From be4eeaece4c23e3c8722a2b44180ad48b0c49f21 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 21 Jun 2023 08:00:43 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/36xxx/CVE-2023-36055.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36056.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36057.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36215.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36216.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36217.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36218.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36219.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36220.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36221.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36222.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36223.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36224.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36225.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36226.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36227.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36228.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36229.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36230.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36231.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36232.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36233.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36234.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36235.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36236.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36237.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36238.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36239.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36240.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36241.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36242.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36243.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36244.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36245.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36246.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36247.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36248.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36249.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36250.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36251.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36252.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36253.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36254.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36255.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36256.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36257.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36258.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36259.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36260.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36261.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36262.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36263.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36264.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36265.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36266.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36267.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36268.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36269.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36270.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36271.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36272.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36273.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36274.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36275.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36276.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36277.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36278.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36279.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36280.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36281.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36282.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36283.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36284.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36285.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36286.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36287.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36288.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36289.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36290.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36291.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36292.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36293.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36294.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36295.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36296.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36297.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36298.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36299.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36300.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36301.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36302.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36303.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36304.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36305.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36306.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36307.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36308.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36309.json | 18 ++++++++++++++++++ 2023/36xxx/CVE-2023-36310.json | 18 ++++++++++++++++++ 2023/3xxx/CVE-2023-3348.json | 18 ++++++++++++++++++ 100 files changed, 1800 insertions(+) create mode 100644 2023/36xxx/CVE-2023-36055.json create mode 100644 2023/36xxx/CVE-2023-36056.json create mode 100644 2023/36xxx/CVE-2023-36057.json create mode 100644 2023/36xxx/CVE-2023-36215.json create mode 100644 2023/36xxx/CVE-2023-36216.json create mode 100644 2023/36xxx/CVE-2023-36217.json create mode 100644 2023/36xxx/CVE-2023-36218.json create mode 100644 2023/36xxx/CVE-2023-36219.json create mode 100644 2023/36xxx/CVE-2023-36220.json create mode 100644 2023/36xxx/CVE-2023-36221.json create mode 100644 2023/36xxx/CVE-2023-36222.json create mode 100644 2023/36xxx/CVE-2023-36223.json create mode 100644 2023/36xxx/CVE-2023-36224.json create mode 100644 2023/36xxx/CVE-2023-36225.json create mode 100644 2023/36xxx/CVE-2023-36226.json create mode 100644 2023/36xxx/CVE-2023-36227.json create mode 100644 2023/36xxx/CVE-2023-36228.json create mode 100644 2023/36xxx/CVE-2023-36229.json create mode 100644 2023/36xxx/CVE-2023-36230.json create mode 100644 2023/36xxx/CVE-2023-36231.json create mode 100644 2023/36xxx/CVE-2023-36232.json create mode 100644 2023/36xxx/CVE-2023-36233.json create mode 100644 2023/36xxx/CVE-2023-36234.json create mode 100644 2023/36xxx/CVE-2023-36235.json create mode 100644 2023/36xxx/CVE-2023-36236.json create mode 100644 2023/36xxx/CVE-2023-36237.json create mode 100644 2023/36xxx/CVE-2023-36238.json create mode 100644 2023/36xxx/CVE-2023-36239.json create mode 100644 2023/36xxx/CVE-2023-36240.json create mode 100644 2023/36xxx/CVE-2023-36241.json create mode 100644 2023/36xxx/CVE-2023-36242.json create mode 100644 2023/36xxx/CVE-2023-36243.json create mode 100644 2023/36xxx/CVE-2023-36244.json create mode 100644 2023/36xxx/CVE-2023-36245.json create mode 100644 2023/36xxx/CVE-2023-36246.json create mode 100644 2023/36xxx/CVE-2023-36247.json create mode 100644 2023/36xxx/CVE-2023-36248.json create mode 100644 2023/36xxx/CVE-2023-36249.json create mode 100644 2023/36xxx/CVE-2023-36250.json create mode 100644 2023/36xxx/CVE-2023-36251.json create mode 100644 2023/36xxx/CVE-2023-36252.json create mode 100644 2023/36xxx/CVE-2023-36253.json create mode 100644 2023/36xxx/CVE-2023-36254.json create mode 100644 2023/36xxx/CVE-2023-36255.json create mode 100644 2023/36xxx/CVE-2023-36256.json create mode 100644 2023/36xxx/CVE-2023-36257.json create mode 100644 2023/36xxx/CVE-2023-36258.json create mode 100644 2023/36xxx/CVE-2023-36259.json create mode 100644 2023/36xxx/CVE-2023-36260.json create mode 100644 2023/36xxx/CVE-2023-36261.json create mode 100644 2023/36xxx/CVE-2023-36262.json create mode 100644 2023/36xxx/CVE-2023-36263.json create mode 100644 2023/36xxx/CVE-2023-36264.json create mode 100644 2023/36xxx/CVE-2023-36265.json create mode 100644 2023/36xxx/CVE-2023-36266.json create mode 100644 2023/36xxx/CVE-2023-36267.json create mode 100644 2023/36xxx/CVE-2023-36268.json create mode 100644 2023/36xxx/CVE-2023-36269.json create mode 100644 2023/36xxx/CVE-2023-36270.json create mode 100644 2023/36xxx/CVE-2023-36271.json create mode 100644 2023/36xxx/CVE-2023-36272.json create mode 100644 2023/36xxx/CVE-2023-36273.json create mode 100644 2023/36xxx/CVE-2023-36274.json create mode 100644 2023/36xxx/CVE-2023-36275.json create mode 100644 2023/36xxx/CVE-2023-36276.json create mode 100644 2023/36xxx/CVE-2023-36277.json create mode 100644 2023/36xxx/CVE-2023-36278.json create mode 100644 2023/36xxx/CVE-2023-36279.json create mode 100644 2023/36xxx/CVE-2023-36280.json create mode 100644 2023/36xxx/CVE-2023-36281.json create mode 100644 2023/36xxx/CVE-2023-36282.json create mode 100644 2023/36xxx/CVE-2023-36283.json create mode 100644 2023/36xxx/CVE-2023-36284.json create mode 100644 2023/36xxx/CVE-2023-36285.json create mode 100644 2023/36xxx/CVE-2023-36286.json create mode 100644 2023/36xxx/CVE-2023-36287.json create mode 100644 2023/36xxx/CVE-2023-36288.json create mode 100644 2023/36xxx/CVE-2023-36289.json create mode 100644 2023/36xxx/CVE-2023-36290.json create mode 100644 2023/36xxx/CVE-2023-36291.json create mode 100644 2023/36xxx/CVE-2023-36292.json create mode 100644 2023/36xxx/CVE-2023-36293.json create mode 100644 2023/36xxx/CVE-2023-36294.json create mode 100644 2023/36xxx/CVE-2023-36295.json create mode 100644 2023/36xxx/CVE-2023-36296.json create mode 100644 2023/36xxx/CVE-2023-36297.json create mode 100644 2023/36xxx/CVE-2023-36298.json create mode 100644 2023/36xxx/CVE-2023-36299.json create mode 100644 2023/36xxx/CVE-2023-36300.json create mode 100644 2023/36xxx/CVE-2023-36301.json create mode 100644 2023/36xxx/CVE-2023-36302.json create mode 100644 2023/36xxx/CVE-2023-36303.json create mode 100644 2023/36xxx/CVE-2023-36304.json create mode 100644 2023/36xxx/CVE-2023-36305.json create mode 100644 2023/36xxx/CVE-2023-36306.json create mode 100644 2023/36xxx/CVE-2023-36307.json create mode 100644 2023/36xxx/CVE-2023-36308.json create mode 100644 2023/36xxx/CVE-2023-36309.json create mode 100644 2023/36xxx/CVE-2023-36310.json create mode 100644 2023/3xxx/CVE-2023-3348.json diff --git a/2023/36xxx/CVE-2023-36055.json b/2023/36xxx/CVE-2023-36055.json new file mode 100644 index 00000000000..74e2d01bbb5 --- /dev/null +++ b/2023/36xxx/CVE-2023-36055.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36055", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36056.json b/2023/36xxx/CVE-2023-36056.json new file mode 100644 index 00000000000..6f919e1c00f --- /dev/null +++ b/2023/36xxx/CVE-2023-36056.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36056", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36057.json b/2023/36xxx/CVE-2023-36057.json new file mode 100644 index 00000000000..69d1c0b4aa8 --- /dev/null +++ b/2023/36xxx/CVE-2023-36057.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36057", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36215.json b/2023/36xxx/CVE-2023-36215.json new file mode 100644 index 00000000000..0d2914ea5d0 --- /dev/null +++ b/2023/36xxx/CVE-2023-36215.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36215", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36216.json b/2023/36xxx/CVE-2023-36216.json new file mode 100644 index 00000000000..14455fd5790 --- /dev/null +++ b/2023/36xxx/CVE-2023-36216.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36216", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36217.json b/2023/36xxx/CVE-2023-36217.json new file mode 100644 index 00000000000..4348775355b --- /dev/null +++ b/2023/36xxx/CVE-2023-36217.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36217", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36218.json b/2023/36xxx/CVE-2023-36218.json new file mode 100644 index 00000000000..4626488fcab --- /dev/null +++ b/2023/36xxx/CVE-2023-36218.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36218", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36219.json b/2023/36xxx/CVE-2023-36219.json new file mode 100644 index 00000000000..4836f9ba125 --- /dev/null +++ b/2023/36xxx/CVE-2023-36219.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36219", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36220.json b/2023/36xxx/CVE-2023-36220.json new file mode 100644 index 00000000000..c96c5e23f08 --- /dev/null +++ b/2023/36xxx/CVE-2023-36220.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36220", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36221.json b/2023/36xxx/CVE-2023-36221.json new file mode 100644 index 00000000000..0a98e833a06 --- /dev/null +++ b/2023/36xxx/CVE-2023-36221.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36221", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36222.json b/2023/36xxx/CVE-2023-36222.json new file mode 100644 index 00000000000..4ccd8c1aa0b --- /dev/null +++ b/2023/36xxx/CVE-2023-36222.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36222", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36223.json b/2023/36xxx/CVE-2023-36223.json new file mode 100644 index 00000000000..63345e7db6a --- /dev/null +++ b/2023/36xxx/CVE-2023-36223.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36223", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36224.json b/2023/36xxx/CVE-2023-36224.json new file mode 100644 index 00000000000..7edf01447c3 --- /dev/null +++ b/2023/36xxx/CVE-2023-36224.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36224", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36225.json b/2023/36xxx/CVE-2023-36225.json new file mode 100644 index 00000000000..de6f322d461 --- /dev/null +++ b/2023/36xxx/CVE-2023-36225.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36225", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36226.json b/2023/36xxx/CVE-2023-36226.json new file mode 100644 index 00000000000..762accd39fd --- /dev/null +++ b/2023/36xxx/CVE-2023-36226.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36226", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36227.json b/2023/36xxx/CVE-2023-36227.json new file mode 100644 index 00000000000..ab68ba4a584 --- /dev/null +++ b/2023/36xxx/CVE-2023-36227.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36227", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36228.json b/2023/36xxx/CVE-2023-36228.json new file mode 100644 index 00000000000..3bc32a6aa88 --- /dev/null +++ b/2023/36xxx/CVE-2023-36228.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36228", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36229.json b/2023/36xxx/CVE-2023-36229.json new file mode 100644 index 00000000000..13befc3d4b7 --- /dev/null +++ b/2023/36xxx/CVE-2023-36229.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36229", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36230.json b/2023/36xxx/CVE-2023-36230.json new file mode 100644 index 00000000000..ca1281753b5 --- /dev/null +++ b/2023/36xxx/CVE-2023-36230.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36230", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36231.json b/2023/36xxx/CVE-2023-36231.json new file mode 100644 index 00000000000..b46fc75e781 --- /dev/null +++ b/2023/36xxx/CVE-2023-36231.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36231", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36232.json b/2023/36xxx/CVE-2023-36232.json new file mode 100644 index 00000000000..5661a0e5067 --- /dev/null +++ b/2023/36xxx/CVE-2023-36232.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36232", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36233.json b/2023/36xxx/CVE-2023-36233.json new file mode 100644 index 00000000000..de94d6f54da --- /dev/null +++ b/2023/36xxx/CVE-2023-36233.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36233", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36234.json b/2023/36xxx/CVE-2023-36234.json new file mode 100644 index 00000000000..dc008c97c35 --- /dev/null +++ b/2023/36xxx/CVE-2023-36234.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36234", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36235.json b/2023/36xxx/CVE-2023-36235.json new file mode 100644 index 00000000000..d4eb8bbe221 --- /dev/null +++ b/2023/36xxx/CVE-2023-36235.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36235", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36236.json b/2023/36xxx/CVE-2023-36236.json new file mode 100644 index 00000000000..369e6a3c508 --- /dev/null +++ b/2023/36xxx/CVE-2023-36236.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36236", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36237.json b/2023/36xxx/CVE-2023-36237.json new file mode 100644 index 00000000000..6d26cb77940 --- /dev/null +++ b/2023/36xxx/CVE-2023-36237.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36237", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36238.json b/2023/36xxx/CVE-2023-36238.json new file mode 100644 index 00000000000..054c7cb1476 --- /dev/null +++ b/2023/36xxx/CVE-2023-36238.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36238", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36239.json b/2023/36xxx/CVE-2023-36239.json new file mode 100644 index 00000000000..773fe1d25a7 --- /dev/null +++ b/2023/36xxx/CVE-2023-36239.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36239", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36240.json b/2023/36xxx/CVE-2023-36240.json new file mode 100644 index 00000000000..4c94015de52 --- /dev/null +++ b/2023/36xxx/CVE-2023-36240.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36240", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36241.json b/2023/36xxx/CVE-2023-36241.json new file mode 100644 index 00000000000..c4e30b5c713 --- /dev/null +++ b/2023/36xxx/CVE-2023-36241.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36241", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36242.json b/2023/36xxx/CVE-2023-36242.json new file mode 100644 index 00000000000..281cfebad39 --- /dev/null +++ b/2023/36xxx/CVE-2023-36242.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36242", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36243.json b/2023/36xxx/CVE-2023-36243.json new file mode 100644 index 00000000000..e8aa459a2eb --- /dev/null +++ b/2023/36xxx/CVE-2023-36243.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36243", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36244.json b/2023/36xxx/CVE-2023-36244.json new file mode 100644 index 00000000000..6466e701a39 --- /dev/null +++ b/2023/36xxx/CVE-2023-36244.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36244", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36245.json b/2023/36xxx/CVE-2023-36245.json new file mode 100644 index 00000000000..8b39bd079b2 --- /dev/null +++ b/2023/36xxx/CVE-2023-36245.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36245", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36246.json b/2023/36xxx/CVE-2023-36246.json new file mode 100644 index 00000000000..a88e2502933 --- /dev/null +++ b/2023/36xxx/CVE-2023-36246.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36246", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36247.json b/2023/36xxx/CVE-2023-36247.json new file mode 100644 index 00000000000..c4f05766bbe --- /dev/null +++ b/2023/36xxx/CVE-2023-36247.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36247", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36248.json b/2023/36xxx/CVE-2023-36248.json new file mode 100644 index 00000000000..af51726f577 --- /dev/null +++ b/2023/36xxx/CVE-2023-36248.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36248", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36249.json b/2023/36xxx/CVE-2023-36249.json new file mode 100644 index 00000000000..165c576f6ba --- /dev/null +++ b/2023/36xxx/CVE-2023-36249.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36249", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36250.json b/2023/36xxx/CVE-2023-36250.json new file mode 100644 index 00000000000..d0639b5b71f --- /dev/null +++ b/2023/36xxx/CVE-2023-36250.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36250", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36251.json b/2023/36xxx/CVE-2023-36251.json new file mode 100644 index 00000000000..3d16ae95ff9 --- /dev/null +++ b/2023/36xxx/CVE-2023-36251.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36251", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36252.json b/2023/36xxx/CVE-2023-36252.json new file mode 100644 index 00000000000..6663596fb8f --- /dev/null +++ b/2023/36xxx/CVE-2023-36252.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36252", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36253.json b/2023/36xxx/CVE-2023-36253.json new file mode 100644 index 00000000000..b8096be2786 --- /dev/null +++ b/2023/36xxx/CVE-2023-36253.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36253", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36254.json b/2023/36xxx/CVE-2023-36254.json new file mode 100644 index 00000000000..7e5e2450f41 --- /dev/null +++ b/2023/36xxx/CVE-2023-36254.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36254", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36255.json b/2023/36xxx/CVE-2023-36255.json new file mode 100644 index 00000000000..371c6a6e9eb --- /dev/null +++ b/2023/36xxx/CVE-2023-36255.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36255", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36256.json b/2023/36xxx/CVE-2023-36256.json new file mode 100644 index 00000000000..a71bb3d4094 --- /dev/null +++ b/2023/36xxx/CVE-2023-36256.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36256", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36257.json b/2023/36xxx/CVE-2023-36257.json new file mode 100644 index 00000000000..8596d800201 --- /dev/null +++ b/2023/36xxx/CVE-2023-36257.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36257", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36258.json b/2023/36xxx/CVE-2023-36258.json new file mode 100644 index 00000000000..4a81cebc749 --- /dev/null +++ b/2023/36xxx/CVE-2023-36258.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36258", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36259.json b/2023/36xxx/CVE-2023-36259.json new file mode 100644 index 00000000000..5469dc03b90 --- /dev/null +++ b/2023/36xxx/CVE-2023-36259.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36259", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36260.json b/2023/36xxx/CVE-2023-36260.json new file mode 100644 index 00000000000..cc162a2fd71 --- /dev/null +++ b/2023/36xxx/CVE-2023-36260.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36260", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36261.json b/2023/36xxx/CVE-2023-36261.json new file mode 100644 index 00000000000..738528ec00c --- /dev/null +++ b/2023/36xxx/CVE-2023-36261.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36261", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36262.json b/2023/36xxx/CVE-2023-36262.json new file mode 100644 index 00000000000..bf7f26992fd --- /dev/null +++ b/2023/36xxx/CVE-2023-36262.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36262", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36263.json b/2023/36xxx/CVE-2023-36263.json new file mode 100644 index 00000000000..3c90a736ec6 --- /dev/null +++ b/2023/36xxx/CVE-2023-36263.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36263", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36264.json b/2023/36xxx/CVE-2023-36264.json new file mode 100644 index 00000000000..b1cea1d824f --- /dev/null +++ b/2023/36xxx/CVE-2023-36264.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36264", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36265.json b/2023/36xxx/CVE-2023-36265.json new file mode 100644 index 00000000000..e2c01efea8a --- /dev/null +++ b/2023/36xxx/CVE-2023-36265.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36265", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36266.json b/2023/36xxx/CVE-2023-36266.json new file mode 100644 index 00000000000..5aa9f200822 --- /dev/null +++ b/2023/36xxx/CVE-2023-36266.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36266", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36267.json b/2023/36xxx/CVE-2023-36267.json new file mode 100644 index 00000000000..d45da9ab665 --- /dev/null +++ b/2023/36xxx/CVE-2023-36267.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36267", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36268.json b/2023/36xxx/CVE-2023-36268.json new file mode 100644 index 00000000000..99726664a64 --- /dev/null +++ b/2023/36xxx/CVE-2023-36268.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36268", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36269.json b/2023/36xxx/CVE-2023-36269.json new file mode 100644 index 00000000000..ed05984809b --- /dev/null +++ b/2023/36xxx/CVE-2023-36269.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36269", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36270.json b/2023/36xxx/CVE-2023-36270.json new file mode 100644 index 00000000000..2fc31a38218 --- /dev/null +++ b/2023/36xxx/CVE-2023-36270.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36270", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36271.json b/2023/36xxx/CVE-2023-36271.json new file mode 100644 index 00000000000..1e19090d61d --- /dev/null +++ b/2023/36xxx/CVE-2023-36271.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36271", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36272.json b/2023/36xxx/CVE-2023-36272.json new file mode 100644 index 00000000000..369d71090fb --- /dev/null +++ b/2023/36xxx/CVE-2023-36272.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36272", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36273.json b/2023/36xxx/CVE-2023-36273.json new file mode 100644 index 00000000000..11b20b5325f --- /dev/null +++ b/2023/36xxx/CVE-2023-36273.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36273", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36274.json b/2023/36xxx/CVE-2023-36274.json new file mode 100644 index 00000000000..8da975a3f40 --- /dev/null +++ b/2023/36xxx/CVE-2023-36274.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36274", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36275.json b/2023/36xxx/CVE-2023-36275.json new file mode 100644 index 00000000000..a1e85d74fdc --- /dev/null +++ b/2023/36xxx/CVE-2023-36275.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36275", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36276.json b/2023/36xxx/CVE-2023-36276.json new file mode 100644 index 00000000000..c0ad4ff8213 --- /dev/null +++ b/2023/36xxx/CVE-2023-36276.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36276", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36277.json b/2023/36xxx/CVE-2023-36277.json new file mode 100644 index 00000000000..9d463994e56 --- /dev/null +++ b/2023/36xxx/CVE-2023-36277.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36277", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36278.json b/2023/36xxx/CVE-2023-36278.json new file mode 100644 index 00000000000..6fe27a53b60 --- /dev/null +++ b/2023/36xxx/CVE-2023-36278.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36278", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36279.json b/2023/36xxx/CVE-2023-36279.json new file mode 100644 index 00000000000..e8772c636a4 --- /dev/null +++ b/2023/36xxx/CVE-2023-36279.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36279", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36280.json b/2023/36xxx/CVE-2023-36280.json new file mode 100644 index 00000000000..e04f2bae3cd --- /dev/null +++ b/2023/36xxx/CVE-2023-36280.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36280", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36281.json b/2023/36xxx/CVE-2023-36281.json new file mode 100644 index 00000000000..267d5296cdf --- /dev/null +++ b/2023/36xxx/CVE-2023-36281.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36281", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36282.json b/2023/36xxx/CVE-2023-36282.json new file mode 100644 index 00000000000..7b91ca401c0 --- /dev/null +++ b/2023/36xxx/CVE-2023-36282.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36282", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36283.json b/2023/36xxx/CVE-2023-36283.json new file mode 100644 index 00000000000..f5324e392b0 --- /dev/null +++ b/2023/36xxx/CVE-2023-36283.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36283", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36284.json b/2023/36xxx/CVE-2023-36284.json new file mode 100644 index 00000000000..6218e1e19c7 --- /dev/null +++ b/2023/36xxx/CVE-2023-36284.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36284", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36285.json b/2023/36xxx/CVE-2023-36285.json new file mode 100644 index 00000000000..78025a1329e --- /dev/null +++ b/2023/36xxx/CVE-2023-36285.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36285", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36286.json b/2023/36xxx/CVE-2023-36286.json new file mode 100644 index 00000000000..a2bc8c00371 --- /dev/null +++ b/2023/36xxx/CVE-2023-36286.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36286", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36287.json b/2023/36xxx/CVE-2023-36287.json new file mode 100644 index 00000000000..21e1ec43f3d --- /dev/null +++ b/2023/36xxx/CVE-2023-36287.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36287", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36288.json b/2023/36xxx/CVE-2023-36288.json new file mode 100644 index 00000000000..ed2c5df9024 --- /dev/null +++ b/2023/36xxx/CVE-2023-36288.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36288", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36289.json b/2023/36xxx/CVE-2023-36289.json new file mode 100644 index 00000000000..0355e6b32be --- /dev/null +++ b/2023/36xxx/CVE-2023-36289.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36289", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36290.json b/2023/36xxx/CVE-2023-36290.json new file mode 100644 index 00000000000..af858bb81ba --- /dev/null +++ b/2023/36xxx/CVE-2023-36290.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36290", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36291.json b/2023/36xxx/CVE-2023-36291.json new file mode 100644 index 00000000000..68de9efcdc3 --- /dev/null +++ b/2023/36xxx/CVE-2023-36291.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36291", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36292.json b/2023/36xxx/CVE-2023-36292.json new file mode 100644 index 00000000000..edeee64d44a --- /dev/null +++ b/2023/36xxx/CVE-2023-36292.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36292", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36293.json b/2023/36xxx/CVE-2023-36293.json new file mode 100644 index 00000000000..3f77a6de459 --- /dev/null +++ b/2023/36xxx/CVE-2023-36293.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36293", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36294.json b/2023/36xxx/CVE-2023-36294.json new file mode 100644 index 00000000000..326d759c915 --- /dev/null +++ b/2023/36xxx/CVE-2023-36294.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36294", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36295.json b/2023/36xxx/CVE-2023-36295.json new file mode 100644 index 00000000000..bfddf735360 --- /dev/null +++ b/2023/36xxx/CVE-2023-36295.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36295", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36296.json b/2023/36xxx/CVE-2023-36296.json new file mode 100644 index 00000000000..f0a4db0183b --- /dev/null +++ b/2023/36xxx/CVE-2023-36296.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36296", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36297.json b/2023/36xxx/CVE-2023-36297.json new file mode 100644 index 00000000000..2c3f8d97e4b --- /dev/null +++ b/2023/36xxx/CVE-2023-36297.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36297", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36298.json b/2023/36xxx/CVE-2023-36298.json new file mode 100644 index 00000000000..672ad0c4eb7 --- /dev/null +++ b/2023/36xxx/CVE-2023-36298.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36298", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36299.json b/2023/36xxx/CVE-2023-36299.json new file mode 100644 index 00000000000..78ba4d16daf --- /dev/null +++ b/2023/36xxx/CVE-2023-36299.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36299", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36300.json b/2023/36xxx/CVE-2023-36300.json new file mode 100644 index 00000000000..d6fcd335ff6 --- /dev/null +++ b/2023/36xxx/CVE-2023-36300.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36300", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36301.json b/2023/36xxx/CVE-2023-36301.json new file mode 100644 index 00000000000..11f3c77dc5f --- /dev/null +++ b/2023/36xxx/CVE-2023-36301.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36301", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36302.json b/2023/36xxx/CVE-2023-36302.json new file mode 100644 index 00000000000..f4dbb4d8571 --- /dev/null +++ b/2023/36xxx/CVE-2023-36302.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36302", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36303.json b/2023/36xxx/CVE-2023-36303.json new file mode 100644 index 00000000000..8baf4e5f132 --- /dev/null +++ b/2023/36xxx/CVE-2023-36303.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36303", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36304.json b/2023/36xxx/CVE-2023-36304.json new file mode 100644 index 00000000000..85e9f0a023b --- /dev/null +++ b/2023/36xxx/CVE-2023-36304.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36304", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36305.json b/2023/36xxx/CVE-2023-36305.json new file mode 100644 index 00000000000..cbe5dbcaada --- /dev/null +++ b/2023/36xxx/CVE-2023-36305.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36305", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36306.json b/2023/36xxx/CVE-2023-36306.json new file mode 100644 index 00000000000..44729889387 --- /dev/null +++ b/2023/36xxx/CVE-2023-36306.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36306", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36307.json b/2023/36xxx/CVE-2023-36307.json new file mode 100644 index 00000000000..877e2e64276 --- /dev/null +++ b/2023/36xxx/CVE-2023-36307.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36307", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36308.json b/2023/36xxx/CVE-2023-36308.json new file mode 100644 index 00000000000..979395d69ea --- /dev/null +++ b/2023/36xxx/CVE-2023-36308.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36308", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36309.json b/2023/36xxx/CVE-2023-36309.json new file mode 100644 index 00000000000..249f9d05de4 --- /dev/null +++ b/2023/36xxx/CVE-2023-36309.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36309", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/36xxx/CVE-2023-36310.json b/2023/36xxx/CVE-2023-36310.json new file mode 100644 index 00000000000..f0823850e10 --- /dev/null +++ b/2023/36xxx/CVE-2023-36310.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-36310", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/3xxx/CVE-2023-3348.json b/2023/3xxx/CVE-2023-3348.json new file mode 100644 index 00000000000..d6e916066e7 --- /dev/null +++ b/2023/3xxx/CVE-2023-3348.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-3348", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file