From ac30f1d186ca2bfc15ecaac253edcd99b916bc7d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 21 Sep 2023 07:00:31 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/43xxx/CVE-2023-43670.json | 18 ++++++++ 2023/43xxx/CVE-2023-43671.json | 18 ++++++++ 2023/43xxx/CVE-2023-43672.json | 18 ++++++++ 2023/43xxx/CVE-2023-43673.json | 18 ++++++++ 2023/43xxx/CVE-2023-43674.json | 18 ++++++++ 2023/43xxx/CVE-2023-43675.json | 18 ++++++++ 2023/43xxx/CVE-2023-43676.json | 18 ++++++++ 2023/43xxx/CVE-2023-43677.json | 18 ++++++++ 2023/43xxx/CVE-2023-43678.json | 18 ++++++++ 2023/43xxx/CVE-2023-43679.json | 18 ++++++++ 2023/43xxx/CVE-2023-43680.json | 18 ++++++++ 2023/43xxx/CVE-2023-43681.json | 18 ++++++++ 2023/43xxx/CVE-2023-43682.json | 18 ++++++++ 2023/43xxx/CVE-2023-43683.json | 18 ++++++++ 2023/43xxx/CVE-2023-43684.json | 18 ++++++++ 2023/43xxx/CVE-2023-43685.json | 18 ++++++++ 2023/43xxx/CVE-2023-43686.json | 18 ++++++++ 2023/43xxx/CVE-2023-43687.json | 18 ++++++++ 2023/43xxx/CVE-2023-43688.json | 18 ++++++++ 2023/43xxx/CVE-2023-43689.json | 18 ++++++++ 2023/43xxx/CVE-2023-43690.json | 18 ++++++++ 2023/43xxx/CVE-2023-43691.json | 18 ++++++++ 2023/43xxx/CVE-2023-43692.json | 18 ++++++++ 2023/43xxx/CVE-2023-43693.json | 18 ++++++++ 2023/43xxx/CVE-2023-43694.json | 18 ++++++++ 2023/43xxx/CVE-2023-43695.json | 18 ++++++++ 2023/4xxx/CVE-2023-4152.json | 79 ++++++++++++++++++++++++++++++++-- 2023/4xxx/CVE-2023-4291.json | 79 ++++++++++++++++++++++++++++++++-- 2023/4xxx/CVE-2023-4292.json | 79 ++++++++++++++++++++++++++++++++-- 29 files changed, 693 insertions(+), 12 deletions(-) create mode 100644 2023/43xxx/CVE-2023-43670.json create mode 100644 2023/43xxx/CVE-2023-43671.json create mode 100644 2023/43xxx/CVE-2023-43672.json create mode 100644 2023/43xxx/CVE-2023-43673.json create mode 100644 2023/43xxx/CVE-2023-43674.json create mode 100644 2023/43xxx/CVE-2023-43675.json create mode 100644 2023/43xxx/CVE-2023-43676.json create mode 100644 2023/43xxx/CVE-2023-43677.json create mode 100644 2023/43xxx/CVE-2023-43678.json create mode 100644 2023/43xxx/CVE-2023-43679.json create mode 100644 2023/43xxx/CVE-2023-43680.json create mode 100644 2023/43xxx/CVE-2023-43681.json create mode 100644 2023/43xxx/CVE-2023-43682.json create mode 100644 2023/43xxx/CVE-2023-43683.json create mode 100644 2023/43xxx/CVE-2023-43684.json create mode 100644 2023/43xxx/CVE-2023-43685.json create mode 100644 2023/43xxx/CVE-2023-43686.json create mode 100644 2023/43xxx/CVE-2023-43687.json create mode 100644 2023/43xxx/CVE-2023-43688.json create mode 100644 2023/43xxx/CVE-2023-43689.json create mode 100644 2023/43xxx/CVE-2023-43690.json create mode 100644 2023/43xxx/CVE-2023-43691.json create mode 100644 2023/43xxx/CVE-2023-43692.json create mode 100644 2023/43xxx/CVE-2023-43693.json create mode 100644 2023/43xxx/CVE-2023-43694.json create mode 100644 2023/43xxx/CVE-2023-43695.json diff --git a/2023/43xxx/CVE-2023-43670.json b/2023/43xxx/CVE-2023-43670.json new file mode 100644 index 00000000000..f519cbf1703 --- /dev/null +++ b/2023/43xxx/CVE-2023-43670.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43670", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43671.json b/2023/43xxx/CVE-2023-43671.json new file mode 100644 index 00000000000..4f56d867ead --- /dev/null +++ b/2023/43xxx/CVE-2023-43671.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43671", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43672.json b/2023/43xxx/CVE-2023-43672.json new file mode 100644 index 00000000000..ad464bc421b --- /dev/null +++ b/2023/43xxx/CVE-2023-43672.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43672", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43673.json b/2023/43xxx/CVE-2023-43673.json new file mode 100644 index 00000000000..83553e33713 --- /dev/null +++ b/2023/43xxx/CVE-2023-43673.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43673", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43674.json b/2023/43xxx/CVE-2023-43674.json new file mode 100644 index 00000000000..df84f0ce262 --- /dev/null +++ b/2023/43xxx/CVE-2023-43674.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43674", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43675.json b/2023/43xxx/CVE-2023-43675.json new file mode 100644 index 00000000000..5dd2f4084a1 --- /dev/null +++ b/2023/43xxx/CVE-2023-43675.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43675", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43676.json b/2023/43xxx/CVE-2023-43676.json new file mode 100644 index 00000000000..b05da4ff144 --- /dev/null +++ b/2023/43xxx/CVE-2023-43676.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43676", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43677.json b/2023/43xxx/CVE-2023-43677.json new file mode 100644 index 00000000000..fcc98a5afec --- /dev/null +++ b/2023/43xxx/CVE-2023-43677.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43677", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43678.json b/2023/43xxx/CVE-2023-43678.json new file mode 100644 index 00000000000..c32ee4b7ed4 --- /dev/null +++ b/2023/43xxx/CVE-2023-43678.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43678", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43679.json b/2023/43xxx/CVE-2023-43679.json new file mode 100644 index 00000000000..043d1910c15 --- /dev/null +++ b/2023/43xxx/CVE-2023-43679.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43679", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43680.json b/2023/43xxx/CVE-2023-43680.json new file mode 100644 index 00000000000..4db6e5a832f --- /dev/null +++ b/2023/43xxx/CVE-2023-43680.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43680", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43681.json b/2023/43xxx/CVE-2023-43681.json new file mode 100644 index 00000000000..92a55f050eb --- /dev/null +++ b/2023/43xxx/CVE-2023-43681.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43681", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43682.json b/2023/43xxx/CVE-2023-43682.json new file mode 100644 index 00000000000..df93fa0f5e4 --- /dev/null +++ b/2023/43xxx/CVE-2023-43682.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43682", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43683.json b/2023/43xxx/CVE-2023-43683.json new file mode 100644 index 00000000000..24dc43d6593 --- /dev/null +++ b/2023/43xxx/CVE-2023-43683.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43683", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43684.json b/2023/43xxx/CVE-2023-43684.json new file mode 100644 index 00000000000..72257ccf26f --- /dev/null +++ b/2023/43xxx/CVE-2023-43684.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43684", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43685.json b/2023/43xxx/CVE-2023-43685.json new file mode 100644 index 00000000000..dbf401b2bb3 --- /dev/null +++ b/2023/43xxx/CVE-2023-43685.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43685", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43686.json b/2023/43xxx/CVE-2023-43686.json new file mode 100644 index 00000000000..48c30b7bbe9 --- /dev/null +++ b/2023/43xxx/CVE-2023-43686.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43686", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43687.json b/2023/43xxx/CVE-2023-43687.json new file mode 100644 index 00000000000..800d2e13ec0 --- /dev/null +++ b/2023/43xxx/CVE-2023-43687.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43687", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43688.json b/2023/43xxx/CVE-2023-43688.json new file mode 100644 index 00000000000..92833a73956 --- /dev/null +++ b/2023/43xxx/CVE-2023-43688.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43688", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43689.json b/2023/43xxx/CVE-2023-43689.json new file mode 100644 index 00000000000..ceb5364150c --- /dev/null +++ b/2023/43xxx/CVE-2023-43689.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43689", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43690.json b/2023/43xxx/CVE-2023-43690.json new file mode 100644 index 00000000000..e0232dc59e3 --- /dev/null +++ b/2023/43xxx/CVE-2023-43690.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43690", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43691.json b/2023/43xxx/CVE-2023-43691.json new file mode 100644 index 00000000000..18f87391b7b --- /dev/null +++ b/2023/43xxx/CVE-2023-43691.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43691", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43692.json b/2023/43xxx/CVE-2023-43692.json new file mode 100644 index 00000000000..d677cb58a76 --- /dev/null +++ b/2023/43xxx/CVE-2023-43692.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43692", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43693.json b/2023/43xxx/CVE-2023-43693.json new file mode 100644 index 00000000000..d17b6e68a7b --- /dev/null +++ b/2023/43xxx/CVE-2023-43693.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43693", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43694.json b/2023/43xxx/CVE-2023-43694.json new file mode 100644 index 00000000000..ec3f3949d21 --- /dev/null +++ b/2023/43xxx/CVE-2023-43694.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43694", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/43xxx/CVE-2023-43695.json b/2023/43xxx/CVE-2023-43695.json new file mode 100644 index 00000000000..b59a94b6b32 --- /dev/null +++ b/2023/43xxx/CVE-2023-43695.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-43695", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/4xxx/CVE-2023-4152.json b/2023/4xxx/CVE-2023-4152.json index 4a027605a8c..064836989b7 100644 --- a/2023/4xxx/CVE-2023-4152.json +++ b/2023/4xxx/CVE-2023-4152.json @@ -1,17 +1,88 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-4152", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "info@cert.vde.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Frauscher Sensortechnik GmbH FDS101 for FAdC/FAdCi v1.4.24 and all previous versions are vulnerable to a path traversal vulnerability of the web interface by a crafted URL without authentication. This enables an remote attacker to read all files on the filesystem of the FDS101 device.\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", + "cweId": "CWE-22" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Frauscher", + "product": { + "product_data": [ + { + "product_name": "FDS101 for FAdC/FAdCi", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "0", + "version_value": "1.4.24" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert.vde.com/en/advisories/VDE-2023-038/", + "refsource": "MISC", + "name": "https://cert.vde.com/en/advisories/VDE-2023-038/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2023/4xxx/CVE-2023-4291.json b/2023/4xxx/CVE-2023-4291.json index 387b2d88e97..b6769bece4c 100644 --- a/2023/4xxx/CVE-2023-4291.json +++ b/2023/4xxx/CVE-2023-4291.json @@ -1,17 +1,88 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-4291", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "info@cert.vde.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Frauscher Sensortechnik GmbH FDS101 for FAdC/FAdCi v1.4.24 and all previous versions are vulnerable to a remote code execution (RCE) vulnerability via manipulated parameters of the web interface without authentication.\u00a0This could lead to a full compromise of the FDS101 device.\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-94 Improper Control of Generation of Code ('Code Injection')", + "cweId": "CWE-94" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Frauscher", + "product": { + "product_data": [ + { + "product_name": "FDS101 for FAdC/FAdCi", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "0", + "version_value": "1.4.24" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert.vde.com/en/advisories/VDE-2023-038", + "refsource": "MISC", + "name": "https://cert.vde.com/en/advisories/VDE-2023-038" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/4xxx/CVE-2023-4292.json b/2023/4xxx/CVE-2023-4292.json index 84044576071..2ce22b40205 100644 --- a/2023/4xxx/CVE-2023-4292.json +++ b/2023/4xxx/CVE-2023-4292.json @@ -1,17 +1,88 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-4292", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "info@cert.vde.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Frauscher Sensortechnik GmbH FDS101 for FAdC/FAdCi v1.4.24 and all previous versions are vulnerable to a SQL injection vulnerability via manipulated parameters of the web interface without authentication. The database contains limited, non-critical log information.\n\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Frauscher", + "product": { + "product_data": [ + { + "product_name": "FDS101 for FAdC/FAdCi", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "0", + "version_value": "1.4.24" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://https://cert.vde.com/en/advisories/VDE-2023-038", + "refsource": "MISC", + "name": "https://https://cert.vde.com/en/advisories/VDE-2023-038" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" } ] }