From bb8d6023af337afd78d22bc6639743876680bc4a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 25 Jun 2023 22:00:41 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/36xxx/CVE-2023-36660.json | 66 ++++++++++++++++++++++++++++--- 2023/36xxx/CVE-2023-36661.json | 56 +++++++++++++++++++++++--- 2023/36xxx/CVE-2023-36664.json | 72 ++++++++++++++++++++++++++++++++++ 2023/36xxx/CVE-2023-36665.json | 18 +++++++++ 2023/36xxx/CVE-2023-36666.json | 67 +++++++++++++++++++++++++++++++ 5 files changed, 267 insertions(+), 12 deletions(-) create mode 100644 2023/36xxx/CVE-2023-36664.json create mode 100644 2023/36xxx/CVE-2023-36665.json create mode 100644 2023/36xxx/CVE-2023-36666.json diff --git a/2023/36xxx/CVE-2023-36660.json b/2023/36xxx/CVE-2023-36660.json index 7d05d699dad..b0c00524e35 100644 --- a/2023/36xxx/CVE-2023-36660.json +++ b/2023/36xxx/CVE-2023-36660.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-36660", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-36660", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The OCB feature in libnettle in Nettle 3.9 before 3.9.1 allows memory corruption." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=1212112", + "refsource": "MISC", + "name": "https://bugzilla.suse.com/show_bug.cgi?id=1212112" + }, + { + "url": "https://git.lysator.liu.se/nettle/nettle/-/commit/867a4548b95705291a3afdd66d76e7f17ba2618f", + "refsource": "MISC", + "name": "https://git.lysator.liu.se/nettle/nettle/-/commit/867a4548b95705291a3afdd66d76e7f17ba2618f" + }, + { + "url": "https://git.lysator.liu.se/nettle/nettle/-/compare/nettle_3.9_release_20230514...nettle_3.9.1_release_20230601", + "refsource": "MISC", + "name": "https://git.lysator.liu.se/nettle/nettle/-/compare/nettle_3.9_release_20230514...nettle_3.9.1_release_20230601" } ] } diff --git a/2023/36xxx/CVE-2023-36661.json b/2023/36xxx/CVE-2023-36661.json index 68e44347772..b7e6d397bb1 100644 --- a/2023/36xxx/CVE-2023-36661.json +++ b/2023/36xxx/CVE-2023-36661.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-36661", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-36661", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Shibboleth XMLTooling before 3.2.4, as used in OpenSAML and Shibboleth Service Provider, allows SSRF via a crafted KeyInfo element. (This is fixed in, for example, Shibboleth Service Provider 3.4.1.3 on Windows.)" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://shibboleth.net/community/advisories/secadv_20230612.txt", + "refsource": "MISC", + "name": "https://shibboleth.net/community/advisories/secadv_20230612.txt" } ] } diff --git a/2023/36xxx/CVE-2023-36664.json b/2023/36xxx/CVE-2023-36664.json new file mode 100644 index 00000000000..ebdd9d429ec --- /dev/null +++ b/2023/36xxx/CVE-2023-36664.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2023-36664", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Artifex Ghostscript through 10.01.2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bugs.ghostscript.com/show_bug.cgi?id=706761", + "refsource": "MISC", + "name": "https://bugs.ghostscript.com/show_bug.cgi?id=706761" + }, + { + "url": "https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=505eab7782b429017eb434b2b95120855f2b0e3c", + "refsource": "MISC", + "name": "https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=505eab7782b429017eb434b2b95120855f2b0e3c" + }, + { + "url": "https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0974e4f2ac0005d3731e0b5c13ebc7e965540f4d", + "refsource": "MISC", + "name": "https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0974e4f2ac0005d3731e0b5c13ebc7e965540f4d" + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36665.json b/2023/36xxx/CVE-2023-36665.json new file mode 100644 index 00000000000..88d90b73a0c --- /dev/null +++ b/2023/36xxx/CVE-2023-36665.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36665", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36666.json b/2023/36xxx/CVE-2023-36666.json new file mode 100644 index 00000000000..acd1f40e459 --- /dev/null +++ b/2023/36xxx/CVE-2023-36666.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2023-36666", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "INEX IXP-Manager before 6.3.1 allows XSS. list-preamble.foil.php, page-header-preamble.foil.php, edit-form.foil.php, page-header-preamble.foil.php, overview.foil.php, cust.foil.php, and view.foil.php may be affected." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/inex/IXP-Manager/commit/fddbc38adb477c9cd46a462655ffed96d3d42229", + "refsource": "MISC", + "name": "https://github.com/inex/IXP-Manager/commit/fddbc38adb477c9cd46a462655ffed96d3d42229" + }, + { + "url": "https://github.com/inex/IXP-Manager/compare/v6.3.0...v6.3.1", + "refsource": "MISC", + "name": "https://github.com/inex/IXP-Manager/compare/v6.3.0...v6.3.1" + } + ] + } +} \ No newline at end of file