diff --git a/2023/3xxx/CVE-2023-3757.json b/2023/3xxx/CVE-2023-3757.json index d783ee59c90..f9443935f1a 100644 --- a/2023/3xxx/CVE-2023-3757.json +++ b/2023/3xxx/CVE-2023-3757.json @@ -11,11 +11,11 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability classified as problematic has been found in GZ Script Car Rental Script 1.8. Affected is an unknown function of the file /EventBookingCalendar/load.php?controller=GzFront/action=checkout/cid=1/layout=calendar/show_header=T/local=3. The manipulation of the argument first_name/second_name/phone/address_1/country leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-234432. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability classified as problematic has been found in GZ Scripts Car Rental Script 1.8. Affected is an unknown function of the file /EventBookingCalendar/load.php?controller=GzFront/action=checkout/cid=1/layout=calendar/show_header=T/local=3. The manipulation of the argument first_name/second_name/phone/address_1/country leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-234432. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "deu", - "value": "Es wurde eine problematische Schwachstelle in GZ Script Car Rental Script 1.8 entdeckt. Es geht dabei um eine nicht klar definierte Funktion der Datei /EventBookingCalendar/load.php?controller=GzFront/action=checkout/cid=1/layout=calendar/show_header=T/local=3. Dank der Manipulation des Arguments first_name/second_name/phone/address_1/country mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren." + "value": "Es wurde eine problematische Schwachstelle in GZ Scripts Car Rental Script 1.8 entdeckt. Es geht dabei um eine nicht klar definierte Funktion der Datei /EventBookingCalendar/load.php?controller=GzFront/action=checkout/cid=1/layout=calendar/show_header=T/local=3. Dank der Manipulation des Arguments first_name/second_name/phone/address_1/country mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren." } ] }, @@ -36,7 +36,7 @@ "vendor": { "vendor_data": [ { - "vendor_name": "GZ Script", + "vendor_name": "GZ Scripts", "product": { "product_data": [ { diff --git a/2023/3xxx/CVE-2023-3971.json b/2023/3xxx/CVE-2023-3971.json new file mode 100644 index 00000000000..f86196c0e0c --- /dev/null +++ b/2023/3xxx/CVE-2023-3971.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-3971", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file