", + "value": "Eine kritische Schwachstelle wurde in AlexRed contentmap ausgemacht. Dies betrifft die Funktion Load der Datei contentmap.php. Durch Beeinflussen des Arguments contentid mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Patch wird als dd265d23ff4abac97422835002c6a47f45ae2a66 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "AlexRed", + "product": { + "product_data": [ + { + "product_name": "contentmap", + "version": { + "version_data": [ + { + "version_value": "n/a", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.218492", + "refsource": "MISC", + "name": "https://vuldb.com/?id.218492" + }, + { + "url": "https://vuldb.com/?ctiid.218492", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.218492" + }, + { + "url": "https://github.com/AlexRed/contentmap/commit/dd265d23ff4abac97422835002c6a47f45ae2a66", + "refsource": "MISC", + "name": "https://github.com/AlexRed/contentmap/commit/dd265d23ff4abac97422835002c6a47f45ae2a66" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "VulDB GitHub Commit Analyzer" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 5.5, + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 5.5, + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 5.2, + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", + "baseSeverity": "MEDIUM" } ] } diff --git a/2020/20xxx/CVE-2020-20412.json b/2020/20xxx/CVE-2020-20412.json index 3caf7b883a9..b690ed32d89 100644 --- a/2020/20xxx/CVE-2020-20412.json +++ b/2020/20xxx/CVE-2020-20412.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "lib/codebook.c in libvorbis before 1.3.6, as used in StepMania 5.0.12 and other products, has insufficient array bounds checking via a crafted OGG file." + "value": "lib/codebook.c in libvorbis before 1.3.6, as used in StepMania 5.0.12 and other products, has insufficient array bounds checking via a crafted OGG file. NOTE: this may overlap CVE-2018-5146." } ] }, diff --git a/2021/4xxx/CVE-2021-4314.json b/2021/4xxx/CVE-2021-4314.json new file mode 100644 index 00000000000..8499eb54cae --- /dev/null +++ b/2021/4xxx/CVE-2021-4314.json @@ -0,0 +1,64 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2021-4314", + "ASSIGNER": "zowe-security@lists.openmainframeproject.org", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "It is possible to manipulate the JWT token without the knowledge of the JWT secret and authenticate without valid JWT token as any user. This is happening only in the situation when zOSMF doesn\u2019t have the APAR PH12143 applied. This issue affects: 1.16 versions to 1.19. What happens is that the services using the ZAAS client or the API ML API to query will be deceived into believing the information in the JWT token is valid when it isn\u2019t. It\u2019s possible to use this to persuade the southbound service that different user is authenticated." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-269 Improper Privilege Management", + "cweId": "CWE-269" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Open Mainframe Project", + "product": { + "product_data": [ + { + "product_name": "Zowe", + "version": { + "version_data": [ + { + "version_value": "1.16.0", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/zowe/api-layer/", + "refsource": "MISC", + "name": "https://github.com/zowe/api-layer/" + } + ] + } +} \ No newline at end of file diff --git a/2022/43xxx/CVE-2022-43440.json b/2022/43xxx/CVE-2022-43440.json new file mode 100644 index 00000000000..bc060c941d8 --- /dev/null +++ b/2022/43xxx/CVE-2022-43440.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-43440", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46302.json b/2022/46xxx/CVE-2022-46302.json new file mode 100644 index 00000000000..bb94b2dd5eb --- /dev/null +++ b/2022/46xxx/CVE-2022-46302.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46302", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46303.json b/2022/46xxx/CVE-2022-46303.json new file mode 100644 index 00000000000..e76adc85a0a --- /dev/null +++ b/2022/46xxx/CVE-2022-46303.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46303", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46463.json b/2022/46xxx/CVE-2022-46463.json index 845143e8236..9972591a82f 100644 --- a/2022/46xxx/CVE-2022-46463.json +++ b/2022/46xxx/CVE-2022-46463.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "An access control issue in Harbor v1.X.X to v2.5.3 allows attackers to access public and private image repositories without authentication." + "value": "** DISPUTED ** An access control issue in Harbor v1.X.X to v2.5.3 allows attackers to access public and private image repositories without authentication. NOTE: the vendor's position is that this \"is clearly described in the documentation as a feature.\"" } ] }, @@ -56,6 +56,16 @@ "url": "https://github.com/lanqingaa/123/blob/main/README.md", "refsource": "MISC", "name": "https://github.com/lanqingaa/123/blob/main/README.md" + }, + { + "refsource": "MISC", + "name": "https://github.com/lanqingaa/123/tree/bb48caa844d88b0e41e69157f2a2734311abf02d", + "url": "https://github.com/lanqingaa/123/tree/bb48caa844d88b0e41e69157f2a2734311abf02d" + }, + { + "refsource": "MISC", + "name": "https://github.com/Vad1mo", + "url": "https://github.com/Vad1mo" } ] } diff --git a/2022/46xxx/CVE-2022-46505.json b/2022/46xxx/CVE-2022-46505.json index 42a44fa3c60..c7da6709365 100644 --- a/2022/46xxx/CVE-2022-46505.json +++ b/2022/46xxx/CVE-2022-46505.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-46505", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-46505", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in MatrixSSL 4.5.1-open and earlier leads to failure to securely check the SessionID field, resulting in the misuse of an all-zero MasterSecret that can decrypt secret data." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://smalltown123.notion.site/MatrixSSL-session-resume-bug-a0", + "refsource": "MISC", + "name": "https://smalltown123.notion.site/MatrixSSL-session-resume-bug-a0" + }, + { + "refsource": "MISC", + "name": "https://github.com/SmallTown123/details-for-CVE-2022-46505", + "url": "https://github.com/SmallTown123/details-for-CVE-2022-46505" } ] } diff --git a/2022/46xxx/CVE-2022-46836.json b/2022/46xxx/CVE-2022-46836.json new file mode 100644 index 00000000000..af8cb6eb114 --- /dev/null +++ b/2022/46xxx/CVE-2022-46836.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46836", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/47xxx/CVE-2022-47909.json b/2022/47xxx/CVE-2022-47909.json new file mode 100644 index 00000000000..f07f4477778 --- /dev/null +++ b/2022/47xxx/CVE-2022-47909.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-47909", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/0xxx/CVE-2023-0386.json b/2023/0xxx/CVE-2023-0386.json new file mode 100644 index 00000000000..8eb33e7d9ec --- /dev/null +++ b/2023/0xxx/CVE-2023-0386.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-0386", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/0xxx/CVE-2023-0387.json b/2023/0xxx/CVE-2023-0387.json new file mode 100644 index 00000000000..47720edca71 --- /dev/null +++ b/2023/0xxx/CVE-2023-0387.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-0387", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/0xxx/CVE-2023-0388.json b/2023/0xxx/CVE-2023-0388.json new file mode 100644 index 00000000000..4e5810347e7 --- /dev/null +++ b/2023/0xxx/CVE-2023-0388.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-0388", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22288.json b/2023/22xxx/CVE-2023-22288.json new file mode 100644 index 00000000000..97f8b3459dc --- /dev/null +++ b/2023/22xxx/CVE-2023-22288.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22288", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22294.json b/2023/22xxx/CVE-2023-22294.json new file mode 100644 index 00000000000..4c9465aeeb3 --- /dev/null +++ b/2023/22xxx/CVE-2023-22294.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22294", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22307.json b/2023/22xxx/CVE-2023-22307.json new file mode 100644 index 00000000000..bb9f7fcecce --- /dev/null +++ b/2023/22xxx/CVE-2023-22307.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22307", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22309.json b/2023/22xxx/CVE-2023-22309.json new file mode 100644 index 00000000000..1d3b5839966 --- /dev/null +++ b/2023/22xxx/CVE-2023-22309.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22309", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22318.json b/2023/22xxx/CVE-2023-22318.json new file mode 100644 index 00000000000..b4f1f2a84a2 --- /dev/null +++ b/2023/22xxx/CVE-2023-22318.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22318", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22348.json b/2023/22xxx/CVE-2023-22348.json new file mode 100644 index 00000000000..fbdf612aad7 --- /dev/null +++ b/2023/22xxx/CVE-2023-22348.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22348", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22359.json b/2023/22xxx/CVE-2023-22359.json new file mode 100644 index 00000000000..ae6888516dc --- /dev/null +++ b/2023/22xxx/CVE-2023-22359.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22359", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23548.json b/2023/23xxx/CVE-2023-23548.json new file mode 100644 index 00000000000..7cb294c803b --- /dev/null +++ b/2023/23xxx/CVE-2023-23548.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23548", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23549.json b/2023/23xxx/CVE-2023-23549.json new file mode 100644 index 00000000000..0ec1c7a562c --- /dev/null +++ b/2023/23xxx/CVE-2023-23549.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23549", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file