From c43e9b63c19df39ffd8fc9a97bc7e08ace7ae8fb Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 28 Jul 2023 14:00:33 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/31xxx/CVE-2023-31932.json | 56 +++++++++++++++++++++++++++---- 2023/31xxx/CVE-2023-31933.json | 56 +++++++++++++++++++++++++++---- 2023/31xxx/CVE-2023-31934.json | 56 +++++++++++++++++++++++++++---- 2023/31xxx/CVE-2023-31935.json | 61 ++++++++++++++++++++++++++++++---- 2023/31xxx/CVE-2023-31936.json | 56 +++++++++++++++++++++++++++---- 2023/31xxx/CVE-2023-31937.json | 56 +++++++++++++++++++++++++++---- 2023/37xxx/CVE-2023-37203.json | 2 +- 2023/39xxx/CVE-2023-39190.json | 8 ++--- 2023/39xxx/CVE-2023-39342.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39343.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39344.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39345.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39346.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39347.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39348.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39349.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39350.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39351.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39352.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39353.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39354.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39355.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39356.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39357.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39358.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39359.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39360.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39361.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39362.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39363.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39364.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39365.json | 18 ++++++++++ 2023/39xxx/CVE-2023-39366.json | 18 ++++++++++ 2023/3xxx/CVE-2023-3417.json | 7 +++- 2023/3xxx/CVE-2023-3995.json | 18 ++++++++++ 35 files changed, 784 insertions(+), 42 deletions(-) create mode 100644 2023/39xxx/CVE-2023-39342.json create mode 100644 2023/39xxx/CVE-2023-39343.json create mode 100644 2023/39xxx/CVE-2023-39344.json create mode 100644 2023/39xxx/CVE-2023-39345.json create mode 100644 2023/39xxx/CVE-2023-39346.json create mode 100644 2023/39xxx/CVE-2023-39347.json create mode 100644 2023/39xxx/CVE-2023-39348.json create mode 100644 2023/39xxx/CVE-2023-39349.json create mode 100644 2023/39xxx/CVE-2023-39350.json create mode 100644 2023/39xxx/CVE-2023-39351.json create mode 100644 2023/39xxx/CVE-2023-39352.json create mode 100644 2023/39xxx/CVE-2023-39353.json create mode 100644 2023/39xxx/CVE-2023-39354.json create mode 100644 2023/39xxx/CVE-2023-39355.json create mode 100644 2023/39xxx/CVE-2023-39356.json create mode 100644 2023/39xxx/CVE-2023-39357.json create mode 100644 2023/39xxx/CVE-2023-39358.json create mode 100644 2023/39xxx/CVE-2023-39359.json create mode 100644 2023/39xxx/CVE-2023-39360.json create mode 100644 2023/39xxx/CVE-2023-39361.json create mode 100644 2023/39xxx/CVE-2023-39362.json create mode 100644 2023/39xxx/CVE-2023-39363.json create mode 100644 2023/39xxx/CVE-2023-39364.json create mode 100644 2023/39xxx/CVE-2023-39365.json create mode 100644 2023/39xxx/CVE-2023-39366.json create mode 100644 2023/3xxx/CVE-2023-3995.json diff --git a/2023/31xxx/CVE-2023-31932.json b/2023/31xxx/CVE-2023-31932.json index 1b5e27cfb24..e1a5b3f424a 100644 --- a/2023/31xxx/CVE-2023-31932.json +++ b/2023/31xxx/CVE-2023-31932.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31932", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31932", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sql injection vulnerability found in Rail Pass Management System v.1.0 allows a remote attacker to execute arbitrary code via the viewid parameter of the view-enquiry.php file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug5-SQL-Injection-viewid.md", + "refsource": "MISC", + "name": "https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug5-SQL-Injection-viewid.md" } ] } diff --git a/2023/31xxx/CVE-2023-31933.json b/2023/31xxx/CVE-2023-31933.json index 38e7a748cfa..3dfbb6a174c 100644 --- a/2023/31xxx/CVE-2023-31933.json +++ b/2023/31xxx/CVE-2023-31933.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31933", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31933", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sql injection vulnerability found in Rail Pass Management System v.1.0 allows a remote attacker to execute arbitrary code via the editid parameter of the edit-pass-detail.php file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug4-SQL-Injection-editid2.md", + "refsource": "MISC", + "name": "https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug4-SQL-Injection-editid2.md" } ] } diff --git a/2023/31xxx/CVE-2023-31934.json b/2023/31xxx/CVE-2023-31934.json index ff026f8feba..f5c1ad0fbe8 100644 --- a/2023/31xxx/CVE-2023-31934.json +++ b/2023/31xxx/CVE-2023-31934.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31934", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31934", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting vulnerability found in Rail Pass Management System v.1.0 allows a remote attacker to obtain sensitive information via the adminname parameter of admin-profile.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug1-XSS-in-Admin-Name.md", + "refsource": "MISC", + "name": "https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug1-XSS-in-Admin-Name.md" } ] } diff --git a/2023/31xxx/CVE-2023-31935.json b/2023/31xxx/CVE-2023-31935.json index 37860f894aa..178fa7d3380 100644 --- a/2023/31xxx/CVE-2023-31935.json +++ b/2023/31xxx/CVE-2023-31935.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31935", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31935", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting vulnerability found in Rail Pass Management System v.1.0 allows a remote attacker to obtain sensitive information via the emial parameter of admin-profile.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug1-XSS-in-Admin-Name.md", + "url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug1-XSS-in-Admin-Name.md" + }, + { + "url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug2-XSS-in-Email-address.md", + "refsource": "MISC", + "name": "https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug2-XSS-in-Email-address.md" } ] } diff --git a/2023/31xxx/CVE-2023-31936.json b/2023/31xxx/CVE-2023-31936.json index c9b09747e9c..3585048dd77 100644 --- a/2023/31xxx/CVE-2023-31936.json +++ b/2023/31xxx/CVE-2023-31936.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31936", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31936", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sql injection vulnerability found in Rail Pass Management System v.1.0 allows a remote attacker to execute arbitrary code via the viewid parameter of the view-pass-detail.php file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug6-SQL-Injection-viewid2.md", + "refsource": "MISC", + "name": "https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug6-SQL-Injection-viewid2.md" } ] } diff --git a/2023/31xxx/CVE-2023-31937.json b/2023/31xxx/CVE-2023-31937.json index ab6ff2bb891..8f8ffe31b56 100644 --- a/2023/31xxx/CVE-2023-31937.json +++ b/2023/31xxx/CVE-2023-31937.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31937", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31937", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sql injection vulnerability found in Rail Pass Management System v.1.0 allows a remote attacker to execute arbitrary code via the editid parameter of the edit-cateogry-detail.php file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug3-SQL-Injection-editid.md", + "refsource": "MISC", + "name": "https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug3-SQL-Injection-editid.md" } ] } diff --git a/2023/37xxx/CVE-2023-37203.json b/2023/37xxx/CVE-2023-37203.json index 87c9b3d03b5..0dd01e1512e 100644 --- a/2023/37xxx/CVE-2023-37203.json +++ b/2023/37xxx/CVE-2023-37203.json @@ -69,7 +69,7 @@ "credits": [ { "lang": "en", - "value": "Paul Nickerson" + "value": "Paul Nickerson and Ameen Basha M K" } ] } \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39190.json b/2023/39xxx/CVE-2023-39190.json index b02f3246c6b..f74ebd5ac12 100644 --- a/2023/39xxx/CVE-2023-39190.json +++ b/2023/39xxx/CVE-2023-39190.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-39190", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** CVE-2023-39190 was found to be a duplicate of CVE-2023-31436. Please see https://access.redhat.com/security/cve/CVE-2023-31436 for information about affected products and security errata." } ] } diff --git a/2023/39xxx/CVE-2023-39342.json b/2023/39xxx/CVE-2023-39342.json new file mode 100644 index 00000000000..d0007a67a26 --- /dev/null +++ b/2023/39xxx/CVE-2023-39342.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39342", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39343.json b/2023/39xxx/CVE-2023-39343.json new file mode 100644 index 00000000000..090ae027af6 --- /dev/null +++ b/2023/39xxx/CVE-2023-39343.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39343", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39344.json b/2023/39xxx/CVE-2023-39344.json new file mode 100644 index 00000000000..8037712a9d8 --- /dev/null +++ b/2023/39xxx/CVE-2023-39344.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39344", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39345.json b/2023/39xxx/CVE-2023-39345.json new file mode 100644 index 00000000000..cb4d0489fbc --- /dev/null +++ b/2023/39xxx/CVE-2023-39345.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39345", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39346.json b/2023/39xxx/CVE-2023-39346.json new file mode 100644 index 00000000000..cd3d28a3951 --- /dev/null +++ b/2023/39xxx/CVE-2023-39346.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39346", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39347.json b/2023/39xxx/CVE-2023-39347.json new file mode 100644 index 00000000000..e905f1ac77a --- /dev/null +++ b/2023/39xxx/CVE-2023-39347.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39347", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39348.json b/2023/39xxx/CVE-2023-39348.json new file mode 100644 index 00000000000..a5e85956cf9 --- /dev/null +++ b/2023/39xxx/CVE-2023-39348.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39348", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39349.json b/2023/39xxx/CVE-2023-39349.json new file mode 100644 index 00000000000..758fed7984f --- /dev/null +++ b/2023/39xxx/CVE-2023-39349.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39349", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39350.json b/2023/39xxx/CVE-2023-39350.json new file mode 100644 index 00000000000..5d3af50c0c2 --- /dev/null +++ b/2023/39xxx/CVE-2023-39350.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39350", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39351.json b/2023/39xxx/CVE-2023-39351.json new file mode 100644 index 00000000000..e2a507bfec2 --- /dev/null +++ b/2023/39xxx/CVE-2023-39351.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39351", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39352.json b/2023/39xxx/CVE-2023-39352.json new file mode 100644 index 00000000000..e399bdb6d4d --- /dev/null +++ b/2023/39xxx/CVE-2023-39352.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39352", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39353.json b/2023/39xxx/CVE-2023-39353.json new file mode 100644 index 00000000000..5b7a0201013 --- /dev/null +++ b/2023/39xxx/CVE-2023-39353.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39353", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39354.json b/2023/39xxx/CVE-2023-39354.json new file mode 100644 index 00000000000..f002301fe08 --- /dev/null +++ b/2023/39xxx/CVE-2023-39354.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39354", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39355.json b/2023/39xxx/CVE-2023-39355.json new file mode 100644 index 00000000000..a3578b8429e --- /dev/null +++ b/2023/39xxx/CVE-2023-39355.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39355", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39356.json b/2023/39xxx/CVE-2023-39356.json new file mode 100644 index 00000000000..87e91c54871 --- /dev/null +++ b/2023/39xxx/CVE-2023-39356.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39356", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39357.json b/2023/39xxx/CVE-2023-39357.json new file mode 100644 index 00000000000..fc62c1f9c9b --- /dev/null +++ b/2023/39xxx/CVE-2023-39357.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39357", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39358.json b/2023/39xxx/CVE-2023-39358.json new file mode 100644 index 00000000000..c162a4b9ec5 --- /dev/null +++ b/2023/39xxx/CVE-2023-39358.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39358", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39359.json b/2023/39xxx/CVE-2023-39359.json new file mode 100644 index 00000000000..2edee03e021 --- /dev/null +++ b/2023/39xxx/CVE-2023-39359.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39359", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39360.json b/2023/39xxx/CVE-2023-39360.json new file mode 100644 index 00000000000..2fc481303f1 --- /dev/null +++ b/2023/39xxx/CVE-2023-39360.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39360", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39361.json b/2023/39xxx/CVE-2023-39361.json new file mode 100644 index 00000000000..92f38a1e59d --- /dev/null +++ b/2023/39xxx/CVE-2023-39361.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39361", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39362.json b/2023/39xxx/CVE-2023-39362.json new file mode 100644 index 00000000000..ad497c89a76 --- /dev/null +++ b/2023/39xxx/CVE-2023-39362.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39362", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39363.json b/2023/39xxx/CVE-2023-39363.json new file mode 100644 index 00000000000..fcbfa396f5c --- /dev/null +++ b/2023/39xxx/CVE-2023-39363.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39363", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39364.json b/2023/39xxx/CVE-2023-39364.json new file mode 100644 index 00000000000..b8737034162 --- /dev/null +++ b/2023/39xxx/CVE-2023-39364.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39364", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39365.json b/2023/39xxx/CVE-2023-39365.json new file mode 100644 index 00000000000..fa8a4d12c69 --- /dev/null +++ b/2023/39xxx/CVE-2023-39365.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39365", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39366.json b/2023/39xxx/CVE-2023-39366.json new file mode 100644 index 00000000000..3fa9952f365 --- /dev/null +++ b/2023/39xxx/CVE-2023-39366.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39366", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/3xxx/CVE-2023-3417.json b/2023/3xxx/CVE-2023-3417.json index 95fdd3c554f..ff16c411a35 100644 --- a/2023/3xxx/CVE-2023-3417.json +++ b/2023/3xxx/CVE-2023-3417.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Thunderbird allowed the Text Direction Override Unicode Character in filenames. An email attachment could be incorrectly shown as being a document file, while in fact it was an executable file. Newer versions of Thunderbird will strip the character and show the correct file extension. This vulnerability affects Thunderbird < 115.0.1." + "value": "Thunderbird allowed the Text Direction Override Unicode Character in filenames. An email attachment could be incorrectly shown as being a document file, while in fact it was an executable file. Newer versions of Thunderbird will strip the character and show the correct file extension. This vulnerability affects Thunderbird < 115.0.1 and Thunderbird < 102.13.1." } ] }, @@ -63,6 +63,11 @@ "url": "https://www.mozilla.org/security/advisories/mfsa2023-27/", "refsource": "MISC", "name": "https://www.mozilla.org/security/advisories/mfsa2023-27/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-28/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2023-28/" } ] }, diff --git a/2023/3xxx/CVE-2023-3995.json b/2023/3xxx/CVE-2023-3995.json new file mode 100644 index 00000000000..661d4f94344 --- /dev/null +++ b/2023/3xxx/CVE-2023-3995.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-3995", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file