diff --git a/2020/36xxx/CVE-2020-36643.json b/2020/36xxx/CVE-2020-36643.json index 3f20a6c1ca9..60735bff739 100644 --- a/2020/36xxx/CVE-2020-36643.json +++ b/2020/36xxx/CVE-2020-36643.json @@ -1,105 +1,17 @@ { - "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", + "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-36643", - "ASSIGNER": "cna@vuldb.com", - "STATE": "PUBLIC" + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in intgr uqm-wasm. It has been classified as critical. This affects the function log_displayBox in the library sc2/src/libs/log/msgbox_macosx.m. The manipulation leads to format string. The name of the patch is 1d5cbf3350a02c423ad6bef6dfd5300d38aa828f. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217563." - }, - { - "lang": "deu", - "value": "Es wurde eine Schwachstelle in intgr uqm-wasm ausgemacht. Sie wurde als kritisch eingestuft. Dabei betrifft es die Funktion log_displayBox in der Bibliothek sc2/src/libs/log/msgbox_macosx.m. Mittels dem Manipulieren mit unbekannten Daten kann eine format string-Schwachstelle ausgenutzt werden. Der Patch wird als 1d5cbf3350a02c423ad6bef6dfd5300d38aa828f bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-134 Format String", - "cweId": "CWE-134" - } - ] - } - ] - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "intgr", - "product": { - "product_data": [ - { - "product_name": "uqm-wasm", - "version": { - "version_data": [ - { - "version_value": "n/a", - "version_affected": "=" - } - ] - } - } - ] - } - } - ] - } - }, - "references": { - "reference_data": [ - { - "url": "https://vuldb.com/?id.217563", - "refsource": "MISC", - "name": "https://vuldb.com/?id.217563" - }, - { - "url": "https://vuldb.com/?ctiid.217563", - "refsource": "MISC", - "name": "https://vuldb.com/?ctiid.217563" - }, - { - "url": "https://github.com/intgr/uqm-wasm/commit/1d5cbf3350a02c423ad6bef6dfd5300d38aa828f", - "refsource": "MISC", - "name": "https://github.com/intgr/uqm-wasm/commit/1d5cbf3350a02c423ad6bef6dfd5300d38aa828f" - } - ] - }, - "credits": [ - { - "lang": "en", - "value": "VulDB GitHub Commit Analyzer" - } - ], - "impact": { - "cvss": [ - { - "version": "3.1", - "baseScore": 5.5, - "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", - "baseSeverity": "MEDIUM" - }, - { - "version": "3.0", - "baseScore": 5.5, - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", - "baseSeverity": "MEDIUM" - }, - { - "version": "2.0", - "baseScore": 5.2, - "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", - "baseSeverity": "MEDIUM" + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] } diff --git a/2023/0xxx/CVE-2023-0882.json b/2023/0xxx/CVE-2023-0882.json new file mode 100644 index 00000000000..373a4198586 --- /dev/null +++ b/2023/0xxx/CVE-2023-0882.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-0882", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22329.json b/2023/22xxx/CVE-2023-22329.json new file mode 100644 index 00000000000..96ec9e01e80 --- /dev/null +++ b/2023/22xxx/CVE-2023-22329.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22329", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22330.json b/2023/22xxx/CVE-2023-22330.json new file mode 100644 index 00000000000..38813fb5e47 --- /dev/null +++ b/2023/22xxx/CVE-2023-22330.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22330", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22351.json b/2023/22xxx/CVE-2023-22351.json new file mode 100644 index 00000000000..d0f33820a31 --- /dev/null +++ b/2023/22xxx/CVE-2023-22351.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22351", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22356.json b/2023/22xxx/CVE-2023-22356.json new file mode 100644 index 00000000000..9699c27b86b --- /dev/null +++ b/2023/22xxx/CVE-2023-22356.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22356", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22444.json b/2023/22xxx/CVE-2023-22444.json new file mode 100644 index 00000000000..509eca1e6c4 --- /dev/null +++ b/2023/22xxx/CVE-2023-22444.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22444", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22449.json b/2023/22xxx/CVE-2023-22449.json new file mode 100644 index 00000000000..7f9eebf512f --- /dev/null +++ b/2023/22xxx/CVE-2023-22449.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22449", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22855.json b/2023/22xxx/CVE-2023-22855.json index 95bc4900f6e..9ed419c3dde 100644 --- a/2023/22xxx/CVE-2023-22855.json +++ b/2023/22xxx/CVE-2023-22855.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://github.com/patrickhener/CVE-2023-22855/blob/main/advisory/advisory.md", "url": "https://github.com/patrickhener/CVE-2023-22855/blob/main/advisory/advisory.md" + }, + { + "refsource": "FULLDISC", + "name": "20230216 Remote Code Execution in Kardex MLOG", + "url": "http://seclists.org/fulldisclosure/2023/Feb/10" } ] } diff --git a/2023/23xxx/CVE-2023-23573.json b/2023/23xxx/CVE-2023-23573.json new file mode 100644 index 00000000000..938807e67e9 --- /dev/null +++ b/2023/23xxx/CVE-2023-23573.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23573", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23904.json b/2023/23xxx/CVE-2023-23904.json new file mode 100644 index 00000000000..654d78bc44c --- /dev/null +++ b/2023/23xxx/CVE-2023-23904.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23904", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25546.json b/2023/25xxx/CVE-2023-25546.json new file mode 100644 index 00000000000..8d85828d42f --- /dev/null +++ b/2023/25xxx/CVE-2023-25546.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25546", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25756.json b/2023/25xxx/CVE-2023-25756.json new file mode 100644 index 00000000000..b8336c10566 --- /dev/null +++ b/2023/25xxx/CVE-2023-25756.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25756", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file