From c48b3ab2bf4337a51f2cc338ab145a0b167b411a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 23 May 2023 01:00:40 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/20xxx/CVE-2020-20012.json | 61 ++++++++++++++++++++++++++--- 2023/25xxx/CVE-2023-25440.json | 61 ++++++++++++++++++++++++++--- 2023/27xxx/CVE-2023-27068.json | 66 ++++++++++++++++++++++++++++--- 2023/29xxx/CVE-2023-29919.json | 61 ++++++++++++++++++++++++++--- 2023/31xxx/CVE-2023-31664.json | 66 ++++++++++++++++++++++++++++--- 2023/31xxx/CVE-2023-31670.json | 56 ++++++++++++++++++++++++--- 2023/31xxx/CVE-2023-31708.json | 56 ++++++++++++++++++++++++--- 2023/31xxx/CVE-2023-31740.json | 61 ++++++++++++++++++++++++++--- 2023/31xxx/CVE-2023-31741.json | 61 ++++++++++++++++++++++++++--- 2023/31xxx/CVE-2023-31814.json | 61 ++++++++++++++++++++++++++--- 2023/31xxx/CVE-2023-31826.json | 71 +++++++++++++++++++++++++++++++--- 2023/31xxx/CVE-2023-31994.json | 56 ++++++++++++++++++++++++--- 2023/31xxx/CVE-2023-31995.json | 56 ++++++++++++++++++++++++--- 2023/31xxx/CVE-2023-31996.json | 56 ++++++++++++++++++++++++--- 2023/33xxx/CVE-2023-33832.json | 18 +++++++++ 2023/33xxx/CVE-2023-33833.json | 18 +++++++++ 2023/33xxx/CVE-2023-33834.json | 18 +++++++++ 2023/33xxx/CVE-2023-33835.json | 18 +++++++++ 2023/33xxx/CVE-2023-33836.json | 18 +++++++++ 2023/33xxx/CVE-2023-33837.json | 18 +++++++++ 2023/33xxx/CVE-2023-33838.json | 18 +++++++++ 2023/33xxx/CVE-2023-33839.json | 18 +++++++++ 2023/33xxx/CVE-2023-33840.json | 18 +++++++++ 2023/33xxx/CVE-2023-33841.json | 18 +++++++++ 2023/33xxx/CVE-2023-33842.json | 18 +++++++++ 2023/33xxx/CVE-2023-33843.json | 18 +++++++++ 2023/33xxx/CVE-2023-33844.json | 18 +++++++++ 2023/33xxx/CVE-2023-33845.json | 18 +++++++++ 2023/33xxx/CVE-2023-33846.json | 18 +++++++++ 2023/33xxx/CVE-2023-33847.json | 18 +++++++++ 2023/33xxx/CVE-2023-33848.json | 18 +++++++++ 2023/33xxx/CVE-2023-33849.json | 18 +++++++++ 2023/33xxx/CVE-2023-33850.json | 18 +++++++++ 2023/33xxx/CVE-2023-33851.json | 18 +++++++++ 2023/33xxx/CVE-2023-33852.json | 18 +++++++++ 2023/33xxx/CVE-2023-33853.json | 18 +++++++++ 2023/33xxx/CVE-2023-33854.json | 18 +++++++++ 2023/33xxx/CVE-2023-33855.json | 18 +++++++++ 2023/33xxx/CVE-2023-33856.json | 18 +++++++++ 2023/33xxx/CVE-2023-33857.json | 18 +++++++++ 2023/33xxx/CVE-2023-33858.json | 18 +++++++++ 2023/33xxx/CVE-2023-33859.json | 18 +++++++++ 2023/33xxx/CVE-2023-33860.json | 18 +++++++++ 2023/33xxx/CVE-2023-33861.json | 18 +++++++++ 44 files changed, 1305 insertions(+), 84 deletions(-) create mode 100644 2023/33xxx/CVE-2023-33832.json create mode 100644 2023/33xxx/CVE-2023-33833.json create mode 100644 2023/33xxx/CVE-2023-33834.json create mode 100644 2023/33xxx/CVE-2023-33835.json create mode 100644 2023/33xxx/CVE-2023-33836.json create mode 100644 2023/33xxx/CVE-2023-33837.json create mode 100644 2023/33xxx/CVE-2023-33838.json create mode 100644 2023/33xxx/CVE-2023-33839.json create mode 100644 2023/33xxx/CVE-2023-33840.json create mode 100644 2023/33xxx/CVE-2023-33841.json create mode 100644 2023/33xxx/CVE-2023-33842.json create mode 100644 2023/33xxx/CVE-2023-33843.json create mode 100644 2023/33xxx/CVE-2023-33844.json create mode 100644 2023/33xxx/CVE-2023-33845.json create mode 100644 2023/33xxx/CVE-2023-33846.json create mode 100644 2023/33xxx/CVE-2023-33847.json create mode 100644 2023/33xxx/CVE-2023-33848.json create mode 100644 2023/33xxx/CVE-2023-33849.json create mode 100644 2023/33xxx/CVE-2023-33850.json create mode 100644 2023/33xxx/CVE-2023-33851.json create mode 100644 2023/33xxx/CVE-2023-33852.json create mode 100644 2023/33xxx/CVE-2023-33853.json create mode 100644 2023/33xxx/CVE-2023-33854.json create mode 100644 2023/33xxx/CVE-2023-33855.json create mode 100644 2023/33xxx/CVE-2023-33856.json create mode 100644 2023/33xxx/CVE-2023-33857.json create mode 100644 2023/33xxx/CVE-2023-33858.json create mode 100644 2023/33xxx/CVE-2023-33859.json create mode 100644 2023/33xxx/CVE-2023-33860.json create mode 100644 2023/33xxx/CVE-2023-33861.json diff --git a/2020/20xxx/CVE-2020-20012.json b/2020/20xxx/CVE-2020-20012.json index 4d0384719a4..4f9557a9a86 100644 --- a/2020/20xxx/CVE-2020-20012.json +++ b/2020/20xxx/CVE-2020-20012.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20012", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20012", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WebPlus Pro v1.4.7.8.4-01 is vulnerable to Incorrect Access Control." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://wzqpt.hfut.edu.cn/login.jsp?_p=YXM9MSZwPTEmbT1OJg__", + "refsource": "MISC", + "name": "http://wzqpt.hfut.edu.cn/login.jsp?_p=YXM9MSZwPTEmbT1OJg__" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/1915504804/9503198d3cbd5bc7db47625ac0caaade", + "url": "https://gist.github.com/1915504804/9503198d3cbd5bc7db47625ac0caaade" } ] } diff --git a/2023/25xxx/CVE-2023-25440.json b/2023/25xxx/CVE-2023-25440.json index cefea9e1646..d07946de5e9 100644 --- a/2023/25xxx/CVE-2023-25440.json +++ b/2023/25xxx/CVE-2023-25440.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-25440", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-25440", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stored Cross Site Scripting (XSS) vulnerability in the add contact function CiviCRM 5.59.alpha1, allows attackers to execute arbitrary code in first/second name field." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://civicrm.org/", + "refsource": "MISC", + "name": "https://civicrm.org/" + }, + { + "refsource": "MISC", + "name": "https://packetstormsecurity.com/files/172470/CiviCRM-5.59.alpha1-Cross-Site-Scripting.html", + "url": "https://packetstormsecurity.com/files/172470/CiviCRM-5.59.alpha1-Cross-Site-Scripting.html" } ] } diff --git a/2023/27xxx/CVE-2023-27068.json b/2023/27xxx/CVE-2023-27068.json index 1a627547bd0..f1ded08a807 100644 --- a/2023/27xxx/CVE-2023-27068.json +++ b/2023/27xxx/CVE-2023-27068.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-27068", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-27068", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Deserialization of Untrusted Data in Sitecore Experience Platform through 10.2 allows remote attackers to run arbitrary code via ValidationResult.aspx." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/103/Sitecore%20Experience%20Platform%20103/Release%20Notes", + "refsource": "MISC", + "name": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/103/Sitecore%20Experience%20Platform%20103/Release%20Notes" + }, + { + "refsource": "MISC", + "name": "https://www.sitecore.com/products/sitecore-experience-platform", + "url": "https://www.sitecore.com/products/sitecore-experience-platform" + }, + { + "refsource": "MISC", + "name": "https://blogs.night-wolf.io/0-day-vulnerabilities-at-sitecore-pagedesigner", + "url": "https://blogs.night-wolf.io/0-day-vulnerabilities-at-sitecore-pagedesigner" } ] } diff --git a/2023/29xxx/CVE-2023-29919.json b/2023/29xxx/CVE-2023-29919.json index eb0dc75d47e..ee4eb94d0e2 100644 --- a/2023/29xxx/CVE-2023-29919.json +++ b/2023/29xxx/CVE-2023-29919.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-29919", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-29919", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SolarView Compact <= 6.0 is vulnerable to Insecure Permissions. Any file on the server can be read or modified because texteditor.php is not restricted." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.solarview.io/", + "url": "https://www.solarview.io/" + }, + { + "refsource": "MISC", + "name": "https://github.com/xiaosed/CVE-2023-29919/", + "url": "https://github.com/xiaosed/CVE-2023-29919/" } ] } diff --git a/2023/31xxx/CVE-2023-31664.json b/2023/31xxx/CVE-2023-31664.json index 9561f4b70c8..2b23e9c76f6 100644 --- a/2023/31xxx/CVE-2023-31664.json +++ b/2023/31xxx/CVE-2023-31664.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31664", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31664", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A reflected cross-site scripting (XSS) vulnerability in /authenticationendpoint/login.do of WSO2 API Manager before 4.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the tenantDomain parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://github.com/wso2/product-apim/releases/tag/v4.2.0", + "url": "https://github.com/wso2/product-apim/releases/tag/v4.2.0" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/wso2/api-manager/issues?q=is%3Aissue+is%3Aclosed+label%3AComponent%2FAPIM+closed%3A2022-04-05..2023-03-11", + "url": "https://github.com/wso2/api-manager/issues?q=is%3Aissue+is%3Aclosed+label%3AComponent%2FAPIM+closed%3A2022-04-05..2023-03-11" + }, + { + "refsource": "MISC", + "name": "https://github.com/adilkhan7/CVE-2023-31664", + "url": "https://github.com/adilkhan7/CVE-2023-31664" } ] } diff --git a/2023/31xxx/CVE-2023-31670.json b/2023/31xxx/CVE-2023-31670.json index cd97ef67d4b..ba46c1251e5 100644 --- a/2023/31xxx/CVE-2023-31670.json +++ b/2023/31xxx/CVE-2023-31670.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31670", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31670", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in wasm2c 1.0.32, wasm2wat 1.0.32, wasm-decompile 1.0.32, and wasm-validate 1.0.32 allows attackers to cause a Denial of Service (DoS) via running a crafted binary." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/WebAssembly/wabt/issues/2199", + "refsource": "MISC", + "name": "https://github.com/WebAssembly/wabt/issues/2199" } ] } diff --git a/2023/31xxx/CVE-2023-31708.json b/2023/31xxx/CVE-2023-31708.json index 8b78dc94450..a001fec95b6 100644 --- a/2023/31xxx/CVE-2023-31708.json +++ b/2023/31xxx/CVE-2023-31708.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31708", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31708", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Cross-Site Request Forgery (CSRF) in EyouCMS v1.6.2 allows attackers to execute arbitrary commands via a supplying a crafted HTML file to the Upload software format function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/weng-xianhu/eyoucms/issues/41", + "refsource": "MISC", + "name": "https://github.com/weng-xianhu/eyoucms/issues/41" } ] } diff --git a/2023/31xxx/CVE-2023-31740.json b/2023/31xxx/CVE-2023-31740.json index 9bca5a5e7cc..8bb7d2583e3 100644 --- a/2023/31xxx/CVE-2023-31740.json +++ b/2023/31xxx/CVE-2023-31740.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31740", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31740", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is a command injection vulnerability in the Linksys E2000 router with firmware version 1.0.06. If an attacker gains web management privileges, they can inject commands into the post request parameters WL_atten_bb, WL_atten_radio, and WL_atten_ctl in the apply.cgi interface, thereby gaining shell privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://linksys.com", + "refsource": "MISC", + "name": "http://linksys.com" + }, + { + "refsource": "MISC", + "name": "https://github.com/D2y6p/CVE/blob/main/Linksys/CVE-2023-31740/Linksys_E2000_RCE.pdf", + "url": "https://github.com/D2y6p/CVE/blob/main/Linksys/CVE-2023-31740/Linksys_E2000_RCE.pdf" } ] } diff --git a/2023/31xxx/CVE-2023-31741.json b/2023/31xxx/CVE-2023-31741.json index 4f88850556b..af4c690d1ca 100644 --- a/2023/31xxx/CVE-2023-31741.json +++ b/2023/31xxx/CVE-2023-31741.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31741", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31741", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is a command injection vulnerability in the Linksys E2000 router with firmware version 1.0.06. If an attacker gains web management privileges, they can inject commands into the post request parameters wl_ssid, wl_ant, wl_rate, WL_atten_ctl, ttcp_num, ttcp_size in the httpd s Start_EPI() function, thereby gaining shell privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://linksys.com", + "refsource": "MISC", + "name": "http://linksys.com" + }, + { + "refsource": "MISC", + "name": "https://github.com/D2y6p/CVE/blob/main/Linksys/CVE-2023-31741/Linksys_E2000_RCE_2.pdf", + "url": "https://github.com/D2y6p/CVE/blob/main/Linksys/CVE-2023-31741/Linksys_E2000_RCE_2.pdf" } ] } diff --git a/2023/31xxx/CVE-2023-31814.json b/2023/31xxx/CVE-2023-31814.json index e3c75f9e050..a0aebb56b52 100644 --- a/2023/31xxx/CVE-2023-31814.json +++ b/2023/31xxx/CVE-2023-31814.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31814", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31814", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "D-Link DIR-300 firmware <=REVA1.06 and <=REVB2.06 is vulnerable to File inclusion via /model/__lang_msg.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.dlink.com/en/security-bulletin/", + "refsource": "MISC", + "name": "https://www.dlink.com/en/security-bulletin/" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/1915504804/9503198d3cbd5bc7db47625ac0caaade", + "url": "https://gist.github.com/1915504804/9503198d3cbd5bc7db47625ac0caaade" } ] } diff --git a/2023/31xxx/CVE-2023-31826.json b/2023/31xxx/CVE-2023-31826.json index f40c17592d5..137c5b3839f 100644 --- a/2023/31xxx/CVE-2023-31826.json +++ b/2023/31xxx/CVE-2023-31826.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31826", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31826", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Skyscreamer Open Source Nevado JMS v1.3.2 does not perform security checks when receiving messages. This allows attackers to execute arbitrary commands via supplying crafted data." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://nevado.skyscreamer.org/", + "refsource": "MISC", + "name": "http://nevado.skyscreamer.org/" + }, + { + "url": "https://github.com/skyscreamer/nevado/releases", + "refsource": "MISC", + "name": "https://github.com/skyscreamer/nevado/releases" + }, + { + "url": "https://novysodope.github.io/2023/04/01/95/", + "refsource": "MISC", + "name": "https://novysodope.github.io/2023/04/01/95/" + }, + { + "url": "https://github.com/skyscreamer/nevado/issues/121", + "refsource": "MISC", + "name": "https://github.com/skyscreamer/nevado/issues/121" } ] } diff --git a/2023/31xxx/CVE-2023-31994.json b/2023/31xxx/CVE-2023-31994.json index e769aac4527..e2513135ce1 100644 --- a/2023/31xxx/CVE-2023-31994.json +++ b/2023/31xxx/CVE-2023-31994.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31994", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31994", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Certain Hanwha products are vulnerable to Denial of Service (DoS). ck vector is: When an empty UDP packet is sent to the listening service, the service thread results in a non-functional service (DoS) via WS Discovery and Hanwha proprietary discovery services. This affects IP Camera ANE-L7012R 1.41.01 and IP Camera XNV-9082R 2.10.02." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.hanwhavision.com/wp-content/uploads/2023/04/Camera-Vulnerability-Report.pdf", + "refsource": "MISC", + "name": "https://www.hanwhavision.com/wp-content/uploads/2023/04/Camera-Vulnerability-Report.pdf" } ] } diff --git a/2023/31xxx/CVE-2023-31995.json b/2023/31xxx/CVE-2023-31995.json index 5cd182ae6fb..292fedac972 100644 --- a/2023/31xxx/CVE-2023-31995.json +++ b/2023/31xxx/CVE-2023-31995.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31995", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31995", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Hanwha IP Camera ANE-L7012R 1.41.01 is vulnerable to Cross Site Scripting (XSS)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.hanwhavision.com/wp-content/uploads/2023/04/Camera-Vulnerability-Report.pdf", + "refsource": "MISC", + "name": "https://www.hanwhavision.com/wp-content/uploads/2023/04/Camera-Vulnerability-Report.pdf" } ] } diff --git a/2023/31xxx/CVE-2023-31996.json b/2023/31xxx/CVE-2023-31996.json index 4b1db5b4256..0383985dd61 100644 --- a/2023/31xxx/CVE-2023-31996.json +++ b/2023/31xxx/CVE-2023-31996.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31996", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31996", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Hanwha IP Camera ANE-L7012R 1.41.01 is vulnerable to Command Injection due to improper sanitization of special characters for the NAS storage test function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.hanwhavision.com/wp-content/uploads/2023/04/Camera-Vulnerability-Report.pdf", + "refsource": "MISC", + "name": "https://www.hanwhavision.com/wp-content/uploads/2023/04/Camera-Vulnerability-Report.pdf" } ] } diff --git a/2023/33xxx/CVE-2023-33832.json b/2023/33xxx/CVE-2023-33832.json new file mode 100644 index 00000000000..abf8f871f6a --- /dev/null +++ b/2023/33xxx/CVE-2023-33832.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33832", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33833.json b/2023/33xxx/CVE-2023-33833.json new file mode 100644 index 00000000000..e55f5692c4f --- /dev/null +++ b/2023/33xxx/CVE-2023-33833.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33833", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33834.json b/2023/33xxx/CVE-2023-33834.json new file mode 100644 index 00000000000..bcdb822b314 --- /dev/null +++ b/2023/33xxx/CVE-2023-33834.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33834", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33835.json b/2023/33xxx/CVE-2023-33835.json new file mode 100644 index 00000000000..1bb35b58c42 --- /dev/null +++ b/2023/33xxx/CVE-2023-33835.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33835", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33836.json b/2023/33xxx/CVE-2023-33836.json new file mode 100644 index 00000000000..0633cd255d7 --- /dev/null +++ b/2023/33xxx/CVE-2023-33836.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33836", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33837.json b/2023/33xxx/CVE-2023-33837.json new file mode 100644 index 00000000000..c1a35efc8d5 --- /dev/null +++ b/2023/33xxx/CVE-2023-33837.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33837", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33838.json b/2023/33xxx/CVE-2023-33838.json new file mode 100644 index 00000000000..92b6a02e667 --- /dev/null +++ b/2023/33xxx/CVE-2023-33838.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33838", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33839.json b/2023/33xxx/CVE-2023-33839.json new file mode 100644 index 00000000000..d9de955dc47 --- /dev/null +++ b/2023/33xxx/CVE-2023-33839.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33839", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33840.json b/2023/33xxx/CVE-2023-33840.json new file mode 100644 index 00000000000..7f5a92146c0 --- /dev/null +++ b/2023/33xxx/CVE-2023-33840.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33840", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33841.json b/2023/33xxx/CVE-2023-33841.json new file mode 100644 index 00000000000..b39b3fb0399 --- /dev/null +++ b/2023/33xxx/CVE-2023-33841.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33841", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33842.json b/2023/33xxx/CVE-2023-33842.json new file mode 100644 index 00000000000..459c2624497 --- /dev/null +++ b/2023/33xxx/CVE-2023-33842.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33842", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33843.json b/2023/33xxx/CVE-2023-33843.json new file mode 100644 index 00000000000..91eef417169 --- /dev/null +++ b/2023/33xxx/CVE-2023-33843.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33843", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33844.json b/2023/33xxx/CVE-2023-33844.json new file mode 100644 index 00000000000..b7b1c514072 --- /dev/null +++ b/2023/33xxx/CVE-2023-33844.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33844", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33845.json b/2023/33xxx/CVE-2023-33845.json new file mode 100644 index 00000000000..135d321cc81 --- /dev/null +++ b/2023/33xxx/CVE-2023-33845.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33845", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33846.json b/2023/33xxx/CVE-2023-33846.json new file mode 100644 index 00000000000..0295366d40f --- /dev/null +++ b/2023/33xxx/CVE-2023-33846.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33846", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33847.json b/2023/33xxx/CVE-2023-33847.json new file mode 100644 index 00000000000..9867913ffaa --- /dev/null +++ b/2023/33xxx/CVE-2023-33847.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33847", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33848.json b/2023/33xxx/CVE-2023-33848.json new file mode 100644 index 00000000000..454529e1283 --- /dev/null +++ b/2023/33xxx/CVE-2023-33848.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33848", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33849.json b/2023/33xxx/CVE-2023-33849.json new file mode 100644 index 00000000000..9ef5738b52b --- /dev/null +++ b/2023/33xxx/CVE-2023-33849.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33849", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33850.json b/2023/33xxx/CVE-2023-33850.json new file mode 100644 index 00000000000..0ff40030d51 --- /dev/null +++ b/2023/33xxx/CVE-2023-33850.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33850", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33851.json b/2023/33xxx/CVE-2023-33851.json new file mode 100644 index 00000000000..8bea17fb568 --- /dev/null +++ b/2023/33xxx/CVE-2023-33851.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33851", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33852.json b/2023/33xxx/CVE-2023-33852.json new file mode 100644 index 00000000000..0f6b20ca378 --- /dev/null +++ b/2023/33xxx/CVE-2023-33852.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33852", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33853.json b/2023/33xxx/CVE-2023-33853.json new file mode 100644 index 00000000000..a9fb22c9ad0 --- /dev/null +++ b/2023/33xxx/CVE-2023-33853.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33853", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33854.json b/2023/33xxx/CVE-2023-33854.json new file mode 100644 index 00000000000..8339e46f008 --- /dev/null +++ b/2023/33xxx/CVE-2023-33854.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33854", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33855.json b/2023/33xxx/CVE-2023-33855.json new file mode 100644 index 00000000000..5c2e8524fa5 --- /dev/null +++ b/2023/33xxx/CVE-2023-33855.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33855", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33856.json b/2023/33xxx/CVE-2023-33856.json new file mode 100644 index 00000000000..b76de53cf47 --- /dev/null +++ b/2023/33xxx/CVE-2023-33856.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33856", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33857.json b/2023/33xxx/CVE-2023-33857.json new file mode 100644 index 00000000000..4f67773c217 --- /dev/null +++ b/2023/33xxx/CVE-2023-33857.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33857", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33858.json b/2023/33xxx/CVE-2023-33858.json new file mode 100644 index 00000000000..37eb219c2ff --- /dev/null +++ b/2023/33xxx/CVE-2023-33858.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33858", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33859.json b/2023/33xxx/CVE-2023-33859.json new file mode 100644 index 00000000000..97703589d98 --- /dev/null +++ b/2023/33xxx/CVE-2023-33859.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33859", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33860.json b/2023/33xxx/CVE-2023-33860.json new file mode 100644 index 00000000000..0ebf9049552 --- /dev/null +++ b/2023/33xxx/CVE-2023-33860.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33860", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33861.json b/2023/33xxx/CVE-2023-33861.json new file mode 100644 index 00000000000..8758c28d09d --- /dev/null +++ b/2023/33xxx/CVE-2023-33861.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33861", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file