From d3c976a16e3ab623b18e1491218affb1570ca30b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 8 Dec 2023 20:00:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/34xxx/CVE-2023-34969.json | 5 +++ 2023/3xxx/CVE-2023-3138.json | 5 +++ 2023/46xxx/CVE-2023-46246.json | 5 +++ 2023/46xxx/CVE-2023-46493.json | 61 ++++++++++++++++++++++++++++++---- 2023/46xxx/CVE-2023-46494.json | 61 ++++++++++++++++++++++++++++++---- 2023/46xxx/CVE-2023-46495.json | 61 ++++++++++++++++++++++++++++++---- 2023/46xxx/CVE-2023-46496.json | 61 ++++++++++++++++++++++++++++++---- 2023/46xxx/CVE-2023-46497.json | 61 ++++++++++++++++++++++++++++++---- 2023/46xxx/CVE-2023-46498.json | 61 ++++++++++++++++++++++++++++++---- 2023/46xxx/CVE-2023-46499.json | 61 ++++++++++++++++++++++++++++++---- 2023/46xxx/CVE-2023-46724.json | 5 +++ 2023/4xxx/CVE-2023-4399.json | 5 +++ 2023/4xxx/CVE-2023-4692.json | 5 +++ 2023/4xxx/CVE-2023-4693.json | 5 +++ 2023/5xxx/CVE-2023-5088.json | 5 +++ 2023/5xxx/CVE-2023-5178.json | 5 +++ 2023/5xxx/CVE-2023-5808.json | 2 +- 2023/6xxx/CVE-2023-6634.json | 18 ++++++++++ 2023/6xxx/CVE-2023-6635.json | 18 ++++++++++ 2023/6xxx/CVE-2023-6636.json | 18 ++++++++++ 2023/6xxx/CVE-2023-6637.json | 18 ++++++++++ 2023/6xxx/CVE-2023-6638.json | 18 ++++++++++ 22 files changed, 521 insertions(+), 43 deletions(-) create mode 100644 2023/6xxx/CVE-2023-6634.json create mode 100644 2023/6xxx/CVE-2023-6635.json create mode 100644 2023/6xxx/CVE-2023-6636.json create mode 100644 2023/6xxx/CVE-2023-6637.json create mode 100644 2023/6xxx/CVE-2023-6638.json diff --git a/2023/34xxx/CVE-2023-34969.json b/2023/34xxx/CVE-2023-34969.json index 0422adb0434..cc2fcc379c1 100644 --- a/2023/34xxx/CVE-2023-34969.json +++ b/2023/34xxx/CVE-2023-34969.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20231023 [SECURITY] [DLA 3628-1] dbus security update", "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00033.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20231208-0007/", + "url": "https://security.netapp.com/advisory/ntap-20231208-0007/" } ] } diff --git a/2023/3xxx/CVE-2023-3138.json b/2023/3xxx/CVE-2023-3138.json index ff5255f4e91..9df90e85932 100644 --- a/2023/3xxx/CVE-2023-3138.json +++ b/2023/3xxx/CVE-2023-3138.json @@ -63,6 +63,11 @@ "refsource": "MISC", "name": "https://lists.x.org/archives/xorg-announce/2023-June/003407.html", "url": "https://lists.x.org/archives/xorg-announce/2023-June/003407.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20231208-0008/", + "url": "https://security.netapp.com/advisory/ntap-20231208-0008/" } ] }, diff --git a/2023/46xxx/CVE-2023-46246.json b/2023/46xxx/CVE-2023-46246.json index 7c1e6c9b15a..02009826930 100644 --- a/2023/46xxx/CVE-2023-46246.json +++ b/2023/46xxx/CVE-2023-46246.json @@ -72,6 +72,11 @@ "url": "https://github.com/vim/vim/commit/9198c1f2b1ddecde22af918541e0de2a32f0f45a", "refsource": "MISC", "name": "https://github.com/vim/vim/commit/9198c1f2b1ddecde22af918541e0de2a32f0f45a" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20231208-0006/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20231208-0006/" } ] }, diff --git a/2023/46xxx/CVE-2023-46493.json b/2023/46xxx/CVE-2023-46493.json index e4038fde545..5e949142303 100644 --- a/2023/46xxx/CVE-2023-46493.json +++ b/2023/46xxx/CVE-2023-46493.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-46493", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-46493", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Directory Traversal vulnerability in EverShop NPM versions before v.1.0.0-rc.8 allows a remote attacker to obtain sensitive information via a crafted request to the readDirSync function in fileBrowser/browser.js." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://devhub.checkmarx.com/cve-details/Cxa4d94170-be41/", + "refsource": "MISC", + "name": "https://devhub.checkmarx.com/cve-details/Cxa4d94170-be41/" + }, + { + "refsource": "MISC", + "name": "https://devhub.checkmarx.com/cve-details/CVE-2023-46493/", + "url": "https://devhub.checkmarx.com/cve-details/CVE-2023-46493/" } ] } diff --git a/2023/46xxx/CVE-2023-46494.json b/2023/46xxx/CVE-2023-46494.json index 530482cc87b..5655d3909e1 100644 --- a/2023/46xxx/CVE-2023-46494.json +++ b/2023/46xxx/CVE-2023-46494.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-46494", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-46494", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting vulnerability in EverShop NPM versions before v.1.0.0-rc.5 allows a remote attacker to obtain sensitive information via a crafted request to the ProductGrid function in admin/productGrid/Grid.jsx." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://devhub.checkmarx.com/cve-details/Cx8ecec391-2014/", + "refsource": "MISC", + "name": "https://devhub.checkmarx.com/cve-details/Cx8ecec391-2014/" + }, + { + "refsource": "MISC", + "name": "https://devhub.checkmarx.com/cve-details/CVE-2023-46494/", + "url": "https://devhub.checkmarx.com/cve-details/CVE-2023-46494/" } ] } diff --git a/2023/46xxx/CVE-2023-46495.json b/2023/46xxx/CVE-2023-46495.json index eb3570515ed..89b8cf35e63 100644 --- a/2023/46xxx/CVE-2023-46495.json +++ b/2023/46xxx/CVE-2023-46495.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-46495", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-46495", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting vulnerability in EverShop NPM versions before v.1.0.0-rc.8 allows a remote attacker to obtain sensitive information via a crafted request to the sortBy parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://devhub.checkmarx.com/cve-details/Cxbc6d4599-c1bd/", + "refsource": "MISC", + "name": "https://devhub.checkmarx.com/cve-details/Cxbc6d4599-c1bd/" + }, + { + "refsource": "MISC", + "name": "https://devhub.checkmarx.com/cve-details/CVE-2023-46495/", + "url": "https://devhub.checkmarx.com/cve-details/CVE-2023-46495/" } ] } diff --git a/2023/46xxx/CVE-2023-46496.json b/2023/46xxx/CVE-2023-46496.json index bd32b89574a..c55cb620069 100644 --- a/2023/46xxx/CVE-2023-46496.json +++ b/2023/46xxx/CVE-2023-46496.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-46496", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-46496", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Directory Traversal vulnerability in EverShop NPM versions before v.1.0.0-rc.8 allows a remote attacker to obtain sensitive information via a crafted request to the DELETE function in api/files endpoint." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://devhub.checkmarx.com/cve-details/Cx943be66a-54cc/", + "refsource": "MISC", + "name": "https://devhub.checkmarx.com/cve-details/Cx943be66a-54cc/" + }, + { + "refsource": "MISC", + "name": "https://devhub.checkmarx.com/cve-details/CVE-2023-46496/", + "url": "https://devhub.checkmarx.com/cve-details/CVE-2023-46496/" } ] } diff --git a/2023/46xxx/CVE-2023-46497.json b/2023/46xxx/CVE-2023-46497.json index f759571c78f..9e85a4908ba 100644 --- a/2023/46xxx/CVE-2023-46497.json +++ b/2023/46xxx/CVE-2023-46497.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-46497", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-46497", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Directory Traversal vulnerability in EverShop NPM versions before v.1.0.0-rc.8 allows a remote attacker to obtain sensitive information via a crafted request to the mkdirSync function in the folderCreate/createFolder.js endpoint." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://devhub.checkmarx.com/cve-details/Cx16846793-56b6/", + "refsource": "MISC", + "name": "https://devhub.checkmarx.com/cve-details/Cx16846793-56b6/" + }, + { + "refsource": "MISC", + "name": "https://devhub.checkmarx.com/cve-details/CVE-2023-46497/", + "url": "https://devhub.checkmarx.com/cve-details/CVE-2023-46497/" } ] } diff --git a/2023/46xxx/CVE-2023-46498.json b/2023/46xxx/CVE-2023-46498.json index 4b13a7f70ca..b20d469d86d 100644 --- a/2023/46xxx/CVE-2023-46498.json +++ b/2023/46xxx/CVE-2023-46498.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-46498", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-46498", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in EverShop NPM versions before v.1.0.0-rc.8 allows a remote attacker to obtain sensitive information and execute arbitrary code via the /deleteCustomer/route.json file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://devhub.checkmarx.com/cve-details/Cx8b24ace3-0c9a/", + "refsource": "MISC", + "name": "https://devhub.checkmarx.com/cve-details/Cx8b24ace3-0c9a/" + }, + { + "refsource": "MISC", + "name": "https://devhub.checkmarx.com/cve-details/cve-2023-46498/", + "url": "https://devhub.checkmarx.com/cve-details/cve-2023-46498/" } ] } diff --git a/2023/46xxx/CVE-2023-46499.json b/2023/46xxx/CVE-2023-46499.json index 9937086605c..c8a16609a4e 100644 --- a/2023/46xxx/CVE-2023-46499.json +++ b/2023/46xxx/CVE-2023-46499.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-46499", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-46499", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting vulnerability in EverShop NPM versions before v.1.0.0-rc.5 allows a remote attacker to obtain sensitive information via a crafted scripts to the Admin Panel." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://devhub.checkmarx.com/cve-details/Cx0f8b38be-d5de/", + "refsource": "MISC", + "name": "https://devhub.checkmarx.com/cve-details/Cx0f8b38be-d5de/" + }, + { + "refsource": "MISC", + "name": "https://devhub.checkmarx.com/cve-details/cve-2023-46499/", + "url": "https://devhub.checkmarx.com/cve-details/cve-2023-46499/" } ] } diff --git a/2023/46xxx/CVE-2023-46724.json b/2023/46xxx/CVE-2023-46724.json index a6a6b871d70..60ab722a083 100644 --- a/2023/46xxx/CVE-2023-46724.json +++ b/2023/46xxx/CVE-2023-46724.json @@ -109,6 +109,11 @@ "url": "http://www.squid-cache.org/Versions/v6/SQUID-2023_4.patch", "refsource": "MISC", "name": "http://www.squid-cache.org/Versions/v6/SQUID-2023_4.patch" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20231208-0001/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20231208-0001/" } ] }, diff --git a/2023/4xxx/CVE-2023-4399.json b/2023/4xxx/CVE-2023-4399.json index 1ab38bf31d8..52de0948567 100644 --- a/2023/4xxx/CVE-2023-4399.json +++ b/2023/4xxx/CVE-2023-4399.json @@ -74,6 +74,11 @@ "url": "https://grafana.com/security/security-advisories/cve-2023-4399/", "refsource": "MISC", "name": "https://grafana.com/security/security-advisories/cve-2023-4399/" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20231208-0003/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20231208-0003/" } ] }, diff --git a/2023/4xxx/CVE-2023-4692.json b/2023/4xxx/CVE-2023-4692.json index 006663f5581..98ef19a8c2b 100644 --- a/2023/4xxx/CVE-2023-4692.json +++ b/2023/4xxx/CVE-2023-4692.json @@ -151,6 +151,11 @@ "url": "https://security.gentoo.org/glsa/202311-14", "refsource": "MISC", "name": "https://security.gentoo.org/glsa/202311-14" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20231208-0002/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20231208-0002/" } ] }, diff --git a/2023/4xxx/CVE-2023-4693.json b/2023/4xxx/CVE-2023-4693.json index 4ade942d6a3..791ca640a63 100644 --- a/2023/4xxx/CVE-2023-4693.json +++ b/2023/4xxx/CVE-2023-4693.json @@ -151,6 +151,11 @@ "url": "https://security.gentoo.org/glsa/202311-14", "refsource": "MISC", "name": "https://security.gentoo.org/glsa/202311-14" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20231208-0002/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20231208-0002/" } ] }, diff --git a/2023/5xxx/CVE-2023-5088.json b/2023/5xxx/CVE-2023-5088.json index 84c5cf475e9..bb44365bb93 100644 --- a/2023/5xxx/CVE-2023-5088.json +++ b/2023/5xxx/CVE-2023-5088.json @@ -168,6 +168,11 @@ "url": "https://lore.kernel.org/all/20230921160712.99521-1-simon.rowe@nutanix.com/T/", "refsource": "MISC", "name": "https://lore.kernel.org/all/20230921160712.99521-1-simon.rowe@nutanix.com/T/" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20231208-0005/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20231208-0005/" } ] }, diff --git a/2023/5xxx/CVE-2023-5178.json b/2023/5xxx/CVE-2023-5178.json index 2f08cbc2c97..1023b8c1c31 100644 --- a/2023/5xxx/CVE-2023-5178.json +++ b/2023/5xxx/CVE-2023-5178.json @@ -363,6 +363,11 @@ "url": "https://lore.kernel.org/linux-nvme/20231002105428.226515-1-sagi@grimberg.me/", "refsource": "MISC", "name": "https://lore.kernel.org/linux-nvme/20231002105428.226515-1-sagi@grimberg.me/" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20231208-0004/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20231208-0004/" } ] }, diff --git a/2023/5xxx/CVE-2023-5808.json b/2023/5xxx/CVE-2023-5808.json index f3bbd0c321a..f1501579a8e 100644 --- a/2023/5xxx/CVE-2023-5808.json +++ b/2023/5xxx/CVE-2023-5808.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "SMU versions prior to 14.8.7825.01 are susceptible to unintended information disclosure, through URL manipulation. Authenticated users in Storage, Server or combined Server+Storage administrative roles are able to access HNAS configuration backup and diagnostic data, that would normally be barred to those specific administrative roles." + "value": "SMU versions prior to 14.8.7825.01 are susceptible to unintended information disclosure, through URL manipulation. Authenticated users in a Storage administrative role are able to access HNAS configuration backup and diagnostic data, that would normally be barred to that specific administrative role." } ] }, diff --git a/2023/6xxx/CVE-2023-6634.json b/2023/6xxx/CVE-2023-6634.json new file mode 100644 index 00000000000..3bc233d187f --- /dev/null +++ b/2023/6xxx/CVE-2023-6634.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-6634", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/6xxx/CVE-2023-6635.json b/2023/6xxx/CVE-2023-6635.json new file mode 100644 index 00000000000..f11367fa3bf --- /dev/null +++ b/2023/6xxx/CVE-2023-6635.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-6635", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/6xxx/CVE-2023-6636.json b/2023/6xxx/CVE-2023-6636.json new file mode 100644 index 00000000000..cf0c7780624 --- /dev/null +++ b/2023/6xxx/CVE-2023-6636.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-6636", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/6xxx/CVE-2023-6637.json b/2023/6xxx/CVE-2023-6637.json new file mode 100644 index 00000000000..34d36321ee9 --- /dev/null +++ b/2023/6xxx/CVE-2023-6637.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-6637", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/6xxx/CVE-2023-6638.json b/2023/6xxx/CVE-2023-6638.json new file mode 100644 index 00000000000..c9ffbf48c7d --- /dev/null +++ b/2023/6xxx/CVE-2023-6638.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-6638", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file