From 8ed13c027e7e3187e40fd0c0bc5af9d2a052f42f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 12 Jan 2023 04:00:39 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/37xxx/CVE-2021-37136.json | 5 ++ 2021/37xxx/CVE-2021-37137.json | 5 ++ 2021/43xxx/CVE-2021-43797.json | 5 ++ 2022/3xxx/CVE-2022-3514.json | 90 ++++++++++++++++++++++++++++++++-- 2022/3xxx/CVE-2022-3573.json | 90 ++++++++++++++++++++++++++++++++-- 2022/3xxx/CVE-2022-3613.json | 90 ++++++++++++++++++++++++++++++++-- 2022/3xxx/CVE-2022-3870.json | 90 ++++++++++++++++++++++++++++++++-- 2022/41xxx/CVE-2022-41881.json | 5 ++ 2022/41xxx/CVE-2022-41915.json | 5 ++ 2022/42xxx/CVE-2022-42919.json | 5 ++ 2022/45xxx/CVE-2022-45061.json | 10 ++++ 2022/45xxx/CVE-2022-45939.json | 5 ++ 2022/4xxx/CVE-2022-4037.json | 90 ++++++++++++++++++++++++++++++++-- 2022/4xxx/CVE-2022-4131.json | 90 ++++++++++++++++++++++++++++++++-- 2022/4xxx/CVE-2022-4167.json | 85 ++++++++++++++++++++++++++++++-- 2022/4xxx/CVE-2022-4342.json | 90 ++++++++++++++++++++++++++++++++-- 2022/4xxx/CVE-2022-4345.json | 82 +++++++++++++++++++++++++++++-- 2022/4xxx/CVE-2022-4365.json | 90 ++++++++++++++++++++++++++++++++-- 2023/0xxx/CVE-2023-0042.json | 85 ++++++++++++++++++++++++++++++-- 2023/23xxx/CVE-2023-23424.json | 18 +++++++ 2023/23xxx/CVE-2023-23425.json | 18 +++++++ 2023/23xxx/CVE-2023-23426.json | 18 +++++++ 2023/23xxx/CVE-2023-23427.json | 18 +++++++ 2023/23xxx/CVE-2023-23428.json | 18 +++++++ 2023/23xxx/CVE-2023-23429.json | 18 +++++++ 2023/23xxx/CVE-2023-23430.json | 18 +++++++ 2023/23xxx/CVE-2023-23431.json | 18 +++++++ 2023/23xxx/CVE-2023-23432.json | 18 +++++++ 2023/23xxx/CVE-2023-23433.json | 18 +++++++ 2023/23xxx/CVE-2023-23434.json | 18 +++++++ 2023/23xxx/CVE-2023-23435.json | 18 +++++++ 2023/23xxx/CVE-2023-23436.json | 18 +++++++ 2023/23xxx/CVE-2023-23437.json | 18 +++++++ 2023/23xxx/CVE-2023-23438.json | 18 +++++++ 2023/23xxx/CVE-2023-23439.json | 18 +++++++ 2023/23xxx/CVE-2023-23440.json | 18 +++++++ 2023/23xxx/CVE-2023-23441.json | 18 +++++++ 2023/23xxx/CVE-2023-23442.json | 18 +++++++ 2023/23xxx/CVE-2023-23443.json | 18 +++++++ 39 files changed, 1333 insertions(+), 44 deletions(-) create mode 100644 2023/23xxx/CVE-2023-23424.json create mode 100644 2023/23xxx/CVE-2023-23425.json create mode 100644 2023/23xxx/CVE-2023-23426.json create mode 100644 2023/23xxx/CVE-2023-23427.json create mode 100644 2023/23xxx/CVE-2023-23428.json create mode 100644 2023/23xxx/CVE-2023-23429.json create mode 100644 2023/23xxx/CVE-2023-23430.json create mode 100644 2023/23xxx/CVE-2023-23431.json create mode 100644 2023/23xxx/CVE-2023-23432.json create mode 100644 2023/23xxx/CVE-2023-23433.json create mode 100644 2023/23xxx/CVE-2023-23434.json create mode 100644 2023/23xxx/CVE-2023-23435.json create mode 100644 2023/23xxx/CVE-2023-23436.json create mode 100644 2023/23xxx/CVE-2023-23437.json create mode 100644 2023/23xxx/CVE-2023-23438.json create mode 100644 2023/23xxx/CVE-2023-23439.json create mode 100644 2023/23xxx/CVE-2023-23440.json create mode 100644 2023/23xxx/CVE-2023-23441.json create mode 100644 2023/23xxx/CVE-2023-23442.json create mode 100644 2023/23xxx/CVE-2023-23443.json diff --git a/2021/37xxx/CVE-2021-37136.json b/2021/37xxx/CVE-2021-37136.json index 86f34e1636f..018675529f1 100644 --- a/2021/37xxx/CVE-2021-37136.json +++ b/2021/37xxx/CVE-2021-37136.json @@ -104,6 +104,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230111 [SECURITY] [DLA 3268-1] netty security update", "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5316", + "url": "https://www.debian.org/security/2023/dsa-5316" } ] }, diff --git a/2021/37xxx/CVE-2021-37137.json b/2021/37xxx/CVE-2021-37137.json index 2080e6f2081..4e00e2528f6 100644 --- a/2021/37xxx/CVE-2021-37137.json +++ b/2021/37xxx/CVE-2021-37137.json @@ -104,6 +104,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230111 [SECURITY] [DLA 3268-1] netty security update", "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5316", + "url": "https://www.debian.org/security/2023/dsa-5316" } ] }, diff --git a/2021/43xxx/CVE-2021-43797.json b/2021/43xxx/CVE-2021-43797.json index d6705920e61..1f2d1dd9380 100644 --- a/2021/43xxx/CVE-2021-43797.json +++ b/2021/43xxx/CVE-2021-43797.json @@ -98,6 +98,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230111 [SECURITY] [DLA 3268-1] netty security update", "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5316", + "url": "https://www.debian.org/security/2023/dsa-5316" } ] }, diff --git a/2022/3xxx/CVE-2022-3514.json b/2022/3xxx/CVE-2022-3514.json index 3a7f15c03ef..556053f02cb 100644 --- a/2022/3xxx/CVE-2022-3514.json +++ b/2022/3xxx/CVE-2022-3514.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-3514", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=6.6, <15.5.7" + }, + { + "version_value": ">=15.6, <15.6.4" + }, + { + "version_value": ">=15.7, <15.7.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncontrolled resource consumption in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/377978", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/377978", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1727201", + "url": "https://hackerone.com/reports/1727201", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3514.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3514.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 6.6 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. An attacker may cause Denial of Service on a GitLab instance by exploiting a regex issue in the submodule URL parser." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks [mokusou](https://hackerone.com/mokusou) for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3573.json b/2022/3xxx/CVE-2022-3573.json index 15a21c1ce97..cb4c98d590f 100644 --- a/2022/3xxx/CVE-2022-3573.json +++ b/2022/3xxx/CVE-2022-3573.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-3573", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=15.4, <15.5.7" + }, + { + "version_value": ">=15.6, <15.6.4" + }, + { + "version_value": ">=15.7, <15.7.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper neutralization of input during web page generation ('cross-site scripting') in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/378216", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/378216", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1730461", + "url": "https://hackerone.com/reports/1730461", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3573.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3573.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. Due to the improper filtering of query parameters in the wiki changes page, an attacker can execute arbitrary JavaScript on the self-hosted instances running without strict CSP." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks [ryotak](https://hackerone.com/ryotak) for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3613.json b/2022/3xxx/CVE-2022-3613.json index 826c1a9f8b5..ae065a4c0f1 100644 --- a/2022/3xxx/CVE-2022-3613.json +++ b/2022/3xxx/CVE-2022-3613.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-3613", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=0.0, <15.5.7" + }, + { + "version_value": ">=15.6, <15.6.4" + }, + { + "version_value": ">=15.7, <15.7.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncontrolled resource consumption in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/378456", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/378456", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1723106", + "url": "https://hackerone.com/reports/1723106", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3613.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3613.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. A crafted Prometheus Server query can cause high resource consumption and may lead to Denial of Service." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks [joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3870.json b/2022/3xxx/CVE-2022-3870.json index c8b9c9971da..fccf7e249c6 100644 --- a/2022/3xxx/CVE-2022-3870.json +++ b/2022/3xxx/CVE-2022-3870.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-3870", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=10.0, <15.5.7" + }, + { + "version_value": ">=15.6, <15.6.4" + }, + { + "version_value": ">=15.7, <15.7.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Authorization bypass through user-controlled key in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/381647", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/381647", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1753423", + "url": "https://hackerone.com/reports/1753423", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3870.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3870.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.0 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. GitLab allows unauthenticated users to download user avatars using the victim's user ID, on private instances that restrict public level visibility." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks [nocasis](https://hackerone.com/nocasis) for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41881.json b/2022/41xxx/CVE-2022-41881.json index 0724a4a9ff4..1bdc36c481f 100644 --- a/2022/41xxx/CVE-2022-41881.json +++ b/2022/41xxx/CVE-2022-41881.json @@ -63,6 +63,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230111 [SECURITY] [DLA 3268-1] netty security update", "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5316", + "url": "https://www.debian.org/security/2023/dsa-5316" } ] }, diff --git a/2022/41xxx/CVE-2022-41915.json b/2022/41xxx/CVE-2022-41915.json index 969954d78d6..858ac4d8932 100644 --- a/2022/41xxx/CVE-2022-41915.json +++ b/2022/41xxx/CVE-2022-41915.json @@ -99,6 +99,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230111 [SECURITY] [DLA 3268-1] netty security update", "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5316", + "url": "https://www.debian.org/security/2023/dsa-5316" } ] }, diff --git a/2022/42xxx/CVE-2022-42919.json b/2022/42xxx/CVE-2022-42919.json index fdbd8d1cbec..67c76ca4e04 100644 --- a/2022/42xxx/CVE-2022-42919.json +++ b/2022/42xxx/CVE-2022-42919.json @@ -96,6 +96,11 @@ "refsource": "MISC", "name": "https://github.com/python/cpython/issues/97514#issuecomment-1310277840", "url": "https://github.com/python/cpython/issues/97514#issuecomment-1310277840" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2023-af5206f71d", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/" } ] } diff --git a/2022/45xxx/CVE-2022-45061.json b/2022/45xxx/CVE-2022-45061.json index 9c282ba9bf5..52d54fbf60d 100644 --- a/2022/45xxx/CVE-2022-45061.json +++ b/2022/45xxx/CVE-2022-45061.json @@ -171,6 +171,16 @@ "refsource": "FEDORA", "name": "FEDORA-2023-78b4ce2f23", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXZJL3CNAFS5PAIR7K4RL62S3Y7THR7O/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2023-af5206f71d", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2023-943556a733", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN26PWZTYG6IF3APLRXQJBVACQHZUPT2/" } ] } diff --git a/2022/45xxx/CVE-2022-45939.json b/2022/45xxx/CVE-2022-45939.json index 9f6d467e090..5c10a6afdb1 100644 --- a/2022/45xxx/CVE-2022-45939.json +++ b/2022/45xxx/CVE-2022-45939.json @@ -71,6 +71,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-e37f239f2e", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FOSK3J7BBAEI4IITW2DRUKLQYUZYKH6Y/" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5314", + "url": "https://www.debian.org/security/2023/dsa-5314" } ] } diff --git a/2022/4xxx/CVE-2022-4037.json b/2022/4xxx/CVE-2022-4037.json index 880840f0be2..540b156fb0d 100644 --- a/2022/4xxx/CVE-2022-4037.json +++ b/2022/4xxx/CVE-2022-4037.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4037", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=0.0, <15.5.7" + }, + { + "version_value": ">=15.6, <15.6.4" + }, + { + "version_value": ">=15.7, <15.7.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Time-of-check time-of-use (toctou) race condition in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/382957", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/382957", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1772543", + "url": "https://hackerone.com/reports/1772543", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4037.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4037.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. A race condition can lead to verified email forgery and takeover of third-party accounts when using GitLab as an OAuth provider." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks to an anonymous researcher for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2022/4xxx/CVE-2022-4131.json b/2022/4xxx/CVE-2022-4131.json index a72321d079e..04e462b6841 100644 --- a/2022/4xxx/CVE-2022-4131.json +++ b/2022/4xxx/CVE-2022-4131.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4131", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=10.8, <15.5.7" + }, + { + "version_value": ">=15.6, <15.6.4" + }, + { + "version_value": ">=15.7, <15.7.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncontrolled resource consumption in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/383598", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/383598", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1772063", + "url": "https://hackerone.com/reports/1772063", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4131.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4131.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.8 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. An attacker may cause Denial of Service on a GitLab instance by exploiting a regex issue in how the application parses user agents." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks [afewgoats](https://hackerone.com/afewgoats) for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2022/4xxx/CVE-2022-4167.json b/2022/4xxx/CVE-2022-4167.json index b91f7aefcfa..9fcecc722a8 100644 --- a/2022/4xxx/CVE-2022-4167.json +++ b/2022/4xxx/CVE-2022-4167.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4167", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=13.11, <15.5.7" + }, + { + "version_value": ">=15.6, <15.6.4" + }, + { + "version_value": ">=15.7, <15.7.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper authorization in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/367740", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/367740", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4167.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4167.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Incorrect Authorization check affecting all versions of GitLab EE from 13.11 prior to 15.5.7, 15.6 prior to 15.6.4, and 15.7 prior to 15.7.2 allows group access tokens to continue working even after the group owner loses the ability to revoke them." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 5.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability was reported to us by a customer" + } + ] } \ No newline at end of file diff --git a/2022/4xxx/CVE-2022-4342.json b/2022/4xxx/CVE-2022-4342.json index a9bce1d51b4..43d46d98383 100644 --- a/2022/4xxx/CVE-2022-4342.json +++ b/2022/4xxx/CVE-2022-4342.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4342", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=15.1, <15.5.7" + }, + { + "version_value": ">=15.6, <15.6.4" + }, + { + "version_value": ">=15.7, <15.7.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information exposure in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/385118", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/385118", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1791331", + "url": "https://hackerone.com/reports/1791331", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4342.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4342.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.1 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. A malicious Maintainer can leak masked webhook secrets by changing target URL of the webhook." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks [joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2022/4xxx/CVE-2022-4345.json b/2022/4xxx/CVE-2022-4345.json index d276e4d2cde..8cd2ebee47e 100644 --- a/2022/4xxx/CVE-2022-4345.json +++ b/2022/4xxx/CVE-2022-4345.json @@ -4,15 +4,89 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4345", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Wireshark Foundation", + "product": { + "product_data": [ + { + "product_name": "Wireshark", + "version": { + "version_data": [ + { + "version_value": ">=4.0.0, <4.0.2" + }, + { + "version_value": ">=3.6.0, <3.6.10" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Loop with unreachable exit condition ('infinite loop') in Wireshark" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.wireshark.org/security/wnpa-sec-2022-09.html", + "url": "https://www.wireshark.org/security/wnpa-sec-2022-09.html", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4345.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4345.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Infinite loops in the BPv6, OpenFlow, and Kafka protocol dissectors in Wireshark 4.0.0 to 4.0.1 and 3.6.0 to 3.6.9 allows denial of service via packet injection or crafted capture file" } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Sharon Brizinov" + } + ] } \ No newline at end of file diff --git a/2022/4xxx/CVE-2022-4365.json b/2022/4xxx/CVE-2022-4365.json index 51063dbd802..9d271c0dc0a 100644 --- a/2022/4xxx/CVE-2022-4365.json +++ b/2022/4xxx/CVE-2022-4365.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4365", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=11.8, <15.5.7" + }, + { + "version_value": ">=15.6, <15.6.4" + }, + { + "version_value": ">=15.7, <15.7.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information exposure in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/385193", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/385193", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1792626", + "url": "https://hackerone.com/reports/1792626", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4365.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4365.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.8 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. A malicious Maintainer can leak the sentry token by changing the configured URL in the Sentry error tracking settings page." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks [joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2023/0xxx/CVE-2023-0042.json b/2023/0xxx/CVE-2023-0042.json index 435c2cf280b..d1ec7e278af 100644 --- a/2023/0xxx/CVE-2023-0042.json +++ b/2023/0xxx/CVE-2023-0042.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-0042", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=11.4, <15.5.7" + }, + { + "version_value": ">=15.6, <15.6.4" + }, + { + "version_value": ">=15.7, <15.7.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Url redirection to untrusted site ('open redirect') in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab-pages/-/issues/728", + "url": "https://gitlab.com/gitlab-org/gitlab-pages/-/issues/728", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0042.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0042.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.4 prior to 15.5.7, 15.6 prior to 15.6.4, and 15.7 prior to 15.7.2. GitLab Pages allows redirection to arbitrary protocols." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability has been discovered internally by a GitLab team member, Joern Schneeweisz" + } + ] } \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23424.json b/2023/23xxx/CVE-2023-23424.json new file mode 100644 index 00000000000..cf4740e93e8 --- /dev/null +++ b/2023/23xxx/CVE-2023-23424.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23424", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23425.json b/2023/23xxx/CVE-2023-23425.json new file mode 100644 index 00000000000..1e4f9bac2d3 --- /dev/null +++ b/2023/23xxx/CVE-2023-23425.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23425", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23426.json b/2023/23xxx/CVE-2023-23426.json new file mode 100644 index 00000000000..3adf2577db8 --- /dev/null +++ b/2023/23xxx/CVE-2023-23426.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23426", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23427.json b/2023/23xxx/CVE-2023-23427.json new file mode 100644 index 00000000000..9e6928f0629 --- /dev/null +++ b/2023/23xxx/CVE-2023-23427.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23427", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23428.json b/2023/23xxx/CVE-2023-23428.json new file mode 100644 index 00000000000..1f258d1ace0 --- /dev/null +++ b/2023/23xxx/CVE-2023-23428.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23428", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23429.json b/2023/23xxx/CVE-2023-23429.json new file mode 100644 index 00000000000..a534455c32e --- /dev/null +++ b/2023/23xxx/CVE-2023-23429.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23429", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23430.json b/2023/23xxx/CVE-2023-23430.json new file mode 100644 index 00000000000..80bb1e08982 --- /dev/null +++ b/2023/23xxx/CVE-2023-23430.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23430", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23431.json b/2023/23xxx/CVE-2023-23431.json new file mode 100644 index 00000000000..80fec242fe8 --- /dev/null +++ b/2023/23xxx/CVE-2023-23431.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23431", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23432.json b/2023/23xxx/CVE-2023-23432.json new file mode 100644 index 00000000000..a328df76903 --- /dev/null +++ b/2023/23xxx/CVE-2023-23432.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23432", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23433.json b/2023/23xxx/CVE-2023-23433.json new file mode 100644 index 00000000000..38c633fa420 --- /dev/null +++ b/2023/23xxx/CVE-2023-23433.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23433", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23434.json b/2023/23xxx/CVE-2023-23434.json new file mode 100644 index 00000000000..8fe10efc306 --- /dev/null +++ b/2023/23xxx/CVE-2023-23434.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23434", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23435.json b/2023/23xxx/CVE-2023-23435.json new file mode 100644 index 00000000000..2e8ac6b0a86 --- /dev/null +++ b/2023/23xxx/CVE-2023-23435.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23435", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23436.json b/2023/23xxx/CVE-2023-23436.json new file mode 100644 index 00000000000..c7398c49662 --- /dev/null +++ b/2023/23xxx/CVE-2023-23436.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23436", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23437.json b/2023/23xxx/CVE-2023-23437.json new file mode 100644 index 00000000000..b6cfd5d1110 --- /dev/null +++ b/2023/23xxx/CVE-2023-23437.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23437", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23438.json b/2023/23xxx/CVE-2023-23438.json new file mode 100644 index 00000000000..fe68d50e225 --- /dev/null +++ b/2023/23xxx/CVE-2023-23438.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23438", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23439.json b/2023/23xxx/CVE-2023-23439.json new file mode 100644 index 00000000000..da0f1bdf3a5 --- /dev/null +++ b/2023/23xxx/CVE-2023-23439.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23439", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23440.json b/2023/23xxx/CVE-2023-23440.json new file mode 100644 index 00000000000..aa983068c6b --- /dev/null +++ b/2023/23xxx/CVE-2023-23440.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23440", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23441.json b/2023/23xxx/CVE-2023-23441.json new file mode 100644 index 00000000000..5c37e00eafb --- /dev/null +++ b/2023/23xxx/CVE-2023-23441.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23441", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23442.json b/2023/23xxx/CVE-2023-23442.json new file mode 100644 index 00000000000..213a5dee4b0 --- /dev/null +++ b/2023/23xxx/CVE-2023-23442.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23442", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23443.json b/2023/23xxx/CVE-2023-23443.json new file mode 100644 index 00000000000..c8bbae23550 --- /dev/null +++ b/2023/23xxx/CVE-2023-23443.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23443", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file