diff --git a/2023/22xxx/CVE-2023-22809.json b/2023/22xxx/CVE-2023-22809.json index 75a2af66243..730e17ba0c1 100644 --- a/2023/22xxx/CVE-2023-22809.json +++ b/2023/22xxx/CVE-2023-22809.json @@ -102,6 +102,11 @@ "name": "GLSA-202305-12", "url": "https://security.gentoo.org/glsa/202305-12" }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT213758", + "url": "https://support.apple.com/kb/HT213758" + }, { "refsource": "MISC", "name": "http://packetstormsecurity.com/files/172509/Sudoedit-Extra-Arguments-Privilege-Escalation.html", diff --git a/2023/29xxx/CVE-2023-29441.json b/2023/29xxx/CVE-2023-29441.json index e72122d34da..ab42778b1d7 100644 --- a/2023/29xxx/CVE-2023-29441.json +++ b/2023/29xxx/CVE-2023-29441.json @@ -1,17 +1,94 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-29441", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Robert Heller WebLibrarian plugin <=\u00a03.5.8.1 versions." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Robert Heller", + "product": { + "product_data": [ + { + "product_name": "WebLibrarian", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "n/a", + "version_value": "3.5.8.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/weblibrarian/wordpress-weblibrarian-plugin-3-5-8-1-multiple-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/weblibrarian/wordpress-weblibrarian-plugin-3-5-8-1-multiple-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "LEE SE HYOUNG (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2023/32xxx/CVE-2023-32352.json b/2023/32xxx/CVE-2023-32352.json index db45fd844bb..d3897243f5e 100644 --- a/2023/32xxx/CVE-2023-32352.json +++ b/2023/32xxx/CVE-2023-32352.json @@ -102,6 +102,11 @@ "url": "https://support.apple.com/en-us/HT213757", "refsource": "MISC", "name": "https://support.apple.com/en-us/HT213757" + }, + { + "url": "https://support.apple.com/kb/HT213761", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213761" } ] } diff --git a/2023/32xxx/CVE-2023-32379.json b/2023/32xxx/CVE-2023-32379.json index 1366fc9a33a..d6479868bf0 100644 --- a/2023/32xxx/CVE-2023-32379.json +++ b/2023/32xxx/CVE-2023-32379.json @@ -58,6 +58,11 @@ "url": "https://support.apple.com/en-us/HT213758", "refsource": "MISC", "name": "https://support.apple.com/en-us/HT213758" + }, + { + "url": "https://support.apple.com/kb/HT213758", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213758" } ] } diff --git a/2023/32xxx/CVE-2023-32390.json b/2023/32xxx/CVE-2023-32390.json index 3d90d92e2bc..2eddaca7b4a 100644 --- a/2023/32xxx/CVE-2023-32390.json +++ b/2023/32xxx/CVE-2023-32390.json @@ -92,6 +92,11 @@ "url": "https://support.apple.com/en-us/HT213757", "refsource": "MISC", "name": "https://support.apple.com/en-us/HT213757" + }, + { + "url": "https://support.apple.com/kb/HT213761", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213761" } ] } diff --git a/2023/32xxx/CVE-2023-32391.json b/2023/32xxx/CVE-2023-32391.json index e2d04697942..c5066c3ffd8 100644 --- a/2023/32xxx/CVE-2023-32391.json +++ b/2023/32xxx/CVE-2023-32391.json @@ -97,6 +97,11 @@ "url": "https://support.apple.com/en-us/HT213757", "refsource": "MISC", "name": "https://support.apple.com/en-us/HT213757" + }, + { + "url": "https://support.apple.com/kb/HT213761", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213761" } ] } diff --git a/2023/32xxx/CVE-2023-32400.json b/2023/32xxx/CVE-2023-32400.json index c188cfaa8e6..9fb1f06f513 100644 --- a/2023/32xxx/CVE-2023-32400.json +++ b/2023/32xxx/CVE-2023-32400.json @@ -92,6 +92,11 @@ "url": "https://support.apple.com/en-us/HT213757", "refsource": "MISC", "name": "https://support.apple.com/en-us/HT213757" + }, + { + "url": "https://support.apple.com/kb/HT213761", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213761" } ] } diff --git a/2023/32xxx/CVE-2023-32404.json b/2023/32xxx/CVE-2023-32404.json index 31891c168e5..9c95618d0aa 100644 --- a/2023/32xxx/CVE-2023-32404.json +++ b/2023/32xxx/CVE-2023-32404.json @@ -92,6 +92,11 @@ "url": "https://support.apple.com/en-us/HT213757", "refsource": "MISC", "name": "https://support.apple.com/en-us/HT213757" + }, + { + "url": "https://support.apple.com/kb/HT213761", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213761" } ] } diff --git a/2023/32xxx/CVE-2023-32417.json b/2023/32xxx/CVE-2023-32417.json index 063f8eb55bd..5d3cb77290b 100644 --- a/2023/32xxx/CVE-2023-32417.json +++ b/2023/32xxx/CVE-2023-32417.json @@ -58,6 +58,11 @@ "url": "https://support.apple.com/en-us/HT213764", "refsource": "MISC", "name": "https://support.apple.com/en-us/HT213764" + }, + { + "url": "https://support.apple.com/kb/HT213758", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213758" } ] } diff --git a/2023/32xxx/CVE-2023-32422.json b/2023/32xxx/CVE-2023-32422.json index 945a688f11d..e2d9fbf3712 100644 --- a/2023/32xxx/CVE-2023-32422.json +++ b/2023/32xxx/CVE-2023-32422.json @@ -92,6 +92,11 @@ "url": "https://support.apple.com/en-us/HT213761", "refsource": "MISC", "name": "https://support.apple.com/en-us/HT213761" + }, + { + "url": "https://support.apple.com/kb/HT213764", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213764" } ] } diff --git a/2023/32xxx/CVE-2023-32425.json b/2023/32xxx/CVE-2023-32425.json index 03e51a69fba..ef1d196870b 100644 --- a/2023/32xxx/CVE-2023-32425.json +++ b/2023/32xxx/CVE-2023-32425.json @@ -75,6 +75,16 @@ "url": "https://support.apple.com/en-us/HT213757", "refsource": "MISC", "name": "https://support.apple.com/en-us/HT213757" + }, + { + "url": "https://support.apple.com/kb/HT213757", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213757" + }, + { + "url": "https://support.apple.com/kb/HT213764", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213764" } ] } diff --git a/2023/32xxx/CVE-2023-32428.json b/2023/32xxx/CVE-2023-32428.json index dd56452aa71..5f5dd6c83ff 100644 --- a/2023/32xxx/CVE-2023-32428.json +++ b/2023/32xxx/CVE-2023-32428.json @@ -109,6 +109,26 @@ "url": "https://support.apple.com/en-us/HT213761", "refsource": "MISC", "name": "https://support.apple.com/en-us/HT213761" + }, + { + "url": "https://support.apple.com/kb/HT213757", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213757" + }, + { + "url": "https://support.apple.com/kb/HT213761", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213761" + }, + { + "url": "https://support.apple.com/kb/HT213764", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213764" + }, + { + "url": "https://support.apple.com/kb/HT213758", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213758" } ] } diff --git a/2023/32xxx/CVE-2023-32432.json b/2023/32xxx/CVE-2023-32432.json index fd3b3ddb15e..ecca6fd546e 100644 --- a/2023/32xxx/CVE-2023-32432.json +++ b/2023/32xxx/CVE-2023-32432.json @@ -109,6 +109,26 @@ "url": "https://support.apple.com/en-us/HT213761", "refsource": "MISC", "name": "https://support.apple.com/en-us/HT213761" + }, + { + "url": "https://support.apple.com/kb/HT213757", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213757" + }, + { + "url": "https://support.apple.com/kb/HT213761", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213761" + }, + { + "url": "https://support.apple.com/kb/HT213764", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213764" + }, + { + "url": "https://support.apple.com/kb/HT213758", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213758" } ] } diff --git a/2023/32xxx/CVE-2023-32437.json b/2023/32xxx/CVE-2023-32437.json index 42d2e7b3ce7..a36321105c8 100644 --- a/2023/32xxx/CVE-2023-32437.json +++ b/2023/32xxx/CVE-2023-32437.json @@ -58,6 +58,26 @@ "url": "https://support.apple.com/en-us/HT213841", "refsource": "MISC", "name": "https://support.apple.com/en-us/HT213841" + }, + { + "url": "https://support.apple.com/kb/HT213757", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213757" + }, + { + "url": "https://support.apple.com/kb/HT213761", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213761" + }, + { + "url": "https://support.apple.com/kb/HT213764", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213764" + }, + { + "url": "https://support.apple.com/kb/HT213758", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213758" } ] } diff --git a/2023/34xxx/CVE-2023-34352.json b/2023/34xxx/CVE-2023-34352.json index a2b7422e018..e33d317e9b4 100644 --- a/2023/34xxx/CVE-2023-34352.json +++ b/2023/34xxx/CVE-2023-34352.json @@ -109,6 +109,26 @@ "url": "https://support.apple.com/en-us/HT213761", "refsource": "MISC", "name": "https://support.apple.com/en-us/HT213761" + }, + { + "url": "https://support.apple.com/kb/HT213757", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213757" + }, + { + "url": "https://support.apple.com/kb/HT213761", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213761" + }, + { + "url": "https://support.apple.com/kb/HT213764", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213764" + }, + { + "url": "https://support.apple.com/kb/HT213758", + "refsource": "MISC", + "name": "https://support.apple.com/kb/HT213758" } ] } diff --git a/2023/3xxx/CVE-2023-3374.json b/2023/3xxx/CVE-2023-3374.json index 640be103e79..6d4ec65fde6 100644 --- a/2023/3xxx/CVE-2023-3374.json +++ b/2023/3xxx/CVE-2023-3374.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Incomplete List of Disallowed Inputs vulnerability in Bookreen allows Privilege Escalation.This issue affects Bookreen: before 3.0.0.\n\n" + "value": "Incomplete List of Disallowed Inputs vulnerability in Unisign Bookreen allows Privilege Escalation.This issue affects Bookreen: before 3.0.0.\n\n" } ] }, @@ -32,7 +32,7 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Unisoft", + "vendor_name": "Unisign", "product": { "product_data": [ { diff --git a/2023/3xxx/CVE-2023-3375.json b/2023/3xxx/CVE-2023-3375.json index 0473894fdbd..74bb32cddf3 100644 --- a/2023/3xxx/CVE-2023-3375.json +++ b/2023/3xxx/CVE-2023-3375.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Bookreen allows OS Command Injection.This issue affects Bookreen: before 3.0.0.\n\n" + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Unisign Bookreen allows OS Command Injection.This issue affects Bookreen: before 3.0.0.\n\n" } ] }, @@ -32,7 +32,7 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Unisoft", + "vendor_name": "Unisign", "product": { "product_data": [ { diff --git a/2023/4xxx/CVE-2023-4705.json b/2023/4xxx/CVE-2023-4705.json index b53baddfbab..822402cd2be 100644 --- a/2023/4xxx/CVE-2023-4705.json +++ b/2023/4xxx/CVE-2023-4705.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-4705", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** CVE-2023-4705 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team." } ] }