diff --git a/2017/6xxx/CVE-2017-6679.json b/2017/6xxx/CVE-2017-6679.json index 24eab9a377b..24993220ef1 100644 --- a/2017/6xxx/CVE-2017-6679.json +++ b/2017/6xxx/CVE-2017-6679.json @@ -71,6 +71,11 @@ "name": "https://support.umbrella.com/hc/en-us/articles/115004154423", "refsource": "MISC", "url": "https://support.umbrella.com/hc/en-us/articles/115004154423" + }, + { + "refsource": "CISCO", + "name": "20230816 Cisco Umbrella Virtual Appliance Undocumented Support Tunnel Vulnerability", + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-tunnel-gJw5thgE" } ] } diff --git a/2022/30xxx/CVE-2022-30333.json b/2022/30xxx/CVE-2022-30333.json index ef5b7557677..5f0303372bd 100644 --- a/2022/30xxx/CVE-2022-30333.json +++ b/2022/30xxx/CVE-2022-30333.json @@ -71,6 +71,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/167989/Zimbra-UnRAR-Path-Traversal.html", "url": "http://packetstormsecurity.com/files/167989/Zimbra-UnRAR-Path-Traversal.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230817 [SECURITY] [DLA 3534-1] rar security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00022.html" } ] } diff --git a/2022/48xxx/CVE-2022-48579.json b/2022/48xxx/CVE-2022-48579.json index 81c5b1feb0a..74ad4716df7 100644 --- a/2022/48xxx/CVE-2022-48579.json +++ b/2022/48xxx/CVE-2022-48579.json @@ -56,6 +56,11 @@ "url": "https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee", "refsource": "MISC", "name": "https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230817 [SECURITY] [DLA 3535-1] unrar-nonfree security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00023.html" } ] } diff --git a/2023/20xxx/CVE-2023-20593.json b/2023/20xxx/CVE-2023-20593.json index 47a2e36da04..a0a32a5d315 100644 --- a/2023/20xxx/CVE-2023-20593.json +++ b/2023/20xxx/CVE-2023-20593.json @@ -323,6 +323,16 @@ "url": "http://www.openwall.com/lists/oss-security/2023/08/08/6", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2023/08/08/6" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/16/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/16/4" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/16/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/16/5" } ] }, diff --git a/2023/20xxx/CVE-2023-20867.json b/2023/20xxx/CVE-2023-20867.json index 0cfd3270ce5..ba2bcd41ffa 100644 --- a/2023/20xxx/CVE-2023-20867.json +++ b/2023/20xxx/CVE-2023-20867.json @@ -71,6 +71,11 @@ "url": "https://security.netapp.com/advisory/ntap-20230725-0001/", "refsource": "MISC", "name": "https://security.netapp.com/advisory/ntap-20230725-0001/" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00020.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2023/08/msg00020.html" } ] }, diff --git a/2023/21xxx/CVE-2023-21930.json b/2023/21xxx/CVE-2023-21930.json index 23ec63d226a..350dd8e6e8b 100644 --- a/2023/21xxx/CVE-2023-21930.json +++ b/2023/21xxx/CVE-2023-21930.json @@ -95,6 +95,11 @@ "url": "https://www.debian.org/security/2023/dsa-5430", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5430" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5478", + "refsource": "MISC", + "name": "https://www.debian.org/security/2023/dsa-5478" } ] }, diff --git a/2023/21xxx/CVE-2023-21937.json b/2023/21xxx/CVE-2023-21937.json index 7b08b20478d..6e1104687c1 100644 --- a/2023/21xxx/CVE-2023-21937.json +++ b/2023/21xxx/CVE-2023-21937.json @@ -95,6 +95,11 @@ "url": "https://www.debian.org/security/2023/dsa-5430", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5430" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5478", + "refsource": "MISC", + "name": "https://www.debian.org/security/2023/dsa-5478" } ] }, diff --git a/2023/21xxx/CVE-2023-21938.json b/2023/21xxx/CVE-2023-21938.json index 84b5a1dee73..79dfe383759 100644 --- a/2023/21xxx/CVE-2023-21938.json +++ b/2023/21xxx/CVE-2023-21938.json @@ -95,6 +95,11 @@ "url": "https://www.debian.org/security/2023/dsa-5430", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5430" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5478", + "refsource": "MISC", + "name": "https://www.debian.org/security/2023/dsa-5478" } ] }, diff --git a/2023/21xxx/CVE-2023-21939.json b/2023/21xxx/CVE-2023-21939.json index 5cb61c3b7c7..6b87f9c57d7 100644 --- a/2023/21xxx/CVE-2023-21939.json +++ b/2023/21xxx/CVE-2023-21939.json @@ -95,6 +95,11 @@ "url": "https://www.debian.org/security/2023/dsa-5430", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5430" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5478", + "refsource": "MISC", + "name": "https://www.debian.org/security/2023/dsa-5478" } ] }, diff --git a/2023/21xxx/CVE-2023-21954.json b/2023/21xxx/CVE-2023-21954.json index 270d1241bc8..da00e109a4f 100644 --- a/2023/21xxx/CVE-2023-21954.json +++ b/2023/21xxx/CVE-2023-21954.json @@ -91,6 +91,11 @@ "url": "https://www.debian.org/security/2023/dsa-5430", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5430" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5478", + "refsource": "MISC", + "name": "https://www.debian.org/security/2023/dsa-5478" } ] }, diff --git a/2023/21xxx/CVE-2023-21967.json b/2023/21xxx/CVE-2023-21967.json index 13515014523..425efa066f3 100644 --- a/2023/21xxx/CVE-2023-21967.json +++ b/2023/21xxx/CVE-2023-21967.json @@ -95,6 +95,11 @@ "url": "https://www.debian.org/security/2023/dsa-5430", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5430" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5478", + "refsource": "MISC", + "name": "https://www.debian.org/security/2023/dsa-5478" } ] }, diff --git a/2023/21xxx/CVE-2023-21968.json b/2023/21xxx/CVE-2023-21968.json index 96064c81b35..5c33e347c4c 100644 --- a/2023/21xxx/CVE-2023-21968.json +++ b/2023/21xxx/CVE-2023-21968.json @@ -95,6 +95,11 @@ "url": "https://www.debian.org/security/2023/dsa-5430", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5430" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5478", + "refsource": "MISC", + "name": "https://www.debian.org/security/2023/dsa-5478" } ] }, diff --git a/2023/22xxx/CVE-2023-22006.json b/2023/22xxx/CVE-2023-22006.json index f10312f80db..a5b3adaaf0b 100644 --- a/2023/22xxx/CVE-2023-22006.json +++ b/2023/22xxx/CVE-2023-22006.json @@ -95,6 +95,11 @@ "url": "https://www.debian.org/security/2023/dsa-5458", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5458" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5478", + "refsource": "MISC", + "name": "https://www.debian.org/security/2023/dsa-5478" } ] }, diff --git a/2023/22xxx/CVE-2023-22036.json b/2023/22xxx/CVE-2023-22036.json index 9843f7684bb..afb1682a9a6 100644 --- a/2023/22xxx/CVE-2023-22036.json +++ b/2023/22xxx/CVE-2023-22036.json @@ -95,6 +95,11 @@ "url": "https://www.debian.org/security/2023/dsa-5458", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5458" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5478", + "refsource": "MISC", + "name": "https://www.debian.org/security/2023/dsa-5478" } ] }, diff --git a/2023/22xxx/CVE-2023-22041.json b/2023/22xxx/CVE-2023-22041.json index 41d4b10e54d..2a131192690 100644 --- a/2023/22xxx/CVE-2023-22041.json +++ b/2023/22xxx/CVE-2023-22041.json @@ -99,6 +99,11 @@ "url": "https://www.debian.org/security/2023/dsa-5458", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5458" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5478", + "refsource": "MISC", + "name": "https://www.debian.org/security/2023/dsa-5478" } ] }, diff --git a/2023/22xxx/CVE-2023-22045.json b/2023/22xxx/CVE-2023-22045.json index 336fc4c005b..e86b10220d7 100644 --- a/2023/22xxx/CVE-2023-22045.json +++ b/2023/22xxx/CVE-2023-22045.json @@ -103,6 +103,11 @@ "url": "https://www.debian.org/security/2023/dsa-5458", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5458" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5478", + "refsource": "MISC", + "name": "https://www.debian.org/security/2023/dsa-5478" } ] }, diff --git a/2023/22xxx/CVE-2023-22049.json b/2023/22xxx/CVE-2023-22049.json index 2cc8e373a13..05deced23c4 100644 --- a/2023/22xxx/CVE-2023-22049.json +++ b/2023/22xxx/CVE-2023-22049.json @@ -103,6 +103,11 @@ "url": "https://www.debian.org/security/2023/dsa-5458", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5458" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5478", + "refsource": "MISC", + "name": "https://www.debian.org/security/2023/dsa-5478" } ] }, diff --git a/2023/22xxx/CVE-2023-22955.json b/2023/22xxx/CVE-2023-22955.json index 376b3c44411..79d4dc22b68 100644 --- a/2023/22xxx/CVE-2023-22955.json +++ b/2023/22xxx/CVE-2023-22955.json @@ -66,6 +66,11 @@ "refsource": "FULLDISC", "name": "20230815 Missing Immutable Root of Trust in Hardware (CWE-1326) / CVE-2023-22955", "url": "http://seclists.org/fulldisclosure/2023/Aug/17" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/174214/AudioCodes-VoIP-Phones-Insufficient-Firmware-Validation.html", + "url": "http://packetstormsecurity.com/files/174214/AudioCodes-VoIP-Phones-Insufficient-Firmware-Validation.html" } ] } diff --git a/2023/22xxx/CVE-2023-22956.json b/2023/22xxx/CVE-2023-22956.json index 1a944d11559..d6a7c78cab2 100644 --- a/2023/22xxx/CVE-2023-22956.json +++ b/2023/22xxx/CVE-2023-22956.json @@ -66,6 +66,11 @@ "refsource": "FULLDISC", "name": "20230815 Use of Hard-coded Cryptographic Key (CWE-321) / CVE-2023-22956", "url": "http://seclists.org/fulldisclosure/2023/Aug/16" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/174216/AudioCodes-VoIP-Phones-Hardcoded-Key.html", + "url": "http://packetstormsecurity.com/files/174216/AudioCodes-VoIP-Phones-Hardcoded-Key.html" } ] } diff --git a/2023/22xxx/CVE-2023-22957.json b/2023/22xxx/CVE-2023-22957.json index fb2897a9ac3..7d4be73e14a 100644 --- a/2023/22xxx/CVE-2023-22957.json +++ b/2023/22xxx/CVE-2023-22957.json @@ -66,6 +66,11 @@ "refsource": "FULLDISC", "name": "20230815 Use of Hard-coded Cryptographic Key (CWE-321) / CVE-2023-22957", "url": "http://seclists.org/fulldisclosure/2023/Aug/15" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/174215/AudioCodes-VoIP-Phones-Hardcoded-Key.html", + "url": "http://packetstormsecurity.com/files/174215/AudioCodes-VoIP-Phones-Hardcoded-Key.html" } ] } diff --git a/2023/25xxx/CVE-2023-25599.json b/2023/25xxx/CVE-2023-25599.json index 60d65448190..3479f73d6be 100644 --- a/2023/25xxx/CVE-2023-25599.json +++ b/2023/25xxx/CVE-2023-25599.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability in the conferencing component of Mitel MiVoice Connect through 19.3 SP2 and 20.x, 21.x, and 22.x through 22.24.1500.0 could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient validation for the test_presenter.php page. A successful exploit could allow an attacker to execute arbitrary scripts." + "value": "A vulnerability in the conferencing component of Mitel MiVoice Connect through 19.3 SP2, 22.24.1500.0 could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient validation for the test_presenter.php page. A successful exploit could allow an attacker to execute arbitrary scripts." } ] }, diff --git a/2023/26xxx/CVE-2023-26469.json b/2023/26xxx/CVE-2023-26469.json index 4810ade40ef..a2c821aa002 100644 --- a/2023/26xxx/CVE-2023-26469.json +++ b/2023/26xxx/CVE-2023-26469.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-26469", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-26469", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Jorani 1.0.0, an attacker could leverage path traversal to access files and execute code on the server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://jorani.org/security-features-in-lms.html", + "refsource": "MISC", + "name": "https://jorani.org/security-features-in-lms.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/Orange-Cyberdefense/CVE-repository/tree/master", + "url": "https://github.com/Orange-Cyberdefense/CVE-repository/tree/master" } ] } diff --git a/2023/2xxx/CVE-2023-2977.json b/2023/2xxx/CVE-2023-2977.json index be15bc1842e..91dc827c415 100644 --- a/2023/2xxx/CVE-2023-2977.json +++ b/2023/2xxx/CVE-2023-2977.json @@ -68,6 +68,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230621 [SECURITY] [DLA 3463-1] opensc security update", "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00025.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2023-29530cc60b", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAR54OV6EHA56B4XJF6RNPQ4HJ2ITU66/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2023-2afb831742", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJD4Q4AJSGE5UIJI7OUYZY4HGGCVYQNI/" } ] }, diff --git a/2023/30xxx/CVE-2023-30589.json b/2023/30xxx/CVE-2023-30589.json index fb5b44b866e..11028f7ccb4 100644 --- a/2023/30xxx/CVE-2023-30589.json +++ b/2023/30xxx/CVE-2023-30589.json @@ -98,6 +98,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCVG4TQRGTK4LKAZKVEQAUEJM7DUACYE/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCVG4TQRGTK4LKAZKVEQAUEJM7DUACYE/" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IV326O2X4BE3SINX5FJHMAKVHUAA4ZYF/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IV326O2X4BE3SINX5FJHMAKVHUAA4ZYF/" } ] } diff --git a/2023/34xxx/CVE-2023-34634.json b/2023/34xxx/CVE-2023-34634.json index f03e98eae2e..ba79fa3efbd 100644 --- a/2023/34xxx/CVE-2023-34634.json +++ b/2023/34xxx/CVE-2023-34634.json @@ -71,6 +71,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/173825/GreenShot-1.2.10-Arbitrary-Code-Execution.html", "url": "http://packetstormsecurity.com/files/173825/GreenShot-1.2.10-Arbitrary-Code-Execution.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/174222/Greenshot-1.3.274-Deserialization-Command-Execution.html", + "url": "http://packetstormsecurity.com/files/174222/Greenshot-1.3.274-Deserialization-Command-Execution.html" } ] } diff --git a/2023/38xxx/CVE-2023-38408.json b/2023/38xxx/CVE-2023-38408.json index 255eb4c2ea5..fcef0b27bc5 100644 --- a/2023/38xxx/CVE-2023-38408.json +++ b/2023/38xxx/CVE-2023-38408.json @@ -126,6 +126,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230803-0010/", "url": "https://security.netapp.com/advisory/ntap-20230803-0010/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230817 [SECURITY] [DLA 3532-1] openssh security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html" } ] } diff --git a/2023/38xxx/CVE-2023-38497.json b/2023/38xxx/CVE-2023-38497.json index abad7650fb6..e6c736f7ab2 100644 --- a/2023/38xxx/CVE-2023-38497.json +++ b/2023/38xxx/CVE-2023-38497.json @@ -88,6 +88,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGKE6PGM4HIQUHPJRBQAHMELINSGN4H4/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGKE6PGM4HIQUHPJRBQAHMELINSGN4H4/" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMEXGUGPW5OBSQA6URTBNDSU3RAEFOZ4/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMEXGUGPW5OBSQA6URTBNDSU3RAEFOZ4/" } ] }, diff --git a/2023/38xxx/CVE-2023-38633.json b/2023/38xxx/CVE-2023-38633.json index 89e393952da..94e64a3a8ad 100644 --- a/2023/38xxx/CVE-2023-38633.json +++ b/2023/38xxx/CVE-2023-38633.json @@ -81,6 +81,11 @@ "refsource": "FEDORA", "name": "FEDORA-2023-fc79ee273d", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5BCXT5GW6RCL45ZUHUZR4CJG2BAFDVC/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2023-0873c38acd", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/422NTIHIEBRASIG2DWXYBH4ADYMHY626/" } ] } diff --git a/2023/38xxx/CVE-2023-38843.json b/2023/38xxx/CVE-2023-38843.json index 67cad82b24a..cd537357291 100644 --- a/2023/38xxx/CVE-2023-38843.json +++ b/2023/38xxx/CVE-2023-38843.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-38843", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-38843", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in Atlos v.1.0 allows an authenticated attacker to execute arbitrary code via a crafted payload into the description field in the incident function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/senzee1984/ff30f0914db39d2741ab17332f0fc6e1", + "refsource": "MISC", + "name": "https://gist.github.com/senzee1984/ff30f0914db39d2741ab17332f0fc6e1" + }, + { + "url": "https://github.com/atlosdotorg/atlos", + "refsource": "MISC", + "name": "https://github.com/atlosdotorg/atlos" } ] } diff --git a/2023/38xxx/CVE-2023-38905.json b/2023/38xxx/CVE-2023-38905.json index 9004f76ace5..066912ef04f 100644 --- a/2023/38xxx/CVE-2023-38905.json +++ b/2023/38xxx/CVE-2023-38905.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-38905", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-38905", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL injection vulnerability in Jeecg-boot v.3.5.0 and before allows a local attacker to cause a denial of service via the Benchmark, PG_Sleep, DBMS_Lock.Sleep, Waitfor, DECODE, and DBMS_PIPE.RECEIVE_MESSAGE functions." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/jeecgboot/jeecg-boot/issues/4737", + "refsource": "MISC", + "name": "https://github.com/jeecgboot/jeecg-boot/issues/4737" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/wealeson1/e24fc8575f4e051320d69e9a75080642", + "url": "https://gist.github.com/wealeson1/e24fc8575f4e051320d69e9a75080642" } ] } diff --git a/2023/39xxx/CVE-2023-39741.json b/2023/39xxx/CVE-2023-39741.json index c9a0bb1bf3d..b3303accefc 100644 --- a/2023/39xxx/CVE-2023-39741.json +++ b/2023/39xxx/CVE-2023-39741.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-39741", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-39741", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "lrzip v0.651 was discovered to contain a heap overflow via the libzpaq::PostProcessor::write(int) function at /libzpaq/libzpaq.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ckolivas/lrzip/issues/246", + "refsource": "MISC", + "name": "https://github.com/ckolivas/lrzip/issues/246" + }, + { + "url": "https://github.com/huanglei3/lrzip_poc/tree/main/lrzip_heap_overflow", + "refsource": "MISC", + "name": "https://github.com/huanglei3/lrzip_poc/tree/main/lrzip_heap_overflow" } ] } diff --git a/2023/39xxx/CVE-2023-39743.json b/2023/39xxx/CVE-2023-39743.json index 60b6e5662d6..dafe12bbff0 100644 --- a/2023/39xxx/CVE-2023-39743.json +++ b/2023/39xxx/CVE-2023-39743.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-39743", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-39743", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "lrzip-next LZMA v23.01 was discovered to contain an access violation via the component /bz3_decode_block src/libbz3.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/huanglei3/lrzip-next-poc/tree/main", + "refsource": "MISC", + "name": "https://github.com/huanglei3/lrzip-next-poc/tree/main" + }, + { + "url": "https://github.com/pete4abw/lrzip-next/issues/132", + "refsource": "MISC", + "name": "https://github.com/pete4abw/lrzip-next/issues/132" } ] } diff --git a/2023/40xxx/CVE-2023-40272.json b/2023/40xxx/CVE-2023-40272.json index b1a84c1996d..13230c191f6 100644 --- a/2023/40xxx/CVE-2023-40272.json +++ b/2023/40xxx/CVE-2023-40272.json @@ -59,6 +59,11 @@ "url": "https://lists.apache.org/thread/t03gktyzyor20rh06okd91jtqmw6k1l7", "refsource": "MISC", "name": "https://lists.apache.org/thread/t03gktyzyor20rh06okd91jtqmw6k1l7" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/17/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/17/1" } ] }, diff --git a/2023/40xxx/CVE-2023-40313.json b/2023/40xxx/CVE-2023-40313.json index f34956d4138..36db1ef427e 100644 --- a/2023/40xxx/CVE-2023-40313.json +++ b/2023/40xxx/CVE-2023-40313.json @@ -1,17 +1,134 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-40313", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@opennms.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A BeanShell interpreter in remote server mode runs in OpenMNS Horizon versions earlier than 32.0.2 and in related Meridian versions which could allow arbitrary remote Java code execution. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "The OpenNMS Group", + "product": { + "product_data": [ + { + "product_name": "Horizon", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "32.0.2", + "status": "affected", + "version": "29.0.4", + "versionType": "maven" + }, + { + "lessThan": "29.0.4", + "status": "unknown", + "version": "0", + "versionType": "maven" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "Meridian", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "2020.0.0", + "version_value": "2020.1.37" + }, + { + "version_affected": "<=", + "version_name": "2021.0.0", + "version_value": "2021.1.29" + }, + { + "version_affected": "<=", + "version_name": "2022.0.0", + "version_value": "2022.1.18" + }, + { + "version_affected": "<=", + "version_name": "2023.0.0", + "version_value": "2023.1.5" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html", + "refsource": "MISC", + "name": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html" + }, + { + "url": "https://github.com/OpenNMS/opennms/pull/6368", + "refsource": "MISC", + "name": "https://github.com/OpenNMS/opennms/pull/6368" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", + "version": "3.1" } ] } diff --git a/2023/40xxx/CVE-2023-40336.json b/2023/40xxx/CVE-2023-40336.json index 839506d36f2..93cbc20db3b 100644 --- a/2023/40xxx/CVE-2023-40336.json +++ b/2023/40xxx/CVE-2023-40336.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3106", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3106" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/16/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/16/3" } ] } diff --git a/2023/40xxx/CVE-2023-40337.json b/2023/40xxx/CVE-2023-40337.json index 4511c0ec545..84a14c24d35 100644 --- a/2023/40xxx/CVE-2023-40337.json +++ b/2023/40xxx/CVE-2023-40337.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3105", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3105" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/16/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/16/3" } ] } diff --git a/2023/40xxx/CVE-2023-40338.json b/2023/40xxx/CVE-2023-40338.json index c97a01b9076..7c721916f15 100644 --- a/2023/40xxx/CVE-2023-40338.json +++ b/2023/40xxx/CVE-2023-40338.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3109", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3109" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/16/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/16/3" } ] } diff --git a/2023/40xxx/CVE-2023-40339.json b/2023/40xxx/CVE-2023-40339.json index 22397c8a0b9..7f3813eb9e7 100644 --- a/2023/40xxx/CVE-2023-40339.json +++ b/2023/40xxx/CVE-2023-40339.json @@ -71,6 +71,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3090", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3090" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/16/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/16/3" } ] } diff --git a/2023/40xxx/CVE-2023-40340.json b/2023/40xxx/CVE-2023-40340.json index d677fea1807..6dffc6abdd7 100644 --- a/2023/40xxx/CVE-2023-40340.json +++ b/2023/40xxx/CVE-2023-40340.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3196", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3196" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/16/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/16/3" } ] } diff --git a/2023/40xxx/CVE-2023-40341.json b/2023/40xxx/CVE-2023-40341.json index f84d6bf436e..99c4cb04193 100644 --- a/2023/40xxx/CVE-2023-40341.json +++ b/2023/40xxx/CVE-2023-40341.json @@ -71,6 +71,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3116", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3116" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/16/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/16/3" } ] } diff --git a/2023/40xxx/CVE-2023-40342.json b/2023/40xxx/CVE-2023-40342.json index 0c6ca86fa42..06b1718401e 100644 --- a/2023/40xxx/CVE-2023-40342.json +++ b/2023/40xxx/CVE-2023-40342.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3223", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3223" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/16/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/16/3" } ] } diff --git a/2023/40xxx/CVE-2023-40343.json b/2023/40xxx/CVE-2023-40343.json index 0fea11785bc..f88e344891b 100644 --- a/2023/40xxx/CVE-2023-40343.json +++ b/2023/40xxx/CVE-2023-40343.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3229", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3229" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/16/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/16/3" } ] } diff --git a/2023/40xxx/CVE-2023-40344.json b/2023/40xxx/CVE-2023-40344.json index 53b59858ab0..6da6e525dc5 100644 --- a/2023/40xxx/CVE-2023-40344.json +++ b/2023/40xxx/CVE-2023-40344.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3214%20(1)", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3214%20(1)" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/16/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/16/3" } ] } diff --git a/2023/40xxx/CVE-2023-40345.json b/2023/40xxx/CVE-2023-40345.json index 8ae20461699..2afc42b202e 100644 --- a/2023/40xxx/CVE-2023-40345.json +++ b/2023/40xxx/CVE-2023-40345.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3214%20(2)", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3214%20(2)" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/16/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/16/3" } ] } diff --git a/2023/40xxx/CVE-2023-40346.json b/2023/40xxx/CVE-2023-40346.json index d1bf5f8a6ac..e1b71f43c86 100644 --- a/2023/40xxx/CVE-2023-40346.json +++ b/2023/40xxx/CVE-2023-40346.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3071", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3071" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/16/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/16/3" } ] } diff --git a/2023/40xxx/CVE-2023-40347.json b/2023/40xxx/CVE-2023-40347.json index 078402f60f9..8d21770f5b5 100644 --- a/2023/40xxx/CVE-2023-40347.json +++ b/2023/40xxx/CVE-2023-40347.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3153", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3153" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/16/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/16/3" } ] } diff --git a/2023/40xxx/CVE-2023-40348.json b/2023/40xxx/CVE-2023-40348.json index 0d00818a3f6..9165a7c8e8e 100644 --- a/2023/40xxx/CVE-2023-40348.json +++ b/2023/40xxx/CVE-2023-40348.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-2894", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-2894" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/16/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/16/3" } ] } diff --git a/2023/40xxx/CVE-2023-40349.json b/2023/40xxx/CVE-2023-40349.json index 97dde493993..a8615cb4774 100644 --- a/2023/40xxx/CVE-2023-40349.json +++ b/2023/40xxx/CVE-2023-40349.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-2894", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-2894" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/16/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/16/3" } ] } diff --git a/2023/40xxx/CVE-2023-40350.json b/2023/40xxx/CVE-2023-40350.json index c8606d6ee5a..9b8211a6e9f 100644 --- a/2023/40xxx/CVE-2023-40350.json +++ b/2023/40xxx/CVE-2023-40350.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-2811", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-2811" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/16/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/16/3" } ] } diff --git a/2023/40xxx/CVE-2023-40351.json b/2023/40xxx/CVE-2023-40351.json index 717dc4c9ad2..5deda9aa440 100644 --- a/2023/40xxx/CVE-2023-40351.json +++ b/2023/40xxx/CVE-2023-40351.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3201", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3201" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/16/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/16/3" } ] } diff --git a/2023/40xxx/CVE-2023-40621.json b/2023/40xxx/CVE-2023-40621.json new file mode 100644 index 00000000000..5cf1def61b7 --- /dev/null +++ b/2023/40xxx/CVE-2023-40621.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-40621", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/40xxx/CVE-2023-40622.json b/2023/40xxx/CVE-2023-40622.json new file mode 100644 index 00000000000..1af71978e21 --- /dev/null +++ b/2023/40xxx/CVE-2023-40622.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-40622", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/40xxx/CVE-2023-40623.json b/2023/40xxx/CVE-2023-40623.json new file mode 100644 index 00000000000..baf84763d44 --- /dev/null +++ b/2023/40xxx/CVE-2023-40623.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-40623", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/40xxx/CVE-2023-40624.json b/2023/40xxx/CVE-2023-40624.json new file mode 100644 index 00000000000..cd1abb60f87 --- /dev/null +++ b/2023/40xxx/CVE-2023-40624.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-40624", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/40xxx/CVE-2023-40625.json b/2023/40xxx/CVE-2023-40625.json new file mode 100644 index 00000000000..dcc56f8ad14 --- /dev/null +++ b/2023/40xxx/CVE-2023-40625.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-40625", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/4xxx/CVE-2023-4382.json b/2023/4xxx/CVE-2023-4382.json index c56fa95bdd9..5d1403d6c00 100644 --- a/2023/4xxx/CVE-2023-4382.json +++ b/2023/4xxx/CVE-2023-4382.json @@ -67,6 +67,11 @@ "url": "https://vuldb.com/?ctiid.237314", "refsource": "MISC", "name": "https://vuldb.com/?ctiid.237314" + }, + { + "url": "http://packetstormsecurity.com/files/174212/Hyip-Rio-2.1-Cross-Site-Scripting-File-Upload.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/174212/Hyip-Rio-2.1-Cross-Site-Scripting-File-Upload.html" } ] }, diff --git a/2023/4xxx/CVE-2023-4404.json b/2023/4xxx/CVE-2023-4404.json new file mode 100644 index 00000000000..1473eefc3c4 --- /dev/null +++ b/2023/4xxx/CVE-2023-4404.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-4404", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file