From cec694def2a41f9a8bc1a1f7b8690dbc74d9d413 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 6 Sep 2023 20:00:31 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/41xxx/CVE-2023-41601.json | 61 +++++++++++++++++++++++++--- 2023/42xxx/CVE-2023-42002.json | 18 +++++++++ 2023/42xxx/CVE-2023-42003.json | 18 +++++++++ 2023/42xxx/CVE-2023-42004.json | 18 +++++++++ 2023/42xxx/CVE-2023-42005.json | 18 +++++++++ 2023/42xxx/CVE-2023-42006.json | 18 +++++++++ 2023/42xxx/CVE-2023-42007.json | 18 +++++++++ 2023/42xxx/CVE-2023-42008.json | 18 +++++++++ 2023/42xxx/CVE-2023-42009.json | 18 +++++++++ 2023/42xxx/CVE-2023-42010.json | 18 +++++++++ 2023/42xxx/CVE-2023-42011.json | 18 +++++++++ 2023/42xxx/CVE-2023-42012.json | 18 +++++++++ 2023/42xxx/CVE-2023-42013.json | 18 +++++++++ 2023/42xxx/CVE-2023-42014.json | 18 +++++++++ 2023/42xxx/CVE-2023-42015.json | 18 +++++++++ 2023/42xxx/CVE-2023-42016.json | 18 +++++++++ 2023/42xxx/CVE-2023-42017.json | 18 +++++++++ 2023/42xxx/CVE-2023-42018.json | 18 +++++++++ 2023/42xxx/CVE-2023-42019.json | 18 +++++++++ 2023/42xxx/CVE-2023-42020.json | 18 +++++++++ 2023/42xxx/CVE-2023-42021.json | 18 +++++++++ 2023/42xxx/CVE-2023-42022.json | 18 +++++++++ 2023/42xxx/CVE-2023-42023.json | 18 +++++++++ 2023/42xxx/CVE-2023-42024.json | 18 +++++++++ 2023/42xxx/CVE-2023-42025.json | 18 +++++++++ 2023/42xxx/CVE-2023-42026.json | 18 +++++++++ 2023/42xxx/CVE-2023-42027.json | 18 +++++++++ 2023/42xxx/CVE-2023-42028.json | 18 +++++++++ 2023/42xxx/CVE-2023-42029.json | 18 +++++++++ 2023/42xxx/CVE-2023-42030.json | 18 +++++++++ 2023/42xxx/CVE-2023-42031.json | 18 +++++++++ 2023/4xxx/CVE-2023-4809.json | 74 +++++++++++++++++++++++++++++++--- 2023/4xxx/CVE-2023-4812.json | 18 +++++++++ 33 files changed, 682 insertions(+), 11 deletions(-) create mode 100644 2023/42xxx/CVE-2023-42002.json create mode 100644 2023/42xxx/CVE-2023-42003.json create mode 100644 2023/42xxx/CVE-2023-42004.json create mode 100644 2023/42xxx/CVE-2023-42005.json create mode 100644 2023/42xxx/CVE-2023-42006.json create mode 100644 2023/42xxx/CVE-2023-42007.json create mode 100644 2023/42xxx/CVE-2023-42008.json create mode 100644 2023/42xxx/CVE-2023-42009.json create mode 100644 2023/42xxx/CVE-2023-42010.json create mode 100644 2023/42xxx/CVE-2023-42011.json create mode 100644 2023/42xxx/CVE-2023-42012.json create mode 100644 2023/42xxx/CVE-2023-42013.json create mode 100644 2023/42xxx/CVE-2023-42014.json create mode 100644 2023/42xxx/CVE-2023-42015.json create mode 100644 2023/42xxx/CVE-2023-42016.json create mode 100644 2023/42xxx/CVE-2023-42017.json create mode 100644 2023/42xxx/CVE-2023-42018.json create mode 100644 2023/42xxx/CVE-2023-42019.json create mode 100644 2023/42xxx/CVE-2023-42020.json create mode 100644 2023/42xxx/CVE-2023-42021.json create mode 100644 2023/42xxx/CVE-2023-42022.json create mode 100644 2023/42xxx/CVE-2023-42023.json create mode 100644 2023/42xxx/CVE-2023-42024.json create mode 100644 2023/42xxx/CVE-2023-42025.json create mode 100644 2023/42xxx/CVE-2023-42026.json create mode 100644 2023/42xxx/CVE-2023-42027.json create mode 100644 2023/42xxx/CVE-2023-42028.json create mode 100644 2023/42xxx/CVE-2023-42029.json create mode 100644 2023/42xxx/CVE-2023-42030.json create mode 100644 2023/42xxx/CVE-2023-42031.json create mode 100644 2023/4xxx/CVE-2023-4812.json diff --git a/2023/41xxx/CVE-2023-41601.json b/2023/41xxx/CVE-2023-41601.json index 878b3dff6a0..37746eb118c 100644 --- a/2023/41xxx/CVE-2023-41601.json +++ b/2023/41xxx/CVE-2023-41601.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-41601", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-41601", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple cross-site scripting (XSS) vulnerabilities in install/index.php of CSZ CMS v1.3.0 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Database Username or Database Host parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.cszcms.com/", + "refsource": "MISC", + "name": "https://www.cszcms.com/" + }, + { + "url": "https://github.com/al3zx/csz_cms_1_3_0_xss_in_install_page/blob/main/README.md", + "refsource": "MISC", + "name": "https://github.com/al3zx/csz_cms_1_3_0_xss_in_install_page/blob/main/README.md" } ] } diff --git a/2023/42xxx/CVE-2023-42002.json b/2023/42xxx/CVE-2023-42002.json new file mode 100644 index 00000000000..b44c9637299 --- /dev/null +++ b/2023/42xxx/CVE-2023-42002.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42002", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42003.json b/2023/42xxx/CVE-2023-42003.json new file mode 100644 index 00000000000..f37eec77f01 --- /dev/null +++ b/2023/42xxx/CVE-2023-42003.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42003", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42004.json b/2023/42xxx/CVE-2023-42004.json new file mode 100644 index 00000000000..31b722d1ed3 --- /dev/null +++ b/2023/42xxx/CVE-2023-42004.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42004", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42005.json b/2023/42xxx/CVE-2023-42005.json new file mode 100644 index 00000000000..f52b77149b4 --- /dev/null +++ b/2023/42xxx/CVE-2023-42005.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42005", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42006.json b/2023/42xxx/CVE-2023-42006.json new file mode 100644 index 00000000000..60d3001f9b0 --- /dev/null +++ b/2023/42xxx/CVE-2023-42006.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42006", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42007.json b/2023/42xxx/CVE-2023-42007.json new file mode 100644 index 00000000000..ad5882f896b --- /dev/null +++ b/2023/42xxx/CVE-2023-42007.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42007", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42008.json b/2023/42xxx/CVE-2023-42008.json new file mode 100644 index 00000000000..072ba1a2972 --- /dev/null +++ b/2023/42xxx/CVE-2023-42008.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42008", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42009.json b/2023/42xxx/CVE-2023-42009.json new file mode 100644 index 00000000000..fa8f794c1fc --- /dev/null +++ b/2023/42xxx/CVE-2023-42009.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42009", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42010.json b/2023/42xxx/CVE-2023-42010.json new file mode 100644 index 00000000000..01acfc3ee31 --- /dev/null +++ b/2023/42xxx/CVE-2023-42010.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42010", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42011.json b/2023/42xxx/CVE-2023-42011.json new file mode 100644 index 00000000000..ddf2bf54e98 --- /dev/null +++ b/2023/42xxx/CVE-2023-42011.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42011", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42012.json b/2023/42xxx/CVE-2023-42012.json new file mode 100644 index 00000000000..36efdcb95fd --- /dev/null +++ b/2023/42xxx/CVE-2023-42012.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42012", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42013.json b/2023/42xxx/CVE-2023-42013.json new file mode 100644 index 00000000000..e95af998da4 --- /dev/null +++ b/2023/42xxx/CVE-2023-42013.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42013", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42014.json b/2023/42xxx/CVE-2023-42014.json new file mode 100644 index 00000000000..62ab013c14f --- /dev/null +++ b/2023/42xxx/CVE-2023-42014.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42014", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42015.json b/2023/42xxx/CVE-2023-42015.json new file mode 100644 index 00000000000..13cbaa76cbf --- /dev/null +++ b/2023/42xxx/CVE-2023-42015.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42015", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42016.json b/2023/42xxx/CVE-2023-42016.json new file mode 100644 index 00000000000..5808d6ba823 --- /dev/null +++ b/2023/42xxx/CVE-2023-42016.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42016", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42017.json b/2023/42xxx/CVE-2023-42017.json new file mode 100644 index 00000000000..1fb297b754a --- /dev/null +++ b/2023/42xxx/CVE-2023-42017.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42017", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42018.json b/2023/42xxx/CVE-2023-42018.json new file mode 100644 index 00000000000..a4cc43e2cb6 --- /dev/null +++ b/2023/42xxx/CVE-2023-42018.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42018", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42019.json b/2023/42xxx/CVE-2023-42019.json new file mode 100644 index 00000000000..48424aedb22 --- /dev/null +++ b/2023/42xxx/CVE-2023-42019.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42019", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42020.json b/2023/42xxx/CVE-2023-42020.json new file mode 100644 index 00000000000..e3c3182ca73 --- /dev/null +++ b/2023/42xxx/CVE-2023-42020.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42020", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42021.json b/2023/42xxx/CVE-2023-42021.json new file mode 100644 index 00000000000..9a111826308 --- /dev/null +++ b/2023/42xxx/CVE-2023-42021.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42021", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42022.json b/2023/42xxx/CVE-2023-42022.json new file mode 100644 index 00000000000..434bd14b052 --- /dev/null +++ b/2023/42xxx/CVE-2023-42022.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42022", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42023.json b/2023/42xxx/CVE-2023-42023.json new file mode 100644 index 00000000000..6891f3ebb36 --- /dev/null +++ b/2023/42xxx/CVE-2023-42023.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42023", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42024.json b/2023/42xxx/CVE-2023-42024.json new file mode 100644 index 00000000000..9ab99b6d49b --- /dev/null +++ b/2023/42xxx/CVE-2023-42024.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42024", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42025.json b/2023/42xxx/CVE-2023-42025.json new file mode 100644 index 00000000000..63f8ae118f7 --- /dev/null +++ b/2023/42xxx/CVE-2023-42025.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42025", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42026.json b/2023/42xxx/CVE-2023-42026.json new file mode 100644 index 00000000000..fc50c92a466 --- /dev/null +++ b/2023/42xxx/CVE-2023-42026.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42026", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42027.json b/2023/42xxx/CVE-2023-42027.json new file mode 100644 index 00000000000..220e9ee8f8a --- /dev/null +++ b/2023/42xxx/CVE-2023-42027.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42027", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42028.json b/2023/42xxx/CVE-2023-42028.json new file mode 100644 index 00000000000..b33c6571caa --- /dev/null +++ b/2023/42xxx/CVE-2023-42028.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42028", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42029.json b/2023/42xxx/CVE-2023-42029.json new file mode 100644 index 00000000000..ae7fcab75e9 --- /dev/null +++ b/2023/42xxx/CVE-2023-42029.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42029", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42030.json b/2023/42xxx/CVE-2023-42030.json new file mode 100644 index 00000000000..93023ac432c --- /dev/null +++ b/2023/42xxx/CVE-2023-42030.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42030", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42031.json b/2023/42xxx/CVE-2023-42031.json new file mode 100644 index 00000000000..d12a23e436c --- /dev/null +++ b/2023/42xxx/CVE-2023-42031.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42031", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/4xxx/CVE-2023-4809.json b/2023/4xxx/CVE-2023-4809.json index 83b1acfa871..c827b98fa89 100644 --- a/2023/4xxx/CVE-2023-4809.json +++ b/2023/4xxx/CVE-2023-4809.json @@ -1,18 +1,82 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-4809", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secteam@freebsd.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In pf packet processing with a 'scrub fragment reassemble' rule, a packet containing multiple IPv6 fragment headers would be reassembled, and then immediately processed. That is, a packet with multiple fragment extension headers would not be recognized as the correct ultimate payload. Instead a packet with multiple IPv6 fragment headers would unexpectedly be interpreted as a fragmented packet, rather than as whatever the real payload is.\n\n\n\n\nAs a result, IPv6 fragments may bypass pf firewall rules written on the assumption all fragments have been reassembled and, as a result, be forwarded or processed by the host.\n\n" } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-167: Improper Handling of Additional Special Element", + "cweId": "CWE-167" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "FreeBSD", + "product": { + "product_data": [ + { + "product_name": "FreeBSD", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "13.2-RELEASE", + "version_value": "p3" + }, + { + "version_affected": "<", + "version_name": "12.4-RELEASE", + "version_value": "p5" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-23:10.pf.asc", + "refsource": "MISC", + "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-23:10.pf.asc" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Enrico Bassetti bassetti@di.uniroma1.it (NetSecurityLab @ Sapienza University of Rome)" + } + ] } \ No newline at end of file diff --git a/2023/4xxx/CVE-2023-4812.json b/2023/4xxx/CVE-2023-4812.json new file mode 100644 index 00000000000..78c7e00e26f --- /dev/null +++ b/2023/4xxx/CVE-2023-4812.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-4812", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file