From 3f931d6b1ccab8be64d2650eef2b07d09354d502 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 29 Apr 2023 01:01:00 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/28xxx/CVE-2023-28759.json | 8 +- 2023/2xxx/CVE-2023-2417.json | 315 ++++++++++++++++++++++++++++++++- 2023/2xxx/CVE-2023-2418.json | 96 +++++++++- 2023/31xxx/CVE-2023-31536.json | 18 ++ 2023/31xxx/CVE-2023-31537.json | 18 ++ 2023/31xxx/CVE-2023-31538.json | 18 ++ 2023/31xxx/CVE-2023-31539.json | 18 ++ 2023/31xxx/CVE-2023-31540.json | 18 ++ 2023/31xxx/CVE-2023-31541.json | 18 ++ 2023/31xxx/CVE-2023-31542.json | 18 ++ 2023/31xxx/CVE-2023-31543.json | 18 ++ 2023/31xxx/CVE-2023-31544.json | 18 ++ 2023/31xxx/CVE-2023-31545.json | 18 ++ 2023/31xxx/CVE-2023-31546.json | 18 ++ 2023/31xxx/CVE-2023-31547.json | 18 ++ 2023/31xxx/CVE-2023-31548.json | 18 ++ 2023/31xxx/CVE-2023-31549.json | 18 ++ 2023/31xxx/CVE-2023-31550.json | 18 ++ 2023/31xxx/CVE-2023-31551.json | 18 ++ 2023/31xxx/CVE-2023-31552.json | 18 ++ 2023/31xxx/CVE-2023-31553.json | 18 ++ 2023/31xxx/CVE-2023-31554.json | 18 ++ 2023/31xxx/CVE-2023-31555.json | 18 ++ 2023/31xxx/CVE-2023-31556.json | 18 ++ 2023/31xxx/CVE-2023-31557.json | 18 ++ 2023/31xxx/CVE-2023-31558.json | 18 ++ 2023/31xxx/CVE-2023-31559.json | 18 ++ 2023/31xxx/CVE-2023-31560.json | 18 ++ 2023/31xxx/CVE-2023-31561.json | 18 ++ 2023/31xxx/CVE-2023-31562.json | 18 ++ 2023/31xxx/CVE-2023-31563.json | 18 ++ 31 files changed, 911 insertions(+), 12 deletions(-) create mode 100644 2023/31xxx/CVE-2023-31536.json create mode 100644 2023/31xxx/CVE-2023-31537.json create mode 100644 2023/31xxx/CVE-2023-31538.json create mode 100644 2023/31xxx/CVE-2023-31539.json create mode 100644 2023/31xxx/CVE-2023-31540.json create mode 100644 2023/31xxx/CVE-2023-31541.json create mode 100644 2023/31xxx/CVE-2023-31542.json create mode 100644 2023/31xxx/CVE-2023-31543.json create mode 100644 2023/31xxx/CVE-2023-31544.json create mode 100644 2023/31xxx/CVE-2023-31545.json create mode 100644 2023/31xxx/CVE-2023-31546.json create mode 100644 2023/31xxx/CVE-2023-31547.json create mode 100644 2023/31xxx/CVE-2023-31548.json create mode 100644 2023/31xxx/CVE-2023-31549.json create mode 100644 2023/31xxx/CVE-2023-31550.json create mode 100644 2023/31xxx/CVE-2023-31551.json create mode 100644 2023/31xxx/CVE-2023-31552.json create mode 100644 2023/31xxx/CVE-2023-31553.json create mode 100644 2023/31xxx/CVE-2023-31554.json create mode 100644 2023/31xxx/CVE-2023-31555.json create mode 100644 2023/31xxx/CVE-2023-31556.json create mode 100644 2023/31xxx/CVE-2023-31557.json create mode 100644 2023/31xxx/CVE-2023-31558.json create mode 100644 2023/31xxx/CVE-2023-31559.json create mode 100644 2023/31xxx/CVE-2023-31560.json create mode 100644 2023/31xxx/CVE-2023-31561.json create mode 100644 2023/31xxx/CVE-2023-31562.json create mode 100644 2023/31xxx/CVE-2023-31563.json diff --git a/2023/28xxx/CVE-2023-28759.json b/2023/28xxx/CVE-2023-28759.json index a19343d9ac3..9485e8698ce 100644 --- a/2023/28xxx/CVE-2023-28759.json +++ b/2023/28xxx/CVE-2023-28759.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "An issue was discovered in Veritas NetBackup before 10.0. A vulnerability in the way NetBackup validates the path to a DLL prior to loading may allow a lower level user to elevate privileges and compromise the system." + "value": "An issue was discovered in Veritas NetBackup before 10.0 on Windows. A vulnerability in the way the client validates the path to a DLL prior to loading may allow a lower-level user to elevate privileges and compromise the system." } ] }, @@ -53,9 +53,9 @@ "references": { "reference_data": [ { - "url": "https://www.veritas.com/content/support/en_US/security/VTS22-010#M2", - "refsource": "MISC", - "name": "https://www.veritas.com/content/support/en_US/security/VTS22-010#M2" + "refsource": "CONFIRM", + "name": "https://www.veritas.com/content/support/en_US/security/VTS23-006", + "url": "https://www.veritas.com/content/support/en_US/security/VTS23-006" } ] }, diff --git a/2023/2xxx/CVE-2023-2417.json b/2023/2xxx/CVE-2023-2417.json index 1c8e3c63485..7a3f0d34311 100644 --- a/2023/2xxx/CVE-2023-2417.json +++ b/2023/2xxx/CVE-2023-2417.json @@ -1,17 +1,324 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-2417", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in ks-soft Advanced Host Monitor up to 12.56 and classified as problematic. Affected by this issue is some unknown functionality of the file C:\\Program Files (x86)\\HostMonitor\\RMA-Win\\rma_active.exe. The manipulation leads to unquoted search path. It is possible to launch the attack on the local host. Upgrading to version 12.60 is able to address this issue. It is recommended to upgrade the affected component. VDB-227714 is the identifier assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "Eine Schwachstelle wurde in ks-soft Advanced Host Monitor bis 12.56 gefunden. Sie wurde als problematisch eingestuft. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei C:\\Program Files (x86)\\HostMonitor\\RMA-Win\\rma_active.exe. Durch die Manipulation mit unbekannten Daten kann eine unquoted search path-Schwachstelle ausgenutzt werden. Der Angriff muss lokal passieren. Ein Aktualisieren auf die Version 12.60 vermag dieses Problem zu l\u00f6sen. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-428 Unquoted Search Path", + "cweId": "CWE-428" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "ks-soft", + "product": { + "product_data": [ + { + "product_name": "Advanced Host Monitor", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "12.0" + }, + { + "version_affected": "=", + "version_value": "12.1" + }, + { + "version_affected": "=", + "version_value": "12.2" + }, + { + "version_affected": "=", + "version_value": "12.3" + }, + { + "version_affected": "=", + "version_value": "12.4" + }, + { + "version_affected": "=", + "version_value": "12.5" + }, + { + "version_affected": "=", + "version_value": "12.6" + }, + { + "version_affected": "=", + "version_value": "12.7" + }, + { + "version_affected": "=", + "version_value": "12.8" + }, + { + "version_affected": "=", + "version_value": "12.9" + }, + { + "version_affected": "=", + "version_value": "12.10" + }, + { + "version_affected": "=", + "version_value": "12.11" + }, + { + "version_affected": "=", + "version_value": "12.12" + }, + { + "version_affected": "=", + "version_value": "12.13" + }, + { + "version_affected": "=", + "version_value": "12.14" + }, + { + "version_affected": "=", + "version_value": "12.15" + }, + { + "version_affected": "=", + "version_value": "12.16" + }, + { + "version_affected": "=", + "version_value": "12.17" + }, + { + "version_affected": "=", + "version_value": "12.18" + }, + { + "version_affected": "=", + "version_value": "12.19" + }, + { + "version_affected": "=", + "version_value": "12.20" + }, + { + "version_affected": "=", + "version_value": "12.21" + }, + { + "version_affected": "=", + "version_value": "12.22" + }, + { + "version_affected": "=", + "version_value": "12.23" + }, + { + "version_affected": "=", + "version_value": "12.24" + }, + { + "version_affected": "=", + "version_value": "12.25" + }, + { + "version_affected": "=", + "version_value": "12.26" + }, + { + "version_affected": "=", + "version_value": "12.27" + }, + { + "version_affected": "=", + "version_value": "12.28" + }, + { + "version_affected": "=", + "version_value": "12.29" + }, + { + "version_affected": "=", + "version_value": "12.30" + }, + { + "version_affected": "=", + "version_value": "12.31" + }, + { + "version_affected": "=", + "version_value": "12.32" + }, + { + "version_affected": "=", + "version_value": "12.33" + }, + { + "version_affected": "=", + "version_value": "12.34" + }, + { + "version_affected": "=", + "version_value": "12.35" + }, + { + "version_affected": "=", + "version_value": "12.36" + }, + { + "version_affected": "=", + "version_value": "12.37" + }, + { + "version_affected": "=", + "version_value": "12.38" + }, + { + "version_affected": "=", + "version_value": "12.39" + }, + { + "version_affected": "=", + "version_value": "12.40" + }, + { + "version_affected": "=", + "version_value": "12.41" + }, + { + "version_affected": "=", + "version_value": "12.42" + }, + { + "version_affected": "=", + "version_value": "12.43" + }, + { + "version_affected": "=", + "version_value": "12.44" + }, + { + "version_affected": "=", + "version_value": "12.45" + }, + { + "version_affected": "=", + "version_value": "12.46" + }, + { + "version_affected": "=", + "version_value": "12.47" + }, + { + "version_affected": "=", + "version_value": "12.48" + }, + { + "version_affected": "=", + "version_value": "12.49" + }, + { + "version_affected": "=", + "version_value": "12.50" + }, + { + "version_affected": "=", + "version_value": "12.51" + }, + { + "version_affected": "=", + "version_value": "12.52" + }, + { + "version_affected": "=", + "version_value": "12.53" + }, + { + "version_affected": "=", + "version_value": "12.54" + }, + { + "version_affected": "=", + "version_value": "12.55" + }, + { + "version_affected": "=", + "version_value": "12.56" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.227714", + "refsource": "MISC", + "name": "https://vuldb.com/?id.227714" + }, + { + "url": "https://vuldb.com/?ctiid.227714", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.227714" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "mrempy (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 5.3, + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 5.3, + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 4.3, + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "baseSeverity": "MEDIUM" } ] } diff --git a/2023/2xxx/CVE-2023-2418.json b/2023/2xxx/CVE-2023-2418.json index 98f08f71280..1ffe9dcd87a 100644 --- a/2023/2xxx/CVE-2023-2418.json +++ b/2023/2xxx/CVE-2023-2418.json @@ -1,17 +1,105 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-2418", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Konga 2.8.3 on Kong. It has been classified as problematic. This affects an unknown part of the component Login API. The manipulation leads to insufficiently random values. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. The associated identifier of this vulnerability is VDB-227715." + }, + { + "lang": "deu", + "value": "Es wurde eine Schwachstelle in Konga 2.8.3 f\u00fcr Kong ausgemacht. Sie wurde als problematisch eingestuft. Es betrifft eine unbekannte Funktion der Komponente Login API. Durch Manipulation mit unbekannten Daten kann eine insufficiently random values-Schwachstelle ausgenutzt werden. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie ist schwierig auszunutzen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme werden Anpassungen an der Konfiguration empfohlen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-330 Insufficiently Random Values", + "cweId": "CWE-330" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Konga", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.8.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.227715", + "refsource": "MISC", + "name": "https://vuldb.com/?id.227715" + }, + { + "url": "https://vuldb.com/?ctiid.227715", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.227715" + }, + { + "url": "https://www.cnblogs.com/andao/p/17330864.html", + "refsource": "MISC", + "name": "https://www.cnblogs.com/andao/p/17330864.html" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "the_whovian (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 3.1, + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 3.1, + "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 1.8, + "vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N", + "baseSeverity": "LOW" } ] } diff --git a/2023/31xxx/CVE-2023-31536.json b/2023/31xxx/CVE-2023-31536.json new file mode 100644 index 00000000000..2068d3e89af --- /dev/null +++ b/2023/31xxx/CVE-2023-31536.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31536", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31537.json b/2023/31xxx/CVE-2023-31537.json new file mode 100644 index 00000000000..f41de412a5f --- /dev/null +++ b/2023/31xxx/CVE-2023-31537.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31537", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31538.json b/2023/31xxx/CVE-2023-31538.json new file mode 100644 index 00000000000..a3644558c07 --- /dev/null +++ b/2023/31xxx/CVE-2023-31538.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31538", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31539.json b/2023/31xxx/CVE-2023-31539.json new file mode 100644 index 00000000000..4c3acf87234 --- /dev/null +++ b/2023/31xxx/CVE-2023-31539.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31539", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31540.json b/2023/31xxx/CVE-2023-31540.json new file mode 100644 index 00000000000..129a476fa03 --- /dev/null +++ b/2023/31xxx/CVE-2023-31540.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31540", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31541.json b/2023/31xxx/CVE-2023-31541.json new file mode 100644 index 00000000000..99cb92ca127 --- /dev/null +++ b/2023/31xxx/CVE-2023-31541.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31541", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31542.json b/2023/31xxx/CVE-2023-31542.json new file mode 100644 index 00000000000..49481812578 --- /dev/null +++ b/2023/31xxx/CVE-2023-31542.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31542", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31543.json b/2023/31xxx/CVE-2023-31543.json new file mode 100644 index 00000000000..89ea47c999a --- /dev/null +++ b/2023/31xxx/CVE-2023-31543.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31543", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31544.json b/2023/31xxx/CVE-2023-31544.json new file mode 100644 index 00000000000..76605780b2c --- /dev/null +++ b/2023/31xxx/CVE-2023-31544.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31544", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31545.json b/2023/31xxx/CVE-2023-31545.json new file mode 100644 index 00000000000..d013b9dce9e --- /dev/null +++ b/2023/31xxx/CVE-2023-31545.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31545", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31546.json b/2023/31xxx/CVE-2023-31546.json new file mode 100644 index 00000000000..304bf8279b2 --- /dev/null +++ b/2023/31xxx/CVE-2023-31546.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31546", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31547.json b/2023/31xxx/CVE-2023-31547.json new file mode 100644 index 00000000000..db7f8885f62 --- /dev/null +++ b/2023/31xxx/CVE-2023-31547.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31547", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31548.json b/2023/31xxx/CVE-2023-31548.json new file mode 100644 index 00000000000..f68d15c84e2 --- /dev/null +++ b/2023/31xxx/CVE-2023-31548.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31548", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31549.json b/2023/31xxx/CVE-2023-31549.json new file mode 100644 index 00000000000..7c6a9ad63a3 --- /dev/null +++ b/2023/31xxx/CVE-2023-31549.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31549", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31550.json b/2023/31xxx/CVE-2023-31550.json new file mode 100644 index 00000000000..fbdc711f07f --- /dev/null +++ b/2023/31xxx/CVE-2023-31550.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31550", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31551.json b/2023/31xxx/CVE-2023-31551.json new file mode 100644 index 00000000000..f8706c9fe5f --- /dev/null +++ b/2023/31xxx/CVE-2023-31551.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31551", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31552.json b/2023/31xxx/CVE-2023-31552.json new file mode 100644 index 00000000000..ea5eb40c6bc --- /dev/null +++ b/2023/31xxx/CVE-2023-31552.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31552", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31553.json b/2023/31xxx/CVE-2023-31553.json new file mode 100644 index 00000000000..e8389fb7d43 --- /dev/null +++ b/2023/31xxx/CVE-2023-31553.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31553", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31554.json b/2023/31xxx/CVE-2023-31554.json new file mode 100644 index 00000000000..2fa7d19ed70 --- /dev/null +++ b/2023/31xxx/CVE-2023-31554.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31554", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31555.json b/2023/31xxx/CVE-2023-31555.json new file mode 100644 index 00000000000..41753ad2c03 --- /dev/null +++ b/2023/31xxx/CVE-2023-31555.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31555", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31556.json b/2023/31xxx/CVE-2023-31556.json new file mode 100644 index 00000000000..b026e8b470e --- /dev/null +++ b/2023/31xxx/CVE-2023-31556.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31556", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31557.json b/2023/31xxx/CVE-2023-31557.json new file mode 100644 index 00000000000..1cf7bf94ab7 --- /dev/null +++ b/2023/31xxx/CVE-2023-31557.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31557", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31558.json b/2023/31xxx/CVE-2023-31558.json new file mode 100644 index 00000000000..d5b18e1f641 --- /dev/null +++ b/2023/31xxx/CVE-2023-31558.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31558", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31559.json b/2023/31xxx/CVE-2023-31559.json new file mode 100644 index 00000000000..31466c4179a --- /dev/null +++ b/2023/31xxx/CVE-2023-31559.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31559", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31560.json b/2023/31xxx/CVE-2023-31560.json new file mode 100644 index 00000000000..b3c6c88b239 --- /dev/null +++ b/2023/31xxx/CVE-2023-31560.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31560", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31561.json b/2023/31xxx/CVE-2023-31561.json new file mode 100644 index 00000000000..027a9b6c5ae --- /dev/null +++ b/2023/31xxx/CVE-2023-31561.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31561", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31562.json b/2023/31xxx/CVE-2023-31562.json new file mode 100644 index 00000000000..37bb29e6fb7 --- /dev/null +++ b/2023/31xxx/CVE-2023-31562.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31562", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31563.json b/2023/31xxx/CVE-2023-31563.json new file mode 100644 index 00000000000..2f544c11d13 --- /dev/null +++ b/2023/31xxx/CVE-2023-31563.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-31563", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file