From 85fa021ef9bd96b358f68e2d9e00d26baf6104ea Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 6 Jun 2023 14:00:42 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2016/15xxx/CVE-2016-15033.json | 18 +++++++++ 2019/25xxx/CVE-2019-25145.json | 18 +++++++++ 2019/25xxx/CVE-2019-25146.json | 18 +++++++++ 2019/25xxx/CVE-2019-25147.json | 18 +++++++++ 2019/25xxx/CVE-2019-25148.json | 18 +++++++++ 2019/25xxx/CVE-2019-25149.json | 18 +++++++++ 2019/25xxx/CVE-2019-25150.json | 18 +++++++++ 2019/25xxx/CVE-2019-25151.json | 18 +++++++++ 2020/36xxx/CVE-2020-36714.json | 18 +++++++++ 2020/36xxx/CVE-2020-36715.json | 18 +++++++++ 2020/36xxx/CVE-2020-36716.json | 18 +++++++++ 2020/36xxx/CVE-2020-36717.json | 18 +++++++++ 2020/36xxx/CVE-2020-36718.json | 18 +++++++++ 2020/36xxx/CVE-2020-36719.json | 18 +++++++++ 2020/36xxx/CVE-2020-36720.json | 18 +++++++++ 2020/36xxx/CVE-2020-36721.json | 18 +++++++++ 2020/36xxx/CVE-2020-36722.json | 18 +++++++++ 2020/36xxx/CVE-2020-36723.json | 18 +++++++++ 2020/36xxx/CVE-2020-36724.json | 18 +++++++++ 2020/36xxx/CVE-2020-36725.json | 18 +++++++++ 2020/36xxx/CVE-2020-36726.json | 18 +++++++++ 2020/36xxx/CVE-2020-36727.json | 18 +++++++++ 2020/36xxx/CVE-2020-36728.json | 18 +++++++++ 2020/36xxx/CVE-2020-36729.json | 18 +++++++++ 2020/36xxx/CVE-2020-36730.json | 18 +++++++++ 2020/36xxx/CVE-2020-36731.json | 18 +++++++++ 2021/4xxx/CVE-2021-4365.json | 18 +++++++++ 2021/4xxx/CVE-2021-4366.json | 18 +++++++++ 2021/4xxx/CVE-2021-4367.json | 18 +++++++++ 2021/4xxx/CVE-2021-4368.json | 18 +++++++++ 2021/4xxx/CVE-2021-4369.json | 18 +++++++++ 2021/4xxx/CVE-2021-4370.json | 18 +++++++++ 2021/4xxx/CVE-2021-4371.json | 18 +++++++++ 2021/4xxx/CVE-2021-4372.json | 18 +++++++++ 2021/4xxx/CVE-2021-4373.json | 18 +++++++++ 2021/4xxx/CVE-2021-4374.json | 18 +++++++++ 2021/4xxx/CVE-2021-4375.json | 18 +++++++++ 2021/4xxx/CVE-2021-4376.json | 18 +++++++++ 2021/4xxx/CVE-2021-4377.json | 18 +++++++++ 2021/4xxx/CVE-2021-4378.json | 18 +++++++++ 2021/4xxx/CVE-2021-4379.json | 18 +++++++++ 2021/4xxx/CVE-2021-4380.json | 18 +++++++++ 2021/4xxx/CVE-2021-4381.json | 18 +++++++++ 2021/4xxx/CVE-2021-4382.json | 18 +++++++++ 2021/4xxx/CVE-2021-4383.json | 18 +++++++++ 2022/4xxx/CVE-2022-4949.json | 18 +++++++++ 2022/4xxx/CVE-2022-4950.json | 18 +++++++++ 2023/31xxx/CVE-2023-31569.json | 71 +++++++++++++++++++++++++++++++--- 2023/33xxx/CVE-2023-33457.json | 56 ++++++++++++++++++++++++--- 2023/33xxx/CVE-2023-33532.json | 61 ++++++++++++++++++++++++++--- 2023/33xxx/CVE-2023-33533.json | 61 ++++++++++++++++++++++++++--- 2023/3xxx/CVE-2023-3123.json | 8 ++-- 2023/3xxx/CVE-2023-3125.json | 18 +++++++++ 2023/3xxx/CVE-2023-3126.json | 18 +++++++++ 54 files changed, 1111 insertions(+), 28 deletions(-) create mode 100644 2016/15xxx/CVE-2016-15033.json create mode 100644 2019/25xxx/CVE-2019-25145.json create mode 100644 2019/25xxx/CVE-2019-25146.json create mode 100644 2019/25xxx/CVE-2019-25147.json create mode 100644 2019/25xxx/CVE-2019-25148.json create mode 100644 2019/25xxx/CVE-2019-25149.json create mode 100644 2019/25xxx/CVE-2019-25150.json create mode 100644 2019/25xxx/CVE-2019-25151.json create mode 100644 2020/36xxx/CVE-2020-36714.json create mode 100644 2020/36xxx/CVE-2020-36715.json create mode 100644 2020/36xxx/CVE-2020-36716.json create mode 100644 2020/36xxx/CVE-2020-36717.json create mode 100644 2020/36xxx/CVE-2020-36718.json create mode 100644 2020/36xxx/CVE-2020-36719.json create mode 100644 2020/36xxx/CVE-2020-36720.json create mode 100644 2020/36xxx/CVE-2020-36721.json create mode 100644 2020/36xxx/CVE-2020-36722.json create mode 100644 2020/36xxx/CVE-2020-36723.json create mode 100644 2020/36xxx/CVE-2020-36724.json create mode 100644 2020/36xxx/CVE-2020-36725.json create mode 100644 2020/36xxx/CVE-2020-36726.json create mode 100644 2020/36xxx/CVE-2020-36727.json create mode 100644 2020/36xxx/CVE-2020-36728.json create mode 100644 2020/36xxx/CVE-2020-36729.json create mode 100644 2020/36xxx/CVE-2020-36730.json create mode 100644 2020/36xxx/CVE-2020-36731.json create mode 100644 2021/4xxx/CVE-2021-4365.json create mode 100644 2021/4xxx/CVE-2021-4366.json create mode 100644 2021/4xxx/CVE-2021-4367.json create mode 100644 2021/4xxx/CVE-2021-4368.json create mode 100644 2021/4xxx/CVE-2021-4369.json create mode 100644 2021/4xxx/CVE-2021-4370.json create mode 100644 2021/4xxx/CVE-2021-4371.json create mode 100644 2021/4xxx/CVE-2021-4372.json create mode 100644 2021/4xxx/CVE-2021-4373.json create mode 100644 2021/4xxx/CVE-2021-4374.json create mode 100644 2021/4xxx/CVE-2021-4375.json create mode 100644 2021/4xxx/CVE-2021-4376.json create mode 100644 2021/4xxx/CVE-2021-4377.json create mode 100644 2021/4xxx/CVE-2021-4378.json create mode 100644 2021/4xxx/CVE-2021-4379.json create mode 100644 2021/4xxx/CVE-2021-4380.json create mode 100644 2021/4xxx/CVE-2021-4381.json create mode 100644 2021/4xxx/CVE-2021-4382.json create mode 100644 2021/4xxx/CVE-2021-4383.json create mode 100644 2022/4xxx/CVE-2022-4949.json create mode 100644 2022/4xxx/CVE-2022-4950.json create mode 100644 2023/3xxx/CVE-2023-3125.json create mode 100644 2023/3xxx/CVE-2023-3126.json diff --git a/2016/15xxx/CVE-2016-15033.json b/2016/15xxx/CVE-2016-15033.json new file mode 100644 index 00000000000..b8469eda0a5 --- /dev/null +++ b/2016/15xxx/CVE-2016-15033.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-15033", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25145.json b/2019/25xxx/CVE-2019-25145.json new file mode 100644 index 00000000000..58bdd305c4d --- /dev/null +++ b/2019/25xxx/CVE-2019-25145.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25145", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25146.json b/2019/25xxx/CVE-2019-25146.json new file mode 100644 index 00000000000..9de6ecca9a8 --- /dev/null +++ b/2019/25xxx/CVE-2019-25146.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25146", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25147.json b/2019/25xxx/CVE-2019-25147.json new file mode 100644 index 00000000000..2839f8fba8a --- /dev/null +++ b/2019/25xxx/CVE-2019-25147.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25147", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25148.json b/2019/25xxx/CVE-2019-25148.json new file mode 100644 index 00000000000..51aea5bb935 --- /dev/null +++ b/2019/25xxx/CVE-2019-25148.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25148", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25149.json b/2019/25xxx/CVE-2019-25149.json new file mode 100644 index 00000000000..ff99fab146f --- /dev/null +++ b/2019/25xxx/CVE-2019-25149.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25149", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25150.json b/2019/25xxx/CVE-2019-25150.json new file mode 100644 index 00000000000..d2b624c6899 --- /dev/null +++ b/2019/25xxx/CVE-2019-25150.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25150", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25151.json b/2019/25xxx/CVE-2019-25151.json new file mode 100644 index 00000000000..116e5080720 --- /dev/null +++ b/2019/25xxx/CVE-2019-25151.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25151", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36714.json b/2020/36xxx/CVE-2020-36714.json new file mode 100644 index 00000000000..5ad1987af13 --- /dev/null +++ b/2020/36xxx/CVE-2020-36714.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36714", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36715.json b/2020/36xxx/CVE-2020-36715.json new file mode 100644 index 00000000000..469f89f4e62 --- /dev/null +++ b/2020/36xxx/CVE-2020-36715.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36715", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36716.json b/2020/36xxx/CVE-2020-36716.json new file mode 100644 index 00000000000..7f847a1991d --- /dev/null +++ b/2020/36xxx/CVE-2020-36716.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36716", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36717.json b/2020/36xxx/CVE-2020-36717.json new file mode 100644 index 00000000000..75ce8272a30 --- /dev/null +++ b/2020/36xxx/CVE-2020-36717.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36717", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36718.json b/2020/36xxx/CVE-2020-36718.json new file mode 100644 index 00000000000..a405bdcb26c --- /dev/null +++ b/2020/36xxx/CVE-2020-36718.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36718", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36719.json b/2020/36xxx/CVE-2020-36719.json new file mode 100644 index 00000000000..0b2ce88bea2 --- /dev/null +++ b/2020/36xxx/CVE-2020-36719.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36719", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36720.json b/2020/36xxx/CVE-2020-36720.json new file mode 100644 index 00000000000..5ce670ffa54 --- /dev/null +++ b/2020/36xxx/CVE-2020-36720.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36720", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36721.json b/2020/36xxx/CVE-2020-36721.json new file mode 100644 index 00000000000..ec5c2a665b2 --- /dev/null +++ b/2020/36xxx/CVE-2020-36721.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36721", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36722.json b/2020/36xxx/CVE-2020-36722.json new file mode 100644 index 00000000000..3c78d011196 --- /dev/null +++ b/2020/36xxx/CVE-2020-36722.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36722", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36723.json b/2020/36xxx/CVE-2020-36723.json new file mode 100644 index 00000000000..91716298b9a --- /dev/null +++ b/2020/36xxx/CVE-2020-36723.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36723", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36724.json b/2020/36xxx/CVE-2020-36724.json new file mode 100644 index 00000000000..974fd4edaef --- /dev/null +++ b/2020/36xxx/CVE-2020-36724.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36724", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36725.json b/2020/36xxx/CVE-2020-36725.json new file mode 100644 index 00000000000..b32f4b08d2d --- /dev/null +++ b/2020/36xxx/CVE-2020-36725.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36725", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36726.json b/2020/36xxx/CVE-2020-36726.json new file mode 100644 index 00000000000..b79117d2bad --- /dev/null +++ b/2020/36xxx/CVE-2020-36726.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36726", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36727.json b/2020/36xxx/CVE-2020-36727.json new file mode 100644 index 00000000000..3f5f4059eca --- /dev/null +++ b/2020/36xxx/CVE-2020-36727.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36727", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36728.json b/2020/36xxx/CVE-2020-36728.json new file mode 100644 index 00000000000..91d852ebb50 --- /dev/null +++ b/2020/36xxx/CVE-2020-36728.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36728", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36729.json b/2020/36xxx/CVE-2020-36729.json new file mode 100644 index 00000000000..bffed2655cf --- /dev/null +++ b/2020/36xxx/CVE-2020-36729.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36729", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36730.json b/2020/36xxx/CVE-2020-36730.json new file mode 100644 index 00000000000..aaf58ef77c3 --- /dev/null +++ b/2020/36xxx/CVE-2020-36730.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36730", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36731.json b/2020/36xxx/CVE-2020-36731.json new file mode 100644 index 00000000000..c231026d9a9 --- /dev/null +++ b/2020/36xxx/CVE-2020-36731.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36731", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4365.json b/2021/4xxx/CVE-2021-4365.json new file mode 100644 index 00000000000..5ef388fb704 --- /dev/null +++ b/2021/4xxx/CVE-2021-4365.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4365", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4366.json b/2021/4xxx/CVE-2021-4366.json new file mode 100644 index 00000000000..bb4e14e4d0d --- /dev/null +++ b/2021/4xxx/CVE-2021-4366.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4366", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4367.json b/2021/4xxx/CVE-2021-4367.json new file mode 100644 index 00000000000..52a96d0874e --- /dev/null +++ b/2021/4xxx/CVE-2021-4367.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4367", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4368.json b/2021/4xxx/CVE-2021-4368.json new file mode 100644 index 00000000000..e28ba300338 --- /dev/null +++ b/2021/4xxx/CVE-2021-4368.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4368", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4369.json b/2021/4xxx/CVE-2021-4369.json new file mode 100644 index 00000000000..5824af9b421 --- /dev/null +++ b/2021/4xxx/CVE-2021-4369.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4369", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4370.json b/2021/4xxx/CVE-2021-4370.json new file mode 100644 index 00000000000..2126bb118f1 --- /dev/null +++ b/2021/4xxx/CVE-2021-4370.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4370", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4371.json b/2021/4xxx/CVE-2021-4371.json new file mode 100644 index 00000000000..21432bb261b --- /dev/null +++ b/2021/4xxx/CVE-2021-4371.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4371", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4372.json b/2021/4xxx/CVE-2021-4372.json new file mode 100644 index 00000000000..e185879ba67 --- /dev/null +++ b/2021/4xxx/CVE-2021-4372.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4372", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4373.json b/2021/4xxx/CVE-2021-4373.json new file mode 100644 index 00000000000..5c364a5c5d9 --- /dev/null +++ b/2021/4xxx/CVE-2021-4373.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4373", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4374.json b/2021/4xxx/CVE-2021-4374.json new file mode 100644 index 00000000000..bc6926d0f78 --- /dev/null +++ b/2021/4xxx/CVE-2021-4374.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4374", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4375.json b/2021/4xxx/CVE-2021-4375.json new file mode 100644 index 00000000000..1a07b0fbbc1 --- /dev/null +++ b/2021/4xxx/CVE-2021-4375.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4375", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4376.json b/2021/4xxx/CVE-2021-4376.json new file mode 100644 index 00000000000..bdd08dd9d73 --- /dev/null +++ b/2021/4xxx/CVE-2021-4376.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4376", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4377.json b/2021/4xxx/CVE-2021-4377.json new file mode 100644 index 00000000000..bdce119c8d6 --- /dev/null +++ b/2021/4xxx/CVE-2021-4377.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4377", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4378.json b/2021/4xxx/CVE-2021-4378.json new file mode 100644 index 00000000000..81f9daaefb0 --- /dev/null +++ b/2021/4xxx/CVE-2021-4378.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4378", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4379.json b/2021/4xxx/CVE-2021-4379.json new file mode 100644 index 00000000000..1b1330f3db4 --- /dev/null +++ b/2021/4xxx/CVE-2021-4379.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4379", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4380.json b/2021/4xxx/CVE-2021-4380.json new file mode 100644 index 00000000000..308bc8eb567 --- /dev/null +++ b/2021/4xxx/CVE-2021-4380.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4380", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4381.json b/2021/4xxx/CVE-2021-4381.json new file mode 100644 index 00000000000..44bda7af601 --- /dev/null +++ b/2021/4xxx/CVE-2021-4381.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4381", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4382.json b/2021/4xxx/CVE-2021-4382.json new file mode 100644 index 00000000000..92162bcf14f --- /dev/null +++ b/2021/4xxx/CVE-2021-4382.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4382", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4383.json b/2021/4xxx/CVE-2021-4383.json new file mode 100644 index 00000000000..116dc053141 --- /dev/null +++ b/2021/4xxx/CVE-2021-4383.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4383", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/4xxx/CVE-2022-4949.json b/2022/4xxx/CVE-2022-4949.json new file mode 100644 index 00000000000..f3e1bc377af --- /dev/null +++ b/2022/4xxx/CVE-2022-4949.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-4949", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/4xxx/CVE-2022-4950.json b/2022/4xxx/CVE-2022-4950.json new file mode 100644 index 00000000000..15a79ba1dfc --- /dev/null +++ b/2022/4xxx/CVE-2022-4950.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-4950", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/31xxx/CVE-2023-31569.json b/2023/31xxx/CVE-2023-31569.json index 3a61272ea1e..e152eb4b019 100644 --- a/2023/31xxx/CVE-2023-31569.json +++ b/2023/31xxx/CVE-2023-31569.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31569", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31569", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain a command injection via the setWanCfg function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://totolink.com", + "refsource": "MISC", + "name": "http://totolink.com" + }, + { + "url": "https://github.com/JeeseenSec/Report/tree/main/TOTOLINK,Thanks", + "refsource": "MISC", + "name": "https://github.com/JeeseenSec/Report/tree/main/TOTOLINK,Thanks" + }, + { + "url": "https://www.totolink.net/home/menu/newstpl/menu_newstpl/products/id/218.html", + "refsource": "MISC", + "name": "https://www.totolink.net/home/menu/newstpl/menu_newstpl/products/id/218.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/JeeseenSec/Report/tree/main/TOTOLINK/CVE-2023-31569", + "url": "https://github.com/JeeseenSec/Report/tree/main/TOTOLINK/CVE-2023-31569" } ] } diff --git a/2023/33xxx/CVE-2023-33457.json b/2023/33xxx/CVE-2023-33457.json index b812ce0c2af..200d9a6b6a6 100644 --- a/2023/33xxx/CVE-2023-33457.json +++ b/2023/33xxx/CVE-2023-33457.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-33457", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-33457", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Sogou Workflow v0.10.6, memcpy a negtive size in URIParser::parse , may cause buffer-overflow and crash." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/sogou/workflow/issues/1272", + "refsource": "MISC", + "name": "https://github.com/sogou/workflow/issues/1272" } ] } diff --git a/2023/33xxx/CVE-2023-33532.json b/2023/33xxx/CVE-2023-33532.json index 4e19d654b05..4ae8e7b8b7f 100644 --- a/2023/33xxx/CVE-2023-33532.json +++ b/2023/33xxx/CVE-2023-33532.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-33532", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-33532", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is a command injection vulnerability in the Netgear R6250 router with Firmware Version 1.0.4.48. If an attacker gains web management privileges, they can inject commands into the post request parameters, thereby gaining shell privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://netgear.com", + "refsource": "MISC", + "name": "http://netgear.com" + }, + { + "refsource": "MISC", + "name": "https://github.com/D2y6p/CVE/blob/main/Netgear/CVE-2023-33532/Netgear_R6250_RCE.pdf", + "url": "https://github.com/D2y6p/CVE/blob/main/Netgear/CVE-2023-33532/Netgear_R6250_RCE.pdf" } ] } diff --git a/2023/33xxx/CVE-2023-33533.json b/2023/33xxx/CVE-2023-33533.json index ce2e4988ea8..0e1d3b5832f 100644 --- a/2023/33xxx/CVE-2023-33533.json +++ b/2023/33xxx/CVE-2023-33533.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-33533", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-33533", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Netgear D6220 with Firmware Version 1.0.0.80, D8500 with Firmware Version 1.0.3.60, R6700 with Firmware Version 1.0.2.26, and R6900 with Firmware Version 1.0.2.26 are vulnerable to Command Injection. If an attacker gains web management privileges, they can inject commands into the post request parameters, gaining shell privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.netgear.com/about/security/", + "refsource": "MISC", + "name": "https://www.netgear.com/about/security/" + }, + { + "refsource": "MISC", + "name": "https://github.com/D2y6p/CVE/blob/main/Netgear/CVE-2023-33533/Netgear_RCE.pdf", + "url": "https://github.com/D2y6p/CVE/blob/main/Netgear/CVE-2023-33533/Netgear_RCE.pdf" } ] } diff --git a/2023/3xxx/CVE-2023-3123.json b/2023/3xxx/CVE-2023-3123.json index ba65a0a00b2..009476fbd63 100644 --- a/2023/3xxx/CVE-2023-3123.json +++ b/2023/3xxx/CVE-2023-3123.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-3123", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Duplicate Assignment." } ] } diff --git a/2023/3xxx/CVE-2023-3125.json b/2023/3xxx/CVE-2023-3125.json new file mode 100644 index 00000000000..353dcc70bc6 --- /dev/null +++ b/2023/3xxx/CVE-2023-3125.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-3125", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/3xxx/CVE-2023-3126.json b/2023/3xxx/CVE-2023-3126.json new file mode 100644 index 00000000000..426be638154 --- /dev/null +++ b/2023/3xxx/CVE-2023-3126.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-3126", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file