diff --git a/2022/39xxx/CVE-2022-39983.json b/2022/39xxx/CVE-2022-39983.json index b68db26f1f8..a35473e0dcc 100644 --- a/2022/39xxx/CVE-2022-39983.json +++ b/2022/39xxx/CVE-2022-39983.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-39983", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-39983", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "File upload vulnerability in Instantdeveloper RD3 22.0.8500, allows attackers to execute arbitrary code." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.swascan.com/it/vulnerability-report-instant-developer/", + "url": "https://www.swascan.com/it/vulnerability-report-instant-developer/" } ] } diff --git a/2022/45xxx/CVE-2022-45599.json b/2022/45xxx/CVE-2022-45599.json index b212a4f6d12..b615f51ef74 100644 --- a/2022/45xxx/CVE-2022-45599.json +++ b/2022/45xxx/CVE-2022-45599.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-45599", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-45599", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Aztech WMB250AC Mesh Routers Firmware Version 016 2020 is vulnerable to PHP Type Juggling in file /var/www/login.php, allows attackers to gain escalated privileges only when specific conditions regarding a given accounts hashed password." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/ethancunt/CVE-2022-45599", + "url": "https://github.com/ethancunt/CVE-2022-45599" } ] } diff --git a/2022/45xxx/CVE-2022-45600.json b/2022/45xxx/CVE-2022-45600.json index d79a334d980..e8bef8a8d39 100644 --- a/2022/45xxx/CVE-2022-45600.json +++ b/2022/45xxx/CVE-2022-45600.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-45600", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-45600", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Aztech WMB250AC Mesh Routers Firmware Version 016 2020 devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/ethancunt/CVE-2022-45600", + "url": "https://github.com/ethancunt/CVE-2022-45600" } ] } diff --git a/2023/23xxx/CVE-2023-23077.json b/2023/23xxx/CVE-2023-23077.json index 8516d5bf52c..7689b4e40d0 100644 --- a/2023/23xxx/CVE-2023-23077.json +++ b/2023/23xxx/CVE-2023-23077.json @@ -56,6 +56,11 @@ "url": "https://bugbounty.zohocorp.com/bb/#/bug/101000006387693?tab=originator", "refsource": "MISC", "name": "https://bugbounty.zohocorp.com/bb/#/bug/101000006387693?tab=originator" + }, + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/service-desk/CVE-2023-23077.html", + "url": "https://www.manageengine.com/products/service-desk/CVE-2023-23077.html" } ] } diff --git a/2023/23xxx/CVE-2023-23078.json b/2023/23xxx/CVE-2023-23078.json index 8abdf718cf0..a6e5f00ab8c 100644 --- a/2023/23xxx/CVE-2023-23078.json +++ b/2023/23xxx/CVE-2023-23078.json @@ -56,6 +56,11 @@ "url": "https://bugbounty.zohocorp.com/bb/#/bug/101000006458675?tab=originator", "refsource": "MISC", "name": "https://bugbounty.zohocorp.com/bb/#/bug/101000006458675?tab=originator" + }, + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/service-desk/CVE-2023-23078.html", + "url": "https://www.manageengine.com/products/service-desk/CVE-2023-23078.html" } ] } diff --git a/2023/26xxx/CVE-2023-26457.json b/2023/26xxx/CVE-2023-26457.json new file mode 100644 index 00000000000..ed6c16e1654 --- /dev/null +++ b/2023/26xxx/CVE-2023-26457.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-26457", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/26xxx/CVE-2023-26458.json b/2023/26xxx/CVE-2023-26458.json new file mode 100644 index 00000000000..4d12cfc786e --- /dev/null +++ b/2023/26xxx/CVE-2023-26458.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-26458", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/26xxx/CVE-2023-26459.json b/2023/26xxx/CVE-2023-26459.json new file mode 100644 index 00000000000..f0e1f70ee32 --- /dev/null +++ b/2023/26xxx/CVE-2023-26459.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-26459", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/26xxx/CVE-2023-26460.json b/2023/26xxx/CVE-2023-26460.json new file mode 100644 index 00000000000..616358518d8 --- /dev/null +++ b/2023/26xxx/CVE-2023-26460.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-26460", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/26xxx/CVE-2023-26461.json b/2023/26xxx/CVE-2023-26461.json new file mode 100644 index 00000000000..6965a7cacbb --- /dev/null +++ b/2023/26xxx/CVE-2023-26461.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-26461", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file