diff --git a/2023/29xxx/CVE-2023-29160.json b/2023/29xxx/CVE-2023-29160.json index 4f7c2964276..d6f2bd1b5ce 100644 --- a/2023/29xxx/CVE-2023-29160.json +++ b/2023/29xxx/CVE-2023-29160.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-29160", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://felib.fujielectric.co.jp/download/details.htm?dataid=45829407&site=global&lang=en" + "url": "https://felib.fujielectric.co.jp/download/details.htm?dataid=45829407&site=global&lang=en", + "refsource": "MISC", + "name": "https://felib.fujielectric.co.jp/download/details.htm?dataid=45829407&site=global&lang=en" }, { - "url": "https://jvn.jp/en/vu/JVNVU97809354/" + "url": "https://jvn.jp/en/vu/JVNVU97809354/", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU97809354/" } ] }, diff --git a/2023/29xxx/CVE-2023-29167.json b/2023/29xxx/CVE-2023-29167.json index 608bcb58f98..3ab79125896 100644 --- a/2023/29xxx/CVE-2023-29167.json +++ b/2023/29xxx/CVE-2023-29167.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-29167", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://felib.fujielectric.co.jp/download/details.htm?dataid=45829407&site=global&lang=en" + "url": "https://felib.fujielectric.co.jp/download/details.htm?dataid=45829407&site=global&lang=en", + "refsource": "MISC", + "name": "https://felib.fujielectric.co.jp/download/details.htm?dataid=45829407&site=global&lang=en" }, { - "url": "https://jvn.jp/en/vu/JVNVU97809354/" + "url": "https://jvn.jp/en/vu/JVNVU97809354/", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU97809354/" } ] }, diff --git a/2023/29xxx/CVE-2023-29498.json b/2023/29xxx/CVE-2023-29498.json index a5d501a7193..c7cb31ff85a 100644 --- a/2023/29xxx/CVE-2023-29498.json +++ b/2023/29xxx/CVE-2023-29498.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-29498", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://felib.fujielectric.co.jp/download/details.htm?dataid=45829407&site=global&lang=en" + "url": "https://felib.fujielectric.co.jp/download/details.htm?dataid=45829407&site=global&lang=en", + "refsource": "MISC", + "name": "https://felib.fujielectric.co.jp/download/details.htm?dataid=45829407&site=global&lang=en" }, { - "url": "https://jvn.jp/en/vu/JVNVU97809354/" + "url": "https://jvn.jp/en/vu/JVNVU97809354/", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU97809354/" } ] }, diff --git a/2023/29xxx/CVE-2023-29501.json b/2023/29xxx/CVE-2023-29501.json index 2c2a7f50c19..389ea066ec3 100644 --- a/2023/29xxx/CVE-2023-29501.json +++ b/2023/29xxx/CVE-2023-29501.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-29501", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,16 +45,24 @@ "references": { "reference_data": [ { - "url": "https://www.runsystem.co.jp/g1-pr/17570" + "url": "https://www.runsystem.co.jp/g1-pr/17570", + "refsource": "MISC", + "name": "https://www.runsystem.co.jp/g1-pr/17570" }, { - "url": "https://apps.apple.com/jp/app/%E8%87%AA%E9%81%8A%E7%A9%BA%E9%96%93%E3%81%A8%E3%81%8F%E3%81%A8%E3%81%8F%E3%82%AF%E3%83%BC%E3%83%9D%E3%83%B3/id608149604" + "url": "https://apps.apple.com/jp/app/%E8%87%AA%E9%81%8A%E7%A9%BA%E9%96%93%E3%81%A8%E3%81%8F%E3%81%A8%E3%81%8F%E3%82%AF%E3%83%BC%E3%83%9D%E3%83%B3/id608149604", + "refsource": "MISC", + "name": "https://apps.apple.com/jp/app/%E8%87%AA%E9%81%8A%E7%A9%BA%E9%96%93%E3%81%A8%E3%81%8F%E3%81%A8%E3%81%8F%E3%82%AF%E3%83%BC%E3%83%9D%E3%83%B3/id608149604" }, { - "url": "https://play.google.com/store/apps/details?id=jp.runsystem" + "url": "https://play.google.com/store/apps/details?id=jp.runsystem", + "refsource": "MISC", + "name": "https://play.google.com/store/apps/details?id=jp.runsystem" }, { - "url": "https://jvn.jp/en/jp/JVN33836375/" + "url": "https://jvn.jp/en/jp/JVN33836375/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN33836375/" } ] }, diff --git a/2023/30xxx/CVE-2023-30762.json b/2023/30xxx/CVE-2023-30762.json index 74e2a11b6a7..ac9c75867d9 100644 --- a/2023/30xxx/CVE-2023-30762.json +++ b/2023/30xxx/CVE-2023-30762.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-30762", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.kbdevice.com/news/%e3%83%ac%e3%82%b3%e3%83%bc%e3%83%80%e3%83%bc%e3%81%ae%e3%83%8d%e3%83%83%e3%83%88%e3%83%af%e3%83%bc%e3%82%af%e6%94%bb%e6%92%83%e3%81%ab%e5%af%be%e3%81%99%e3%82%8b%e3%82%a2%e3%83%83%e3%83%97%e3%83%87/" + "url": "https://www.kbdevice.com/news/%e3%83%ac%e3%82%b3%e3%83%bc%e3%83%80%e3%83%bc%e3%81%ae%e3%83%8d%e3%83%83%e3%83%88%e3%83%af%e3%83%bc%e3%82%af%e6%94%bb%e6%92%83%e3%81%ab%e5%af%be%e3%81%99%e3%82%8b%e3%82%a2%e3%83%83%e3%83%97%e3%83%87/", + "refsource": "MISC", + "name": "https://www.kbdevice.com/news/%e3%83%ac%e3%82%b3%e3%83%bc%e3%83%80%e3%83%bc%e3%81%ae%e3%83%8d%e3%83%83%e3%83%88%e3%83%af%e3%83%bc%e3%82%af%e6%94%bb%e6%92%83%e3%81%ab%e5%af%be%e3%81%99%e3%82%8b%e3%82%a2%e3%83%83%e3%83%97%e3%83%87/" }, { - "url": "https://jvn.jp/en/vu/JVNVU90812349/" + "url": "https://jvn.jp/en/vu/JVNVU90812349/", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU90812349/" } ] }, diff --git a/2023/30xxx/CVE-2023-30764.json b/2023/30xxx/CVE-2023-30764.json index 45c9e091a18..328586561b0 100644 --- a/2023/30xxx/CVE-2023-30764.json +++ b/2023/30xxx/CVE-2023-30764.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-30764", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.kbdevice.com/news/%e3%83%ac%e3%82%b3%e3%83%bc%e3%83%80%e3%83%bc%e3%81%ae%e3%83%8d%e3%83%83%e3%83%88%e3%83%af%e3%83%bc%e3%82%af%e6%94%bb%e6%92%83%e3%81%ab%e5%af%be%e3%81%99%e3%82%8b%e3%82%a2%e3%83%83%e3%83%97%e3%83%87/" + "url": "https://www.kbdevice.com/news/%e3%83%ac%e3%82%b3%e3%83%bc%e3%83%80%e3%83%bc%e3%81%ae%e3%83%8d%e3%83%83%e3%83%88%e3%83%af%e3%83%bc%e3%82%af%e6%94%bb%e6%92%83%e3%81%ab%e5%af%be%e3%81%99%e3%82%8b%e3%82%a2%e3%83%83%e3%83%97%e3%83%87/", + "refsource": "MISC", + "name": "https://www.kbdevice.com/news/%e3%83%ac%e3%82%b3%e3%83%bc%e3%83%80%e3%83%bc%e3%81%ae%e3%83%8d%e3%83%83%e3%83%88%e3%83%af%e3%83%bc%e3%82%af%e6%94%bb%e6%92%83%e3%81%ab%e5%af%be%e3%81%99%e3%82%8b%e3%82%a2%e3%83%83%e3%83%97%e3%83%87/" }, { - "url": "https://jvn.jp/en/vu/JVNVU90812349/" + "url": "https://jvn.jp/en/vu/JVNVU90812349/", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU90812349/" } ] }, diff --git a/2023/30xxx/CVE-2023-30766.json b/2023/30xxx/CVE-2023-30766.json index b405681546a..cf41ab6d760 100644 --- a/2023/30xxx/CVE-2023-30766.json +++ b/2023/30xxx/CVE-2023-30766.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-30766", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.kbdevice.com/news/%e3%83%ac%e3%82%b3%e3%83%bc%e3%83%80%e3%83%bc%e3%81%ae%e3%83%8d%e3%83%83%e3%83%88%e3%83%af%e3%83%bc%e3%82%af%e6%94%bb%e6%92%83%e3%81%ab%e5%af%be%e3%81%99%e3%82%8b%e3%82%a2%e3%83%83%e3%83%97%e3%83%87/" + "url": "https://www.kbdevice.com/news/%e3%83%ac%e3%82%b3%e3%83%bc%e3%83%80%e3%83%bc%e3%81%ae%e3%83%8d%e3%83%83%e3%83%88%e3%83%af%e3%83%bc%e3%82%af%e6%94%bb%e6%92%83%e3%81%ab%e5%af%be%e3%81%99%e3%82%8b%e3%82%a2%e3%83%83%e3%83%97%e3%83%87/", + "refsource": "MISC", + "name": "https://www.kbdevice.com/news/%e3%83%ac%e3%82%b3%e3%83%bc%e3%83%80%e3%83%bc%e3%81%ae%e3%83%8d%e3%83%83%e3%83%88%e3%83%af%e3%83%bc%e3%82%af%e6%94%bb%e6%92%83%e3%81%ab%e5%af%be%e3%81%99%e3%82%8b%e3%82%a2%e3%83%83%e3%83%97%e3%83%87/" }, { - "url": "https://jvn.jp/en/vu/JVNVU90812349/" + "url": "https://jvn.jp/en/vu/JVNVU90812349/", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU90812349/" } ] }, diff --git a/2023/31xxx/CVE-2023-31195.json b/2023/31xxx/CVE-2023-31195.json index 955f4b3246a..795bf98bdf4 100644 --- a/2023/31xxx/CVE-2023-31195.json +++ b/2023/31xxx/CVE-2023-31195.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-31195", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.asus.com/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ax3000/helpdesk_bios/?model2Name=RT-AX3000" + "url": "https://www.asus.com/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ax3000/helpdesk_bios/?model2Name=RT-AX3000", + "refsource": "MISC", + "name": "https://www.asus.com/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ax3000/helpdesk_bios/?model2Name=RT-AX3000" }, { - "url": "https://jvn.jp/en/jp/JVN34232595/" + "url": "https://jvn.jp/en/jp/JVN34232595/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN34232595/" } ] }, diff --git a/2023/31xxx/CVE-2023-31196.json b/2023/31xxx/CVE-2023-31196.json index f73ddac231a..d46a7d5f279 100644 --- a/2023/31xxx/CVE-2023-31196.json +++ b/2023/31xxx/CVE-2023-31196.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-31196", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.inaba.co.jp/abaniact/news/Wi-Fi_AP_UNIT%E3%81%AB%E3%81%8A%E3%81%91%E3%82%8B%E8%A4%87%E6%95%B0%E3%81%AE%E8%84%86%E5%BC%B1%E6%80%A7%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6.pdf" + "url": "https://jvn.jp/en/jp/JVN28412757/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN28412757/" }, { - "url": "https://jvn.jp/en/jp/JVN28412757/" + "url": "https://www.inaba.co.jp/abaniact/news/Wi-Fi_AP_UNIT%E3%81%AB%E3%81%8A%E3%81%91%E3%82%8B%E8%A4%87%E6%95%B0%E3%81%AE%E8%84%86%E5%BC%B1%E6%80%A7%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6.pdf", + "refsource": "MISC", + "name": "https://www.inaba.co.jp/abaniact/news/Wi-Fi_AP_UNIT%E3%81%AB%E3%81%8A%E3%81%91%E3%82%8B%E8%A4%87%E6%95%B0%E3%81%AE%E8%84%86%E5%BC%B1%E6%80%A7%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6.pdf" } ] }, diff --git a/2023/31xxx/CVE-2023-31198.json b/2023/31xxx/CVE-2023-31198.json index 82f7c6af5b2..eefcee102d5 100644 --- a/2023/31xxx/CVE-2023-31198.json +++ b/2023/31xxx/CVE-2023-31198.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-31198", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.inaba.co.jp/abaniact/news/Wi-Fi_AP_UNIT%E3%81%AB%E3%81%8A%E3%81%91%E3%82%8B%E8%A4%87%E6%95%B0%E3%81%AE%E8%84%86%E5%BC%B1%E6%80%A7%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6.pdf" + "url": "https://jvn.jp/en/jp/JVN28412757/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN28412757/" }, { - "url": "https://jvn.jp/en/jp/JVN28412757/" + "url": "https://www.inaba.co.jp/abaniact/news/Wi-Fi_AP_UNIT%E3%81%AB%E3%81%8A%E3%81%91%E3%82%8B%E8%A4%87%E6%95%B0%E3%81%AE%E8%84%86%E5%BC%B1%E6%80%A7%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6.pdf", + "refsource": "MISC", + "name": "https://www.inaba.co.jp/abaniact/news/Wi-Fi_AP_UNIT%E3%81%AB%E3%81%8A%E3%81%91%E3%82%8B%E8%A4%87%E6%95%B0%E3%81%AE%E8%84%86%E5%BC%B1%E6%80%A7%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6.pdf" } ] }, diff --git a/2023/32xxx/CVE-2023-32546.json b/2023/32xxx/CVE-2023-32546.json index 7890ad4027f..e24c32210eb 100644 --- a/2023/32xxx/CVE-2023-32546.json +++ b/2023/32xxx/CVE-2023-32546.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-32546", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://go.chatwork.com/ja/download/" + "url": "https://go.chatwork.com/ja/download/", + "refsource": "MISC", + "name": "https://go.chatwork.com/ja/download/" }, { - "url": "https://jvn.jp/en/jp/JVN96828492/" + "url": "https://jvn.jp/en/jp/JVN96828492/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN96828492/" } ] }, diff --git a/2023/32xxx/CVE-2023-32548.json b/2023/32xxx/CVE-2023-32548.json index 0fa5ec55116..085282b69b1 100644 --- a/2023/32xxx/CVE-2023-32548.json +++ b/2023/32xxx/CVE-2023-32548.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-32548", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://support.kingsoft.jp/about/20230605.html" + "url": "https://support.kingsoft.jp/about/20230605.html", + "refsource": "MISC", + "name": "https://support.kingsoft.jp/about/20230605.html" }, { - "url": "https://jvn.jp/en/jp/JVN36060509/" + "url": "https://jvn.jp/en/jp/JVN36060509/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN36060509/" } ] }, diff --git a/2023/3xxx/CVE-2023-3218.json b/2023/3xxx/CVE-2023-3218.json new file mode 100644 index 00000000000..a70bc237d11 --- /dev/null +++ b/2023/3xxx/CVE-2023-3218.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-3218", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file