From 70f3ddea2aeed1844e18c88993b3b814c1c71915 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 14 Jun 2023 17:00:43 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/31xxx/CVE-2022-31640.json | 56 +++++++- 2022/31xxx/CVE-2022-31641.json | 56 +++++++- 2022/31xxx/CVE-2022-31642.json | 56 +++++++- 2023/0xxx/CVE-2023-0009.json | 153 ++++++++++++++++++++- 2023/0xxx/CVE-2023-0010.json | 244 ++++++++++++++++++++++++++++++++- 2023/25xxx/CVE-2023-25367.json | 61 ++++++++- 2023/34xxx/CVE-2023-34095.json | 96 ++++++++++++- 2023/3xxx/CVE-2023-3246.json | 18 +++ 2023/3xxx/CVE-2023-3247.json | 18 +++ 9 files changed, 728 insertions(+), 30 deletions(-) create mode 100644 2023/3xxx/CVE-2023-3246.json create mode 100644 2023/3xxx/CVE-2023-3247.json diff --git a/2022/31xxx/CVE-2022-31640.json b/2022/31xxx/CVE-2022-31640.json index 40e3f9412f7..aa1a507777a 100644 --- a/2022/31xxx/CVE-2022-31640.json +++ b/2022/31xxx/CVE-2022-31640.json @@ -1,18 +1,66 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-31640", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "hp-security-alert@hp.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "HP Inc.", + "product": { + "product_data": [ + { + "product_name": "HP PC BIOS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "See HP Security Bulletin reference for affected versions." + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.hp.com/us-en/document/ish_6662920-6662944-16/hpsbhf03805", + "refsource": "MISC", + "name": "https://support.hp.com/us-en/document/ish_6662920-6662944-16/hpsbhf03805" + } + ] + }, + "generator": { + "engine": "cveClient/1.0.13" } } \ No newline at end of file diff --git a/2022/31xxx/CVE-2022-31641.json b/2022/31xxx/CVE-2022-31641.json index 8527981796b..65316d0ef1d 100644 --- a/2022/31xxx/CVE-2022-31641.json +++ b/2022/31xxx/CVE-2022-31641.json @@ -1,18 +1,66 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-31641", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "hp-security-alert@hp.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "HP Inc.", + "product": { + "product_data": [ + { + "product_name": "HP PC BIOS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "See HP Security Bulletin reference for affected versions." + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.hp.com/us-en/document/ish_6662920-6662944-16/hpsbhf03805", + "refsource": "MISC", + "name": "https://support.hp.com/us-en/document/ish_6662920-6662944-16/hpsbhf03805" + } + ] + }, + "generator": { + "engine": "cveClient/1.0.13" } } \ No newline at end of file diff --git a/2022/31xxx/CVE-2022-31642.json b/2022/31xxx/CVE-2022-31642.json index 4f65535becb..ced028558dd 100644 --- a/2022/31xxx/CVE-2022-31642.json +++ b/2022/31xxx/CVE-2022-31642.json @@ -1,18 +1,66 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-31642", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "hp-security-alert@hp.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "HP Inc.", + "product": { + "product_data": [ + { + "product_name": "HP PC BIOS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "See HP Security Bulletin reference for affected versions." + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.hp.com/us-en/document/ish_6662920-6662944-16/hpsbhf03805", + "refsource": "MISC", + "name": "https://support.hp.com/us-en/document/ish_6662920-6662944-16/hpsbhf03805" + } + ] + }, + "generator": { + "engine": "cveClient/1.0.13" } } \ No newline at end of file diff --git a/2023/0xxx/CVE-2023-0009.json b/2023/0xxx/CVE-2023-0009.json index 8e4df076769..e70a1e9a863 100644 --- a/2023/0xxx/CVE-2023-0009.json +++ b/2023/0xxx/CVE-2023-0009.json @@ -1,17 +1,162 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-0009", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@paloaltonetworks.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A local privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows enables a local service account or user with token impersonation privileges to execute programs with elevated privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-807: Reliance on Untrusted Inputs in a Security Decision", + "cweId": "CWE-807" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Palo Alto Networks", + "product": { + "product_data": [ + { + "product_name": "GlobalProtect App", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "6.1.1", + "status": "unaffected" + } + ], + "lessThan": "6.1.1", + "status": "affected", + "version": "6.1", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "6.0.5", + "status": "unaffected" + } + ], + "lessThan": "6.0.5", + "status": "affected", + "version": "6.0", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "5.2.13", + "status": "unaffected" + } + ], + "lessThan": "5.2.13", + "status": "affected", + "version": "5.2", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2023-0009", + "refsource": "MISC", + "name": "https://security.paloaltonetworks.com/CVE-2023-0009" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "defect": [ + "GPC-16078" + ], + "discovery": "EXTERNAL" + }, + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.
" + } + ], + "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.\n" + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "This issue is fixed in GlobalProtect app 5.2.13, GlobalProtect app 6.0.5, GlobalProtect app 6.1.1, and all later GlobalProtect app versions." + } + ], + "value": "This issue is fixed in GlobalProtect app 5.2.13, GlobalProtect app 6.0.5, GlobalProtect app 6.1.1, and all later GlobalProtect app versions." + } + ], + "credits": [ + { + "lang": "en", + "value": "Mohammad Arman from Zurich Insurance" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/0xxx/CVE-2023-0010.json b/2023/0xxx/CVE-2023-0010.json index cf5c94fa1f4..dd993b46261 100644 --- a/2023/0xxx/CVE-2023-0010.json +++ b/2023/0xxx/CVE-2023-0010.json @@ -1,17 +1,253 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-0010", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@paloaltonetworks.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A reflected cross-site scripting (XSS) vulnerability in the Captive Portal feature of Palo Alto Networks PAN-OS software can allow a JavaScript payload to be executed in the context of an authenticated Captive Portal user\u2019s browser when they click on a specifically crafted link.\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Palo Alto Networks", + "product": { + "product_data": [ + { + "product_name": "PAN-OS", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "11.0" + }, + { + "changes": [ + { + "at": "10.2.2", + "status": "unaffected" + } + ], + "lessThan": "10.2.2", + "status": "affected", + "version": "10.2", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "10.1.6", + "status": "unaffected" + } + ], + "lessThan": "10.1.6", + "status": "affected", + "version": "10.1", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "10.0.11", + "status": "unaffected" + } + ], + "lessThan": "10.0.11", + "status": "affected", + "version": "10.0", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "9.1.16", + "status": "unaffected" + } + ], + "lessThan": "9.1.16", + "status": "affected", + "version": "9.1", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "9.0.17", + "status": "unaffected" + } + ], + "lessThan": "9.0.17", + "status": "affected", + "version": "9.0", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "8.1.24", + "status": "unaffected" + } + ], + "lessThan": "8.1.24", + "status": "affected", + "version": "8.1", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "Cloud NGFW", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "All" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "Prisma Access", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "All" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2023-0010", + "refsource": "MISC", + "name": "https://security.paloaltonetworks.com/CVE-2023-0010" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "defect": [ + "PAN-191662" + ], + "discovery": "EXTERNAL" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

This issue is applicable only to firewalls that are configured to use Captive Portal authentication.

On PAN-OS 10.0 and later software versions, this issue applies only to firewalls that have also disabled the default token generation for Captive Portal authentication. You can verify that the token is not disabled by running the following command: \u2018show deviceconfig setting captive-portal\u2019.

" + } + ], + "value": "This issue is applicable only to firewalls that are configured to use Captive Portal authentication.\n\nOn PAN-OS 10.0 and later software versions, this issue applies only to firewalls that have also disabled the default token generation for Captive Portal authentication. You can verify that the token is not disabled by running the following command: \u2018show deviceconfig setting captive-portal\u2019.\n\n" + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

Palo Alto Networks is not aware of any malicious exploitation of this issue.

" + } + ], + "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.\n\n" + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.16, PAN-OS 10.0.11, PAN-OS 10.1.6, PAN-OS 10.2.2, and all later PAN-OS versions." + } + ], + "value": "This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.16, PAN-OS 10.0.11, PAN-OS 10.1.6, PAN-OS 10.2.2, and all later PAN-OS versions." + } + ], + "credits": [ + { + "lang": "en", + "value": "Lockheed Martin Red Team" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2023/25xxx/CVE-2023-25367.json b/2023/25xxx/CVE-2023-25367.json index 1f6e01d18b4..d1ba84ea312 100644 --- a/2023/25xxx/CVE-2023-25367.json +++ b/2023/25xxx/CVE-2023-25367.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-25367", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-25367", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Siglent SDS 1104X-E SDS1xx4X-E_V6.1.37R9.ADS allows unfiltered user input resulting in Remote Code Execution (RCE) with SCPI interface or web server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://siglent.com", + "refsource": "MISC", + "name": "https://siglent.com" + }, + { + "refsource": "MISC", + "name": "https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25367.md", + "url": "https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25367.md" } ] } diff --git a/2023/34xxx/CVE-2023-34095.json b/2023/34xxx/CVE-2023-34095.json index 522a660b35b..3d541564f19 100644 --- a/2023/34xxx/CVE-2023-34095.json +++ b/2023/34xxx/CVE-2023-34095.json @@ -1,17 +1,105 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-34095", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "cpdb-libs provides frontend and backend libraries for the Common Printing Dialog Backends (CPDB) project. In versions 1.0 through 2.0b4, cpdb-libs is vulnerable to buffer overflows via improper use of `scanf(3)`. cpdb-libs uses the `fscanf()` and `scanf()` functions to parse command lines and configuration files, dropping the read string components into fixed-length buffers, but does not limit the length of the strings to be read by `fscanf()` and `scanf()` causing buffer overflows when a string is longer than 1023 characters. A patch for this issue is available at commit f181bd1f14757c2ae0f17cc76dc20421a40f30b7. As all buffers have a length of 1024 characters, the patch limits the maximum string length to be read to 1023 by replacing all occurrences of `%s` with `%1023s` in all calls of the `fscanf()` and `scanf()` functions.\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-121: Stack-based Buffer Overflow", + "cweId": "CWE-121" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "OpenPrinting", + "product": { + "product_data": [ + { + "product_name": "cpdb-libs", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": ">= 1.0, <= 2.0b4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/OpenPrinting/cpdb-libs/security/advisories/GHSA-25j7-9gfc-f46x", + "refsource": "MISC", + "name": "https://github.com/OpenPrinting/cpdb-libs/security/advisories/GHSA-25j7-9gfc-f46x" + }, + { + "url": "https://github.com/OpenPrinting/cpdb-libs/commit/f181bd1f14757c2ae0f17cc76dc20421a40f30b7", + "refsource": "MISC", + "name": "https://github.com/OpenPrinting/cpdb-libs/commit/f181bd1f14757c2ae0f17cc76dc20421a40f30b7" + }, + { + "url": "https://github.com/OpenPrinting/cpdb-libs/blob/85555fba64d34f53a2fce099b0488904cc48ed35/cpdb/cpdb-frontend.c#L372", + "refsource": "MISC", + "name": "https://github.com/OpenPrinting/cpdb-libs/blob/85555fba64d34f53a2fce099b0488904cc48ed35/cpdb/cpdb-frontend.c#L372" + }, + { + "url": "https://github.com/OpenPrinting/cpdb-libs/blob/85555fba64d34f53a2fce099b0488904cc48ed35/tools/cpdb-text-frontend.c#L362", + "refsource": "MISC", + "name": "https://github.com/OpenPrinting/cpdb-libs/blob/85555fba64d34f53a2fce099b0488904cc48ed35/tools/cpdb-text-frontend.c#L362" + }, + { + "url": "https://github.com/OpenPrinting/cpdb-libs/blob/85555fba64d34f53a2fce099b0488904cc48ed35/tools/cpdb-text-frontend.c#L453", + "refsource": "MISC", + "name": "https://github.com/OpenPrinting/cpdb-libs/blob/85555fba64d34f53a2fce099b0488904cc48ed35/tools/cpdb-text-frontend.c#L453" + } + ] + }, + "source": { + "advisory": "GHSA-25j7-9gfc-f46x", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/3xxx/CVE-2023-3246.json b/2023/3xxx/CVE-2023-3246.json new file mode 100644 index 00000000000..d1bff2fe0ba --- /dev/null +++ b/2023/3xxx/CVE-2023-3246.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-3246", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/3xxx/CVE-2023-3247.json b/2023/3xxx/CVE-2023-3247.json new file mode 100644 index 00000000000..8d45b77a707 --- /dev/null +++ b/2023/3xxx/CVE-2023-3247.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-3247", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file