diff --git a/2018/1000xxx/CVE-2018-1000807.json b/2018/1000xxx/CVE-2018-1000807.json index fa3696a63ab..f58664abaff 100644 --- a/2018/1000xxx/CVE-2018-1000807.json +++ b/2018/1000xxx/CVE-2018-1000807.json @@ -74,6 +74,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2019:1104", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/pyca/pyopenssl/commit/e73818600065821d588af475b024f4eb518c3509", + "url": "https://github.com/pyca/pyopenssl/commit/e73818600065821d588af475b024f4eb518c3509" } ] } diff --git a/2019/11xxx/CVE-2019-11069.json b/2019/11xxx/CVE-2019-11069.json index d55287a22d9..cf7c7438b71 100644 --- a/2019/11xxx/CVE-2019-11069.json +++ b/2019/11xxx/CVE-2019-11069.json @@ -66,6 +66,11 @@ "refsource": "CONFIRM", "name": "https://github.com/sequelize/sequelize/blob/98cb17c17f73e2aa1792aa5a1d31216ba984b456/lib/dialects/postgres/connection-manager.js#L158-L160", "url": "https://github.com/sequelize/sequelize/blob/98cb17c17f73e2aa1792aa5a1d31216ba984b456/lib/dialects/postgres/connection-manager.js#L158-L160" + }, + { + "refsource": "MISC", + "name": "https://github.com/sequelize/sequelize/commit/850c7fd04669e0fef9238b6dc4f8d6ee93ed71e9", + "url": "https://github.com/sequelize/sequelize/commit/850c7fd04669e0fef9238b6dc4f8d6ee93ed71e9" } ] } diff --git a/2023/44xxx/CVE-2023-44762.json b/2023/44xxx/CVE-2023-44762.json index 1709747db41..b5ddd8bd408 100644 --- a/2023/44xxx/CVE-2023-44762.json +++ b/2023/44xxx/CVE-2023-44762.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "A Cross Site Scripting (XSS) vulnerability in Concrete CMS v.9.2.1 allows an attacker to execute arbitrary code via a crafted script to the Tags from Settings - Tags." + "value": "A Cross Site Scripting (XSS) vulnerability in Concrete CMS from versions 9.2.0 to 9.2.2 allows an attacker to execute arbitrary code via a crafted script to the Tags from Settings - Tags." } ] }, diff --git a/2023/48xxx/CVE-2023-48716.json b/2023/48xxx/CVE-2023-48716.json new file mode 100644 index 00000000000..53413637302 --- /dev/null +++ b/2023/48xxx/CVE-2023-48716.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48716", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48717.json b/2023/48xxx/CVE-2023-48717.json new file mode 100644 index 00000000000..34fa6780bcd --- /dev/null +++ b/2023/48xxx/CVE-2023-48717.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48717", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48718.json b/2023/48xxx/CVE-2023-48718.json new file mode 100644 index 00000000000..636ec0a1ef2 --- /dev/null +++ b/2023/48xxx/CVE-2023-48718.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48718", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48719.json b/2023/48xxx/CVE-2023-48719.json new file mode 100644 index 00000000000..dadb8c79095 --- /dev/null +++ b/2023/48xxx/CVE-2023-48719.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48719", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48720.json b/2023/48xxx/CVE-2023-48720.json new file mode 100644 index 00000000000..cecdfe5b0d5 --- /dev/null +++ b/2023/48xxx/CVE-2023-48720.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48720", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48721.json b/2023/48xxx/CVE-2023-48721.json new file mode 100644 index 00000000000..02e330f0124 --- /dev/null +++ b/2023/48xxx/CVE-2023-48721.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48721", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48722.json b/2023/48xxx/CVE-2023-48722.json new file mode 100644 index 00000000000..68de4fc2eb1 --- /dev/null +++ b/2023/48xxx/CVE-2023-48722.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48722", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/48xxx/CVE-2023-48723.json b/2023/48xxx/CVE-2023-48723.json new file mode 100644 index 00000000000..fc8124adffd --- /dev/null +++ b/2023/48xxx/CVE-2023-48723.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-48723", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/6xxx/CVE-2023-6196.json b/2023/6xxx/CVE-2023-6196.json new file mode 100644 index 00000000000..37d206db8d4 --- /dev/null +++ b/2023/6xxx/CVE-2023-6196.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-6196", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/6xxx/CVE-2023-6197.json b/2023/6xxx/CVE-2023-6197.json new file mode 100644 index 00000000000..1d9b197a66b --- /dev/null +++ b/2023/6xxx/CVE-2023-6197.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-6197", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file