From 70b0f65ffa5c5d4f9cb37d1b16ea5f30e9ceca9b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 May 2023 21:00:37 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/0xxx/CVE-2019-0160.json | 91 +++++++++++++++++--------------- 2023/29xxx/CVE-2023-29791.json | 56 +++++++++++++++++--- 2023/2xxx/CVE-2023-2662.json | 94 ++++++++++++++++++++++++++++++++++ 2023/2xxx/CVE-2023-2663.json | 94 ++++++++++++++++++++++++++++++++++ 2023/2xxx/CVE-2023-2664.json | 94 ++++++++++++++++++++++++++++++++++ 2023/31xxx/CVE-2023-31146.json | 81 +++++++++++++++++++++++++++-- 2023/31xxx/CVE-2023-31497.json | 56 +++++++++++++++++--- 2023/32xxx/CVE-2023-32058.json | 81 +++++++++++++++++++++++++++-- 2023/32xxx/CVE-2023-32701.json | 18 +++++++ 2023/32xxx/CVE-2023-32702.json | 18 +++++++ 2023/32xxx/CVE-2023-32703.json | 18 +++++++ 2023/32xxx/CVE-2023-32704.json | 18 +++++++ 2023/32xxx/CVE-2023-32705.json | 18 +++++++ 2023/32xxx/CVE-2023-32706.json | 18 +++++++ 2023/32xxx/CVE-2023-32707.json | 18 +++++++ 2023/32xxx/CVE-2023-32708.json | 18 +++++++ 2023/32xxx/CVE-2023-32709.json | 18 +++++++ 2023/32xxx/CVE-2023-32710.json | 18 +++++++ 2023/32xxx/CVE-2023-32711.json | 18 +++++++ 2023/32xxx/CVE-2023-32712.json | 18 +++++++ 2023/32xxx/CVE-2023-32713.json | 18 +++++++ 2023/32xxx/CVE-2023-32714.json | 18 +++++++ 2023/32xxx/CVE-2023-32715.json | 18 +++++++ 2023/32xxx/CVE-2023-32716.json | 18 +++++++ 2023/32xxx/CVE-2023-32717.json | 18 +++++++ 2023/32xxx/CVE-2023-32718.json | 18 +++++++ 2023/32xxx/CVE-2023-32719.json | 18 +++++++ 2023/32xxx/CVE-2023-32720.json | 18 +++++++ 28 files changed, 946 insertions(+), 61 deletions(-) create mode 100644 2023/2xxx/CVE-2023-2662.json create mode 100644 2023/2xxx/CVE-2023-2663.json create mode 100644 2023/2xxx/CVE-2023-2664.json create mode 100644 2023/32xxx/CVE-2023-32701.json create mode 100644 2023/32xxx/CVE-2023-32702.json create mode 100644 2023/32xxx/CVE-2023-32703.json create mode 100644 2023/32xxx/CVE-2023-32704.json create mode 100644 2023/32xxx/CVE-2023-32705.json create mode 100644 2023/32xxx/CVE-2023-32706.json create mode 100644 2023/32xxx/CVE-2023-32707.json create mode 100644 2023/32xxx/CVE-2023-32708.json create mode 100644 2023/32xxx/CVE-2023-32709.json create mode 100644 2023/32xxx/CVE-2023-32710.json create mode 100644 2023/32xxx/CVE-2023-32711.json create mode 100644 2023/32xxx/CVE-2023-32712.json create mode 100644 2023/32xxx/CVE-2023-32713.json create mode 100644 2023/32xxx/CVE-2023-32714.json create mode 100644 2023/32xxx/CVE-2023-32715.json create mode 100644 2023/32xxx/CVE-2023-32716.json create mode 100644 2023/32xxx/CVE-2023-32717.json create mode 100644 2023/32xxx/CVE-2023-32718.json create mode 100644 2023/32xxx/CVE-2023-32719.json create mode 100644 2023/32xxx/CVE-2023-32720.json diff --git a/2019/0xxx/CVE-2019-0160.json b/2019/0xxx/CVE-2019-0160.json index 1fb574cc8af..92400877784 100644 --- a/2019/0xxx/CVE-2019-0160.json +++ b/2019/0xxx/CVE-2019-0160.json @@ -1,17 +1,41 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-0160", "ASSIGNER": "secure@intel.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer overflow in system firmware for EDK II may allow unauthenticated user to potentially enable escalation of privilege and/or denial of service via network access.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Escalation of Privilege and/or Denial of Service" + }, + { + "lang": "eng", + "value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ { - "vendor_name": "Extensible Firmware Interface Development Kit (EDK II)", + "vendor_name": "n/a", "product": { "product_data": [ { @@ -19,6 +43,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "N/A" } ] @@ -30,52 +55,36 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Escalation of Privilege and/or Denial of Service" - } - ] - } - ] - }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "name": "https://edk2-docs.gitbooks.io/security-advisory/content/partitiondxe-and-udf-buffer-overflow.html", - "url": "https://edk2-docs.gitbooks.io/security-advisory/content/partitiondxe-and-udf-buffer-overflow.html" - }, - { - "refsource": "SUSE", - "name": "openSUSE-SU-2019:1172", - "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00048.html" - }, - { - "refsource": "REDHAT", - "name": "RHSA-2019:2125", - "url": "https://access.redhat.com/errata/RHSA-2019:2125" - }, - { - "refsource": "FEDORA", - "name": "FEDORA-2019-d47a9d4b8b", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/" - }, - { - "refsource": "REDHAT", - "name": "RHSA-2019:3338", - "url": "https://access.redhat.com/errata/RHSA-2019:3338" + "url": "https://tianocore-docs.github.io/SecurityAdvisory/draft/partitiondxe-and-udf-buffer-overflow.html", + "refsource": "MISC", + "name": "https://tianocore-docs.github.io/SecurityAdvisory/draft/partitiondxe-and-udf-buffer-overflow.html" } ] }, - "description": { - "description_data": [ + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ { - "lang": "eng", - "value": "Buffer overflow in system firmware for EDK II may allow unauthenticated user to potentially enable escalation of privilege and/or denial of service via network access." + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/29xxx/CVE-2023-29791.json b/2023/29xxx/CVE-2023-29791.json index fef98b9c5a7..1afae8bb2b7 100644 --- a/2023/29xxx/CVE-2023-29791.json +++ b/2023/29xxx/CVE-2023-29791.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-29791", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-29791", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "kodbox <= 1.37 is vulnerable to Cross Site Scripting (XSS) via the debug information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://blog.mo60.cn/index.php/archives/kodbox-xss.html", + "refsource": "MISC", + "name": "https://blog.mo60.cn/index.php/archives/kodbox-xss.html" } ] } diff --git a/2023/2xxx/CVE-2023-2662.json b/2023/2xxx/CVE-2023-2662.json new file mode 100644 index 00000000000..c42066c4381 --- /dev/null +++ b/2023/2xxx/CVE-2023-2662.json @@ -0,0 +1,94 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2023-2662", + "ASSIGNER": "xpdf@xpdfreader.com", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Xpdf 4.04 (and earlier), a bad color space object in the input PDF file can cause a divide-by-zero.\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-369 Divide By Zero", + "cweId": "CWE-369" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Xpdf", + "product": { + "product_data": [ + { + "product_name": "Xpdf", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.04" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://forum.xpdfreader.com/viewtopic.php?t=42505", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?t=42505" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "huckleberry" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 2.9, + "baseSeverity": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" + } + ] + } +} \ No newline at end of file diff --git a/2023/2xxx/CVE-2023-2663.json b/2023/2xxx/CVE-2023-2663.json new file mode 100644 index 00000000000..8f6df94f7dc --- /dev/null +++ b/2023/2xxx/CVE-2023-2663.json @@ -0,0 +1,94 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2023-2663", + "ASSIGNER": "xpdf@xpdfreader.com", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "\u00a0In Xpdf 4.04 (and earlier), a PDF object loop in the page label tree leads to infinite recursion and a stack overflow.\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-674 Uncontrolled Recursion", + "cweId": "CWE-674" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Xpdf", + "product": { + "product_data": [ + { + "product_name": "Xpdf", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.04" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://forum.xpdfreader.com/viewtopic.php?t=42421", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?t=42421" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "BabyBus" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 2.9, + "baseSeverity": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" + } + ] + } +} \ No newline at end of file diff --git a/2023/2xxx/CVE-2023-2664.json b/2023/2xxx/CVE-2023-2664.json new file mode 100644 index 00000000000..c958c6211a2 --- /dev/null +++ b/2023/2xxx/CVE-2023-2664.json @@ -0,0 +1,94 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2023-2664", + "ASSIGNER": "xpdf@xpdfreader.com", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "\u00a0In Xpdf 4.04 (and earlier), a PDF object loop in the embedded file tree leads to infinite recursion and a stack overflow.\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-674 Uncontrolled Recursion", + "cweId": "CWE-674" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Xpdf", + "product": { + "product_data": [ + { + "product_name": "Xpdf", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.04" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://forum.xpdfreader.com/viewtopic.php?t=42422", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?t=42422" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "BabyBus" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 2.9, + "baseSeverity": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31146.json b/2023/31xxx/CVE-2023-31146.json index f10c5261758..187857f1143 100644 --- a/2023/31xxx/CVE-2023-31146.json +++ b/2023/31xxx/CVE-2023-31146.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-31146", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to version 0.3.8, during codegen, the length word of a dynarray is written before the data, which can result in out-of-bounds array access in the case where the dynarray is on both the lhs and rhs of an assignment. The issue can cause data corruption across call frames. The expected behavior is to revert due to out-of-bounds array access. Version 0.3.8 contains a patch for this issue." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-787: Out-of-bounds Write", + "cweId": "CWE-787" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "vyperlang", + "product": { + "product_data": [ + { + "product_name": "vyper", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 0.3.8" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-3p37-3636-q8wv", + "refsource": "MISC", + "name": "https://github.com/vyperlang/vyper/security/advisories/GHSA-3p37-3636-q8wv" + }, + { + "url": "https://github.com/vyperlang/vyper/commit/4f8289a81206f767df1900ac48f485d90fc87edb", + "refsource": "MISC", + "name": "https://github.com/vyperlang/vyper/commit/4f8289a81206f767df1900ac48f485d90fc87edb" + } + ] + }, + "source": { + "advisory": "GHSA-3p37-3636-q8wv", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "version": "3.1" } ] } diff --git a/2023/31xxx/CVE-2023-31497.json b/2023/31xxx/CVE-2023-31497.json index 808adb05810..db7b517b65e 100644 --- a/2023/31xxx/CVE-2023-31497.json +++ b/2023/31xxx/CVE-2023-31497.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31497", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31497", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Incorrect access control in Quick Heal Technologies Limited Seqrite Endpoint Security (EPS) all versions prior to v8.0 allows attackers to escalate privileges to root via supplying a crafted binary to the target system." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/0xInfection/EPScalate", + "refsource": "MISC", + "name": "https://github.com/0xInfection/EPScalate" } ] } diff --git a/2023/32xxx/CVE-2023-32058.json b/2023/32xxx/CVE-2023-32058.json index 599af55ad12..3463d76d8fb 100644 --- a/2023/32xxx/CVE-2023-32058.json +++ b/2023/32xxx/CVE-2023-32058.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-32058", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to version 0.3.8, due to missing overflow check for loop variables, by assigning the iterator of a loop to a variable, it is possible to overflow the type of the latter. The issue seems to happen only in loops of type `for i in range(a, a + N)` as in loops of type `for i in range(start, stop)` and `for i in range(stop)`, the compiler is able to raise a `TypeMismatch` when trying to overflow the variable. The problem has been patched in version 0.3.8." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-190: Integer Overflow or Wraparound", + "cweId": "CWE-190" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "vyperlang", + "product": { + "product_data": [ + { + "product_name": "vyper", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 0.3.8" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-6r8q-pfpv-7cgj", + "refsource": "MISC", + "name": "https://github.com/vyperlang/vyper/security/advisories/GHSA-6r8q-pfpv-7cgj" + }, + { + "url": "https://github.com/vyperlang/vyper/commit/3de1415ee77a9244eb04bdb695e249d3ec9ed868", + "refsource": "MISC", + "name": "https://github.com/vyperlang/vyper/commit/3de1415ee77a9244eb04bdb695e249d3ec9ed868" + } + ] + }, + "source": { + "advisory": "GHSA-6r8q-pfpv-7cgj", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2023/32xxx/CVE-2023-32701.json b/2023/32xxx/CVE-2023-32701.json new file mode 100644 index 00000000000..80469404dce --- /dev/null +++ b/2023/32xxx/CVE-2023-32701.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32701", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32702.json b/2023/32xxx/CVE-2023-32702.json new file mode 100644 index 00000000000..581891a6121 --- /dev/null +++ b/2023/32xxx/CVE-2023-32702.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32702", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32703.json b/2023/32xxx/CVE-2023-32703.json new file mode 100644 index 00000000000..dca21628038 --- /dev/null +++ b/2023/32xxx/CVE-2023-32703.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32703", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32704.json b/2023/32xxx/CVE-2023-32704.json new file mode 100644 index 00000000000..70e794a45f5 --- /dev/null +++ b/2023/32xxx/CVE-2023-32704.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32704", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32705.json b/2023/32xxx/CVE-2023-32705.json new file mode 100644 index 00000000000..0d11f3be30c --- /dev/null +++ b/2023/32xxx/CVE-2023-32705.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32705", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32706.json b/2023/32xxx/CVE-2023-32706.json new file mode 100644 index 00000000000..869a5de5028 --- /dev/null +++ b/2023/32xxx/CVE-2023-32706.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32706", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32707.json b/2023/32xxx/CVE-2023-32707.json new file mode 100644 index 00000000000..5d8b3513d72 --- /dev/null +++ b/2023/32xxx/CVE-2023-32707.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32707", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32708.json b/2023/32xxx/CVE-2023-32708.json new file mode 100644 index 00000000000..983fc1ae9b2 --- /dev/null +++ b/2023/32xxx/CVE-2023-32708.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32708", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32709.json b/2023/32xxx/CVE-2023-32709.json new file mode 100644 index 00000000000..b28f0cf3a55 --- /dev/null +++ b/2023/32xxx/CVE-2023-32709.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32709", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32710.json b/2023/32xxx/CVE-2023-32710.json new file mode 100644 index 00000000000..08ee76bddb5 --- /dev/null +++ b/2023/32xxx/CVE-2023-32710.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32710", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32711.json b/2023/32xxx/CVE-2023-32711.json new file mode 100644 index 00000000000..b44e2f291c4 --- /dev/null +++ b/2023/32xxx/CVE-2023-32711.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32711", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32712.json b/2023/32xxx/CVE-2023-32712.json new file mode 100644 index 00000000000..5b2444ce4a9 --- /dev/null +++ b/2023/32xxx/CVE-2023-32712.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32712", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32713.json b/2023/32xxx/CVE-2023-32713.json new file mode 100644 index 00000000000..462bc210403 --- /dev/null +++ b/2023/32xxx/CVE-2023-32713.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32713", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32714.json b/2023/32xxx/CVE-2023-32714.json new file mode 100644 index 00000000000..c9c4fb27158 --- /dev/null +++ b/2023/32xxx/CVE-2023-32714.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32714", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32715.json b/2023/32xxx/CVE-2023-32715.json new file mode 100644 index 00000000000..d716f89769e --- /dev/null +++ b/2023/32xxx/CVE-2023-32715.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32715", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32716.json b/2023/32xxx/CVE-2023-32716.json new file mode 100644 index 00000000000..0319f56ac6c --- /dev/null +++ b/2023/32xxx/CVE-2023-32716.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32716", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32717.json b/2023/32xxx/CVE-2023-32717.json new file mode 100644 index 00000000000..dafb01b5c9c --- /dev/null +++ b/2023/32xxx/CVE-2023-32717.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32717", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32718.json b/2023/32xxx/CVE-2023-32718.json new file mode 100644 index 00000000000..75e4d5c3d51 --- /dev/null +++ b/2023/32xxx/CVE-2023-32718.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32718", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32719.json b/2023/32xxx/CVE-2023-32719.json new file mode 100644 index 00000000000..6b6c2d0bf13 --- /dev/null +++ b/2023/32xxx/CVE-2023-32719.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32719", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32720.json b/2023/32xxx/CVE-2023-32720.json new file mode 100644 index 00000000000..badabce2bc1 --- /dev/null +++ b/2023/32xxx/CVE-2023-32720.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-32720", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file