diff --git a/2023/20xxx/CVE-2023-20098.json b/2023/20xxx/CVE-2023-20098.json index 540e069bcb3..f72c4096d58 100644 --- a/2023/20xxx/CVE-2023-20098.json +++ b/2023/20xxx/CVE-2023-20098.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "Path Traversal", + "cweId": "CWE-24" } ] } @@ -61,11 +62,6 @@ "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanage-wfnqmYhN", "refsource": "MISC", "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanage-wfnqmYhN" - }, - { - "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-5j43-q336-92ch", - "refsource": "MISC", - "name": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-5j43-q336-92ch" } ] }, diff --git a/2023/20xxx/CVE-2023-20101.json b/2023/20xxx/CVE-2023-20101.json index 71dc6c49fd1..cc644ee76e4 100644 --- a/2023/20xxx/CVE-2023-20101.json +++ b/2023/20xxx/CVE-2023-20101.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "Use of Hard-coded Credentials", + "cweId": "CWE-798" } ] } diff --git a/2023/20xxx/CVE-2023-20105.json b/2023/20xxx/CVE-2023-20105.json index 645b6a75395..7f3c88e6a78 100644 --- a/2023/20xxx/CVE-2023-20105.json +++ b/2023/20xxx/CVE-2023-20105.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "Improper Input Validation", + "cweId": "CWE-20" } ] } @@ -233,6 +234,58 @@ { "version_affected": "=", "version_value": "X8.11.0" + }, + { + "version_affected": "=", + "version_value": "X14.0.1" + }, + { + "version_affected": "=", + "version_value": "X14.0.3" + }, + { + "version_affected": "=", + "version_value": "X14.0.2" + }, + { + "version_affected": "=", + "version_value": "X14.0.4" + }, + { + "version_affected": "=", + "version_value": "X14.0.5" + }, + { + "version_affected": "=", + "version_value": "X14.0.6" + }, + { + "version_affected": "=", + "version_value": "X14.0.7" + }, + { + "version_affected": "=", + "version_value": "X14.0.8" + }, + { + "version_affected": "=", + "version_value": "X14.0.9" + }, + { + "version_affected": "=", + "version_value": "X14.0.10" + }, + { + "version_affected": "=", + "version_value": "X14.0.11" + }, + { + "version_affected": "=", + "version_value": "X14.2.1" + }, + { + "version_affected": "=", + "version_value": "X14.2.0" } ] } diff --git a/2023/20xxx/CVE-2023-20108.json b/2023/20xxx/CVE-2023-20108.json index 87cf7cf4311..b65938a37ab 100644 --- a/2023/20xxx/CVE-2023-20108.json +++ b/2023/20xxx/CVE-2023-20108.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "Uncontrolled Memory Allocation", + "cweId": "CWE-789" } ] } diff --git a/2023/20xxx/CVE-2023-20109.json b/2023/20xxx/CVE-2023-20109.json index 5328430e494..36d9f31ac34 100644 --- a/2023/20xxx/CVE-2023-20109.json +++ b/2023/20xxx/CVE-2023-20109.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "Out-of-bounds Write", + "cweId": "CWE-787" } ] } @@ -1646,10 +1647,6 @@ "version_affected": "=", "version_value": "15.2(8)E4" }, - { - "version_affected": "=", - "version_value": "15.2(4)E10e" - }, { "version_affected": "=", "version_value": "15.1(3)MRA" @@ -3337,10 +3334,6 @@ "version_affected": "=", "version_value": "3.8.10E" }, - { - "version_affected": "=", - "version_value": "3.8.10eE" - }, { "version_affected": "=", "version_value": "16.3.1" @@ -4109,6 +4102,10 @@ "version_affected": "=", "version_value": "17.6.5" }, + { + "version_affected": "=", + "version_value": "17.6.5a" + }, { "version_affected": "=", "version_value": "17.7.1" @@ -4177,10 +4174,6 @@ "version_affected": "=", "version_value": "17.9.2a" }, - { - "version_affected": "=", - "version_value": "17.9.2b" - }, { "version_affected": "=", "version_value": "17.9.1x1" diff --git a/2023/20xxx/CVE-2023-20111.json b/2023/20xxx/CVE-2023-20111.json index 17603257e05..d96d09946cc 100644 --- a/2023/20xxx/CVE-2023-20111.json +++ b/2023/20xxx/CVE-2023-20111.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "Exposure of Sensitive System Information to an Unauthorized Control Sphere", + "cweId": "CWE-497" } ] } @@ -118,6 +119,10 @@ "version_affected": "=", "version_value": "2.7.0 p7" }, + { + "version_affected": "=", + "version_value": "2.7.0 p9" + }, { "version_affected": "=", "version_value": "3.0.0" diff --git a/2023/20xxx/CVE-2023-20114.json b/2023/20xxx/CVE-2023-20114.json index 19b9b25f319..5676c0734bc 100644 --- a/2023/20xxx/CVE-2023-20114.json +++ b/2023/20xxx/CVE-2023-20114.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "External Control of File Name or Path", + "cweId": "CWE-73" } ] } diff --git a/2023/20xxx/CVE-2023-20115.json b/2023/20xxx/CVE-2023-20115.json index 3a0e5ca68ac..93cb58ea75b 100644 --- a/2023/20xxx/CVE-2023-20115.json +++ b/2023/20xxx/CVE-2023-20115.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "Lack of Administrator Control over Security", + "cweId": "CWE-671" } ] } diff --git a/2023/20xxx/CVE-2023-20116.json b/2023/20xxx/CVE-2023-20116.json index 74fcc7cc4d0..1da980d2779 100644 --- a/2023/20xxx/CVE-2023-20116.json +++ b/2023/20xxx/CVE-2023-20116.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "Loop with Unreachable Exit Condition ('Infinite Loop')", + "cweId": "CWE-835" } ] } diff --git a/2023/20xxx/CVE-2023-20118.json b/2023/20xxx/CVE-2023-20118.json index d3ca0385d52..6ea53ce8893 100644 --- a/2023/20xxx/CVE-2023-20118.json +++ b/2023/20xxx/CVE-2023-20118.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "Improper Neutralization of Special Elements used in a Command ('Command Injection')", + "cweId": "CWE-77" } ] }