From 5f74c905a12a2517769dd012a4d19291a1b7a721 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 7 Dec 2022 03:00:38 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/44xxx/CVE-2022-44849.json | 56 ++++++++++++++++++++++++++++++---- 2023/21xxx/CVE-2023-21624.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21625.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21626.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21627.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21628.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21629.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21630.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21631.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21632.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21633.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21634.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21635.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21636.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21637.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21638.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21639.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21640.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21641.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21642.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21643.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21644.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21645.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21646.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21647.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21648.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21649.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21650.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21651.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21652.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21653.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21654.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21655.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21656.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21657.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21658.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21659.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21660.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21661.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21662.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21663.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21664.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21665.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21666.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21667.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21668.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21669.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21670.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21671.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21672.json | 18 +++++++++++ 2023/21xxx/CVE-2023-21673.json | 18 +++++++++++ 51 files changed, 950 insertions(+), 6 deletions(-) create mode 100644 2023/21xxx/CVE-2023-21624.json create mode 100644 2023/21xxx/CVE-2023-21625.json create mode 100644 2023/21xxx/CVE-2023-21626.json create mode 100644 2023/21xxx/CVE-2023-21627.json create mode 100644 2023/21xxx/CVE-2023-21628.json create mode 100644 2023/21xxx/CVE-2023-21629.json create mode 100644 2023/21xxx/CVE-2023-21630.json create mode 100644 2023/21xxx/CVE-2023-21631.json create mode 100644 2023/21xxx/CVE-2023-21632.json create mode 100644 2023/21xxx/CVE-2023-21633.json create mode 100644 2023/21xxx/CVE-2023-21634.json create mode 100644 2023/21xxx/CVE-2023-21635.json create mode 100644 2023/21xxx/CVE-2023-21636.json create mode 100644 2023/21xxx/CVE-2023-21637.json create mode 100644 2023/21xxx/CVE-2023-21638.json create mode 100644 2023/21xxx/CVE-2023-21639.json create mode 100644 2023/21xxx/CVE-2023-21640.json create mode 100644 2023/21xxx/CVE-2023-21641.json create mode 100644 2023/21xxx/CVE-2023-21642.json create mode 100644 2023/21xxx/CVE-2023-21643.json create mode 100644 2023/21xxx/CVE-2023-21644.json create mode 100644 2023/21xxx/CVE-2023-21645.json create mode 100644 2023/21xxx/CVE-2023-21646.json create mode 100644 2023/21xxx/CVE-2023-21647.json create mode 100644 2023/21xxx/CVE-2023-21648.json create mode 100644 2023/21xxx/CVE-2023-21649.json create mode 100644 2023/21xxx/CVE-2023-21650.json create mode 100644 2023/21xxx/CVE-2023-21651.json create mode 100644 2023/21xxx/CVE-2023-21652.json create mode 100644 2023/21xxx/CVE-2023-21653.json create mode 100644 2023/21xxx/CVE-2023-21654.json create mode 100644 2023/21xxx/CVE-2023-21655.json create mode 100644 2023/21xxx/CVE-2023-21656.json create mode 100644 2023/21xxx/CVE-2023-21657.json create mode 100644 2023/21xxx/CVE-2023-21658.json create mode 100644 2023/21xxx/CVE-2023-21659.json create mode 100644 2023/21xxx/CVE-2023-21660.json create mode 100644 2023/21xxx/CVE-2023-21661.json create mode 100644 2023/21xxx/CVE-2023-21662.json create mode 100644 2023/21xxx/CVE-2023-21663.json create mode 100644 2023/21xxx/CVE-2023-21664.json create mode 100644 2023/21xxx/CVE-2023-21665.json create mode 100644 2023/21xxx/CVE-2023-21666.json create mode 100644 2023/21xxx/CVE-2023-21667.json create mode 100644 2023/21xxx/CVE-2023-21668.json create mode 100644 2023/21xxx/CVE-2023-21669.json create mode 100644 2023/21xxx/CVE-2023-21670.json create mode 100644 2023/21xxx/CVE-2023-21671.json create mode 100644 2023/21xxx/CVE-2023-21672.json create mode 100644 2023/21xxx/CVE-2023-21673.json diff --git a/2022/44xxx/CVE-2022-44849.json b/2022/44xxx/CVE-2022-44849.json index 9fb0919dcff..96ff6dadb45 100644 --- a/2022/44xxx/CVE-2022-44849.json +++ b/2022/44xxx/CVE-2022-44849.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-44849", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-44849", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Cross-Site Request Forgery (CSRF) in the Administrator List of MetInfo v7.7 allows attackers to arbitrarily add Super Administrator account." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gitee.com/MetInfo_1/MetInfo/issues/I5YM81?from=project-issue", + "refsource": "MISC", + "name": "https://gitee.com/MetInfo_1/MetInfo/issues/I5YM81?from=project-issue" } ] } diff --git a/2023/21xxx/CVE-2023-21624.json b/2023/21xxx/CVE-2023-21624.json new file mode 100644 index 00000000000..fc8f845a102 --- /dev/null +++ b/2023/21xxx/CVE-2023-21624.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21624", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21625.json b/2023/21xxx/CVE-2023-21625.json new file mode 100644 index 00000000000..012cb820186 --- /dev/null +++ b/2023/21xxx/CVE-2023-21625.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21625", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21626.json b/2023/21xxx/CVE-2023-21626.json new file mode 100644 index 00000000000..9785153294b --- /dev/null +++ b/2023/21xxx/CVE-2023-21626.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21626", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21627.json b/2023/21xxx/CVE-2023-21627.json new file mode 100644 index 00000000000..cab2ea4b720 --- /dev/null +++ b/2023/21xxx/CVE-2023-21627.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21627", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21628.json b/2023/21xxx/CVE-2023-21628.json new file mode 100644 index 00000000000..3c570e5d64e --- /dev/null +++ b/2023/21xxx/CVE-2023-21628.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21628", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21629.json b/2023/21xxx/CVE-2023-21629.json new file mode 100644 index 00000000000..fe5d7ee39f0 --- /dev/null +++ b/2023/21xxx/CVE-2023-21629.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21629", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21630.json b/2023/21xxx/CVE-2023-21630.json new file mode 100644 index 00000000000..07b5d3df067 --- /dev/null +++ b/2023/21xxx/CVE-2023-21630.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21630", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21631.json b/2023/21xxx/CVE-2023-21631.json new file mode 100644 index 00000000000..79d46071b91 --- /dev/null +++ b/2023/21xxx/CVE-2023-21631.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21631", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21632.json b/2023/21xxx/CVE-2023-21632.json new file mode 100644 index 00000000000..234776a7269 --- /dev/null +++ b/2023/21xxx/CVE-2023-21632.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21632", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21633.json b/2023/21xxx/CVE-2023-21633.json new file mode 100644 index 00000000000..2bf54329205 --- /dev/null +++ b/2023/21xxx/CVE-2023-21633.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21633", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21634.json b/2023/21xxx/CVE-2023-21634.json new file mode 100644 index 00000000000..a622cbca9a4 --- /dev/null +++ b/2023/21xxx/CVE-2023-21634.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21634", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21635.json b/2023/21xxx/CVE-2023-21635.json new file mode 100644 index 00000000000..55885d9bf10 --- /dev/null +++ b/2023/21xxx/CVE-2023-21635.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21635", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21636.json b/2023/21xxx/CVE-2023-21636.json new file mode 100644 index 00000000000..65eea37486f --- /dev/null +++ b/2023/21xxx/CVE-2023-21636.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21636", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21637.json b/2023/21xxx/CVE-2023-21637.json new file mode 100644 index 00000000000..f4a72155b78 --- /dev/null +++ b/2023/21xxx/CVE-2023-21637.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21637", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21638.json b/2023/21xxx/CVE-2023-21638.json new file mode 100644 index 00000000000..c7e0e3aa952 --- /dev/null +++ b/2023/21xxx/CVE-2023-21638.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21638", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21639.json b/2023/21xxx/CVE-2023-21639.json new file mode 100644 index 00000000000..a698c78455b --- /dev/null +++ b/2023/21xxx/CVE-2023-21639.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21639", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21640.json b/2023/21xxx/CVE-2023-21640.json new file mode 100644 index 00000000000..c6d4c284750 --- /dev/null +++ b/2023/21xxx/CVE-2023-21640.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21640", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21641.json b/2023/21xxx/CVE-2023-21641.json new file mode 100644 index 00000000000..54a70696a89 --- /dev/null +++ b/2023/21xxx/CVE-2023-21641.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21641", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21642.json b/2023/21xxx/CVE-2023-21642.json new file mode 100644 index 00000000000..d00c9aa49e0 --- /dev/null +++ b/2023/21xxx/CVE-2023-21642.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21642", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21643.json b/2023/21xxx/CVE-2023-21643.json new file mode 100644 index 00000000000..5f513a08907 --- /dev/null +++ b/2023/21xxx/CVE-2023-21643.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21643", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21644.json b/2023/21xxx/CVE-2023-21644.json new file mode 100644 index 00000000000..ec190f67f7d --- /dev/null +++ b/2023/21xxx/CVE-2023-21644.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21644", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21645.json b/2023/21xxx/CVE-2023-21645.json new file mode 100644 index 00000000000..a34811f7885 --- /dev/null +++ b/2023/21xxx/CVE-2023-21645.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21645", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21646.json b/2023/21xxx/CVE-2023-21646.json new file mode 100644 index 00000000000..ab102eea190 --- /dev/null +++ b/2023/21xxx/CVE-2023-21646.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21646", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21647.json b/2023/21xxx/CVE-2023-21647.json new file mode 100644 index 00000000000..914d9c69618 --- /dev/null +++ b/2023/21xxx/CVE-2023-21647.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21647", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21648.json b/2023/21xxx/CVE-2023-21648.json new file mode 100644 index 00000000000..31fc0b16732 --- /dev/null +++ b/2023/21xxx/CVE-2023-21648.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21648", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21649.json b/2023/21xxx/CVE-2023-21649.json new file mode 100644 index 00000000000..e1e96daf873 --- /dev/null +++ b/2023/21xxx/CVE-2023-21649.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21649", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21650.json b/2023/21xxx/CVE-2023-21650.json new file mode 100644 index 00000000000..37ce3c7ad98 --- /dev/null +++ b/2023/21xxx/CVE-2023-21650.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21650", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21651.json b/2023/21xxx/CVE-2023-21651.json new file mode 100644 index 00000000000..9739ff1c423 --- /dev/null +++ b/2023/21xxx/CVE-2023-21651.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21651", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21652.json b/2023/21xxx/CVE-2023-21652.json new file mode 100644 index 00000000000..28e9b32426a --- /dev/null +++ b/2023/21xxx/CVE-2023-21652.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21652", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21653.json b/2023/21xxx/CVE-2023-21653.json new file mode 100644 index 00000000000..de3ebebba9f --- /dev/null +++ b/2023/21xxx/CVE-2023-21653.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21653", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21654.json b/2023/21xxx/CVE-2023-21654.json new file mode 100644 index 00000000000..a1ee115489e --- /dev/null +++ b/2023/21xxx/CVE-2023-21654.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21654", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21655.json b/2023/21xxx/CVE-2023-21655.json new file mode 100644 index 00000000000..ba20ac891f3 --- /dev/null +++ b/2023/21xxx/CVE-2023-21655.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21655", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21656.json b/2023/21xxx/CVE-2023-21656.json new file mode 100644 index 00000000000..af4a489313e --- /dev/null +++ b/2023/21xxx/CVE-2023-21656.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21656", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21657.json b/2023/21xxx/CVE-2023-21657.json new file mode 100644 index 00000000000..7282e84a352 --- /dev/null +++ b/2023/21xxx/CVE-2023-21657.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21657", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21658.json b/2023/21xxx/CVE-2023-21658.json new file mode 100644 index 00000000000..d06f3685788 --- /dev/null +++ b/2023/21xxx/CVE-2023-21658.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21658", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21659.json b/2023/21xxx/CVE-2023-21659.json new file mode 100644 index 00000000000..7f3df648750 --- /dev/null +++ b/2023/21xxx/CVE-2023-21659.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21659", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21660.json b/2023/21xxx/CVE-2023-21660.json new file mode 100644 index 00000000000..39f7d677388 --- /dev/null +++ b/2023/21xxx/CVE-2023-21660.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21660", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21661.json b/2023/21xxx/CVE-2023-21661.json new file mode 100644 index 00000000000..cd5c8a205c7 --- /dev/null +++ b/2023/21xxx/CVE-2023-21661.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21661", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21662.json b/2023/21xxx/CVE-2023-21662.json new file mode 100644 index 00000000000..f3491363361 --- /dev/null +++ b/2023/21xxx/CVE-2023-21662.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21662", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21663.json b/2023/21xxx/CVE-2023-21663.json new file mode 100644 index 00000000000..244b5c6d6f7 --- /dev/null +++ b/2023/21xxx/CVE-2023-21663.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21663", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21664.json b/2023/21xxx/CVE-2023-21664.json new file mode 100644 index 00000000000..4224c87b22e --- /dev/null +++ b/2023/21xxx/CVE-2023-21664.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21664", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21665.json b/2023/21xxx/CVE-2023-21665.json new file mode 100644 index 00000000000..322d07e74d8 --- /dev/null +++ b/2023/21xxx/CVE-2023-21665.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21665", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21666.json b/2023/21xxx/CVE-2023-21666.json new file mode 100644 index 00000000000..55f452c16db --- /dev/null +++ b/2023/21xxx/CVE-2023-21666.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21666", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21667.json b/2023/21xxx/CVE-2023-21667.json new file mode 100644 index 00000000000..a39e599dc5d --- /dev/null +++ b/2023/21xxx/CVE-2023-21667.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21667", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21668.json b/2023/21xxx/CVE-2023-21668.json new file mode 100644 index 00000000000..bc088d9eff9 --- /dev/null +++ b/2023/21xxx/CVE-2023-21668.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21668", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21669.json b/2023/21xxx/CVE-2023-21669.json new file mode 100644 index 00000000000..8c712f5f956 --- /dev/null +++ b/2023/21xxx/CVE-2023-21669.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21669", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21670.json b/2023/21xxx/CVE-2023-21670.json new file mode 100644 index 00000000000..80e07d36249 --- /dev/null +++ b/2023/21xxx/CVE-2023-21670.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21670", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21671.json b/2023/21xxx/CVE-2023-21671.json new file mode 100644 index 00000000000..16ac6712a4a --- /dev/null +++ b/2023/21xxx/CVE-2023-21671.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21671", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21672.json b/2023/21xxx/CVE-2023-21672.json new file mode 100644 index 00000000000..1a1ab75937b --- /dev/null +++ b/2023/21xxx/CVE-2023-21672.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21672", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21673.json b/2023/21xxx/CVE-2023-21673.json new file mode 100644 index 00000000000..8ce73994067 --- /dev/null +++ b/2023/21xxx/CVE-2023-21673.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-21673", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file