From c08035981c448b45b2237af219c8f5c276470a0b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 23 Jun 2023 02:00:41 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/33xxx/CVE-2023-33140.json | 5 --- 2023/33xxx/CVE-2023-33141.json | 64 +++++++++++++++++++++++++++++++--- 2023/36xxx/CVE-2023-36191.json | 56 +++++++++++++++++++++++++---- 2023/36xxx/CVE-2023-36192.json | 56 +++++++++++++++++++++++++---- 2023/36xxx/CVE-2023-36193.json | 56 +++++++++++++++++++++++++---- 2023/3xxx/CVE-2023-3373.json | 18 ++++++++++ 6 files changed, 228 insertions(+), 27 deletions(-) create mode 100644 2023/3xxx/CVE-2023-3373.json diff --git a/2023/33xxx/CVE-2023-33140.json b/2023/33xxx/CVE-2023-33140.json index 6133104bcd1..5b468f4406f 100644 --- a/2023/33xxx/CVE-2023-33140.json +++ b/2023/33xxx/CVE-2023-33140.json @@ -58,11 +58,6 @@ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33140", "refsource": "MISC", "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33140" - }, - { - "url": "http://packetstormsecurity.com/files/173064/Microsoft-OneNote-2305-Build-16.0.16501.20074-Spoofing.html", - "refsource": "MISC", - "name": "http://packetstormsecurity.com/files/173064/Microsoft-OneNote-2305-Build-16.0.16501.20074-Spoofing.html" } ] }, diff --git a/2023/33xxx/CVE-2023-33141.json b/2023/33xxx/CVE-2023-33141.json index cb6d1d7462a..1aed58980bc 100644 --- a/2023/33xxx/CVE-2023-33141.json +++ b/2023/33xxx/CVE-2023-33141.json @@ -1,17 +1,73 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-33141", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secure@microsoft.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Yet Another Reverse Proxy (YARP) Denial of Service Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "YARP", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.0.0", + "version_value": "1.1.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33141", + "refsource": "MISC", + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33141" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 7.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C" } ] } diff --git a/2023/36xxx/CVE-2023-36191.json b/2023/36xxx/CVE-2023-36191.json index 46e0dc88d7b..c1c3e9978cb 100644 --- a/2023/36xxx/CVE-2023-36191.json +++ b/2023/36xxx/CVE-2023-36191.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-36191", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-36191", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "sqlite3 v3.40.1 was discovered to contain a segmentation violation at /sqlite3_aflpp/shell.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.sqlite.org/forum/forumpost/19f55ef73b", + "refsource": "MISC", + "name": "https://www.sqlite.org/forum/forumpost/19f55ef73b" } ] } diff --git a/2023/36xxx/CVE-2023-36192.json b/2023/36xxx/CVE-2023-36192.json index 1934378b733..7403ea577f6 100644 --- a/2023/36xxx/CVE-2023-36192.json +++ b/2023/36xxx/CVE-2023-36192.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-36192", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-36192", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sngrep v1.6.0 was discovered to contain a heap buffer overflow via the function capture_ws_check_packet at /src/capture.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/irontec/sngrep/issues/438", + "refsource": "MISC", + "name": "https://github.com/irontec/sngrep/issues/438" } ] } diff --git a/2023/36xxx/CVE-2023-36193.json b/2023/36xxx/CVE-2023-36193.json index 9ed1d5aa2e7..c29afca3abd 100644 --- a/2023/36xxx/CVE-2023-36193.json +++ b/2023/36xxx/CVE-2023-36193.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-36193", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-36193", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Gifsicle v1.9.3 was discovered to contain a heap buffer overflow via the ambiguity_error component at /src/clp.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/kohler/gifsicle/issues/191", + "refsource": "MISC", + "name": "https://github.com/kohler/gifsicle/issues/191" } ] } diff --git a/2023/3xxx/CVE-2023-3373.json b/2023/3xxx/CVE-2023-3373.json new file mode 100644 index 00000000000..ea396225954 --- /dev/null +++ b/2023/3xxx/CVE-2023-3373.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-3373", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file