diff --git a/2023/1xxx/CVE-2023-1402.json b/2023/1xxx/CVE-2023-1402.json new file mode 100644 index 00000000000..c7ce2dd6d16 --- /dev/null +++ b/2023/1xxx/CVE-2023-1402.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1402", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/21xxx/CVE-2023-21528.json b/2023/21xxx/CVE-2023-21528.json index 27bf724f911..6e4231cfe89 100644 --- a/2023/21xxx/CVE-2023-21528.json +++ b/2023/21xxx/CVE-2023-21528.json @@ -57,11 +57,21 @@ "version_name": "12.0.0", "version_value": "12.0.6444.4" }, + { + "version_affected": "<", + "version_name": "11.0.0", + "version_value": "11.0.7512.11" + }, { "version_affected": "<", "version_name": "14.0.0", "version_value": "14.0.2047.8" }, + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.6814.4" + }, { "version_affected": "<", "version_name": "16.0.0", diff --git a/2023/21xxx/CVE-2023-21568.json b/2023/21xxx/CVE-2023-21568.json index 48392f0cd1b..1e31680d025 100644 --- a/2023/21xxx/CVE-2023-21568.json +++ b/2023/21xxx/CVE-2023-21568.json @@ -39,57 +39,25 @@ "product": { "product_data": [ { - "product_name": "Microsoft SQL Server", + "product_name": "SQL Server Integration Services for Visual Studio 2019", "version": { "version_data": [ - { - "version_affected": "<", - "version_name": "12.0.0", - "version_value": "12.0.6174.8" - }, - { - "version_affected": "<", - "version_name": "15.0.0", - "version_value": "15.0.2101.7" - }, - { - "version_affected": "<", - "version_name": "13.0.0", - "version_value": "13.0.7024.30" - }, { "version_affected": "<", "version_name": "16.0.0", - "version_value": "16.0.1050.5" - }, - { - "version_affected": "<", - "version_name": "14.0.0", - "version_value": "14.0.2047.8" + "version_value": "16.0.5035.3" } ] } }, { - "product_name": "Microsoft SQL Server 2017", + "product_name": "SQL Server Integration Services for Visual Studio 2022", "version": { "version_data": [ { "version_affected": "<", - "version_name": "14.0.0", - "version_value": "14.0.3460.9" - } - ] - } - }, - { - "product_name": "Microsoft SQL Server 2019", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "15.0.0", - "version_value": "15.0.4280.7" + "version_name": "16.0.0", + "version_value": "16.0.5035.3" } ] } diff --git a/2023/21xxx/CVE-2023-21570.json b/2023/21xxx/CVE-2023-21570.json index e5cc42928ed..43c5fa03385 100644 --- a/2023/21xxx/CVE-2023-21570.json +++ b/2023/21xxx/CVE-2023-21570.json @@ -45,7 +45,7 @@ { "version_affected": "<", "version_name": "9.1.0", - "version_value": "9.1.15.32" + "version_value": "9.1.16.20" } ] } @@ -57,7 +57,7 @@ { "version_affected": "<", "version_name": "9.0.0", - "version_value": "4.2.0.51" + "version_value": "9.0.45.11" } ] } diff --git a/2023/21xxx/CVE-2023-21571.json b/2023/21xxx/CVE-2023-21571.json index c9d6e12e16d..762b2c2dc3d 100644 --- a/2023/21xxx/CVE-2023-21571.json +++ b/2023/21xxx/CVE-2023-21571.json @@ -45,7 +45,7 @@ { "version_affected": "<", "version_name": "9.1.0", - "version_value": "9.1.15.32" + "version_value": "9.1.16.20" } ] } @@ -57,7 +57,7 @@ { "version_affected": "<", "version_name": "9.0.0", - "version_value": "4.2.0.51" + "version_value": "9.0.45.11" } ] } diff --git a/2023/21xxx/CVE-2023-21572.json b/2023/21xxx/CVE-2023-21572.json index 00685522a1e..55d7b2bc08a 100644 --- a/2023/21xxx/CVE-2023-21572.json +++ b/2023/21xxx/CVE-2023-21572.json @@ -45,7 +45,7 @@ { "version_affected": "<", "version_name": "9.1.0", - "version_value": "9.1.15.32" + "version_value": "9.1.16.20" } ] } @@ -57,7 +57,7 @@ { "version_affected": "<", "version_name": "9.0.0", - "version_value": "4.2.0.51" + "version_value": "9.0.45.11" } ] } diff --git a/2023/21xxx/CVE-2023-21573.json b/2023/21xxx/CVE-2023-21573.json index 832ab87df8a..b3342d7d43c 100644 --- a/2023/21xxx/CVE-2023-21573.json +++ b/2023/21xxx/CVE-2023-21573.json @@ -45,7 +45,7 @@ { "version_affected": "<", "version_name": "9.1.0", - "version_value": "9.1.15.32" + "version_value": "9.1.16.20" } ] } @@ -57,7 +57,7 @@ { "version_affected": "<", "version_name": "9.0.0", - "version_value": "4.2.0.51" + "version_value": "9.0.45.11" } ] } diff --git a/2023/21xxx/CVE-2023-21684.json b/2023/21xxx/CVE-2023-21684.json index 190ba1dafc0..b3d03d613c2 100644 --- a/2023/21xxx/CVE-2023-21684.json +++ b/2023/21xxx/CVE-2023-21684.json @@ -11,11 +11,11 @@ "description_data": [ { "lang": "eng", - "value": "Microsoft PostScript Printer Driver Remote Code Execution Vulnerability" + "value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability" }, { "lang": "eng", - "value": "Microsoft PostScript Printer Driver Remote Code Execution Vulnerability" + "value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability" } ] }, diff --git a/2023/21xxx/CVE-2023-21693.json b/2023/21xxx/CVE-2023-21693.json index f9288361f97..f7b3f4542a8 100644 --- a/2023/21xxx/CVE-2023-21693.json +++ b/2023/21xxx/CVE-2023-21693.json @@ -11,11 +11,11 @@ "description_data": [ { "lang": "eng", - "value": "Microsoft PostScript Printer Driver Information Disclosure Vulnerability" + "value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability" }, { "lang": "eng", - "value": "Microsoft PostScript Printer Driver Information Disclosure Vulnerability" + "value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability" } ] }, diff --git a/2023/21xxx/CVE-2023-21705.json b/2023/21xxx/CVE-2023-21705.json index def873e9e11..bd80e72355a 100644 --- a/2023/21xxx/CVE-2023-21705.json +++ b/2023/21xxx/CVE-2023-21705.json @@ -42,6 +42,11 @@ "product_name": "Microsoft SQL Server", "version": { "version_data": [ + { + "version_affected": "<", + "version_name": "11.0.0", + "version_value": "11.0.7512.11" + }, { "version_affected": "<", "version_name": "14.0.0", diff --git a/2023/21xxx/CVE-2023-21707.json b/2023/21xxx/CVE-2023-21707.json index ac49bdb41be..0f0f3e54f16 100644 --- a/2023/21xxx/CVE-2023-21707.json +++ b/2023/21xxx/CVE-2023-21707.json @@ -45,7 +45,7 @@ { "version_affected": "<", "version_name": "15.01.0", - "version_value": "15.01.2507.021" + "version_value": "15.01.2507.023" } ] } @@ -57,7 +57,7 @@ { "version_affected": "<", "version_name": "15.02.0", - "version_value": "15.02.1118.025" + "version_value": "15.02.1118.026" } ] } @@ -69,7 +69,7 @@ { "version_affected": "<", "version_name": "15.02.0", - "version_value": "15.02.0986.041" + "version_value": "15.02.0986.042" } ] } @@ -81,7 +81,7 @@ { "version_affected": "<", "version_name": "15.00.0", - "version_value": "15.00.1497.047" + "version_value": "15.00.1497.048" } ] } diff --git a/2023/21xxx/CVE-2023-21708.json b/2023/21xxx/CVE-2023-21708.json index dd605f3643e..26e1eea0807 100644 --- a/2023/21xxx/CVE-2023-21708.json +++ b/2023/21xxx/CVE-2023-21708.json @@ -1,17 +1,250 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-21708", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secure@microsoft.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability" + }, + { + "lang": "eng", + "value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Windows 10 Version 1809", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, + { + "product_name": "Windows Server 2019", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, + { + "product_name": "Windows Server 2022", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.20348.1607" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.19042.2728" + } + ] + } + }, + { + "product_name": "Windows 11 version 21H2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.22000.1696" + } + ] + } + }, + { + "product_name": "Windows 10 Version 21H2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.19044.2728" + } + ] + } + }, + { + "product_name": "Windows 11 version 22H2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.22000.1413" + } + ] + } + }, + { + "product_name": "Windows 10 Version 22H2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.19045.2728" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1507", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.10240.19805" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1607", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } + }, + { + "product_name": "Windows Server 2016", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } + }, + { + "product_name": "Windows Server 2008", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.0.6003.21966" + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.1.0", + "version_value": "6.1.7601.26415" + }, + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26415" + } + ] + } + }, + { + "product_name": "Windows Server 2012", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.2.0", + "version_value": "6.2.9200.24168" + } + ] + } + }, + { + "product_name": "Windows Server 2012 R2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.3.0", + "version_value": "6.3.9600.20865" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21708", + "refsource": "MISC", + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21708" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "baseSeverity": "CRITICAL", + "baseScore": 9.8, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C" } ] } diff --git a/2023/21xxx/CVE-2023-21713.json b/2023/21xxx/CVE-2023-21713.json index e101d3806b2..aee71270b22 100644 --- a/2023/21xxx/CVE-2023-21713.json +++ b/2023/21xxx/CVE-2023-21713.json @@ -57,6 +57,11 @@ "version_name": "15.0.0", "version_value": "15.0.2101.7" }, + { + "version_affected": "<", + "version_name": "11.0.0", + "version_value": "11.0.7512.11" + }, { "version_affected": "<", "version_name": "14.0.0", diff --git a/2023/21xxx/CVE-2023-21721.json b/2023/21xxx/CVE-2023-21721.json index c63cca11ca7..1a4aef9e3f1 100644 --- a/2023/21xxx/CVE-2023-21721.json +++ b/2023/21xxx/CVE-2023-21721.json @@ -11,11 +11,11 @@ "description_data": [ { "lang": "eng", - "value": "Microsoft OneNote Spoofing Vulnerability" + "value": "Microsoft OneNote Elevation of Privilege Vulnerability" }, { "lang": "eng", - "value": "Microsoft OneNote Spoofing Vulnerability" + "value": "Microsoft OneNote Elevation of Privilege Vulnerability" } ] }, @@ -25,7 +25,7 @@ "description": [ { "lang": "eng", - "value": "Spoofing" + "value": "Elevation of Privilege" } ] } diff --git a/2023/21xxx/CVE-2023-21801.json b/2023/21xxx/CVE-2023-21801.json index c258679e0ab..87cfa48810c 100644 --- a/2023/21xxx/CVE-2023-21801.json +++ b/2023/21xxx/CVE-2023-21801.json @@ -11,11 +11,11 @@ "description_data": [ { "lang": "eng", - "value": "Microsoft PostScript Printer Driver Remote Code Execution Vulnerability" + "value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability" }, { "lang": "eng", - "value": "Microsoft PostScript Printer Driver Remote Code Execution Vulnerability" + "value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability" } ] }, diff --git a/2023/21xxx/CVE-2023-21805.json b/2023/21xxx/CVE-2023-21805.json index c12740bb824..7781f846433 100644 --- a/2023/21xxx/CVE-2023-21805.json +++ b/2023/21xxx/CVE-2023-21805.json @@ -189,12 +189,12 @@ { "version_affected": "<", "version_name": "6.1.0", - "version_value": "1.1.0.0" + "version_value": "6.1.7601.26366" }, { "version_affected": "<", "version_name": "6.0.0", - "version_value": "1.1.0.0" + "version_value": "6.1.7601.26366" } ] } @@ -206,7 +206,7 @@ { "version_affected": "<", "version_name": "6.2.0", - "version_value": "1.1.0.0" + "version_value": "6.2.9200.24116" } ] } @@ -218,7 +218,7 @@ { "version_affected": "<", "version_name": "6.3.0", - "version_value": "6.3.9600.20818" + "version_value": "6.3.9600.20821" } ] } diff --git a/2023/21xxx/CVE-2023-21807.json b/2023/21xxx/CVE-2023-21807.json index e38012cd557..17e137b93cf 100644 --- a/2023/21xxx/CVE-2023-21807.json +++ b/2023/21xxx/CVE-2023-21807.json @@ -45,7 +45,7 @@ { "version_affected": "<", "version_name": "9.1.0", - "version_value": "9.1.15.32" + "version_value": "9.1.16.20" } ] } @@ -57,7 +57,7 @@ { "version_affected": "<", "version_name": "9.0.0", - "version_value": "4.2.0.51" + "version_value": "9.0.45.11" } ] } diff --git a/2023/21xxx/CVE-2023-21808.json b/2023/21xxx/CVE-2023-21808.json index 0f846c42a2b..bff1528b150 100644 --- a/2023/21xxx/CVE-2023-21808.json +++ b/2023/21xxx/CVE-2023-21808.json @@ -94,6 +94,18 @@ ] } }, + { + "product_name": "PowerShell", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "7.2.0", + "version_value": "7.2.10" + } + ] + } + }, { "product_name": "Microsoft .NET Framework 3.5 AND 4.8", "version": { diff --git a/2023/25xxx/CVE-2023-25206.json b/2023/25xxx/CVE-2023-25206.json index 8ef9deb0c25..b7555ff9cff 100644 --- a/2023/25xxx/CVE-2023-25206.json +++ b/2023/25xxx/CVE-2023-25206.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-25206", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-25206", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "PrestaShop ws_productreviews < 3.6.2 is vulnerable to SQL Injection." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://addons.prestashop.com/en/customer-reviews/22373-advanced-reviews-photos-reminder-google-snippets.html", + "refsource": "MISC", + "name": "https://addons.prestashop.com/en/customer-reviews/22373-advanced-reviews-photos-reminder-google-snippets.html" + }, + { + "refsource": "MISC", + "name": "https://friends-of-presta.github.io/security-advisories/modules/2023/03/14/ws_productreviews.html", + "url": "https://friends-of-presta.github.io/security-advisories/modules/2023/03/14/ws_productreviews.html" } ] } diff --git a/2023/27xxx/CVE-2023-27585.json b/2023/27xxx/CVE-2023-27585.json index bca92992afb..dc632a8ec6a 100644 --- a/2023/27xxx/CVE-2023-27585.json +++ b/2023/27xxx/CVE-2023-27585.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-27585", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. A patch is available as commit `d1c5e4d` in the `master` branch. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver implementation instead." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "pjsip", + "product": { + "product_data": [ + { + "product_name": "pjproject", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "<= 2.13" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr", + "refsource": "MISC", + "name": "https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr" + }, + { + "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4", + "refsource": "MISC", + "name": "https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4" + }, + { + "url": "https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5", + "refsource": "MISC", + "name": "https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5" + }, + { + "url": "https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm", + "refsource": "MISC", + "name": "https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm" + } + ] + }, + "source": { + "advisory": "GHSA-q9cp-8wcq-7pfr", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2023/28xxx/CVE-2023-28329.json b/2023/28xxx/CVE-2023-28329.json new file mode 100644 index 00000000000..9d8ce99e199 --- /dev/null +++ b/2023/28xxx/CVE-2023-28329.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28329", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28330.json b/2023/28xxx/CVE-2023-28330.json new file mode 100644 index 00000000000..d86f6fc52da --- /dev/null +++ b/2023/28xxx/CVE-2023-28330.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28330", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28331.json b/2023/28xxx/CVE-2023-28331.json new file mode 100644 index 00000000000..1f0c5e01e76 --- /dev/null +++ b/2023/28xxx/CVE-2023-28331.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28331", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28332.json b/2023/28xxx/CVE-2023-28332.json new file mode 100644 index 00000000000..f56c3ae5e5c --- /dev/null +++ b/2023/28xxx/CVE-2023-28332.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28332", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28333.json b/2023/28xxx/CVE-2023-28333.json new file mode 100644 index 00000000000..7e47c145490 --- /dev/null +++ b/2023/28xxx/CVE-2023-28333.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28333", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28334.json b/2023/28xxx/CVE-2023-28334.json new file mode 100644 index 00000000000..d0d1d2ef669 --- /dev/null +++ b/2023/28xxx/CVE-2023-28334.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28334", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28335.json b/2023/28xxx/CVE-2023-28335.json new file mode 100644 index 00000000000..6bd4a358ca7 --- /dev/null +++ b/2023/28xxx/CVE-2023-28335.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28335", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28336.json b/2023/28xxx/CVE-2023-28336.json new file mode 100644 index 00000000000..7470a732c92 --- /dev/null +++ b/2023/28xxx/CVE-2023-28336.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28336", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file