diff --git a/2014/125xxx/CVE-2014-125106.json b/2014/125xxx/CVE-2014-125106.json new file mode 100644 index 00000000000..eb2979fb47a --- /dev/null +++ b/2014/125xxx/CVE-2014-125106.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2014-125106", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Nanopb before 0.3.1 allows size_t overflows in pb_dec_bytes and pb_dec_string." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nanopb/nanopb/commit/d2099cc8f1adb33d427a44a5e32ed27b647c7168", + "refsource": "MISC", + "name": "https://github.com/nanopb/nanopb/commit/d2099cc8f1adb33d427a44a5e32ed27b647c7168" + }, + { + "url": "https://github.com/nanopb/nanopb/blob/master/CHANGELOG.txt", + "refsource": "MISC", + "name": "https://github.com/nanopb/nanopb/blob/master/CHANGELOG.txt" + }, + { + "url": "https://github.com/nanopb/nanopb/compare/nanopb-0.3.0...nanopb-0.3.1", + "refsource": "MISC", + "name": "https://github.com/nanopb/nanopb/compare/nanopb-0.3.0...nanopb-0.3.1" + } + ] + } +} \ No newline at end of file diff --git a/2023/35xxx/CVE-2023-35804.json b/2023/35xxx/CVE-2023-35804.json new file mode 100644 index 00000000000..7707e2e7f56 --- /dev/null +++ b/2023/35xxx/CVE-2023-35804.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-35804", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/35xxx/CVE-2023-35805.json b/2023/35xxx/CVE-2023-35805.json new file mode 100644 index 00000000000..a43c5dbff4e --- /dev/null +++ b/2023/35xxx/CVE-2023-35805.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-35805", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/35xxx/CVE-2023-35806.json b/2023/35xxx/CVE-2023-35806.json new file mode 100644 index 00000000000..65669adfb01 --- /dev/null +++ b/2023/35xxx/CVE-2023-35806.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-35806", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/35xxx/CVE-2023-35807.json b/2023/35xxx/CVE-2023-35807.json new file mode 100644 index 00000000000..cdf22bab723 --- /dev/null +++ b/2023/35xxx/CVE-2023-35807.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-35807", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/35xxx/CVE-2023-35808.json b/2023/35xxx/CVE-2023-35808.json new file mode 100644 index 00000000000..2dc9e19a137 --- /dev/null +++ b/2023/35xxx/CVE-2023-35808.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2023-35808", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. An Unrestricted File Upload vulnerability has been identified in the Notes module. By using crafted requests, custom PHP code can be injected and executed through the Notes module because of missing input validation. Regular user privileges can be used to exploit this vulnerability. Editions other than Enterprise are also affected." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-006/", + "refsource": "MISC", + "name": "https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-006/" + } + ] + } +} \ No newline at end of file diff --git a/2023/35xxx/CVE-2023-35809.json b/2023/35xxx/CVE-2023-35809.json new file mode 100644 index 00000000000..a1c42f6c299 --- /dev/null +++ b/2023/35xxx/CVE-2023-35809.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2023-35809", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. A Bean Manipulation vulnerability has been identified in the REST API. By using a crafted request, custom PHP code can be injected through the REST API because of missing input validation. Regular user privileges can be used to exploit this vulnerability. Editions other than Enterprise are also affected." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-007/", + "refsource": "MISC", + "name": "https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-007/" + } + ] + } +} \ No newline at end of file diff --git a/2023/35xxx/CVE-2023-35810.json b/2023/35xxx/CVE-2023-35810.json new file mode 100644 index 00000000000..501078218af --- /dev/null +++ b/2023/35xxx/CVE-2023-35810.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2023-35810", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. A Second-Order PHP Object Injection vulnerability has been identified in the DocuSign module. By using crafted requests, custom PHP code can be injected and executed through the DocuSign module because of missing input validation. Admin user privileges are required to exploit this vulnerability. Editions other than Enterprise are also affected." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-009/", + "refsource": "MISC", + "name": "https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-009/" + } + ] + } +} \ No newline at end of file diff --git a/2023/35xxx/CVE-2023-35811.json b/2023/35xxx/CVE-2023-35811.json new file mode 100644 index 00000000000..0ce8fef68f2 --- /dev/null +++ b/2023/35xxx/CVE-2023-35811.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2023-35811", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. Two SQL Injection vectors have been identified in the REST API. By using crafted requests, custom SQL code can be injected through the REST API because of missing input validation. Regular user privileges can use used for exploitation. Editions other than Enterprise are also affected." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-008/", + "refsource": "MISC", + "name": "https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-008/" + } + ] + } +} \ No newline at end of file diff --git a/2023/35xxx/CVE-2023-35812.json b/2023/35xxx/CVE-2023-35812.json new file mode 100644 index 00000000000..61cd54f565f --- /dev/null +++ b/2023/35xxx/CVE-2023-35812.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-35812", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file