diff --git a/2023/20xxx/CVE-2023-20256.json b/2023/20xxx/CVE-2023-20256.json index 483d1217943..aae963e2a6d 100644 --- a/2023/20xxx/CVE-2023-20256.json +++ b/2023/20xxx/CVE-2023-20256.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "Authentication Bypass by Spoofing", + "cweId": "CWE-290" } ] } diff --git a/2023/20xxx/CVE-2023-20259.json b/2023/20xxx/CVE-2023-20259.json index 438e038e08f..848698be334 100644 --- a/2023/20xxx/CVE-2023-20259.json +++ b/2023/20xxx/CVE-2023-20259.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "Uncontrolled Resource Consumption", + "cweId": "CWE-400" } ] } diff --git a/2023/20xxx/CVE-2023-20261.json b/2023/20xxx/CVE-2023-20261.json index 17880c376a6..6c9a16156fd 100644 --- a/2023/20xxx/CVE-2023-20261.json +++ b/2023/20xxx/CVE-2023-20261.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "Improper Access Control", + "cweId": "CWE-284" } ] } diff --git a/2023/20xxx/CVE-2023-20262.json b/2023/20xxx/CVE-2023-20262.json index 1b4af637b40..bde3ab8e115 100644 --- a/2023/20xxx/CVE-2023-20262.json +++ b/2023/20xxx/CVE-2023-20262.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "Resource Management Errors", + "cweId": "CWE-399" } ] } @@ -35,7 +36,7 @@ "product": { "product_data": [ { - "product_name": "Cisco Catalyst SD-WAN Manager", + "product_name": "Cisco SD-WAN Solution", "version": { "version_data": [ { diff --git a/2023/20xxx/CVE-2023-20263.json b/2023/20xxx/CVE-2023-20263.json index 8157a41426e..512e2bfa53a 100644 --- a/2023/20xxx/CVE-2023-20263.json +++ b/2023/20xxx/CVE-2023-20263.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "URL Redirection to Untrusted Site ('Open Redirect')", + "cweId": "CWE-601" } ] } diff --git a/2023/20xxx/CVE-2023-20264.json b/2023/20xxx/CVE-2023-20264.json index dad8e677f7f..cf1300ccd6e 100644 --- a/2023/20xxx/CVE-2023-20264.json +++ b/2023/20xxx/CVE-2023-20264.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "URL Redirection to Untrusted Site ('Open Redirect')", + "cweId": "CWE-601" } ] } diff --git a/2023/20xxx/CVE-2023-20265.json b/2023/20xxx/CVE-2023-20265.json index 3b1c8a8b3dc..bf8a2bacab0 100644 --- a/2023/20xxx/CVE-2023-20265.json +++ b/2023/20xxx/CVE-2023-20265.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" } ] } diff --git a/2023/20xxx/CVE-2023-20266.json b/2023/20xxx/CVE-2023-20266.json index 477ecf04cc1..6cbd007d9f1 100644 --- a/2023/20xxx/CVE-2023-20266.json +++ b/2023/20xxx/CVE-2023-20266.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "Improper Verification of Cryptographic Signature", + "cweId": "CWE-347" } ] } @@ -38,6 +39,10 @@ "product_name": "Cisco Emergency Responder", "version": { "version_data": [ + { + "version_affected": "=", + "version_value": "12.5(1)SU4" + }, { "version_affected": "=", "version_value": "12.5(1)SU8a" diff --git a/2023/20xxx/CVE-2023-20267.json b/2023/20xxx/CVE-2023-20267.json index a5c76a8ce19..4ab6cbb4911 100644 --- a/2023/20xxx/CVE-2023-20267.json +++ b/2023/20xxx/CVE-2023-20267.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "Improper Access Control", + "cweId": "CWE-284" } ] } diff --git a/2023/20xxx/CVE-2023-20268.json b/2023/20xxx/CVE-2023-20268.json index fbe8e7a6b41..4763886ac82 100644 --- a/2023/20xxx/CVE-2023-20268.json +++ b/2023/20xxx/CVE-2023-20268.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "Uncontrolled Resource Consumption", + "cweId": "CWE-400" } ] }