diff --git a/2022/46xxx/CVE-2022-46751.json b/2022/46xxx/CVE-2022-46751.json index 1b8b042f2cf..78918fdd116 100644 --- a/2022/46xxx/CVE-2022-46751.json +++ b/2022/46xxx/CVE-2022-46751.json @@ -83,6 +83,11 @@ "url": "https://lists.apache.org/thread/1dj60hg5nr36kjr4p1100dwjrqookps8", "refsource": "MISC", "name": "https://lists.apache.org/thread/1dj60hg5nr36kjr4p1100dwjrqookps8" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] }, diff --git a/2023/1xxx/CVE-2023-1114.json b/2023/1xxx/CVE-2023-1114.json index de494a8e165..fe7b0843da7 100644 --- a/2023/1xxx/CVE-2023-1114.json +++ b/2023/1xxx/CVE-2023-1114.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Improper Input Validation, Missing Authorization vulnerability in Eskom Bilgisayar e-Belediye allows Information Elicitation.This issue affects e-Belediye: from 1.0.0.95 before 1.0.0.100." + "value": "Missing Authorization vulnerability in Eskom e-Belediye allows Information Elicitation.This issue affects e-Belediye: from 1.0.0.95 before 1.0.0.100.\n\n" } ] }, @@ -32,7 +32,7 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Eskom Bilgisayar", + "vendor_name": "Eskom", "product": { "product_data": [ { diff --git a/2023/1xxx/CVE-2023-1863.json b/2023/1xxx/CVE-2023-1863.json index 37a9ac7dc42..44bf3ddf401 100644 --- a/2023/1xxx/CVE-2023-1863.json +++ b/2023/1xxx/CVE-2023-1863.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eskom Computer Water Metering Software allows Command Line Execution through SQL Injection.This issue affects Water Metering Software: before 23.04.06.\n\n" + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eskom Water Metering Software allows Command Line Execution through SQL Injection.This issue affects Water Metering Software: before 23.04.06.\n\n" } ] }, @@ -32,7 +32,7 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Eskom Computer", + "vendor_name": "Eskom", "product": { "product_data": [ { diff --git a/2023/41xxx/CVE-2023-41930.json b/2023/41xxx/CVE-2023-41930.json index 53f236b0e4d..c35cf6e9c3d 100644 --- a/2023/41xxx/CVE-2023-41930.json +++ b/2023/41xxx/CVE-2023-41930.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3233", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3233" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] } diff --git a/2023/41xxx/CVE-2023-41931.json b/2023/41xxx/CVE-2023-41931.json index e9eb7b8b53f..559867b169d 100644 --- a/2023/41xxx/CVE-2023-41931.json +++ b/2023/41xxx/CVE-2023-41931.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3233", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3233" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] } diff --git a/2023/41xxx/CVE-2023-41932.json b/2023/41xxx/CVE-2023-41932.json index 86a70a9bc03..e5ec275eaf7 100644 --- a/2023/41xxx/CVE-2023-41932.json +++ b/2023/41xxx/CVE-2023-41932.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3235", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3235" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] } diff --git a/2023/41xxx/CVE-2023-41933.json b/2023/41xxx/CVE-2023-41933.json index 73da9a1fdab..d6382dddcd6 100644 --- a/2023/41xxx/CVE-2023-41933.json +++ b/2023/41xxx/CVE-2023-41933.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3235", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3235" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] } diff --git a/2023/41xxx/CVE-2023-41934.json b/2023/41xxx/CVE-2023-41934.json index 6f5d5f6e3b2..af198dd0436 100644 --- a/2023/41xxx/CVE-2023-41934.json +++ b/2023/41xxx/CVE-2023-41934.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3257", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3257" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] } diff --git a/2023/41xxx/CVE-2023-41935.json b/2023/41xxx/CVE-2023-41935.json index 619b3dfb659..804cc0a6834 100644 --- a/2023/41xxx/CVE-2023-41935.json +++ b/2023/41xxx/CVE-2023-41935.json @@ -73,6 +73,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3227", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3227" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] } diff --git a/2023/41xxx/CVE-2023-41936.json b/2023/41xxx/CVE-2023-41936.json index 00f923d24d9..7dbb6c7abe8 100644 --- a/2023/41xxx/CVE-2023-41936.json +++ b/2023/41xxx/CVE-2023-41936.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3228", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3228" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] } diff --git a/2023/41xxx/CVE-2023-41937.json b/2023/41xxx/CVE-2023-41937.json index e5bf71269b1..94e5acb573a 100644 --- a/2023/41xxx/CVE-2023-41937.json +++ b/2023/41xxx/CVE-2023-41937.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3165", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3165" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] } diff --git a/2023/41xxx/CVE-2023-41938.json b/2023/41xxx/CVE-2023-41938.json index 71dbf4c4081..b70ec9eab1a 100644 --- a/2023/41xxx/CVE-2023-41938.json +++ b/2023/41xxx/CVE-2023-41938.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3093", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3093" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] } diff --git a/2023/41xxx/CVE-2023-41939.json b/2023/41xxx/CVE-2023-41939.json index 8786c0a6a58..bde26f3ede1 100644 --- a/2023/41xxx/CVE-2023-41939.json +++ b/2023/41xxx/CVE-2023-41939.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3064", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3064" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] } diff --git a/2023/41xxx/CVE-2023-41940.json b/2023/41xxx/CVE-2023-41940.json index 3f26bfcab0a..797e1ac181c 100644 --- a/2023/41xxx/CVE-2023-41940.json +++ b/2023/41xxx/CVE-2023-41940.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3190", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3190" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] } diff --git a/2023/41xxx/CVE-2023-41941.json b/2023/41xxx/CVE-2023-41941.json index 4a5f8df448f..90c45dac716 100644 --- a/2023/41xxx/CVE-2023-41941.json +++ b/2023/41xxx/CVE-2023-41941.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3101%20(1)", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3101%20(1)" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] } diff --git a/2023/41xxx/CVE-2023-41942.json b/2023/41xxx/CVE-2023-41942.json index 6ef5b91ecdb..9388a73fa86 100644 --- a/2023/41xxx/CVE-2023-41942.json +++ b/2023/41xxx/CVE-2023-41942.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3101%20(2)", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3101%20(2)" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] } diff --git a/2023/41xxx/CVE-2023-41943.json b/2023/41xxx/CVE-2023-41943.json index 642d66695d0..ac0ab16506a 100644 --- a/2023/41xxx/CVE-2023-41943.json +++ b/2023/41xxx/CVE-2023-41943.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3101%20(2)", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3101%20(2)" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] } diff --git a/2023/41xxx/CVE-2023-41944.json b/2023/41xxx/CVE-2023-41944.json index 3f8c6ef4bdd..2cb3327fa87 100644 --- a/2023/41xxx/CVE-2023-41944.json +++ b/2023/41xxx/CVE-2023-41944.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3102", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3102" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] } diff --git a/2023/41xxx/CVE-2023-41945.json b/2023/41xxx/CVE-2023-41945.json index 3d535b29859..80b3e8f1191 100644 --- a/2023/41xxx/CVE-2023-41945.json +++ b/2023/41xxx/CVE-2023-41945.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3065", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3065" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] } diff --git a/2023/41xxx/CVE-2023-41946.json b/2023/41xxx/CVE-2023-41946.json index ce1f7fcd0ce..97f0620667c 100644 --- a/2023/41xxx/CVE-2023-41946.json +++ b/2023/41xxx/CVE-2023-41946.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3082", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3082" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] } diff --git a/2023/41xxx/CVE-2023-41947.json b/2023/41xxx/CVE-2023-41947.json index 1cccf542c5d..e89444449ba 100644 --- a/2023/41xxx/CVE-2023-41947.json +++ b/2023/41xxx/CVE-2023-41947.json @@ -58,6 +58,11 @@ "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3082", "refsource": "MISC", "name": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3082" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] } diff --git a/2023/4xxx/CVE-2023-4797.json b/2023/4xxx/CVE-2023-4797.json new file mode 100644 index 00000000000..32122285bda --- /dev/null +++ b/2023/4xxx/CVE-2023-4797.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-4797", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/4xxx/CVE-2023-4798.json b/2023/4xxx/CVE-2023-4798.json new file mode 100644 index 00000000000..90bc767f910 --- /dev/null +++ b/2023/4xxx/CVE-2023-4798.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-4798", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/4xxx/CVE-2023-4799.json b/2023/4xxx/CVE-2023-4799.json new file mode 100644 index 00000000000..ceedcf52392 --- /dev/null +++ b/2023/4xxx/CVE-2023-4799.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-4799", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/4xxx/CVE-2023-4800.json b/2023/4xxx/CVE-2023-4800.json new file mode 100644 index 00000000000..3f1e05e672c --- /dev/null +++ b/2023/4xxx/CVE-2023-4800.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-4800", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file