From 63d1e20d18c12f03f559950536eae2e12523c3c2 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 23 Oct 2023 19:00:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/10xxx/CVE-2019-10222.json | 5 ++ 2020/10xxx/CVE-2020-10753.json | 5 ++ 2020/12xxx/CVE-2020-12059.json | 5 ++ 2020/1xxx/CVE-2020-1700.json | 5 ++ 2020/1xxx/CVE-2020-1760.json | 5 ++ 2020/25xxx/CVE-2020-25678.json | 5 ++ 2020/27xxx/CVE-2020-27781.json | 5 ++ 2021/20xxx/CVE-2021-20288.json | 5 ++ 2021/2xxx/CVE-2021-2351.json | 118 +++++++++++++++++++-------------- 2021/3xxx/CVE-2021-3524.json | 5 ++ 2021/3xxx/CVE-2021-3531.json | 5 ++ 2021/3xxx/CVE-2021-3979.json | 5 ++ 2023/3xxx/CVE-2023-3794.json | 3 +- 2023/3xxx/CVE-2023-3795.json | 3 +- 2023/3xxx/CVE-2023-3796.json | 3 +- 2023/3xxx/CVE-2023-3797.json | 3 +- 2023/3xxx/CVE-2023-3798.json | 3 +- 2023/3xxx/CVE-2023-3799.json | 3 +- 2023/3xxx/CVE-2023-3800.json | 3 +- 2023/3xxx/CVE-2023-3801.json | 8 +-- 2023/46xxx/CVE-2023-46288.json | 82 +++++++++++++++++++++-- 2023/5xxx/CVE-2023-5737.json | 18 +++++ 2023/5xxx/CVE-2023-5738.json | 18 +++++ 23 files changed, 243 insertions(+), 77 deletions(-) create mode 100644 2023/5xxx/CVE-2023-5737.json create mode 100644 2023/5xxx/CVE-2023-5738.json diff --git a/2019/10xxx/CVE-2019-10222.json b/2019/10xxx/CVE-2019-10222.json index 6b17ba586a2..8ca71b59bbc 100644 --- a/2019/10xxx/CVE-2019-10222.json +++ b/2019/10xxx/CVE-2019-10222.json @@ -63,6 +63,11 @@ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10222", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10222" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html" } ] }, diff --git a/2020/10xxx/CVE-2020-10753.json b/2020/10xxx/CVE-2020-10753.json index d0d63f398f8..2b07b41578d 100644 --- a/2020/10xxx/CVE-2020-10753.json +++ b/2020/10xxx/CVE-2020-10753.json @@ -73,6 +73,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210810 [SECURITY] [DLA 2735-1] ceph security update", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00013.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20231023 [SECURITY] [DLA 3629-1] ceph security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html" } ] }, diff --git a/2020/12xxx/CVE-2020-12059.json b/2020/12xxx/CVE-2020-12059.json index 4ca5a8d207d..0c675e45dce 100644 --- a/2020/12xxx/CVE-2020-12059.json +++ b/2020/12xxx/CVE-2020-12059.json @@ -71,6 +71,11 @@ "refsource": "UBUNTU", "name": "USN-4528-1", "url": "https://usn.ubuntu.com/4528-1/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20231023 [SECURITY] [DLA 3629-1] ceph security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html" } ] } diff --git a/2020/1xxx/CVE-2020-1700.json b/2020/1xxx/CVE-2020-1700.json index 65dc35c0475..acfcddd0906 100644 --- a/2020/1xxx/CVE-2020-1700.json +++ b/2020/1xxx/CVE-2020-1700.json @@ -61,6 +61,11 @@ "refsource": "UBUNTU", "name": "USN-4304-1", "url": "https://usn.ubuntu.com/4304-1/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20231023 [SECURITY] [DLA 3629-1] ceph security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1760.json b/2020/1xxx/CVE-2020-1760.json index 20cb15c72db..7e23e226105 100644 --- a/2020/1xxx/CVE-2020-1760.json +++ b/2020/1xxx/CVE-2020-1760.json @@ -79,6 +79,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210810 [SECURITY] [DLA 2735-1] ceph security update", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00013.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20231023 [SECURITY] [DLA 3629-1] ceph security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html" } ] }, diff --git a/2020/25xxx/CVE-2020-25678.json b/2020/25xxx/CVE-2020-25678.json index 115152d403d..557a08e7e42 100644 --- a/2020/25xxx/CVE-2020-25678.json +++ b/2020/25xxx/CVE-2020-25678.json @@ -73,6 +73,11 @@ "url": "https://security.gentoo.org/glsa/202105-39", "refsource": "MISC", "name": "https://security.gentoo.org/glsa/202105-39" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html" } ] } diff --git a/2020/27xxx/CVE-2020-27781.json b/2020/27xxx/CVE-2020-27781.json index 214e6dec5db..d7d9bb82a0d 100644 --- a/2020/27xxx/CVE-2020-27781.json +++ b/2020/27xxx/CVE-2020-27781.json @@ -58,6 +58,11 @@ "refsource": "GENTOO", "name": "GLSA-202105-39", "url": "https://security.gentoo.org/glsa/202105-39" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20231023 [SECURITY] [DLA 3629-1] ceph security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20288.json b/2021/20xxx/CVE-2021-20288.json index 2bd4a8f9fc5..cf17ded3f21 100644 --- a/2021/20xxx/CVE-2021-20288.json +++ b/2021/20xxx/CVE-2021-20288.json @@ -68,6 +68,11 @@ "refsource": "GENTOO", "name": "GLSA-202105-39", "url": "https://security.gentoo.org/glsa/202105-39" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20231023 [SECURITY] [DLA 3629-1] ceph security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html" } ] }, diff --git a/2021/2xxx/CVE-2021-2351.json b/2021/2xxx/CVE-2021-2351.json index f8bbd5e574a..57729756618 100644 --- a/2021/2xxx/CVE-2021-2351.json +++ b/2021/2xxx/CVE-2021-2351.json @@ -1,44 +1,12 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2021-2351", + "ASSIGNER": "secalert_us@oracle.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "WebLogic Server", - "version": { - "version_data": [ - { - "version_value": "12.2.1.3.0", - "version_affected": "=" - }, - { - "version_value": "12.2.1.4.0", - "version_affected": "=" - }, - { - "version_value": "14.1.1.0.0", - "version_affected": "=" - } - ] - } - } - ] - }, - "vendor_name": "Oracle Corporation" - } - ] - } - }, "description": { "description_data": [ { @@ -47,13 +15,6 @@ } ] }, - "impact": { - "cvss": { - "baseScore": "8.3", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", - "version": "3.1" - } - }, "problemtype": { "problemtype_data": [ { @@ -66,6 +27,38 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Oracle Corporation", + "product": { + "product_data": [ + { + "product_name": "WebLogic Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "12.2.1.3.0" + }, + { + "version_affected": "=", + "version_value": "12.2.1.4.0" + }, + { + "version_affected": "=", + "version_value": "14.1.1.0.0" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { @@ -79,14 +72,14 @@ "name": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { - "refsource": "FULLDISC", - "name": "20211210 [SYSS-2021-061] Oracle Database - NNE Connection Hijacking", - "url": "http://seclists.org/fulldisclosure/2021/Dec/19" + "url": "http://seclists.org/fulldisclosure/2021/Dec/19", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2021/Dec/19" }, { - "refsource": "FULLDISC", - "name": "20211210 [SYSS-2021-062] Oracle Database - Weak NNE Integrity Key Derivation", - "url": "http://seclists.org/fulldisclosure/2021/Dec/20" + "url": "http://seclists.org/fulldisclosure/2021/Dec/20", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2021/Dec/20" }, { "url": "https://www.oracle.com/security-alerts/cpujan2022.html", @@ -94,14 +87,14 @@ "name": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { + "url": "http://packetstormsecurity.com/files/165258/Oracle-Database-Weak-NNE-Integrity-Key-Derivation.html", "refsource": "MISC", - "name": "http://packetstormsecurity.com/files/165258/Oracle-Database-Weak-NNE-Integrity-Key-Derivation.html", - "url": "http://packetstormsecurity.com/files/165258/Oracle-Database-Weak-NNE-Integrity-Key-Derivation.html" + "name": "http://packetstormsecurity.com/files/165258/Oracle-Database-Weak-NNE-Integrity-Key-Derivation.html" }, { + "url": "http://packetstormsecurity.com/files/165255/Oracle-Database-Protection-Mechanism-Bypass.html", "refsource": "MISC", - "name": "http://packetstormsecurity.com/files/165255/Oracle-Database-Protection-Mechanism-Bypass.html", - "url": "http://packetstormsecurity.com/files/165255/Oracle-Database-Protection-Mechanism-Bypass.html" + "name": "http://packetstormsecurity.com/files/165255/Oracle-Database-Protection-Mechanism-Bypass.html" }, { "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", @@ -112,6 +105,29 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujan2023.html" + } + ] + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2021/3xxx/CVE-2021-3524.json b/2021/3xxx/CVE-2021-3524.json index 856e5e127e7..65c325c6a99 100644 --- a/2021/3xxx/CVE-2021-3524.json +++ b/2021/3xxx/CVE-2021-3524.json @@ -68,6 +68,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210810 [SECURITY] [DLA 2735-1] ceph security update", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00013.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20231023 [SECURITY] [DLA 3629-1] ceph security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3531.json b/2021/3xxx/CVE-2021-3531.json index 31dbf43f969..57e61f1ff58 100644 --- a/2021/3xxx/CVE-2021-3531.json +++ b/2021/3xxx/CVE-2021-3531.json @@ -73,6 +73,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-1bf13db941", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZRUNDH2TJRZRWL3DCH2PQ6KROWTPQ7AJ/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20231023 [SECURITY] [DLA 3629-1] ceph security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3979.json b/2021/3xxx/CVE-2021-3979.json index f1121af0b2f..b2971b15fe7 100644 --- a/2021/3xxx/CVE-2021-3979.json +++ b/2021/3xxx/CVE-2021-3979.json @@ -83,6 +83,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPOK44BESMIFW6BIOGCN452AKKOIIT6Q/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPOK44BESMIFW6BIOGCN452AKKOIIT6Q/" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html" } ] } diff --git a/2023/3xxx/CVE-2023-3794.json b/2023/3xxx/CVE-2023-3794.json index 0474c2ad844..c29eef3148c 100644 --- a/2023/3xxx/CVE-2023-3794.json +++ b/2023/3xxx/CVE-2023-3794.json @@ -93,8 +93,7 @@ { "version": "2.0", "baseScore": 4, - "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", - "baseSeverity": "MEDIUM" + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N" } ] } diff --git a/2023/3xxx/CVE-2023-3795.json b/2023/3xxx/CVE-2023-3795.json index 0a85ffabe67..64bc96f7b86 100644 --- a/2023/3xxx/CVE-2023-3795.json +++ b/2023/3xxx/CVE-2023-3795.json @@ -93,8 +93,7 @@ { "version": "2.0", "baseScore": 5.2, - "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", - "baseSeverity": "MEDIUM" + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2023/3xxx/CVE-2023-3796.json b/2023/3xxx/CVE-2023-3796.json index 845a5abbc1f..5789352b7b6 100644 --- a/2023/3xxx/CVE-2023-3796.json +++ b/2023/3xxx/CVE-2023-3796.json @@ -93,8 +93,7 @@ { "version": "2.0", "baseScore": 4, - "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", - "baseSeverity": "MEDIUM" + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N" } ] } diff --git a/2023/3xxx/CVE-2023-3797.json b/2023/3xxx/CVE-2023-3797.json index 3e3fd474f7f..420846a3281 100644 --- a/2023/3xxx/CVE-2023-3797.json +++ b/2023/3xxx/CVE-2023-3797.json @@ -98,8 +98,7 @@ { "version": "2.0", "baseScore": 5.2, - "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", - "baseSeverity": "MEDIUM" + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2023/3xxx/CVE-2023-3798.json b/2023/3xxx/CVE-2023-3798.json index 3cb2fb9643c..b9acb076bab 100644 --- a/2023/3xxx/CVE-2023-3798.json +++ b/2023/3xxx/CVE-2023-3798.json @@ -98,8 +98,7 @@ { "version": "2.0", "baseScore": 5.2, - "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", - "baseSeverity": "MEDIUM" + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2023/3xxx/CVE-2023-3799.json b/2023/3xxx/CVE-2023-3799.json index 14b74be3dcf..d63a8ca6911 100644 --- a/2023/3xxx/CVE-2023-3799.json +++ b/2023/3xxx/CVE-2023-3799.json @@ -98,8 +98,7 @@ { "version": "2.0", "baseScore": 6.5, - "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", - "baseSeverity": "MEDIUM" + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2023/3xxx/CVE-2023-3800.json b/2023/3xxx/CVE-2023-3800.json index cd7d0101e59..b1020ece6fb 100644 --- a/2023/3xxx/CVE-2023-3800.json +++ b/2023/3xxx/CVE-2023-3800.json @@ -98,8 +98,7 @@ { "version": "2.0", "baseScore": 3.7, - "vectorString": "AV:A/AC:H/Au:M/C:P/I:P/A:P", - "baseSeverity": "LOW" + "vectorString": "AV:A/AC:H/Au:M/C:P/I:P/A:P" } ] } diff --git a/2023/3xxx/CVE-2023-3801.json b/2023/3xxx/CVE-2023-3801.json index fd0ef28dfb2..c3243f9de2c 100644 --- a/2023/3xxx/CVE-2023-3801.json +++ b/2023/3xxx/CVE-2023-3801.json @@ -77,11 +77,6 @@ "url": "https://github.com/Wkingxc/CVE/blob/master/ibos_OA_1.md", "refsource": "MISC", "name": "https://github.com/Wkingxc/CVE/blob/master/ibos_OA_1.md" - }, - { - "url": "http://web.archive.org/web/20230722143348/https://github.com/funnn7/cve/blob/main/sql.md", - "refsource": "MISC", - "name": "http://web.archive.org/web/20230722143348/https://github.com/funnn7/cve/blob/main/sql.md" } ] }, @@ -108,8 +103,7 @@ { "version": "2.0", "baseScore": 5.2, - "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", - "baseSeverity": "MEDIUM" + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2023/46xxx/CVE-2023-46288.json b/2023/46xxx/CVE-2023-46288.json index af434cad9a1..836ccb85acd 100644 --- a/2023/46xxx/CVE-2023-46288.json +++ b/2023/46xxx/CVE-2023-46288.json @@ -1,18 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-46288", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@apache.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Airflow.This issue affects Apache Airflow from 2.4.0 to 2.7.0.\n\nSensitive configuration information has been exposed to authenticated users with the ability to read configuration via Airflow REST API for configuration even when the expose_config\u00a0option is set to non-sensitive-only. The expose_config option is False by default. It is recommended to upgrade to a version that is not affected if you set expose_config\u00a0to non-sensitive-only\u00a0configuration. This is a different error than CVE-2023-45348\u00a0which allows authenticated user to retrieve individual configuration values in 2.7.* by specially crafting their request (solved in 2.7.2).\n\nUsers are recommended to upgrade to version 2.7.2, which fixes the issue and additionally fixes\u00a0CVE-2023-45348.\n\n" } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", + "cweId": "CWE-200" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apache Software Foundation", + "product": { + "product_data": [ + { + "product_name": "Apache Airflow", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.4.0", + "version_value": "2.7.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/apache/airflow/pull/32261", + "refsource": "MISC", + "name": "https://github.com/apache/airflow/pull/32261" + }, + { + "url": "https://lists.apache.org/thread/yw4vzm0c5lqkwm0bxv6qy03yfd1od4nw", + "refsource": "MISC", + "name": "https://lists.apache.org/thread/yw4vzm0c5lqkwm0bxv6qy03yfd1od4nw" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "id_No2015429 of 3H Secruity Team" + }, + { + "lang": "en", + "value": "Lee, Wei" + }, + { + "lang": "en", + "value": "Lee, Wei" + } + ] } \ No newline at end of file diff --git a/2023/5xxx/CVE-2023-5737.json b/2023/5xxx/CVE-2023-5737.json new file mode 100644 index 00000000000..31e45e16ebd --- /dev/null +++ b/2023/5xxx/CVE-2023-5737.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-5737", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/5xxx/CVE-2023-5738.json b/2023/5xxx/CVE-2023-5738.json new file mode 100644 index 00000000000..8a3d2bf99af --- /dev/null +++ b/2023/5xxx/CVE-2023-5738.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-5738", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file