From 3b90fea9fd150a88b34e38e03f5041ba4bc4c697 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 25 May 2023 18:00:37 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/2xxx/CVE-2023-2897.json | 18 +++++++ 2023/2xxx/CVE-2023-2898.json | 18 +++++++ 2023/30xxx/CVE-2023-30615.json | 81 ++++++++++++++++++++++++++-- 2023/30xxx/CVE-2023-30851.json | 99 ++++++++++++++++++++++++++++++++-- 2023/34xxx/CVE-2023-34034.json | 18 +++++++ 2023/34xxx/CVE-2023-34035.json | 18 +++++++ 2023/34xxx/CVE-2023-34036.json | 18 +++++++ 2023/34xxx/CVE-2023-34037.json | 18 +++++++ 2023/34xxx/CVE-2023-34038.json | 18 +++++++ 2023/34xxx/CVE-2023-34039.json | 18 +++++++ 2023/34xxx/CVE-2023-34040.json | 18 +++++++ 2023/34xxx/CVE-2023-34041.json | 18 +++++++ 2023/34xxx/CVE-2023-34042.json | 18 +++++++ 2023/34xxx/CVE-2023-34043.json | 18 +++++++ 2023/34xxx/CVE-2023-34044.json | 18 +++++++ 2023/34xxx/CVE-2023-34045.json | 18 +++++++ 2023/34xxx/CVE-2023-34046.json | 18 +++++++ 2023/34xxx/CVE-2023-34047.json | 18 +++++++ 2023/34xxx/CVE-2023-34048.json | 18 +++++++ 2023/34xxx/CVE-2023-34049.json | 18 +++++++ 2023/34xxx/CVE-2023-34050.json | 18 +++++++ 2023/34xxx/CVE-2023-34051.json | 18 +++++++ 2023/34xxx/CVE-2023-34052.json | 18 +++++++ 2023/34xxx/CVE-2023-34053.json | 18 +++++++ 2023/34xxx/CVE-2023-34054.json | 18 +++++++ 2023/34xxx/CVE-2023-34055.json | 18 +++++++ 2023/34xxx/CVE-2023-34056.json | 18 +++++++ 2023/34xxx/CVE-2023-34057.json | 18 +++++++ 2023/34xxx/CVE-2023-34058.json | 18 +++++++ 2023/34xxx/CVE-2023-34059.json | 18 +++++++ 2023/34xxx/CVE-2023-34060.json | 18 +++++++ 2023/34xxx/CVE-2023-34061.json | 18 +++++++ 2023/34xxx/CVE-2023-34062.json | 18 +++++++ 2023/34xxx/CVE-2023-34063.json | 18 +++++++ 2023/34xxx/CVE-2023-34064.json | 18 +++++++ 2023/34xxx/CVE-2023-34065.json | 18 +++++++ 2023/34xxx/CVE-2023-34066.json | 18 +++++++ 2023/34xxx/CVE-2023-34067.json | 18 +++++++ 2023/34xxx/CVE-2023-34068.json | 18 +++++++ 2023/34xxx/CVE-2023-34069.json | 18 +++++++ 2023/34xxx/CVE-2023-34070.json | 18 +++++++ 2023/34xxx/CVE-2023-34071.json | 18 +++++++ 2023/34xxx/CVE-2023-34072.json | 18 +++++++ 2023/34xxx/CVE-2023-34073.json | 18 +++++++ 2023/34xxx/CVE-2023-34074.json | 18 +++++++ 2023/34xxx/CVE-2023-34075.json | 18 +++++++ 2023/34xxx/CVE-2023-34076.json | 18 +++++++ 2023/34xxx/CVE-2023-34077.json | 18 +++++++ 2023/34xxx/CVE-2023-34078.json | 18 +++++++ 2023/34xxx/CVE-2023-34079.json | 18 +++++++ 2023/34xxx/CVE-2023-34080.json | 18 +++++++ 2023/34xxx/CVE-2023-34081.json | 18 +++++++ 2023/34xxx/CVE-2023-34082.json | 18 +++++++ 2023/34xxx/CVE-2023-34083.json | 18 +++++++ 54 files changed, 1108 insertions(+), 8 deletions(-) create mode 100644 2023/2xxx/CVE-2023-2897.json create mode 100644 2023/2xxx/CVE-2023-2898.json create mode 100644 2023/34xxx/CVE-2023-34034.json create mode 100644 2023/34xxx/CVE-2023-34035.json create mode 100644 2023/34xxx/CVE-2023-34036.json create mode 100644 2023/34xxx/CVE-2023-34037.json create mode 100644 2023/34xxx/CVE-2023-34038.json create mode 100644 2023/34xxx/CVE-2023-34039.json create mode 100644 2023/34xxx/CVE-2023-34040.json create mode 100644 2023/34xxx/CVE-2023-34041.json create mode 100644 2023/34xxx/CVE-2023-34042.json create mode 100644 2023/34xxx/CVE-2023-34043.json create mode 100644 2023/34xxx/CVE-2023-34044.json create mode 100644 2023/34xxx/CVE-2023-34045.json create mode 100644 2023/34xxx/CVE-2023-34046.json create mode 100644 2023/34xxx/CVE-2023-34047.json create mode 100644 2023/34xxx/CVE-2023-34048.json create mode 100644 2023/34xxx/CVE-2023-34049.json create mode 100644 2023/34xxx/CVE-2023-34050.json create mode 100644 2023/34xxx/CVE-2023-34051.json create mode 100644 2023/34xxx/CVE-2023-34052.json create mode 100644 2023/34xxx/CVE-2023-34053.json create mode 100644 2023/34xxx/CVE-2023-34054.json create mode 100644 2023/34xxx/CVE-2023-34055.json create mode 100644 2023/34xxx/CVE-2023-34056.json create mode 100644 2023/34xxx/CVE-2023-34057.json create mode 100644 2023/34xxx/CVE-2023-34058.json create mode 100644 2023/34xxx/CVE-2023-34059.json create mode 100644 2023/34xxx/CVE-2023-34060.json create mode 100644 2023/34xxx/CVE-2023-34061.json create mode 100644 2023/34xxx/CVE-2023-34062.json create mode 100644 2023/34xxx/CVE-2023-34063.json create mode 100644 2023/34xxx/CVE-2023-34064.json create mode 100644 2023/34xxx/CVE-2023-34065.json create mode 100644 2023/34xxx/CVE-2023-34066.json create mode 100644 2023/34xxx/CVE-2023-34067.json create mode 100644 2023/34xxx/CVE-2023-34068.json create mode 100644 2023/34xxx/CVE-2023-34069.json create mode 100644 2023/34xxx/CVE-2023-34070.json create mode 100644 2023/34xxx/CVE-2023-34071.json create mode 100644 2023/34xxx/CVE-2023-34072.json create mode 100644 2023/34xxx/CVE-2023-34073.json create mode 100644 2023/34xxx/CVE-2023-34074.json create mode 100644 2023/34xxx/CVE-2023-34075.json create mode 100644 2023/34xxx/CVE-2023-34076.json create mode 100644 2023/34xxx/CVE-2023-34077.json create mode 100644 2023/34xxx/CVE-2023-34078.json create mode 100644 2023/34xxx/CVE-2023-34079.json create mode 100644 2023/34xxx/CVE-2023-34080.json create mode 100644 2023/34xxx/CVE-2023-34081.json create mode 100644 2023/34xxx/CVE-2023-34082.json create mode 100644 2023/34xxx/CVE-2023-34083.json diff --git a/2023/2xxx/CVE-2023-2897.json b/2023/2xxx/CVE-2023-2897.json new file mode 100644 index 00000000000..7303d6cebec --- /dev/null +++ b/2023/2xxx/CVE-2023-2897.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-2897", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/2xxx/CVE-2023-2898.json b/2023/2xxx/CVE-2023-2898.json new file mode 100644 index 00000000000..79cf876a74a --- /dev/null +++ b/2023/2xxx/CVE-2023-2898.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-2898", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30615.json b/2023/30xxx/CVE-2023-30615.json index 5664d3e4681..cdd237e68f1 100644 --- a/2023/30xxx/CVE-2023-30615.json +++ b/2023/30xxx/CVE-2023-30615.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-30615", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Iris is a web collaborative platform aiming to help incident responders sharing technical details during investigations. A stored Cross-Site Scripting (XSS) vulnerability has been identified in iris-web, affecting multiple locations . The vulnerability in allows an attacker to inject malicious scripts into the application, which are then executed when a user visits the affected locations. This can lead to unauthorized access, data theft, or other malicious activities. An attacker need to be authenticated on the application to exploit this vulnerability. The issue was patched in version 2.2.1 of iris-web. \n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", + "cweId": "CWE-80" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "dfir-iris", + "product": { + "product_data": [ + { + "product_name": "iris-web", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 2.2.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/dfir-iris/iris-web/security/advisories/GHSA-gc6j-6276-2m49", + "refsource": "MISC", + "name": "https://github.com/dfir-iris/iris-web/security/advisories/GHSA-gc6j-6276-2m49" + }, + { + "url": "https://github.com/dfir-iris/iris-web/releases/tag/v2.2.1", + "refsource": "MISC", + "name": "https://github.com/dfir-iris/iris-web/releases/tag/v2.2.1" + } + ] + }, + "source": { + "advisory": "GHSA-gc6j-6276-2m49", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N", + "version": "3.1" } ] } diff --git a/2023/30xxx/CVE-2023-30851.json b/2023/30xxx/CVE-2023-30851.json index 1f3514be60a..141c57fbb8e 100644 --- a/2023/30xxx/CVE-2023-30851.json +++ b/2023/30xxx/CVE-2023-30851.json @@ -1,17 +1,108 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-30851", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. This issue only impacts users who have a HTTP policy that applies to multiple `toEndpoints` AND have an allow-all rule in place that affects only one of those endpoints. In such cases, a wildcard rule will be appended to the set of HTTP rules, which could cause bypass of HTTP policies. This issue has been patched in Cilium 1.11.16, 1.12.9, and 1.13.2." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-693: Protection Mechanism Failure", + "cweId": "CWE-693" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "cilium", + "product": { + "product_data": [ + { + "product_name": "cilium", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 1.11.16" + }, + { + "version_affected": "=", + "version_value": ">= 1.12.0, < 1.12.9" + }, + { + "version_affected": "=", + "version_value": ">= 1.13.0, < 1.13.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/cilium/cilium/security/advisories/GHSA-2h44-x2wx-49f4", + "refsource": "MISC", + "name": "https://github.com/cilium/cilium/security/advisories/GHSA-2h44-x2wx-49f4" + }, + { + "url": "https://github.com/cilium/cilium/releases/tag/v1.11.16", + "refsource": "MISC", + "name": "https://github.com/cilium/cilium/releases/tag/v1.11.16" + }, + { + "url": "https://github.com/cilium/cilium/releases/tag/v1.12.9", + "refsource": "MISC", + "name": "https://github.com/cilium/cilium/releases/tag/v1.12.9" + }, + { + "url": "https://github.com/cilium/cilium/releases/tag/v1.13.2", + "refsource": "MISC", + "name": "https://github.com/cilium/cilium/releases/tag/v1.13.2" + } + ] + }, + "source": { + "advisory": "GHSA-2h44-x2wx-49f4", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "NONE", + "baseScore": 2.6, + "baseSeverity": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N", + "version": "3.1" } ] } diff --git a/2023/34xxx/CVE-2023-34034.json b/2023/34xxx/CVE-2023-34034.json new file mode 100644 index 00000000000..ab01e4d8207 --- /dev/null +++ b/2023/34xxx/CVE-2023-34034.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34034", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34035.json b/2023/34xxx/CVE-2023-34035.json new file mode 100644 index 00000000000..f33bf6dd4f1 --- /dev/null +++ b/2023/34xxx/CVE-2023-34035.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34035", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34036.json b/2023/34xxx/CVE-2023-34036.json new file mode 100644 index 00000000000..efa049e0823 --- /dev/null +++ b/2023/34xxx/CVE-2023-34036.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34036", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34037.json b/2023/34xxx/CVE-2023-34037.json new file mode 100644 index 00000000000..78fa9068040 --- /dev/null +++ b/2023/34xxx/CVE-2023-34037.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34037", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34038.json b/2023/34xxx/CVE-2023-34038.json new file mode 100644 index 00000000000..5e40d880d75 --- /dev/null +++ b/2023/34xxx/CVE-2023-34038.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34038", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34039.json b/2023/34xxx/CVE-2023-34039.json new file mode 100644 index 00000000000..386cfa674f3 --- /dev/null +++ b/2023/34xxx/CVE-2023-34039.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34039", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34040.json b/2023/34xxx/CVE-2023-34040.json new file mode 100644 index 00000000000..2577fe9415a --- /dev/null +++ b/2023/34xxx/CVE-2023-34040.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34040", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34041.json b/2023/34xxx/CVE-2023-34041.json new file mode 100644 index 00000000000..97bf90d3c8c --- /dev/null +++ b/2023/34xxx/CVE-2023-34041.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34041", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34042.json b/2023/34xxx/CVE-2023-34042.json new file mode 100644 index 00000000000..22ab049c6c2 --- /dev/null +++ b/2023/34xxx/CVE-2023-34042.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34042", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34043.json b/2023/34xxx/CVE-2023-34043.json new file mode 100644 index 00000000000..8efbdafed83 --- /dev/null +++ b/2023/34xxx/CVE-2023-34043.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34043", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34044.json b/2023/34xxx/CVE-2023-34044.json new file mode 100644 index 00000000000..23f1122d1cf --- /dev/null +++ b/2023/34xxx/CVE-2023-34044.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34044", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34045.json b/2023/34xxx/CVE-2023-34045.json new file mode 100644 index 00000000000..3bf3cfcac3d --- /dev/null +++ b/2023/34xxx/CVE-2023-34045.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34045", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34046.json b/2023/34xxx/CVE-2023-34046.json new file mode 100644 index 00000000000..6dd1b7e7e6c --- /dev/null +++ b/2023/34xxx/CVE-2023-34046.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34046", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34047.json b/2023/34xxx/CVE-2023-34047.json new file mode 100644 index 00000000000..98abafafef7 --- /dev/null +++ b/2023/34xxx/CVE-2023-34047.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34047", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34048.json b/2023/34xxx/CVE-2023-34048.json new file mode 100644 index 00000000000..41faead809b --- /dev/null +++ b/2023/34xxx/CVE-2023-34048.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34048", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34049.json b/2023/34xxx/CVE-2023-34049.json new file mode 100644 index 00000000000..e7492a677ab --- /dev/null +++ b/2023/34xxx/CVE-2023-34049.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34049", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34050.json b/2023/34xxx/CVE-2023-34050.json new file mode 100644 index 00000000000..f5b7be408cd --- /dev/null +++ b/2023/34xxx/CVE-2023-34050.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34050", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34051.json b/2023/34xxx/CVE-2023-34051.json new file mode 100644 index 00000000000..d39b18658ac --- /dev/null +++ b/2023/34xxx/CVE-2023-34051.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34051", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34052.json b/2023/34xxx/CVE-2023-34052.json new file mode 100644 index 00000000000..b0279139dbe --- /dev/null +++ b/2023/34xxx/CVE-2023-34052.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34052", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34053.json b/2023/34xxx/CVE-2023-34053.json new file mode 100644 index 00000000000..d4133c95a5e --- /dev/null +++ b/2023/34xxx/CVE-2023-34053.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34053", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34054.json b/2023/34xxx/CVE-2023-34054.json new file mode 100644 index 00000000000..6c43641dd41 --- /dev/null +++ b/2023/34xxx/CVE-2023-34054.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34054", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34055.json b/2023/34xxx/CVE-2023-34055.json new file mode 100644 index 00000000000..c960909e27f --- /dev/null +++ b/2023/34xxx/CVE-2023-34055.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34055", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34056.json b/2023/34xxx/CVE-2023-34056.json new file mode 100644 index 00000000000..5fbb4dd2bee --- /dev/null +++ b/2023/34xxx/CVE-2023-34056.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34056", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34057.json b/2023/34xxx/CVE-2023-34057.json new file mode 100644 index 00000000000..e7b8e67c31c --- /dev/null +++ b/2023/34xxx/CVE-2023-34057.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34057", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34058.json b/2023/34xxx/CVE-2023-34058.json new file mode 100644 index 00000000000..e33c430fb80 --- /dev/null +++ b/2023/34xxx/CVE-2023-34058.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34058", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34059.json b/2023/34xxx/CVE-2023-34059.json new file mode 100644 index 00000000000..5313c697ccb --- /dev/null +++ b/2023/34xxx/CVE-2023-34059.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34059", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34060.json b/2023/34xxx/CVE-2023-34060.json new file mode 100644 index 00000000000..754e8a1ddc7 --- /dev/null +++ b/2023/34xxx/CVE-2023-34060.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34060", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34061.json b/2023/34xxx/CVE-2023-34061.json new file mode 100644 index 00000000000..ee1f047150e --- /dev/null +++ b/2023/34xxx/CVE-2023-34061.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34061", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34062.json b/2023/34xxx/CVE-2023-34062.json new file mode 100644 index 00000000000..b5b8cb4e2cb --- /dev/null +++ b/2023/34xxx/CVE-2023-34062.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34062", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34063.json b/2023/34xxx/CVE-2023-34063.json new file mode 100644 index 00000000000..d5873a9ba00 --- /dev/null +++ b/2023/34xxx/CVE-2023-34063.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34063", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34064.json b/2023/34xxx/CVE-2023-34064.json new file mode 100644 index 00000000000..093dcb25700 --- /dev/null +++ b/2023/34xxx/CVE-2023-34064.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34064", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34065.json b/2023/34xxx/CVE-2023-34065.json new file mode 100644 index 00000000000..edad6f086ac --- /dev/null +++ b/2023/34xxx/CVE-2023-34065.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34065", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34066.json b/2023/34xxx/CVE-2023-34066.json new file mode 100644 index 00000000000..96042c0cc56 --- /dev/null +++ b/2023/34xxx/CVE-2023-34066.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34066", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34067.json b/2023/34xxx/CVE-2023-34067.json new file mode 100644 index 00000000000..b99fc4212d8 --- /dev/null +++ b/2023/34xxx/CVE-2023-34067.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34067", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34068.json b/2023/34xxx/CVE-2023-34068.json new file mode 100644 index 00000000000..7178e5f7b91 --- /dev/null +++ b/2023/34xxx/CVE-2023-34068.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34068", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34069.json b/2023/34xxx/CVE-2023-34069.json new file mode 100644 index 00000000000..702dce5bf08 --- /dev/null +++ b/2023/34xxx/CVE-2023-34069.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34069", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34070.json b/2023/34xxx/CVE-2023-34070.json new file mode 100644 index 00000000000..8127e72a409 --- /dev/null +++ b/2023/34xxx/CVE-2023-34070.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34070", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34071.json b/2023/34xxx/CVE-2023-34071.json new file mode 100644 index 00000000000..1d5678dc6f9 --- /dev/null +++ b/2023/34xxx/CVE-2023-34071.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34071", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34072.json b/2023/34xxx/CVE-2023-34072.json new file mode 100644 index 00000000000..576872d803b --- /dev/null +++ b/2023/34xxx/CVE-2023-34072.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34072", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34073.json b/2023/34xxx/CVE-2023-34073.json new file mode 100644 index 00000000000..2c70b0e4915 --- /dev/null +++ b/2023/34xxx/CVE-2023-34073.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34073", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34074.json b/2023/34xxx/CVE-2023-34074.json new file mode 100644 index 00000000000..6ab3d1c7bda --- /dev/null +++ b/2023/34xxx/CVE-2023-34074.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34074", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34075.json b/2023/34xxx/CVE-2023-34075.json new file mode 100644 index 00000000000..aa210be3f17 --- /dev/null +++ b/2023/34xxx/CVE-2023-34075.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34075", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34076.json b/2023/34xxx/CVE-2023-34076.json new file mode 100644 index 00000000000..b42b90a615c --- /dev/null +++ b/2023/34xxx/CVE-2023-34076.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34076", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34077.json b/2023/34xxx/CVE-2023-34077.json new file mode 100644 index 00000000000..0b4cbd491e3 --- /dev/null +++ b/2023/34xxx/CVE-2023-34077.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34077", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34078.json b/2023/34xxx/CVE-2023-34078.json new file mode 100644 index 00000000000..0821ffc67b6 --- /dev/null +++ b/2023/34xxx/CVE-2023-34078.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34078", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34079.json b/2023/34xxx/CVE-2023-34079.json new file mode 100644 index 00000000000..5338353f075 --- /dev/null +++ b/2023/34xxx/CVE-2023-34079.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34079", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34080.json b/2023/34xxx/CVE-2023-34080.json new file mode 100644 index 00000000000..1d723970714 --- /dev/null +++ b/2023/34xxx/CVE-2023-34080.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34080", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34081.json b/2023/34xxx/CVE-2023-34081.json new file mode 100644 index 00000000000..64faeaec51a --- /dev/null +++ b/2023/34xxx/CVE-2023-34081.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34081", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34082.json b/2023/34xxx/CVE-2023-34082.json new file mode 100644 index 00000000000..ea7f4cceb69 --- /dev/null +++ b/2023/34xxx/CVE-2023-34082.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34082", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/34xxx/CVE-2023-34083.json b/2023/34xxx/CVE-2023-34083.json new file mode 100644 index 00000000000..d4275fb36b2 --- /dev/null +++ b/2023/34xxx/CVE-2023-34083.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-34083", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file