From 5b60149e9728c1fd0236943af38051fec2528f28 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 7 Apr 2023 03:00:37 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/22xxx/CVE-2023-22310.json | 18 +++++++++++ 2023/22xxx/CVE-2023-22313.json | 18 +++++++++++ 2023/25xxx/CVE-2023-25076.json | 6 ++++ 2023/26xxx/CVE-2023-26817.json | 56 ++++++++++++++++++++++++++++++---- 2023/26xxx/CVE-2023-26820.json | 56 ++++++++++++++++++++++++++++++---- 2023/26xxx/CVE-2023-26848.json | 56 ++++++++++++++++++++++++++++++---- 2023/27xxx/CVE-2023-27391.json | 18 +++++++++++ 2023/28xxx/CVE-2023-28396.json | 18 +++++++++++ 2023/28xxx/CVE-2023-28397.json | 18 +++++++++++ 2023/28xxx/CVE-2023-28715.json | 18 +++++++++++ 2023/28xxx/CVE-2023-28741.json | 18 +++++++++++ 2023/28xxx/CVE-2023-28823.json | 18 +++++++++++ 2023/29xxx/CVE-2023-29165.json | 18 +++++++++++ 2023/29xxx/CVE-2023-29244.json | 18 +++++++++++ 2023/29xxx/CVE-2023-29476.json | 18 +++++++++++ 15 files changed, 354 insertions(+), 18 deletions(-) create mode 100644 2023/22xxx/CVE-2023-22310.json create mode 100644 2023/22xxx/CVE-2023-22313.json create mode 100644 2023/27xxx/CVE-2023-27391.json create mode 100644 2023/28xxx/CVE-2023-28396.json create mode 100644 2023/28xxx/CVE-2023-28397.json create mode 100644 2023/28xxx/CVE-2023-28715.json create mode 100644 2023/28xxx/CVE-2023-28741.json create mode 100644 2023/28xxx/CVE-2023-28823.json create mode 100644 2023/29xxx/CVE-2023-29165.json create mode 100644 2023/29xxx/CVE-2023-29244.json create mode 100644 2023/29xxx/CVE-2023-29476.json diff --git a/2023/22xxx/CVE-2023-22310.json b/2023/22xxx/CVE-2023-22310.json new file mode 100644 index 00000000000..659c021c72f --- /dev/null +++ b/2023/22xxx/CVE-2023-22310.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22310", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22313.json b/2023/22xxx/CVE-2023-22313.json new file mode 100644 index 00000000000..71ce6b51a53 --- /dev/null +++ b/2023/22xxx/CVE-2023-22313.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22313", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25076.json b/2023/25xxx/CVE-2023-25076.json index 741737b1f85..9ac9328bd0e 100644 --- a/2023/25xxx/CVE-2023-25076.json +++ b/2023/25xxx/CVE-2023-25076.json @@ -70,6 +70,12 @@ } ] }, + "credits": [ + { + "lang": "en", + "value": "Discovered by Keane O'Kelley of Cisco ASIG." + } + ], "impact": { "cvss": [ { diff --git a/2023/26xxx/CVE-2023-26817.json b/2023/26xxx/CVE-2023-26817.json index a2ff171fc0f..4ec0c67338a 100644 --- a/2023/26xxx/CVE-2023-26817.json +++ b/2023/26xxx/CVE-2023-26817.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-26817", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-26817", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "codefever before 2023.2.7-commit-b1c2e7f was discovered to contain a remote code execution (RCE) vulnerability via the component /controllers/api/user.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/PGYER/codefever/issues/140", + "refsource": "MISC", + "name": "https://github.com/PGYER/codefever/issues/140" } ] } diff --git a/2023/26xxx/CVE-2023-26820.json b/2023/26xxx/CVE-2023-26820.json index c2bde5b7d74..c21875da330 100644 --- a/2023/26xxx/CVE-2023-26820.json +++ b/2023/26xxx/CVE-2023-26820.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-26820", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-26820", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "siteproxy v1.0 was discovered to contain a path traversal vulnerability via the component index.js." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/netptop/siteproxy/issues/67", + "refsource": "MISC", + "name": "https://github.com/netptop/siteproxy/issues/67" } ] } diff --git a/2023/26xxx/CVE-2023-26848.json b/2023/26xxx/CVE-2023-26848.json index 5292342f49d..d666ed8e9ae 100644 --- a/2023/26xxx/CVE-2023-26848.json +++ b/2023/26xxx/CVE-2023-26848.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-26848", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-26848", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "TOTOlink A7100RU(V7.4cu.2313_B20191024) was discovered to contain a command injection vulnerability via the org parameter at setting/delStaticDhcpRules." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Am1ngl/ttt/tree/main/23", + "refsource": "MISC", + "name": "https://github.com/Am1ngl/ttt/tree/main/23" } ] } diff --git a/2023/27xxx/CVE-2023-27391.json b/2023/27xxx/CVE-2023-27391.json new file mode 100644 index 00000000000..51211f3bc2c --- /dev/null +++ b/2023/27xxx/CVE-2023-27391.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-27391", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28396.json b/2023/28xxx/CVE-2023-28396.json new file mode 100644 index 00000000000..17e12b53cf8 --- /dev/null +++ b/2023/28xxx/CVE-2023-28396.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28396", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28397.json b/2023/28xxx/CVE-2023-28397.json new file mode 100644 index 00000000000..e70574d2f43 --- /dev/null +++ b/2023/28xxx/CVE-2023-28397.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28397", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28715.json b/2023/28xxx/CVE-2023-28715.json new file mode 100644 index 00000000000..b76921474bc --- /dev/null +++ b/2023/28xxx/CVE-2023-28715.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28715", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28741.json b/2023/28xxx/CVE-2023-28741.json new file mode 100644 index 00000000000..5962da716a3 --- /dev/null +++ b/2023/28xxx/CVE-2023-28741.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28741", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28823.json b/2023/28xxx/CVE-2023-28823.json new file mode 100644 index 00000000000..25e0887121c --- /dev/null +++ b/2023/28xxx/CVE-2023-28823.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28823", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/29xxx/CVE-2023-29165.json b/2023/29xxx/CVE-2023-29165.json new file mode 100644 index 00000000000..8001e69f4b0 --- /dev/null +++ b/2023/29xxx/CVE-2023-29165.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-29165", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/29xxx/CVE-2023-29244.json b/2023/29xxx/CVE-2023-29244.json new file mode 100644 index 00000000000..05f38b0a672 --- /dev/null +++ b/2023/29xxx/CVE-2023-29244.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-29244", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/29xxx/CVE-2023-29476.json b/2023/29xxx/CVE-2023-29476.json new file mode 100644 index 00000000000..1720f33d387 --- /dev/null +++ b/2023/29xxx/CVE-2023-29476.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-29476", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file