From e8434eb0d9609d5ea0d4e17084d1c8dafcc26354 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 12 Apr 2023 16:00:35 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/15xxx/CVE-2019-15132.json | 5 ++ 2020/15xxx/CVE-2020-15803.json | 5 ++ 2021/27xxx/CVE-2021-27927.json | 5 ++ 2022/24xxx/CVE-2022-24349.json | 5 ++ 2022/24xxx/CVE-2022-24917.json | 5 ++ 2022/24xxx/CVE-2022-24919.json | 5 ++ 2022/35xxx/CVE-2022-35229.json | 7 ++- 2022/35xxx/CVE-2022-35230.json | 7 ++- 2023/1xxx/CVE-2023-1872.json | 90 ++++++++++++++++++++++++++++++++-- 2023/28xxx/CVE-2023-28488.json | 61 ++++++++++++++++++++--- 2023/29xxx/CVE-2023-29581.json | 61 ++++++++++++++++++++--- 2023/2xxx/CVE-2023-2005.json | 18 +++++++ 2023/2xxx/CVE-2023-2006.json | 18 +++++++ 2023/2xxx/CVE-2023-2007.json | 18 +++++++ 2023/2xxx/CVE-2023-2008.json | 18 +++++++ 2023/30xxx/CVE-2023-30534.json | 18 +++++++ 2023/30xxx/CVE-2023-30535.json | 18 +++++++ 2023/30xxx/CVE-2023-30536.json | 18 +++++++ 2023/30xxx/CVE-2023-30537.json | 18 +++++++ 2023/30xxx/CVE-2023-30538.json | 18 +++++++ 2023/30xxx/CVE-2023-30539.json | 18 +++++++ 2023/30xxx/CVE-2023-30540.json | 18 +++++++ 2023/30xxx/CVE-2023-30541.json | 18 +++++++ 2023/30xxx/CVE-2023-30542.json | 18 +++++++ 2023/30xxx/CVE-2023-30543.json | 18 +++++++ 2023/30xxx/CVE-2023-30544.json | 18 +++++++ 2023/30xxx/CVE-2023-30545.json | 18 +++++++ 2023/30xxx/CVE-2023-30546.json | 18 +++++++ 2023/30xxx/CVE-2023-30547.json | 18 +++++++ 2023/30xxx/CVE-2023-30548.json | 18 +++++++ 2023/30xxx/CVE-2023-30549.json | 18 +++++++ 2023/30xxx/CVE-2023-30550.json | 18 +++++++ 2023/30xxx/CVE-2023-30551.json | 18 +++++++ 2023/30xxx/CVE-2023-30552.json | 18 +++++++ 2023/30xxx/CVE-2023-30553.json | 18 +++++++ 2023/30xxx/CVE-2023-30554.json | 18 +++++++ 2023/30xxx/CVE-2023-30555.json | 18 +++++++ 2023/30xxx/CVE-2023-30556.json | 18 +++++++ 2023/30xxx/CVE-2023-30557.json | 18 +++++++ 2023/30xxx/CVE-2023-30558.json | 18 +++++++ 40 files changed, 760 insertions(+), 18 deletions(-) create mode 100644 2023/2xxx/CVE-2023-2005.json create mode 100644 2023/2xxx/CVE-2023-2006.json create mode 100644 2023/2xxx/CVE-2023-2007.json create mode 100644 2023/2xxx/CVE-2023-2008.json create mode 100644 2023/30xxx/CVE-2023-30534.json create mode 100644 2023/30xxx/CVE-2023-30535.json create mode 100644 2023/30xxx/CVE-2023-30536.json create mode 100644 2023/30xxx/CVE-2023-30537.json create mode 100644 2023/30xxx/CVE-2023-30538.json create mode 100644 2023/30xxx/CVE-2023-30539.json create mode 100644 2023/30xxx/CVE-2023-30540.json create mode 100644 2023/30xxx/CVE-2023-30541.json create mode 100644 2023/30xxx/CVE-2023-30542.json create mode 100644 2023/30xxx/CVE-2023-30543.json create mode 100644 2023/30xxx/CVE-2023-30544.json create mode 100644 2023/30xxx/CVE-2023-30545.json create mode 100644 2023/30xxx/CVE-2023-30546.json create mode 100644 2023/30xxx/CVE-2023-30547.json create mode 100644 2023/30xxx/CVE-2023-30548.json create mode 100644 2023/30xxx/CVE-2023-30549.json create mode 100644 2023/30xxx/CVE-2023-30550.json create mode 100644 2023/30xxx/CVE-2023-30551.json create mode 100644 2023/30xxx/CVE-2023-30552.json create mode 100644 2023/30xxx/CVE-2023-30553.json create mode 100644 2023/30xxx/CVE-2023-30554.json create mode 100644 2023/30xxx/CVE-2023-30555.json create mode 100644 2023/30xxx/CVE-2023-30556.json create mode 100644 2023/30xxx/CVE-2023-30557.json create mode 100644 2023/30xxx/CVE-2023-30558.json diff --git a/2019/15xxx/CVE-2019-15132.json b/2019/15xxx/CVE-2019-15132.json index 1d43ef35022..9e5a4e44e81 100644 --- a/2019/15xxx/CVE-2019-15132.json +++ b/2019/15xxx/CVE-2019-15132.json @@ -61,6 +61,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210421 [SECURITY] [DLA 2631-1] zabbix security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html" } ] } diff --git a/2020/15xxx/CVE-2020-15803.json b/2020/15xxx/CVE-2020-15803.json index bb77987e4dc..cda8ca2ac68 100644 --- a/2020/15xxx/CVE-2020-15803.json +++ b/2020/15xxx/CVE-2020-15803.json @@ -81,6 +81,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210421 [SECURITY] [DLA 2631-1] zabbix security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html" } ] } diff --git a/2021/27xxx/CVE-2021-27927.json b/2021/27xxx/CVE-2021-27927.json index f4b4ba1c6b8..181e54c3d20 100644 --- a/2021/27xxx/CVE-2021-27927.json +++ b/2021/27xxx/CVE-2021-27927.json @@ -56,6 +56,11 @@ "url": "https://support.zabbix.com/browse/ZBX-18942", "refsource": "MISC", "name": "https://support.zabbix.com/browse/ZBX-18942" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html" } ] }, diff --git a/2022/24xxx/CVE-2022-24349.json b/2022/24xxx/CVE-2022-24349.json index e6b5c8c1366..28df743557e 100644 --- a/2022/24xxx/CVE-2022-24349.json +++ b/2022/24xxx/CVE-2022-24349.json @@ -133,6 +133,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20220412 [SECURITY] [DLA 2980-1] zabbix security update", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html" } ] }, diff --git a/2022/24xxx/CVE-2022-24917.json b/2022/24xxx/CVE-2022-24917.json index 07895a6dcd7..a005f6439a1 100644 --- a/2022/24xxx/CVE-2022-24917.json +++ b/2022/24xxx/CVE-2022-24917.json @@ -125,6 +125,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20220412 [SECURITY] [DLA 2980-1] zabbix security update", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html" } ] }, diff --git a/2022/24xxx/CVE-2022-24919.json b/2022/24xxx/CVE-2022-24919.json index 6794c3149d0..caaa1faad3b 100644 --- a/2022/24xxx/CVE-2022-24919.json +++ b/2022/24xxx/CVE-2022-24919.json @@ -133,6 +133,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20220412 [SECURITY] [DLA 2980-1] zabbix security update", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html" } ] }, diff --git a/2022/35xxx/CVE-2022-35229.json b/2022/35xxx/CVE-2022-35229.json index d8e7dc897a5..1f6cab3dab3 100644 --- a/2022/35xxx/CVE-2022-35229.json +++ b/2022/35xxx/CVE-2022-35229.json @@ -97,6 +97,11 @@ "refsource": "MISC", "url": "https://support.zabbix.com/browse/ZBX-21306", "name": "https://support.zabbix.com/browse/ZBX-21306" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html" } ] }, @@ -115,4 +120,4 @@ "value": "The vulnerability can be exploited only by authenticated users. If an immediate update is not possible, review user access rights to your Zabbix Frontend, be attentive to browser warnings and always check any links you can receive via email or other means of communication, which lead to the discoveryconf.php page of Zabbix Frontend and contain suspicious parameters with special symbols. If you have clicked on the suspicious link, do not fill out the opened form." } ] -} +} \ No newline at end of file diff --git a/2022/35xxx/CVE-2022-35230.json b/2022/35xxx/CVE-2022-35230.json index 404dc27268d..53f8321be87 100644 --- a/2022/35xxx/CVE-2022-35230.json +++ b/2022/35xxx/CVE-2022-35230.json @@ -89,6 +89,11 @@ "refsource": "MISC", "url": "https://support.zabbix.com/browse/ZBX-21305", "name": "https://support.zabbix.com/browse/ZBX-21305" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html" } ] }, @@ -107,4 +112,4 @@ "value": "The vulnerability can be exploited only by authenticated users. If an immediate update is not possible, review user access rights to your Zabbix Frontend, be attentive to browser warnings and always check any links you can receive via email or other means of communication, which lead to the graphs.php page of Zabbix Frontend and contain suspicious parameters with special symbols. If you have clicked on the suspicious link, do not fill out the opened form" } ] -} +} \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1872.json b/2023/1xxx/CVE-2023-1872.json index 28b91c1cd8c..c7a621b3a03 100644 --- a/2023/1xxx/CVE-2023-1872.json +++ b/2023/1xxx/CVE-2023-1872.json @@ -1,17 +1,99 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-1872", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@google.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation.\n\nThe io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered.\n\nWe recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-416 Use After Free", + "cweId": "CWE-416" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux Kernel", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "5.7", + "version_value": "5.17" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=08681391b84da27133deefaaddefd0acfa90c2be", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=08681391b84da27133deefaaddefd0acfa90c2be" + }, + { + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=da24142b1ef9fd5d36b76e36bab328a5b27523e8", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=da24142b1ef9fd5d36b76e36bab328a5b27523e8" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Bing-Jhong Billy Jheng of Starlabs" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/28xxx/CVE-2023-28488.json b/2023/28xxx/CVE-2023-28488.json index 2d2a8b69dee..dcd986956f9 100644 --- a/2023/28xxx/CVE-2023-28488.json +++ b/2023/28xxx/CVE-2023-28488.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-28488", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-28488", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "client.c in gdhcp in ConnMan through 1.41 could be used by network-adjacent attackers (operating a crafted DHCP server) to cause a stack-based buffer overflow and denial of service, terminating the connman process." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://kernel.googlesource.com/pub/scm/network/connman/connman/+/99e2c16ea1cced34a5dc450d76287a1c3e762138", + "url": "https://kernel.googlesource.com/pub/scm/network/connman/connman/+/99e2c16ea1cced34a5dc450d76287a1c3e762138" + }, + { + "refsource": "MISC", + "name": "https://github.com/moehw/poc_exploits/tree/master/CVE-2023-28488", + "url": "https://github.com/moehw/poc_exploits/tree/master/CVE-2023-28488" } ] } diff --git a/2023/29xxx/CVE-2023-29581.json b/2023/29xxx/CVE-2023-29581.json index 2961ca57795..7d722a61cd6 100644 --- a/2023/29xxx/CVE-2023-29581.json +++ b/2023/29xxx/CVE-2023-29581.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-29581", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-29581", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function delete_Token at /nasm/nasm-pp.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/yasm/yasm/issues/216", + "refsource": "MISC", + "name": "https://github.com/yasm/yasm/issues/216" + }, + { + "url": "https://github.com/z1r00/fuzz_vuln/blob/main/yasm/segv/delete_Token/readme.md", + "refsource": "MISC", + "name": "https://github.com/z1r00/fuzz_vuln/blob/main/yasm/segv/delete_Token/readme.md" } ] } diff --git a/2023/2xxx/CVE-2023-2005.json b/2023/2xxx/CVE-2023-2005.json new file mode 100644 index 00000000000..94ac38975d4 --- /dev/null +++ b/2023/2xxx/CVE-2023-2005.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-2005", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/2xxx/CVE-2023-2006.json b/2023/2xxx/CVE-2023-2006.json new file mode 100644 index 00000000000..f137bf0664e --- /dev/null +++ b/2023/2xxx/CVE-2023-2006.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-2006", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/2xxx/CVE-2023-2007.json b/2023/2xxx/CVE-2023-2007.json new file mode 100644 index 00000000000..78550b9a437 --- /dev/null +++ b/2023/2xxx/CVE-2023-2007.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-2007", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/2xxx/CVE-2023-2008.json b/2023/2xxx/CVE-2023-2008.json new file mode 100644 index 00000000000..cf2c550b38f --- /dev/null +++ b/2023/2xxx/CVE-2023-2008.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-2008", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30534.json b/2023/30xxx/CVE-2023-30534.json new file mode 100644 index 00000000000..0d44ae4191d --- /dev/null +++ b/2023/30xxx/CVE-2023-30534.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30534", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30535.json b/2023/30xxx/CVE-2023-30535.json new file mode 100644 index 00000000000..50313fdb934 --- /dev/null +++ b/2023/30xxx/CVE-2023-30535.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30535", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30536.json b/2023/30xxx/CVE-2023-30536.json new file mode 100644 index 00000000000..a2eb017f37b --- /dev/null +++ b/2023/30xxx/CVE-2023-30536.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30536", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30537.json b/2023/30xxx/CVE-2023-30537.json new file mode 100644 index 00000000000..1373bc44e6c --- /dev/null +++ b/2023/30xxx/CVE-2023-30537.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30537", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30538.json b/2023/30xxx/CVE-2023-30538.json new file mode 100644 index 00000000000..bc726be8e41 --- /dev/null +++ b/2023/30xxx/CVE-2023-30538.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30538", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30539.json b/2023/30xxx/CVE-2023-30539.json new file mode 100644 index 00000000000..7da38ce9321 --- /dev/null +++ b/2023/30xxx/CVE-2023-30539.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30539", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30540.json b/2023/30xxx/CVE-2023-30540.json new file mode 100644 index 00000000000..827c03e09d0 --- /dev/null +++ b/2023/30xxx/CVE-2023-30540.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30540", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30541.json b/2023/30xxx/CVE-2023-30541.json new file mode 100644 index 00000000000..c331d89f61d --- /dev/null +++ b/2023/30xxx/CVE-2023-30541.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30541", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30542.json b/2023/30xxx/CVE-2023-30542.json new file mode 100644 index 00000000000..48a786acba1 --- /dev/null +++ b/2023/30xxx/CVE-2023-30542.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30542", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30543.json b/2023/30xxx/CVE-2023-30543.json new file mode 100644 index 00000000000..3e8b2678dac --- /dev/null +++ b/2023/30xxx/CVE-2023-30543.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30543", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30544.json b/2023/30xxx/CVE-2023-30544.json new file mode 100644 index 00000000000..f2e0ab5849f --- /dev/null +++ b/2023/30xxx/CVE-2023-30544.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30544", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30545.json b/2023/30xxx/CVE-2023-30545.json new file mode 100644 index 00000000000..100eee79004 --- /dev/null +++ b/2023/30xxx/CVE-2023-30545.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30545", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30546.json b/2023/30xxx/CVE-2023-30546.json new file mode 100644 index 00000000000..fcb4fe4389b --- /dev/null +++ b/2023/30xxx/CVE-2023-30546.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30546", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30547.json b/2023/30xxx/CVE-2023-30547.json new file mode 100644 index 00000000000..4a715637650 --- /dev/null +++ b/2023/30xxx/CVE-2023-30547.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30547", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30548.json b/2023/30xxx/CVE-2023-30548.json new file mode 100644 index 00000000000..26b3dca9768 --- /dev/null +++ b/2023/30xxx/CVE-2023-30548.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30548", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30549.json b/2023/30xxx/CVE-2023-30549.json new file mode 100644 index 00000000000..f63f238689a --- /dev/null +++ b/2023/30xxx/CVE-2023-30549.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30549", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30550.json b/2023/30xxx/CVE-2023-30550.json new file mode 100644 index 00000000000..c7c4dacc513 --- /dev/null +++ b/2023/30xxx/CVE-2023-30550.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30550", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30551.json b/2023/30xxx/CVE-2023-30551.json new file mode 100644 index 00000000000..5b28c87bcfb --- /dev/null +++ b/2023/30xxx/CVE-2023-30551.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30551", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30552.json b/2023/30xxx/CVE-2023-30552.json new file mode 100644 index 00000000000..c1d0c3a649d --- /dev/null +++ b/2023/30xxx/CVE-2023-30552.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30552", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30553.json b/2023/30xxx/CVE-2023-30553.json new file mode 100644 index 00000000000..a8c1c844d19 --- /dev/null +++ b/2023/30xxx/CVE-2023-30553.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30553", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30554.json b/2023/30xxx/CVE-2023-30554.json new file mode 100644 index 00000000000..9c126181f50 --- /dev/null +++ b/2023/30xxx/CVE-2023-30554.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30554", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30555.json b/2023/30xxx/CVE-2023-30555.json new file mode 100644 index 00000000000..74cc823d33f --- /dev/null +++ b/2023/30xxx/CVE-2023-30555.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30555", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30556.json b/2023/30xxx/CVE-2023-30556.json new file mode 100644 index 00000000000..2d2059838ba --- /dev/null +++ b/2023/30xxx/CVE-2023-30556.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30556", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30557.json b/2023/30xxx/CVE-2023-30557.json new file mode 100644 index 00000000000..fda42816f53 --- /dev/null +++ b/2023/30xxx/CVE-2023-30557.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30557", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30558.json b/2023/30xxx/CVE-2023-30558.json new file mode 100644 index 00000000000..2c17e57f4d2 --- /dev/null +++ b/2023/30xxx/CVE-2023-30558.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-30558", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file