From dfca61ae94e47c3a4435f21834c46766d42bf9e0 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 17 Feb 2023 19:00:38 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/34xxx/CVE-2022-34351.json | 89 ++++++++++++++++++++++++++++++++-- 2022/40xxx/CVE-2022-40231.json | 88 +++++++++++++++++++++++++++++++-- 2022/43xxx/CVE-2022-43579.json | 89 ++++++++++++++++++++++++++++++++-- 2023/0xxx/CVE-2023-0896.json | 18 +++++++ 2023/23xxx/CVE-2023-23279.json | 56 ++++++++++++++++++--- 2023/24xxx/CVE-2023-24188.json | 6 +-- 2023/24xxx/CVE-2023-24960.json | 83 +++++++++++++++++++++++++++++-- 2023/26xxx/CVE-2023-26021.json | 18 +++++++ 2023/26xxx/CVE-2023-26022.json | 18 +++++++ 2023/26xxx/CVE-2023-26023.json | 18 +++++++ 2023/26xxx/CVE-2023-26024.json | 18 +++++++ 2023/26xxx/CVE-2023-26025.json | 18 +++++++ 2023/26xxx/CVE-2023-26026.json | 18 +++++++ 2023/26xxx/CVE-2023-26027.json | 18 +++++++ 2023/26xxx/CVE-2023-26028.json | 18 +++++++ 2023/26xxx/CVE-2023-26029.json | 18 +++++++ 2023/26xxx/CVE-2023-26030.json | 18 +++++++ 17 files changed, 584 insertions(+), 25 deletions(-) create mode 100644 2023/0xxx/CVE-2023-0896.json create mode 100644 2023/26xxx/CVE-2023-26021.json create mode 100644 2023/26xxx/CVE-2023-26022.json create mode 100644 2023/26xxx/CVE-2023-26023.json create mode 100644 2023/26xxx/CVE-2023-26024.json create mode 100644 2023/26xxx/CVE-2023-26025.json create mode 100644 2023/26xxx/CVE-2023-26026.json create mode 100644 2023/26xxx/CVE-2023-26027.json create mode 100644 2023/26xxx/CVE-2023-26028.json create mode 100644 2023/26xxx/CVE-2023-26029.json create mode 100644 2023/26xxx/CVE-2023-26030.json diff --git a/2022/34xxx/CVE-2022-34351.json b/2022/34xxx/CVE-2022-34351.json index 36012dc8606..3987fe9a577 100644 --- a/2022/34xxx/CVE-2022-34351.json +++ b/2022/34xxx/CVE-2022-34351.json @@ -1,17 +1,98 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-34351", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM QRadar SIEM 7.4 and 7.5 is vulnerable to information exposure allowing a non-tenant user with a specific domain security profile assigned to see some data from other domains. IBM X-Force ID: 230402." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", + "cweId": "CWE-200" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "QRadar SIEM", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "7.4.0", + "version_value": "7.4.3 Fix Pack 7" + }, + { + "version_affected": "<", + "version_name": "7.5.0", + "version_value": "7.5.0 Update Pack 3 " + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6955059", + "refsource": "MISC", + "name": "https://www.ibm.com/support/pages/node/6955059" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/230402", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/230402" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2022/40xxx/CVE-2022-40231.json b/2022/40xxx/CVE-2022-40231.json index bc8c1537723..a344756bdc8 100644 --- a/2022/40xxx/CVE-2022-40231.json +++ b/2022/40xxx/CVE-2022-40231.json @@ -1,17 +1,97 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-40231", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.7 and 6.1.0.0 through 6.1.2.0 could allow an authenticated user to perform unauthorized actions due to improper access controls. IBM X-Force ID: 235533." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "284 Improper Access Control" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Sterling B2B Integrator Standard Edition", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0.0", + "version_value": "6.0.3.7" + }, + { + "version_affected": "<", + "version_name": "6.1.0.0", + "version_value": "6.1.2.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6954771", + "refsource": "MISC", + "name": "https://www.ibm.com/support/pages/node/6954771" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/235533", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/235533" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "version": "3.1" } ] } diff --git a/2022/43xxx/CVE-2022-43579.json b/2022/43xxx/CVE-2022-43579.json index 7767ef567a4..e7c16b95109 100644 --- a/2022/43xxx/CVE-2022-43579.json +++ b/2022/43xxx/CVE-2022-43579.json @@ -1,17 +1,98 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-43579", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.7 and 6.1.0.0 through 6.1.2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 238684." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Sterling B2B Integrator Standard Edition", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0.0", + "version_value": "6.0.3.7" + }, + { + "version_affected": "<", + "version_name": "6.1.0.0", + "version_value": "6.1.2.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6954765", + "refsource": "MISC", + "name": "https://www.ibm.com/support/pages/node/6954765" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/238684", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/238684" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2023/0xxx/CVE-2023-0896.json b/2023/0xxx/CVE-2023-0896.json new file mode 100644 index 00000000000..a5318fc273a --- /dev/null +++ b/2023/0xxx/CVE-2023-0896.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-0896", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23279.json b/2023/23xxx/CVE-2023-23279.json index cddc54c80bc..4e1e069eec7 100644 --- a/2023/23xxx/CVE-2023-23279.json +++ b/2023/23xxx/CVE-2023-23279.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-23279", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-23279", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Canteen Management System 1.0 is vulnerable to SQL Injection via /php_action/getOrderReport.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://hackmd.io/mG658E9iSW6TkbS8xAuUNg", + "refsource": "MISC", + "name": "https://hackmd.io/mG658E9iSW6TkbS8xAuUNg" } ] } diff --git a/2023/24xxx/CVE-2023-24188.json b/2023/24xxx/CVE-2023-24188.json index 120600e77f7..4696137df70 100644 --- a/2023/24xxx/CVE-2023-24188.json +++ b/2023/24xxx/CVE-2023-24188.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "ureport v2.2.9 was discovered to contain an arbitrary file deletion vulnerability." + "value": "ureport v2.2.9 was discovered to contain a directory traversal vulnerability via the deletion function which allows for arbitrary files to be deleted." } ] }, @@ -64,8 +64,8 @@ }, { "refsource": "MISC", - "name": "https://github.com/cgddgc/vulns/blob/main/ureport2-filedelete-vuln.md", - "url": "https://github.com/cgddgc/vulns/blob/main/ureport2-filedelete-vuln.md" + "name": "https://github.com/Venus-WQLab/bug_report/blob/main/ureport/ureport-cve-2023-24188.md", + "url": "https://github.com/Venus-WQLab/bug_report/blob/main/ureport/ureport-cve-2023-24188.md" } ] } diff --git a/2023/24xxx/CVE-2023-24960.json b/2023/24xxx/CVE-2023-24960.json index 6ac8efa72d0..8c65d3847b8 100644 --- a/2023/24xxx/CVE-2023-24960.json +++ b/2023/24xxx/CVE-2023-24960.json @@ -1,17 +1,92 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-24960", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM InfoSphere Information Server 11.7 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 246333" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", + "cweId": "CWE-22" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "InfoSphere Information Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "11.7" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6953521", + "refsource": "MISC", + "name": "https://www.ibm.com/support/pages/node/6953521" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/246333", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/246333" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2023/26xxx/CVE-2023-26021.json b/2023/26xxx/CVE-2023-26021.json new file mode 100644 index 00000000000..73354f6ea4f --- /dev/null +++ b/2023/26xxx/CVE-2023-26021.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-26021", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/26xxx/CVE-2023-26022.json b/2023/26xxx/CVE-2023-26022.json new file mode 100644 index 00000000000..a6aa791680c --- /dev/null +++ b/2023/26xxx/CVE-2023-26022.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-26022", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/26xxx/CVE-2023-26023.json b/2023/26xxx/CVE-2023-26023.json new file mode 100644 index 00000000000..920e1261586 --- /dev/null +++ b/2023/26xxx/CVE-2023-26023.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-26023", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/26xxx/CVE-2023-26024.json b/2023/26xxx/CVE-2023-26024.json new file mode 100644 index 00000000000..e941f07faf8 --- /dev/null +++ b/2023/26xxx/CVE-2023-26024.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-26024", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/26xxx/CVE-2023-26025.json b/2023/26xxx/CVE-2023-26025.json new file mode 100644 index 00000000000..40abd4c273c --- /dev/null +++ b/2023/26xxx/CVE-2023-26025.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-26025", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/26xxx/CVE-2023-26026.json b/2023/26xxx/CVE-2023-26026.json new file mode 100644 index 00000000000..9b205c7a47b --- /dev/null +++ b/2023/26xxx/CVE-2023-26026.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-26026", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/26xxx/CVE-2023-26027.json b/2023/26xxx/CVE-2023-26027.json new file mode 100644 index 00000000000..47c7c3dbcb4 --- /dev/null +++ b/2023/26xxx/CVE-2023-26027.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-26027", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/26xxx/CVE-2023-26028.json b/2023/26xxx/CVE-2023-26028.json new file mode 100644 index 00000000000..79e21922ca8 --- /dev/null +++ b/2023/26xxx/CVE-2023-26028.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-26028", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/26xxx/CVE-2023-26029.json b/2023/26xxx/CVE-2023-26029.json new file mode 100644 index 00000000000..e5ab290fe3d --- /dev/null +++ b/2023/26xxx/CVE-2023-26029.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-26029", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/26xxx/CVE-2023-26030.json b/2023/26xxx/CVE-2023-26030.json new file mode 100644 index 00000000000..c784fdb5889 --- /dev/null +++ b/2023/26xxx/CVE-2023-26030.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-26030", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file