diff --git a/2022/40xxx/CVE-2022-40540.json b/2022/40xxx/CVE-2022-40540.json index afda111f4b3..6a10daee4b7 100644 --- a/2022/40xxx/CVE-2022-40540.json +++ b/2022/40xxx/CVE-2022-40540.json @@ -117,6 +117,11 @@ "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin", "refsource": "MISC", "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230616-0001/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230616-0001/" } ] }, diff --git a/2023/28xxx/CVE-2023-28709.json b/2023/28xxx/CVE-2023-28709.json index 569a3322886..33d61594fae 100644 --- a/2023/28xxx/CVE-2023-28709.json +++ b/2023/28xxx/CVE-2023-28709.json @@ -84,6 +84,11 @@ "url": "https://security.gentoo.org/glsa/202305-37", "refsource": "MISC", "name": "https://security.gentoo.org/glsa/202305-37" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230616-0004/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230616-0004/" } ] }, diff --git a/2023/30xxx/CVE-2023-30086.json b/2023/30xxx/CVE-2023-30086.json index 3c58d842fcc..1ab8b31a963 100644 --- a/2023/30xxx/CVE-2023-30086.json +++ b/2023/30xxx/CVE-2023-30086.json @@ -66,6 +66,11 @@ "url": "https://gitlab.com/libtiff/libtiff/-/issues/538", "refsource": "MISC", "name": "https://gitlab.com/libtiff/libtiff/-/issues/538" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230616-0003/", + "url": "https://security.netapp.com/advisory/ntap-20230616-0003/" } ] } diff --git a/2023/31xxx/CVE-2023-31655.json b/2023/31xxx/CVE-2023-31655.json index 43ae41b4e9f..3c433a5cbd6 100644 --- a/2023/31xxx/CVE-2023-31655.json +++ b/2023/31xxx/CVE-2023-31655.json @@ -56,6 +56,11 @@ "url": "https://github.com/RedisLabs/redisraft/issues/608", "refsource": "MISC", "name": "https://github.com/RedisLabs/redisraft/issues/608" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230616-0005/", + "url": "https://security.netapp.com/advisory/ntap-20230616-0005/" } ] } diff --git a/2023/32xxx/CVE-2023-32233.json b/2023/32xxx/CVE-2023-32233.json index 3b91d315b46..ec6ad5a74cd 100644 --- a/2023/32xxx/CVE-2023-32233.json +++ b/2023/32xxx/CVE-2023-32233.json @@ -91,6 +91,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230605 [SECURITY] [DLA 3446-1] linux-5.10 security update", "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230616-0002/", + "url": "https://security.netapp.com/advisory/ntap-20230616-0002/" } ] } diff --git a/2023/32xxx/CVE-2023-32305.json b/2023/32xxx/CVE-2023-32305.json index 844580dad65..e6c440710a6 100644 --- a/2023/32xxx/CVE-2023-32305.json +++ b/2023/32xxx/CVE-2023-32305.json @@ -72,6 +72,11 @@ "url": "https://github.com/aiven/aiven-extras/commit/8682ae01bec0791708bf25791786d776e2fb0250", "refsource": "MISC", "name": "https://github.com/aiven/aiven-extras/commit/8682ae01bec0791708bf25791786d776e2fb0250" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230616-0006/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230616-0006/" } ] }, diff --git a/2023/34xxx/CVE-2023-34548.json b/2023/34xxx/CVE-2023-34548.json index 15a7f5e98a4..8334ec0371d 100644 --- a/2023/34xxx/CVE-2023-34548.json +++ b/2023/34xxx/CVE-2023-34548.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-34548", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-34548", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Simple Customer Relationship Management 1.0 is vulnerable to SQL Injection via the email parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2023/SCRMS-2023-05-27-1.0", + "refsource": "MISC", + "name": "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2023/SCRMS-2023-05-27-1.0" } ] } diff --git a/2023/35xxx/CVE-2023-35782.json b/2023/35xxx/CVE-2023-35782.json new file mode 100644 index 00000000000..6885933e197 --- /dev/null +++ b/2023/35xxx/CVE-2023-35782.json @@ -0,0 +1,76 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2023-35782", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The ipandlanguageredirect extension before 5.1.2 for TYPO3 allows SQL Injection." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://typo3.org/security/advisory/typo3-ext-sa-2023-005", + "refsource": "MISC", + "name": "https://typo3.org/security/advisory/typo3-ext-sa-2023-005" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:N/C:H/I:L/PR:N/S:U/UI:N", + "version": "3.1" + } + } +} \ No newline at end of file diff --git a/2023/35xxx/CVE-2023-35783.json b/2023/35xxx/CVE-2023-35783.json new file mode 100644 index 00000000000..eda349dadf6 --- /dev/null +++ b/2023/35xxx/CVE-2023-35783.json @@ -0,0 +1,76 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2023-35783", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The ke_search (aka Faceted Search) extension before 4.0.3, 4.1.x through 4.6.x before 4.6.6, and 5.x before 5.0.2 for TYPO3 allows XSS via indexed data." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://typo3.org/security/advisory/typo3-ext-sa-2023-004", + "refsource": "MISC", + "name": "https://typo3.org/security/advisory/typo3-ext-sa-2023-004" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:L/C:L/I:L/PR:L/S:U/UI:N", + "version": "3.1" + } + } +} \ No newline at end of file diff --git a/2023/3xxx/CVE-2023-3296.json b/2023/3xxx/CVE-2023-3296.json new file mode 100644 index 00000000000..c631d4f5275 --- /dev/null +++ b/2023/3xxx/CVE-2023-3296.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-3296", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/3xxx/CVE-2023-3297.json b/2023/3xxx/CVE-2023-3297.json new file mode 100644 index 00000000000..bdebb16847a --- /dev/null +++ b/2023/3xxx/CVE-2023-3297.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-3297", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file