From 6ba30ce6c114b7a2f96060b51822f28e8f2bad47 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 15 Nov 2023 07:00:36 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/36xxx/CVE-2022-36827.json | 6 +-- 2022/43xxx/CVE-2022-43783.json | 6 +-- 2022/43xxx/CVE-2022-43784.json | 6 +-- 2022/43xxx/CVE-2022-43785.json | 6 +-- 2022/43xxx/CVE-2022-43786.json | 6 +-- 2022/43xxx/CVE-2022-43787.json | 6 +-- 2022/43xxx/CVE-2022-43788.json | 6 +-- 2022/43xxx/CVE-2022-43792.json | 6 +-- 2022/43xxx/CVE-2022-43793.json | 6 +-- 2022/43xxx/CVE-2022-43794.json | 6 +-- 2022/43xxx/CVE-2022-43795.json | 6 +-- 2022/43xxx/CVE-2022-43796.json | 6 +-- 2022/43xxx/CVE-2022-43797.json | 6 +-- 2022/43xxx/CVE-2022-43798.json | 6 +-- 2022/43xxx/CVE-2022-43799.json | 6 +-- 2022/43xxx/CVE-2022-43800.json | 6 +-- 2022/43xxx/CVE-2022-43801.json | 6 +-- 2022/43xxx/CVE-2022-43802.json | 6 +-- 2022/43xxx/CVE-2022-43803.json | 6 +-- 2022/43xxx/CVE-2022-43804.json | 6 +-- 2022/43xxx/CVE-2022-43805.json | 6 +-- 2022/43xxx/CVE-2022-43806.json | 6 +-- 2022/43xxx/CVE-2022-43807.json | 6 +-- 2022/43xxx/CVE-2022-43808.json | 6 +-- 2022/43xxx/CVE-2022-43809.json | 6 +-- 2022/43xxx/CVE-2022-43810.json | 6 +-- 2022/43xxx/CVE-2022-43811.json | 6 +-- 2022/43xxx/CVE-2022-43812.json | 6 +-- 2022/43xxx/CVE-2022-43813.json | 6 +-- 2022/43xxx/CVE-2022-43814.json | 6 +-- 2022/43xxx/CVE-2022-43815.json | 6 +-- 2022/43xxx/CVE-2022-43816.json | 6 +-- 2022/43xxx/CVE-2022-43817.json | 6 +-- 2022/43xxx/CVE-2022-43818.json | 6 +-- 2022/43xxx/CVE-2022-43819.json | 6 +-- 2022/43xxx/CVE-2022-43820.json | 6 +-- 2022/43xxx/CVE-2022-43821.json | 6 +-- 2022/43xxx/CVE-2022-43822.json | 6 +-- 2022/43xxx/CVE-2022-43823.json | 6 +-- 2022/43xxx/CVE-2022-43824.json | 6 +-- 2022/43xxx/CVE-2022-43825.json | 6 +-- 2022/43xxx/CVE-2022-43826.json | 6 +-- 2022/43xxx/CVE-2022-43827.json | 6 +-- 2022/43xxx/CVE-2022-43828.json | 6 +-- 2022/43xxx/CVE-2022-43829.json | 6 +-- 2022/43xxx/CVE-2022-43830.json | 6 +-- 2023/47xxx/CVE-2023-47584.json | 74 +++++++++++++++++++++++++++-- 2023/47xxx/CVE-2023-47585.json | 74 +++++++++++++++++++++++++++-- 2023/47xxx/CVE-2023-47586.json | 74 +++++++++++++++++++++++++++-- 2023/4xxx/CVE-2023-4889.json | 75 ++++++++++++++++++++++++++++-- 2023/6xxx/CVE-2023-6133.json | 85 ++++++++++++++++++++++++++++++++-- 51 files changed, 408 insertions(+), 250 deletions(-) diff --git a/2022/36xxx/CVE-2022-36827.json b/2022/36xxx/CVE-2022-36827.json index e514e66c4a1..0f1de8ecf07 100644 --- a/2022/36xxx/CVE-2022-36827.json +++ b/2022/36xxx/CVE-2022-36827.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43783.json b/2022/43xxx/CVE-2022-43783.json index 720d5993b8c..91b7b57db0e 100644 --- a/2022/43xxx/CVE-2022-43783.json +++ b/2022/43xxx/CVE-2022-43783.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43784.json b/2022/43xxx/CVE-2022-43784.json index f4571af81b4..cafe4c16270 100644 --- a/2022/43xxx/CVE-2022-43784.json +++ b/2022/43xxx/CVE-2022-43784.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43785.json b/2022/43xxx/CVE-2022-43785.json index 60d7e842397..95d64c5f885 100644 --- a/2022/43xxx/CVE-2022-43785.json +++ b/2022/43xxx/CVE-2022-43785.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43786.json b/2022/43xxx/CVE-2022-43786.json index 10ff00e3cb8..9c89332b1d7 100644 --- a/2022/43xxx/CVE-2022-43786.json +++ b/2022/43xxx/CVE-2022-43786.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43787.json b/2022/43xxx/CVE-2022-43787.json index 032f1cd6296..8120c570699 100644 --- a/2022/43xxx/CVE-2022-43787.json +++ b/2022/43xxx/CVE-2022-43787.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43788.json b/2022/43xxx/CVE-2022-43788.json index 297f4b1ba57..b3463512480 100644 --- a/2022/43xxx/CVE-2022-43788.json +++ b/2022/43xxx/CVE-2022-43788.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43792.json b/2022/43xxx/CVE-2022-43792.json index 7fe1a1597a0..e72f6648831 100644 --- a/2022/43xxx/CVE-2022-43792.json +++ b/2022/43xxx/CVE-2022-43792.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43793.json b/2022/43xxx/CVE-2022-43793.json index ea049484634..f53a012becf 100644 --- a/2022/43xxx/CVE-2022-43793.json +++ b/2022/43xxx/CVE-2022-43793.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43794.json b/2022/43xxx/CVE-2022-43794.json index 1fb1a828de6..aef398c186c 100644 --- a/2022/43xxx/CVE-2022-43794.json +++ b/2022/43xxx/CVE-2022-43794.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43795.json b/2022/43xxx/CVE-2022-43795.json index c16587f3288..8b0a3a8340a 100644 --- a/2022/43xxx/CVE-2022-43795.json +++ b/2022/43xxx/CVE-2022-43795.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43796.json b/2022/43xxx/CVE-2022-43796.json index b069014ae8e..c6dc4c454b6 100644 --- a/2022/43xxx/CVE-2022-43796.json +++ b/2022/43xxx/CVE-2022-43796.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43797.json b/2022/43xxx/CVE-2022-43797.json index 47948ebb2b3..ce527ec2fd9 100644 --- a/2022/43xxx/CVE-2022-43797.json +++ b/2022/43xxx/CVE-2022-43797.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43798.json b/2022/43xxx/CVE-2022-43798.json index 8e3c72af4ac..826deea8159 100644 --- a/2022/43xxx/CVE-2022-43798.json +++ b/2022/43xxx/CVE-2022-43798.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43799.json b/2022/43xxx/CVE-2022-43799.json index 02f619c173d..9d04073b853 100644 --- a/2022/43xxx/CVE-2022-43799.json +++ b/2022/43xxx/CVE-2022-43799.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43800.json b/2022/43xxx/CVE-2022-43800.json index 5770a11cd77..8b45aafa7f8 100644 --- a/2022/43xxx/CVE-2022-43800.json +++ b/2022/43xxx/CVE-2022-43800.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43801.json b/2022/43xxx/CVE-2022-43801.json index aaa2458e500..77373a14b2a 100644 --- a/2022/43xxx/CVE-2022-43801.json +++ b/2022/43xxx/CVE-2022-43801.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43802.json b/2022/43xxx/CVE-2022-43802.json index b67463a5e40..93e2eb6610f 100644 --- a/2022/43xxx/CVE-2022-43802.json +++ b/2022/43xxx/CVE-2022-43802.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43803.json b/2022/43xxx/CVE-2022-43803.json index a71dc9c2a3c..6eef86a0f5d 100644 --- a/2022/43xxx/CVE-2022-43803.json +++ b/2022/43xxx/CVE-2022-43803.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43804.json b/2022/43xxx/CVE-2022-43804.json index d9484f7b3ac..1ad407690fa 100644 --- a/2022/43xxx/CVE-2022-43804.json +++ b/2022/43xxx/CVE-2022-43804.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43805.json b/2022/43xxx/CVE-2022-43805.json index e45e13e38b6..a675d56cf9f 100644 --- a/2022/43xxx/CVE-2022-43805.json +++ b/2022/43xxx/CVE-2022-43805.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43806.json b/2022/43xxx/CVE-2022-43806.json index 8f507e7b211..d8fb0d3f6bc 100644 --- a/2022/43xxx/CVE-2022-43806.json +++ b/2022/43xxx/CVE-2022-43806.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43807.json b/2022/43xxx/CVE-2022-43807.json index 7c7847d8c40..af7a6dfe8e3 100644 --- a/2022/43xxx/CVE-2022-43807.json +++ b/2022/43xxx/CVE-2022-43807.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43808.json b/2022/43xxx/CVE-2022-43808.json index e66e373116f..116f18474fa 100644 --- a/2022/43xxx/CVE-2022-43808.json +++ b/2022/43xxx/CVE-2022-43808.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43809.json b/2022/43xxx/CVE-2022-43809.json index cdce75e2395..d59325b5d06 100644 --- a/2022/43xxx/CVE-2022-43809.json +++ b/2022/43xxx/CVE-2022-43809.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43810.json b/2022/43xxx/CVE-2022-43810.json index cd154e271cd..bb87edcb90f 100644 --- a/2022/43xxx/CVE-2022-43810.json +++ b/2022/43xxx/CVE-2022-43810.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43811.json b/2022/43xxx/CVE-2022-43811.json index 67b79e9f595..3594e775e90 100644 --- a/2022/43xxx/CVE-2022-43811.json +++ b/2022/43xxx/CVE-2022-43811.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43812.json b/2022/43xxx/CVE-2022-43812.json index 81a8a963287..748c18379ef 100644 --- a/2022/43xxx/CVE-2022-43812.json +++ b/2022/43xxx/CVE-2022-43812.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43813.json b/2022/43xxx/CVE-2022-43813.json index 85e390dad2b..afda83e2373 100644 --- a/2022/43xxx/CVE-2022-43813.json +++ b/2022/43xxx/CVE-2022-43813.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43814.json b/2022/43xxx/CVE-2022-43814.json index 9701090a864..732402a9fc0 100644 --- a/2022/43xxx/CVE-2022-43814.json +++ b/2022/43xxx/CVE-2022-43814.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43815.json b/2022/43xxx/CVE-2022-43815.json index ee7c80824f2..8e832aebf08 100644 --- a/2022/43xxx/CVE-2022-43815.json +++ b/2022/43xxx/CVE-2022-43815.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43816.json b/2022/43xxx/CVE-2022-43816.json index 6d4cccf092d..8ee5eabf8d3 100644 --- a/2022/43xxx/CVE-2022-43816.json +++ b/2022/43xxx/CVE-2022-43816.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43817.json b/2022/43xxx/CVE-2022-43817.json index 103a9682d5c..9408afffa1d 100644 --- a/2022/43xxx/CVE-2022-43817.json +++ b/2022/43xxx/CVE-2022-43817.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43818.json b/2022/43xxx/CVE-2022-43818.json index a3a177e8385..bdf3d35215f 100644 --- a/2022/43xxx/CVE-2022-43818.json +++ b/2022/43xxx/CVE-2022-43818.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43819.json b/2022/43xxx/CVE-2022-43819.json index 1fa6e37d100..b53745607c4 100644 --- a/2022/43xxx/CVE-2022-43819.json +++ b/2022/43xxx/CVE-2022-43819.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43820.json b/2022/43xxx/CVE-2022-43820.json index 1dae4a4dd6b..ce34bb3ad61 100644 --- a/2022/43xxx/CVE-2022-43820.json +++ b/2022/43xxx/CVE-2022-43820.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43821.json b/2022/43xxx/CVE-2022-43821.json index fa673f44831..445b4f680fc 100644 --- a/2022/43xxx/CVE-2022-43821.json +++ b/2022/43xxx/CVE-2022-43821.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43822.json b/2022/43xxx/CVE-2022-43822.json index 279805ba8c5..f6901585f5c 100644 --- a/2022/43xxx/CVE-2022-43822.json +++ b/2022/43xxx/CVE-2022-43822.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43823.json b/2022/43xxx/CVE-2022-43823.json index b3ec5bb66cb..521e038681f 100644 --- a/2022/43xxx/CVE-2022-43823.json +++ b/2022/43xxx/CVE-2022-43823.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43824.json b/2022/43xxx/CVE-2022-43824.json index f7f9027df5a..567b1a6d674 100644 --- a/2022/43xxx/CVE-2022-43824.json +++ b/2022/43xxx/CVE-2022-43824.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43825.json b/2022/43xxx/CVE-2022-43825.json index bc9f254b3c9..445004b6be4 100644 --- a/2022/43xxx/CVE-2022-43825.json +++ b/2022/43xxx/CVE-2022-43825.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43826.json b/2022/43xxx/CVE-2022-43826.json index d807b55ce5d..99a9b5fffe1 100644 --- a/2022/43xxx/CVE-2022-43826.json +++ b/2022/43xxx/CVE-2022-43826.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43827.json b/2022/43xxx/CVE-2022-43827.json index 7b0408789f7..37d9dcb941a 100644 --- a/2022/43xxx/CVE-2022-43827.json +++ b/2022/43xxx/CVE-2022-43827.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43828.json b/2022/43xxx/CVE-2022-43828.json index 5172cfb871d..3fa320d7851 100644 --- a/2022/43xxx/CVE-2022-43828.json +++ b/2022/43xxx/CVE-2022-43828.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43829.json b/2022/43xxx/CVE-2022-43829.json index bbd258df744..0bc8437c54b 100644 --- a/2022/43xxx/CVE-2022-43829.json +++ b/2022/43xxx/CVE-2022-43829.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2022/43xxx/CVE-2022-43830.json b/2022/43xxx/CVE-2022-43830.json index a7bfa91b01a..0ad0ec2a15a 100644 --- a/2022/43xxx/CVE-2022-43830.json +++ b/2022/43xxx/CVE-2022-43830.json @@ -11,11 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." - }, - { - "lang": "eng", - "value": "To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." + "value": "** REJECT ** To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used." } ] } diff --git a/2023/47xxx/CVE-2023-47584.json b/2023/47xxx/CVE-2023-47584.json index b0ce68fc63d..7d35dfd7ca5 100644 --- a/2023/47xxx/CVE-2023-47584.json +++ b/2023/47xxx/CVE-2023-47584.json @@ -1,17 +1,83 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-47584", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Out-of-bounds write vulnerability exists in V-Server V4.0.18.0 and earlier and V-Server Lite V4.0.18.0 and earlier. If a user opens a specially crafted VPR file, information may be disclosed and/or arbitrary code may be executed.\r\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds write" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd.", + "product": { + "product_data": [ + { + "product_name": "V-Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V4.0.18.0 and earlier" + } + ] + } + }, + { + "product_name": "V-Server Lite", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V4.0.18.0 and earlier" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php", + "refsource": "MISC", + "name": "https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php" + }, + { + "url": "https://hakko-elec.co.jp/site/download/03tellus_inf/index.php", + "refsource": "MISC", + "name": "https://hakko-elec.co.jp/site/download/03tellus_inf/index.php" + }, + { + "url": "https://jvn.jp/en/vu/JVNVU93840158/", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU93840158/" } ] } diff --git a/2023/47xxx/CVE-2023-47585.json b/2023/47xxx/CVE-2023-47585.json index 175f092d7df..0652d347059 100644 --- a/2023/47xxx/CVE-2023-47585.json +++ b/2023/47xxx/CVE-2023-47585.json @@ -1,17 +1,83 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-47585", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Out-of-bounds read vulnerability exists in V-Server V4.0.18.0 and earlier and V-Server Lite V4.0.18.0 and earlier. If a user opens a specially crafted VPR file, information may be disclosed and/or arbitrary code may be executed." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds read" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd.", + "product": { + "product_data": [ + { + "product_name": "V-Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V4.0.18.0 and earlier" + } + ] + } + }, + { + "product_name": "V-Server Lite", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V4.0.18.0 and earlier" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php", + "refsource": "MISC", + "name": "https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php" + }, + { + "url": "https://hakko-elec.co.jp/site/download/03tellus_inf/index.php", + "refsource": "MISC", + "name": "https://hakko-elec.co.jp/site/download/03tellus_inf/index.php" + }, + { + "url": "https://jvn.jp/en/vu/JVNVU93840158/", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU93840158/" } ] } diff --git a/2023/47xxx/CVE-2023-47586.json b/2023/47xxx/CVE-2023-47586.json index 64fb2531f48..b838badbb3e 100644 --- a/2023/47xxx/CVE-2023-47586.json +++ b/2023/47xxx/CVE-2023-47586.json @@ -1,17 +1,83 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-47586", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple heap-based buffer overflow vulnerabilities exist in V-Server V4.0.18.0 and earlier and V-Server Lite V4.0.18.0 and earlier. If a user opens a specially crafted VPR file, information may be disclosed and/or arbitrary code may be executed." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Heap-based buffer overflow" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd.", + "product": { + "product_data": [ + { + "product_name": "V-Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V4.0.18.0 and earlier" + } + ] + } + }, + { + "product_name": "V-Server Lite", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V4.0.18.0 and earlier" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php", + "refsource": "MISC", + "name": "https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php" + }, + { + "url": "https://hakko-elec.co.jp/site/download/03tellus_inf/index.php", + "refsource": "MISC", + "name": "https://hakko-elec.co.jp/site/download/03tellus_inf/index.php" + }, + { + "url": "https://jvn.jp/en/vu/JVNVU93840158/", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU93840158/" } ] } diff --git a/2023/4xxx/CVE-2023-4889.json b/2023/4xxx/CVE-2023-4889.json index 07b0507f192..8b6d003be18 100644 --- a/2023/4xxx/CVE-2023-4889.json +++ b/2023/4xxx/CVE-2023-4889.json @@ -1,17 +1,84 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-4889", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Shareaholic plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'shareaholic' shortcode in versions up to, and including, 9.7.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "shareaholic", + "product": { + "product_data": [ + { + "product_name": "Professional Social Sharing Buttons, Icons & Related Posts \u2013 Shareaholic", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "9.7.8" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ff6932c6-f3ec-46a8-a03b-95512eee5bf1?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ff6932c6-f3ec-46a8-a03b-95512eee5bf1?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/2995413/shareaholic#file51", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/2995413/shareaholic#file51" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Istv\u00e1n M\u00e1rton" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" } ] } diff --git a/2023/6xxx/CVE-2023-6133.json b/2023/6xxx/CVE-2023-6133.json index 4bc98841d2f..19b2b2e6e02 100644 --- a/2023/6xxx/CVE-2023-6133.json +++ b/2023/6xxx/CVE-2023-6133.json @@ -1,17 +1,94 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-6133", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Forminator plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient blacklisting on the 'forminator_allowed_mime_types' function in versions up to, and including, 1.27.0. This makes it possible for authenticated attackers with administrator-level capabilities or above to upload arbitrary files on the affected site's server, but due to the htaccess configuration, remote code cannot be executed." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-434 Unrestricted Upload of File with Dangerous Type" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "wpmudev", + "product": { + "product_data": [ + { + "product_name": "Forminator \u2013 Contact Form, Payment Form & Custom Form Builder", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "1.27.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/13cfa202-ab90-46c0-ab53-00995bfdcaa3?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/13cfa202-ab90-46c0-ab53-00995bfdcaa3?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/forminator/tags/1.27.0/library/fields/upload.php#L356", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/forminator/tags/1.27.0/library/fields/upload.php#L356" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/forminator/tags/1.27.0/library/fields/upload.php#L372", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/forminator/tags/1.27.0/library/fields/upload.php#L372" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/2995007/forminator/trunk/library/helpers/helper-fields.php#file0", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/2995007/forminator/trunk/library/helpers/helper-fields.php#file0" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Istv\u00e1n M\u00e1rton" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" } ] }