diff --git a/2015/20xxx/CVE-2015-20107.json b/2015/20xxx/CVE-2015-20107.json index 87b6a428646..6fed7d04dc2 100644 --- a/2015/20xxx/CVE-2015-20107.json +++ b/2015/20xxx/CVE-2015-20107.json @@ -186,6 +186,11 @@ "refsource": "GENTOO", "name": "GLSA-202305-02", "url": "https://security.gentoo.org/glsa/202305-02" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230524 [SECURITY] [DLA 3432-1] python2.7 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html" } ] } diff --git a/2019/20xxx/CVE-2019-20907.json b/2019/20xxx/CVE-2019-20907.json index 9ff2fe9ee23..7e8058a4695 100644 --- a/2019/20xxx/CVE-2019-20907.json +++ b/2019/20xxx/CVE-2019-20907.json @@ -181,6 +181,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200731-0002/", "url": "https://security.netapp.com/advisory/ntap-20200731-0002/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230524 [SECURITY] [DLA 3432-1] python2.7 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html" } ] } diff --git a/2020/26xxx/CVE-2020-26116.json b/2020/26xxx/CVE-2020-26116.json index 48b6e978eff..3e6f39a0b4d 100644 --- a/2020/26xxx/CVE-2020-26116.json +++ b/2020/26xxx/CVE-2020-26116.json @@ -116,6 +116,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20201023-0001/", "url": "https://security.netapp.com/advisory/ntap-20201023-0001/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230524 [SECURITY] [DLA 3432-1] python2.7 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html" } ] } diff --git a/2020/8xxx/CVE-2020-8492.json b/2020/8xxx/CVE-2020-8492.json index ada449b853a..fd4620d45c3 100644 --- a/2020/8xxx/CVE-2020-8492.json +++ b/2020/8xxx/CVE-2020-8492.json @@ -126,6 +126,11 @@ "refsource": "MLIST", "name": "[cassandra-commits] 20210816 [jira] [Updated] (CASSANDRA-16857) Security vulnerability CVE-2020-8492", "url": "https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230524 [SECURITY] [DLA 3432-1] python2.7 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html" } ] } diff --git a/2021/3xxx/CVE-2021-3177.json b/2021/3xxx/CVE-2021-3177.json index 54a14a7b34c..bd8b295f0f1 100644 --- a/2021/3xxx/CVE-2021-3177.json +++ b/2021/3xxx/CVE-2021-3177.json @@ -186,6 +186,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230524 [SECURITY] [DLA 3432-1] python2.7 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html" } ] } diff --git a/2021/3xxx/CVE-2021-3733.json b/2021/3xxx/CVE-2021-3733.json index 4bb2f175b75..e550cdf04ef 100644 --- a/2021/3xxx/CVE-2021-3733.json +++ b/2021/3xxx/CVE-2021-3733.json @@ -73,6 +73,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220407-0001/", "url": "https://security.netapp.com/advisory/ntap-20220407-0001/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230524 [SECURITY] [DLA 3432-1] python2.7 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3737.json b/2021/3xxx/CVE-2021-3737.json index cfc3ae42446..6e1098712ce 100644 --- a/2021/3xxx/CVE-2021-3737.json +++ b/2021/3xxx/CVE-2021-3737.json @@ -83,6 +83,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220407-0009/", "url": "https://security.netapp.com/advisory/ntap-20220407-0009/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230524 [SECURITY] [DLA 3432-1] python2.7 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html" } ] }, diff --git a/2021/4xxx/CVE-2021-4189.json b/2021/4xxx/CVE-2021-4189.json index bc9728aacc5..291c632a3aa 100644 --- a/2021/4xxx/CVE-2021-4189.json +++ b/2021/4xxx/CVE-2021-4189.json @@ -78,6 +78,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20221104-0004/", "url": "https://security.netapp.com/advisory/ntap-20221104-0004/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230524 [SECURITY] [DLA 3432-1] python2.7 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html" } ] }, diff --git a/2022/30xxx/CVE-2022-30025.json b/2022/30xxx/CVE-2022-30025.json index e195c1f7fea..708fbce5226 100644 --- a/2022/30xxx/CVE-2022-30025.json +++ b/2022/30xxx/CVE-2022-30025.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-30025", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-30025", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL injection in \"/Framewrk/Home.jsp\" file (POST method) in tCredence Analytics iDEAL Wealth and Funds - 1.0 iallows authenticated remote attackers to inject payload via \"v\" parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gist.github.com/fir3storm/c8a013d1231c22e22835566609620afd", + "url": "https://gist.github.com/fir3storm/c8a013d1231c22e22835566609620afd" } ] } diff --git a/2022/31xxx/CVE-2022-31001.json b/2022/31xxx/CVE-2022-31001.json index 38e11714019..13ba4f11825 100644 --- a/2022/31xxx/CVE-2022-31001.json +++ b/2022/31xxx/CVE-2022-31001.json @@ -88,6 +88,11 @@ "refsource": "GENTOO", "name": "GLSA-202210-18", "url": "https://security.gentoo.org/glsa/202210-18" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5410", + "url": "https://www.debian.org/security/2023/dsa-5410" } ] }, diff --git a/2022/31xxx/CVE-2022-31002.json b/2022/31xxx/CVE-2022-31002.json index e55f985b604..802334bedbe 100644 --- a/2022/31xxx/CVE-2022-31002.json +++ b/2022/31xxx/CVE-2022-31002.json @@ -88,6 +88,11 @@ "refsource": "GENTOO", "name": "GLSA-202210-18", "url": "https://security.gentoo.org/glsa/202210-18" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5410", + "url": "https://www.debian.org/security/2023/dsa-5410" } ] }, diff --git a/2022/31xxx/CVE-2022-31003.json b/2022/31xxx/CVE-2022-31003.json index fc809d9bff7..45afb10bc3a 100644 --- a/2022/31xxx/CVE-2022-31003.json +++ b/2022/31xxx/CVE-2022-31003.json @@ -96,6 +96,11 @@ "refsource": "GENTOO", "name": "GLSA-202210-18", "url": "https://security.gentoo.org/glsa/202210-18" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5410", + "url": "https://www.debian.org/security/2023/dsa-5410" } ] }, diff --git a/2022/41xxx/CVE-2022-41221.json b/2022/41xxx/CVE-2022-41221.json index 7ed8e9acab9..8ed915600d7 100644 --- a/2022/41xxx/CVE-2022-41221.json +++ b/2022/41xxx/CVE-2022-41221.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-41221", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-41221", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The client in OpenText Archive Center Administration through 21.2 allows XXE attacks. Authenticated users of the OpenText Archive Center Administration client (Versions 16.2.3, 21.2, and older versions) could upload XML files to the application that it did not sufficiently validate. As a result, attackers could craft XML files that, when processed by the application, would cause a negative security impact such as data exfiltration or localized denial of service against the application instance and system of the user running it." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://labs.withsecure.com/advisories/opentext-archive-center-administration-client-xxe-vulnerability", + "url": "https://labs.withsecure.com/advisories/opentext-archive-center-administration-client-xxe-vulnerability" } ] } diff --git a/2022/45xxx/CVE-2022-45061.json b/2022/45xxx/CVE-2022-45061.json index e1bc561c838..54d761b3961 100644 --- a/2022/45xxx/CVE-2022-45061.json +++ b/2022/45xxx/CVE-2022-45061.json @@ -196,6 +196,11 @@ "refsource": "GENTOO", "name": "GLSA-202305-02", "url": "https://security.gentoo.org/glsa/202305-02" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230524 [SECURITY] [DLA 3432-1] python2.7 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html" } ] } diff --git a/2022/47xxx/CVE-2022-47516.json b/2022/47xxx/CVE-2022-47516.json index 99dbf30e911..fa4a7eec7b1 100644 --- a/2022/47xxx/CVE-2022-47516.json +++ b/2022/47xxx/CVE-2022-47516.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230222 [SECURITY] [DLA 3334-1] sofia-sip security update", "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00028.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5410", + "url": "https://www.debian.org/security/2023/dsa-5410" } ] } diff --git a/2023/22xxx/CVE-2023-22741.json b/2023/22xxx/CVE-2023-22741.json index 632a96bcfa3..85317d0bb05 100644 --- a/2023/22xxx/CVE-2023-22741.json +++ b/2023/22xxx/CVE-2023-22741.json @@ -40,8 +40,8 @@ "version": { "version_data": [ { - "version_value": "< 1.13.11", - "version_affected": "=" + "version_affected": "=", + "version_value": "< 1.13.11" } ] } @@ -63,6 +63,11 @@ "url": "https://github.com/freeswitch/sofia-sip/commit/da53e4fbcb138b080a75576dd49c1fff2ada2764", "refsource": "MISC", "name": "https://github.com/freeswitch/sofia-sip/commit/da53e4fbcb138b080a75576dd49c1fff2ada2764" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5410", + "refsource": "MISC", + "name": "https://www.debian.org/security/2023/dsa-5410" } ] }, diff --git a/2023/25xxx/CVE-2023-25599.json b/2023/25xxx/CVE-2023-25599.json index 596d3dc0412..60d65448190 100644 --- a/2023/25xxx/CVE-2023-25599.json +++ b/2023/25xxx/CVE-2023-25599.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-25599", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-25599", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the conferencing component of Mitel MiVoice Connect through 19.3 SP2 and 20.x, 21.x, and 22.x through 22.24.1500.0 could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient validation for the test_presenter.php page. A successful exploit could allow an attacker to execute arbitrary scripts." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.mitel.com/support/security-advisories", + "refsource": "MISC", + "name": "https://www.mitel.com/support/security-advisories" + }, + { + "refsource": "MISC", + "name": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0003", + "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0003" } ] } diff --git a/2023/29xxx/CVE-2023-29721.json b/2023/29xxx/CVE-2023-29721.json index a3538dced27..bd1b45efe5c 100644 --- a/2023/29xxx/CVE-2023-29721.json +++ b/2023/29xxx/CVE-2023-29721.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-29721", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-29721", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SofaWiki <= 3.8.9 has a file upload vulnerability that leads to command execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/bellenuit/sofawiki/issues/27", + "refsource": "MISC", + "name": "https://github.com/bellenuit/sofawiki/issues/27" + }, + { + "refsource": "MISC", + "name": "https://github.com/xul18/Showcase/issues/2", + "url": "https://github.com/xul18/Showcase/issues/2" } ] } diff --git a/2023/31xxx/CVE-2023-31458.json b/2023/31xxx/CVE-2023-31458.json index f36b79b9a05..a0a69ca578e 100644 --- a/2023/31xxx/CVE-2023-31458.json +++ b/2023/31xxx/CVE-2023-31458.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31458", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31458", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the Edge Gateway component of Mitel MiVoice Connect versions 19.3 SP2 (22.24.1500.0) and earlier could allow an unauthenticated attacker with internal network access to authenticate with administrative privileges, because initial installation does not enforce a password change. A successful exploit could allow an attacker to make arbitrary configuration changes and execute arbitrary commands." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.mitel.com/support/security-advisories", + "refsource": "MISC", + "name": "https://www.mitel.com/support/security-advisories" + }, + { + "refsource": "MISC", + "name": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0005", + "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0005" } ] } diff --git a/2023/33xxx/CVE-2023-33829.json b/2023/33xxx/CVE-2023-33829.json index 4ae66879445..997b6131dd4 100644 --- a/2023/33xxx/CVE-2023-33829.json +++ b/2023/33xxx/CVE-2023-33829.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-33829", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-33829", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A stored cross-site scripting (XSS) vulnerability in Cloudogu GmbH SCM Manager v1.2 to v1.60 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description text field." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bitbucket.org/sdorra/docker-scm-manager/src/master/", + "refsource": "MISC", + "name": "https://bitbucket.org/sdorra/docker-scm-manager/src/master/" + }, + { + "url": "https://github.com/n3gox/Stored-XSS-on-SCM-Manager-1.60", + "refsource": "MISC", + "name": "https://github.com/n3gox/Stored-XSS-on-SCM-Manager-1.60" } ] } diff --git a/2023/33xxx/CVE-2023-33984.json b/2023/33xxx/CVE-2023-33984.json new file mode 100644 index 00000000000..6cfcdc1794f --- /dev/null +++ b/2023/33xxx/CVE-2023-33984.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33984", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33985.json b/2023/33xxx/CVE-2023-33985.json new file mode 100644 index 00000000000..2a484e4008b --- /dev/null +++ b/2023/33xxx/CVE-2023-33985.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33985", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33986.json b/2023/33xxx/CVE-2023-33986.json new file mode 100644 index 00000000000..31d73120f45 --- /dev/null +++ b/2023/33xxx/CVE-2023-33986.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33986", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33987.json b/2023/33xxx/CVE-2023-33987.json new file mode 100644 index 00000000000..7356cfe515a --- /dev/null +++ b/2023/33xxx/CVE-2023-33987.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33987", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33988.json b/2023/33xxx/CVE-2023-33988.json new file mode 100644 index 00000000000..f6c9e2e51f5 --- /dev/null +++ b/2023/33xxx/CVE-2023-33988.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33988", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33989.json b/2023/33xxx/CVE-2023-33989.json new file mode 100644 index 00000000000..d732643e45a --- /dev/null +++ b/2023/33xxx/CVE-2023-33989.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33989", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33990.json b/2023/33xxx/CVE-2023-33990.json new file mode 100644 index 00000000000..384eb7547e4 --- /dev/null +++ b/2023/33xxx/CVE-2023-33990.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33990", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33991.json b/2023/33xxx/CVE-2023-33991.json new file mode 100644 index 00000000000..2f8f4477290 --- /dev/null +++ b/2023/33xxx/CVE-2023-33991.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33991", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33992.json b/2023/33xxx/CVE-2023-33992.json new file mode 100644 index 00000000000..3d6313f1f1f --- /dev/null +++ b/2023/33xxx/CVE-2023-33992.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33992", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/33xxx/CVE-2023-33993.json b/2023/33xxx/CVE-2023-33993.json new file mode 100644 index 00000000000..a1291fdb4ec --- /dev/null +++ b/2023/33xxx/CVE-2023-33993.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-33993", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file