diff --git a/2020/26xxx/CVE-2020-26708.json b/2020/26xxx/CVE-2020-26708.json index c40f64187df..0195ad764e9 100644 --- a/2020/26xxx/CVE-2020-26708.json +++ b/2020/26xxx/CVE-2020-26708.json @@ -56,6 +56,11 @@ "url": "https://github.com/erinxocon/requests-xml/issues/7", "refsource": "MISC", "name": "https://github.com/erinxocon/requests-xml/issues/7" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230908-0003/", + "url": "https://security.netapp.com/advisory/ntap-20230908-0003/" } ] } diff --git a/2022/24xxx/CVE-2022-24963.json b/2022/24xxx/CVE-2022-24963.json index fba92a3a5c5..470e2da3cbd 100644 --- a/2022/24xxx/CVE-2022-24963.json +++ b/2022/24xxx/CVE-2022-24963.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime (APR) version 1.7.0." + "value": "Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer.\nThis issue affects Apache Portable Runtime (APR) version 1.7.0." } ] }, @@ -40,8 +40,8 @@ "version": { "version_data": [ { - "version_value": "1.7.0", - "version_affected": "=" + "version_affected": "=", + "version_value": "1.7.0" } ] } @@ -58,6 +58,11 @@ "url": "https://lists.apache.org/thread/fw9p6sdncwsjkstwc066vz57xqzfksq9", "refsource": "MISC", "name": "https://lists.apache.org/thread/fw9p6sdncwsjkstwc066vz57xqzfksq9" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230908-0008/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230908-0008/" } ] }, diff --git a/2022/24xxx/CVE-2022-24999.json b/2022/24xxx/CVE-2022-24999.json index 2ff5b6c5ebe..5ab24f03110 100644 --- a/2022/24xxx/CVE-2022-24999.json +++ b/2022/24xxx/CVE-2022-24999.json @@ -71,6 +71,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230130 [SECURITY] [DLA 3299-1] node-qs security update", "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00039.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230908-0005/", + "url": "https://security.netapp.com/advisory/ntap-20230908-0005/" } ] } diff --git a/2023/1xxx/CVE-2023-1255.json b/2023/1xxx/CVE-2023-1255.json index c390ddcaa66..764aa16f5f0 100644 --- a/2023/1xxx/CVE-2023-1255.json +++ b/2023/1xxx/CVE-2023-1255.json @@ -73,6 +73,11 @@ "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=02ac9c9420275868472f33b01def01218742b8bb", "refsource": "MISC", "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=02ac9c9420275868472f33b01def01218742b8bb" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230908-0006/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230908-0006/" } ] }, diff --git a/2023/31xxx/CVE-2023-31425.json b/2023/31xxx/CVE-2023-31425.json index 5413c7213d4..1f35a61d99a 100644 --- a/2023/31xxx/CVE-2023-31425.json +++ b/2023/31xxx/CVE-2023-31425.json @@ -57,6 +57,11 @@ "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22407", "refsource": "MISC", "name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22407" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230908-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230908-0007/" } ] }, diff --git a/2023/31xxx/CVE-2023-31426.json b/2023/31xxx/CVE-2023-31426.json index 1340d4917a8..72729647cba 100644 --- a/2023/31xxx/CVE-2023-31426.json +++ b/2023/31xxx/CVE-2023-31426.json @@ -58,6 +58,11 @@ "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22407", "refsource": "MISC", "name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22407" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230908-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230908-0007/" } ] }, diff --git a/2023/31xxx/CVE-2023-31427.json b/2023/31xxx/CVE-2023-31427.json index 055b0f4a64d..79b5e39a648 100644 --- a/2023/31xxx/CVE-2023-31427.json +++ b/2023/31xxx/CVE-2023-31427.json @@ -58,6 +58,11 @@ "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22379", "refsource": "MISC", "name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22379" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230908-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230908-0007/" } ] }, diff --git a/2023/31xxx/CVE-2023-31428.json b/2023/31xxx/CVE-2023-31428.json index 79a97890073..6d659a33e49 100644 --- a/2023/31xxx/CVE-2023-31428.json +++ b/2023/31xxx/CVE-2023-31428.json @@ -58,6 +58,11 @@ "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22380", "refsource": "MISC", "name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22380" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230908-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230908-0007/" } ] }, diff --git a/2023/31xxx/CVE-2023-31429.json b/2023/31xxx/CVE-2023-31429.json index 2d45798c170..4dde1bd0f78 100644 --- a/2023/31xxx/CVE-2023-31429.json +++ b/2023/31xxx/CVE-2023-31429.json @@ -58,6 +58,11 @@ "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/22408", "refsource": "MISC", "name": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/22408" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230908-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230908-0007/" } ] }, diff --git a/2023/31xxx/CVE-2023-31430.json b/2023/31xxx/CVE-2023-31430.json index e6a1fbdf8a4..88c247e779b 100644 --- a/2023/31xxx/CVE-2023-31430.json +++ b/2023/31xxx/CVE-2023-31430.json @@ -58,6 +58,11 @@ "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22381", "refsource": "MISC", "name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22381" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230908-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230908-0007/" } ] }, diff --git a/2023/31xxx/CVE-2023-31431.json b/2023/31xxx/CVE-2023-31431.json index de47e2c9ea0..7bf043d3ce1 100644 --- a/2023/31xxx/CVE-2023-31431.json +++ b/2023/31xxx/CVE-2023-31431.json @@ -58,6 +58,11 @@ "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22384", "refsource": "MISC", "name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22384" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230908-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230908-0007/" } ] }, diff --git a/2023/31xxx/CVE-2023-31432.json b/2023/31xxx/CVE-2023-31432.json index 2e31dc3ae99..005dd29f1f6 100644 --- a/2023/31xxx/CVE-2023-31432.json +++ b/2023/31xxx/CVE-2023-31432.json @@ -58,6 +58,11 @@ "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22385", "refsource": "MISC", "name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22385" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230908-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230908-0007/" } ] }, diff --git a/2023/31xxx/CVE-2023-31926.json b/2023/31xxx/CVE-2023-31926.json index 41e57d28d83..ca126e52db9 100644 --- a/2023/31xxx/CVE-2023-31926.json +++ b/2023/31xxx/CVE-2023-31926.json @@ -67,6 +67,11 @@ "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22388", "refsource": "MISC", "name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22388" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230908-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230908-0007/" } ] }, diff --git a/2023/31xxx/CVE-2023-31927.json b/2023/31xxx/CVE-2023-31927.json index d84cb3d405f..5ab819cd1fc 100644 --- a/2023/31xxx/CVE-2023-31927.json +++ b/2023/31xxx/CVE-2023-31927.json @@ -58,6 +58,11 @@ "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22389", "refsource": "MISC", "name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22389" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230908-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230908-0007/" } ] }, diff --git a/2023/31xxx/CVE-2023-31928.json b/2023/31xxx/CVE-2023-31928.json index d15e6b68f2b..fcc5065d533 100644 --- a/2023/31xxx/CVE-2023-31928.json +++ b/2023/31xxx/CVE-2023-31928.json @@ -58,6 +58,11 @@ "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22390", "refsource": "MISC", "name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22390" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230908-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230908-0007/" } ] }, diff --git a/2023/36xxx/CVE-2023-36054.json b/2023/36xxx/CVE-2023-36054.json index 69674669a07..472783183f7 100644 --- a/2023/36xxx/CVE-2023-36054.json +++ b/2023/36xxx/CVE-2023-36054.json @@ -71,6 +71,11 @@ "refsource": "CONFIRM", "name": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd", "url": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230908-0004/", + "url": "https://security.netapp.com/advisory/ntap-20230908-0004/" } ] } diff --git a/2023/38xxx/CVE-2023-38573.json b/2023/38xxx/CVE-2023-38573.json new file mode 100644 index 00000000000..3a1c6826f2b --- /dev/null +++ b/2023/38xxx/CVE-2023-38573.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-38573", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39318.json b/2023/39xxx/CVE-2023-39318.json index e8ded92d78c..4ea124b410e 100644 --- a/2023/39xxx/CVE-2023-39318.json +++ b/2023/39xxx/CVE-2023-39318.json @@ -1,18 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-39318", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@golang.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The html/template package does not properly handle HTML-like \"\" comment tokens, nor hashbang \"#!\" comment tokens, in