diff --git a/2022/36xxx/CVE-2022-36440.json b/2022/36xxx/CVE-2022-36440.json index 1ae4260918e..b2636ba6051 100644 --- a/2022/36xxx/CVE-2022-36440.json +++ b/2022/36xxx/CVE-2022-36440.json @@ -76,6 +76,11 @@ "refsource": "FEDORA", "name": "FEDORA-2023-77d00facd0", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBXEXL2ZQBWCBLNUP6P67FHECXQWSK3L/" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5495", + "url": "https://www.debian.org/security/2023/dsa-5495" } ] } diff --git a/2022/40xxx/CVE-2022-40302.json b/2022/40xxx/CVE-2022-40302.json index 8bcc3bb3251..efd36567c33 100644 --- a/2022/40xxx/CVE-2022-40302.json +++ b/2022/40xxx/CVE-2022-40302.json @@ -56,6 +56,11 @@ "url": "https://github.com/FRRouting/frr/releases", "refsource": "MISC", "name": "https://github.com/FRRouting/frr/releases" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5495", + "url": "https://www.debian.org/security/2023/dsa-5495" } ] } diff --git a/2022/40xxx/CVE-2022-40318.json b/2022/40xxx/CVE-2022-40318.json index edab263145a..7b0322abf76 100644 --- a/2022/40xxx/CVE-2022-40318.json +++ b/2022/40xxx/CVE-2022-40318.json @@ -56,6 +56,11 @@ "url": "https://github.com/FRRouting/frr/releases", "refsource": "MISC", "name": "https://github.com/FRRouting/frr/releases" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5495", + "url": "https://www.debian.org/security/2023/dsa-5495" } ] } diff --git a/2022/43xxx/CVE-2022-43681.json b/2022/43xxx/CVE-2022-43681.json index 43dfdd9a210..cbaa3b4f188 100644 --- a/2022/43xxx/CVE-2022-43681.json +++ b/2022/43xxx/CVE-2022-43681.json @@ -56,6 +56,11 @@ "url": "https://forescout.com", "refsource": "MISC", "name": "https://forescout.com" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5495", + "url": "https://www.debian.org/security/2023/dsa-5495" } ] } diff --git a/2023/31xxx/CVE-2023-31490.json b/2023/31xxx/CVE-2023-31490.json index b60e123dd1b..277a7c9c3a0 100644 --- a/2023/31xxx/CVE-2023-31490.json +++ b/2023/31xxx/CVE-2023-31490.json @@ -56,6 +56,11 @@ "url": "https://github.com/FRRouting/frr/issues/13099", "refsource": "MISC", "name": "https://github.com/FRRouting/frr/issues/13099" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5495", + "url": "https://www.debian.org/security/2023/dsa-5495" } ] } diff --git a/2023/38xxx/CVE-2023-38802.json b/2023/38xxx/CVE-2023-38802.json index 9451829b048..28f7e2cded3 100644 --- a/2023/38xxx/CVE-2023-38802.json +++ b/2023/38xxx/CVE-2023-38802.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://news.ycombinator.com/item?id=37305800", "url": "https://news.ycombinator.com/item?id=37305800" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5495", + "url": "https://www.debian.org/security/2023/dsa-5495" } ] } diff --git a/2023/40xxx/CVE-2023-40440.json b/2023/40xxx/CVE-2023-40440.json index 3cc3f503e33..1b7bba3da5e 100644 --- a/2023/40xxx/CVE-2023-40440.json +++ b/2023/40xxx/CVE-2023-40440.json @@ -1,17 +1,63 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-40440", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This issue was addressed with improved state management of S/MIME encrypted emails. This issue is fixed in macOS Monterey 12.6.8. A S/MIME encrypted email may be inadvertently sent unencrypted." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "A S/MIME encrypted email may be inadvertently sent unencrypted" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "12.6" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.apple.com/en-us/HT213844", + "refsource": "MISC", + "name": "https://support.apple.com/en-us/HT213844" } ] } diff --git a/2023/40xxx/CVE-2023-40442.json b/2023/40xxx/CVE-2023-40442.json index bae4e08503f..24dda691017 100644 --- a/2023/40xxx/CVE-2023-40442.json +++ b/2023/40xxx/CVE-2023-40442.json @@ -1,17 +1,85 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-40442", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, macOS Big Sur 11.7.9, macOS Monterey 12.6.8. An app may be able to read sensitive location information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app may be able to read sensitive location information" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "iOS and iPadOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "15.7" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "11.7" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.apple.com/en-us/HT213842", + "refsource": "MISC", + "name": "https://support.apple.com/en-us/HT213842" + }, + { + "url": "https://support.apple.com/en-us/HT213845", + "refsource": "MISC", + "name": "https://support.apple.com/en-us/HT213845" + }, + { + "url": "https://support.apple.com/en-us/HT213844", + "refsource": "MISC", + "name": "https://support.apple.com/en-us/HT213844" } ] } diff --git a/2023/41xxx/CVE-2023-41064.json b/2023/41xxx/CVE-2023-41064.json index c1da8da2ead..5a7c84825e9 100644 --- a/2023/41xxx/CVE-2023-41064.json +++ b/2023/41xxx/CVE-2023-41064.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.5.2, iOS 16.6.1 and iPadOS 16.6.1. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited." + "value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6.9, macOS Big Sur 11.7.10, macOS Ventura 13.5.2, iOS 16.6.1 and iPadOS 16.6.1, iOS 15.7.9 and iPadOS 15.7.9. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited." } ] }, @@ -34,6 +34,18 @@ "vendor_name": "Apple", "product": { "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "12.6" + } + ] + } + }, { "product_name": "iOS and iPadOS", "version": { @@ -45,18 +57,6 @@ } ] } - }, - { - "product_name": "macOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "unspecified", - "version_value": "13.5" - } - ] - } } ] } @@ -66,50 +66,30 @@ }, "references": { "reference_data": [ + { + "url": "https://support.apple.com/en-us/HT213914", + "refsource": "MISC", + "name": "https://support.apple.com/en-us/HT213914" + }, + { + "url": "https://support.apple.com/en-us/HT213915", + "refsource": "MISC", + "name": "https://support.apple.com/en-us/HT213915" + }, { "url": "https://support.apple.com/en-us/HT213905", "refsource": "MISC", "name": "https://support.apple.com/en-us/HT213905" }, + { + "url": "https://support.apple.com/en-us/HT213913", + "refsource": "MISC", + "name": "https://support.apple.com/en-us/HT213913" + }, { "url": "https://support.apple.com/en-us/HT213906", "refsource": "MISC", "name": "https://support.apple.com/en-us/HT213906" - }, - { - "url": "https://support.apple.com/kb/HT213905", - "refsource": "MISC", - "name": "https://support.apple.com/kb/HT213905" - }, - { - "url": "https://support.apple.com/kb/HT213906", - "refsource": "MISC", - "name": "https://support.apple.com/kb/HT213906" - }, - { - "url": "http://seclists.org/fulldisclosure/2023/Sep/3", - "refsource": "MISC", - "name": "http://seclists.org/fulldisclosure/2023/Sep/3" - }, - { - "url": "http://seclists.org/fulldisclosure/2023/Sep/4", - "refsource": "MISC", - "name": "http://seclists.org/fulldisclosure/2023/Sep/4" - }, - { - "url": "https://support.apple.com/kb/HT213915", - "refsource": "MISC", - "name": "https://support.apple.com/kb/HT213915" - }, - { - "url": "https://support.apple.com/kb/HT213914", - "refsource": "MISC", - "name": "https://support.apple.com/kb/HT213914" - }, - { - "url": "https://support.apple.com/kb/HT213913", - "refsource": "MISC", - "name": "https://support.apple.com/kb/HT213913" } ] } diff --git a/2023/41xxx/CVE-2023-41358.json b/2023/41xxx/CVE-2023-41358.json index 4de20f4f0e7..a4912f5f3a8 100644 --- a/2023/41xxx/CVE-2023-41358.json +++ b/2023/41xxx/CVE-2023-41358.json @@ -56,6 +56,11 @@ "url": "https://github.com/FRRouting/frr/pull/14260", "refsource": "MISC", "name": "https://github.com/FRRouting/frr/pull/14260" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5495", + "url": "https://www.debian.org/security/2023/dsa-5495" } ] } diff --git a/2023/41xxx/CVE-2023-41990.json b/2023/41xxx/CVE-2023-41990.json index d2bbac448ac..939fe1a1d6d 100644 --- a/2023/41xxx/CVE-2023-41990.json +++ b/2023/41xxx/CVE-2023-41990.json @@ -1,17 +1,129 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-41990", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The issue was addressed with improved handling of caches. This issue is fixed in macOS Ventura 13.2, iOS 15.7.8 and iPadOS 15.7.8, watchOS 9.3, tvOS 16.3, iOS 16.3 and iPadOS 16.3, macOS Big Sur 11.7.9, macOS Monterey 12.6.8. Processing a font file may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Processing a font file may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1." + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "iOS and iPadOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "16.3" + } + ] + } + }, + { + "product_name": "tvOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "16.3" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "11.7" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "9.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.apple.com/en-us/HT213606", + "refsource": "MISC", + "name": "https://support.apple.com/en-us/HT213606" + }, + { + "url": "https://support.apple.com/en-us/HT213601", + "refsource": "MISC", + "name": "https://support.apple.com/en-us/HT213601" + }, + { + "url": "https://support.apple.com/en-us/HT213842", + "refsource": "MISC", + "name": "https://support.apple.com/en-us/HT213842" + }, + { + "url": "https://support.apple.com/en-us/HT213845", + "refsource": "MISC", + "name": "https://support.apple.com/en-us/HT213845" + }, + { + "url": "https://support.apple.com/en-us/HT213605", + "refsource": "MISC", + "name": "https://support.apple.com/en-us/HT213605" + }, + { + "url": "https://support.apple.com/en-us/HT213844", + "refsource": "MISC", + "name": "https://support.apple.com/en-us/HT213844" + }, + { + "url": "https://support.apple.com/en-us/HT213599", + "refsource": "MISC", + "name": "https://support.apple.com/en-us/HT213599" } ] } diff --git a/2023/42xxx/CVE-2023-42527.json b/2023/42xxx/CVE-2023-42527.json new file mode 100644 index 00000000000..378e2b4a000 --- /dev/null +++ b/2023/42xxx/CVE-2023-42527.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42527", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42528.json b/2023/42xxx/CVE-2023-42528.json new file mode 100644 index 00000000000..ab1db0d873c --- /dev/null +++ b/2023/42xxx/CVE-2023-42528.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42528", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42529.json b/2023/42xxx/CVE-2023-42529.json new file mode 100644 index 00000000000..5ac0fce6524 --- /dev/null +++ b/2023/42xxx/CVE-2023-42529.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42529", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42530.json b/2023/42xxx/CVE-2023-42530.json new file mode 100644 index 00000000000..9b55d7f189d --- /dev/null +++ b/2023/42xxx/CVE-2023-42530.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42530", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42531.json b/2023/42xxx/CVE-2023-42531.json new file mode 100644 index 00000000000..916f1c80da7 --- /dev/null +++ b/2023/42xxx/CVE-2023-42531.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42531", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42532.json b/2023/42xxx/CVE-2023-42532.json new file mode 100644 index 00000000000..b35108ad126 --- /dev/null +++ b/2023/42xxx/CVE-2023-42532.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42532", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42533.json b/2023/42xxx/CVE-2023-42533.json new file mode 100644 index 00000000000..5d6af25f1bb --- /dev/null +++ b/2023/42xxx/CVE-2023-42533.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42533", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42534.json b/2023/42xxx/CVE-2023-42534.json new file mode 100644 index 00000000000..19dbccb1758 --- /dev/null +++ b/2023/42xxx/CVE-2023-42534.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42534", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42535.json b/2023/42xxx/CVE-2023-42535.json new file mode 100644 index 00000000000..60c587ea128 --- /dev/null +++ b/2023/42xxx/CVE-2023-42535.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42535", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42536.json b/2023/42xxx/CVE-2023-42536.json new file mode 100644 index 00000000000..cb92d6be166 --- /dev/null +++ b/2023/42xxx/CVE-2023-42536.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42536", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42537.json b/2023/42xxx/CVE-2023-42537.json new file mode 100644 index 00000000000..adc11987d1c --- /dev/null +++ b/2023/42xxx/CVE-2023-42537.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42537", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42538.json b/2023/42xxx/CVE-2023-42538.json new file mode 100644 index 00000000000..a0ca4cca58a --- /dev/null +++ b/2023/42xxx/CVE-2023-42538.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42538", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42539.json b/2023/42xxx/CVE-2023-42539.json new file mode 100644 index 00000000000..78bbab9d049 --- /dev/null +++ b/2023/42xxx/CVE-2023-42539.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42539", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42540.json b/2023/42xxx/CVE-2023-42540.json new file mode 100644 index 00000000000..1d1f64a2fd8 --- /dev/null +++ b/2023/42xxx/CVE-2023-42540.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42540", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42541.json b/2023/42xxx/CVE-2023-42541.json new file mode 100644 index 00000000000..55127221d4b --- /dev/null +++ b/2023/42xxx/CVE-2023-42541.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42541", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42542.json b/2023/42xxx/CVE-2023-42542.json new file mode 100644 index 00000000000..7739eb9a4c7 --- /dev/null +++ b/2023/42xxx/CVE-2023-42542.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42542", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42543.json b/2023/42xxx/CVE-2023-42543.json new file mode 100644 index 00000000000..5886a3d140c --- /dev/null +++ b/2023/42xxx/CVE-2023-42543.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42543", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42544.json b/2023/42xxx/CVE-2023-42544.json new file mode 100644 index 00000000000..ad912b719ad --- /dev/null +++ b/2023/42xxx/CVE-2023-42544.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42544", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42545.json b/2023/42xxx/CVE-2023-42545.json new file mode 100644 index 00000000000..42a3cb990cc --- /dev/null +++ b/2023/42xxx/CVE-2023-42545.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42545", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42546.json b/2023/42xxx/CVE-2023-42546.json new file mode 100644 index 00000000000..8b513db73e2 --- /dev/null +++ b/2023/42xxx/CVE-2023-42546.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42546", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42547.json b/2023/42xxx/CVE-2023-42547.json new file mode 100644 index 00000000000..e65c61e9fac --- /dev/null +++ b/2023/42xxx/CVE-2023-42547.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42547", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42548.json b/2023/42xxx/CVE-2023-42548.json new file mode 100644 index 00000000000..48b14e2e6b8 --- /dev/null +++ b/2023/42xxx/CVE-2023-42548.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42548", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42549.json b/2023/42xxx/CVE-2023-42549.json new file mode 100644 index 00000000000..5e524ffeddd --- /dev/null +++ b/2023/42xxx/CVE-2023-42549.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42549", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42550.json b/2023/42xxx/CVE-2023-42550.json new file mode 100644 index 00000000000..093d0952a85 --- /dev/null +++ b/2023/42xxx/CVE-2023-42550.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42550", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42551.json b/2023/42xxx/CVE-2023-42551.json new file mode 100644 index 00000000000..92cb81df33d --- /dev/null +++ b/2023/42xxx/CVE-2023-42551.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42551", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42552.json b/2023/42xxx/CVE-2023-42552.json new file mode 100644 index 00000000000..7d55f59eac3 --- /dev/null +++ b/2023/42xxx/CVE-2023-42552.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42552", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42553.json b/2023/42xxx/CVE-2023-42553.json new file mode 100644 index 00000000000..ab1604998bb --- /dev/null +++ b/2023/42xxx/CVE-2023-42553.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42553", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42554.json b/2023/42xxx/CVE-2023-42554.json new file mode 100644 index 00000000000..6840efc9c96 --- /dev/null +++ b/2023/42xxx/CVE-2023-42554.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42554", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42555.json b/2023/42xxx/CVE-2023-42555.json new file mode 100644 index 00000000000..9e4cac98538 --- /dev/null +++ b/2023/42xxx/CVE-2023-42555.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42555", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42556.json b/2023/42xxx/CVE-2023-42556.json new file mode 100644 index 00000000000..f5a25b0c836 --- /dev/null +++ b/2023/42xxx/CVE-2023-42556.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42556", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42557.json b/2023/42xxx/CVE-2023-42557.json new file mode 100644 index 00000000000..45f2d271b5a --- /dev/null +++ b/2023/42xxx/CVE-2023-42557.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42557", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42558.json b/2023/42xxx/CVE-2023-42558.json new file mode 100644 index 00000000000..554a8cf7bf3 --- /dev/null +++ b/2023/42xxx/CVE-2023-42558.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42558", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42559.json b/2023/42xxx/CVE-2023-42559.json new file mode 100644 index 00000000000..f41f1f837bb --- /dev/null +++ b/2023/42xxx/CVE-2023-42559.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42559", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42560.json b/2023/42xxx/CVE-2023-42560.json new file mode 100644 index 00000000000..7057c1ad1d1 --- /dev/null +++ b/2023/42xxx/CVE-2023-42560.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42560", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42561.json b/2023/42xxx/CVE-2023-42561.json new file mode 100644 index 00000000000..221a43704fe --- /dev/null +++ b/2023/42xxx/CVE-2023-42561.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42561", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42562.json b/2023/42xxx/CVE-2023-42562.json new file mode 100644 index 00000000000..984033e80a3 --- /dev/null +++ b/2023/42xxx/CVE-2023-42562.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42562", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42563.json b/2023/42xxx/CVE-2023-42563.json new file mode 100644 index 00000000000..f91b1934e55 --- /dev/null +++ b/2023/42xxx/CVE-2023-42563.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42563", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42564.json b/2023/42xxx/CVE-2023-42564.json new file mode 100644 index 00000000000..f07bef9dc6c --- /dev/null +++ b/2023/42xxx/CVE-2023-42564.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42564", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42565.json b/2023/42xxx/CVE-2023-42565.json new file mode 100644 index 00000000000..5e1e2267baf --- /dev/null +++ b/2023/42xxx/CVE-2023-42565.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42565", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42566.json b/2023/42xxx/CVE-2023-42566.json new file mode 100644 index 00000000000..44bbc0b9a22 --- /dev/null +++ b/2023/42xxx/CVE-2023-42566.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42566", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42567.json b/2023/42xxx/CVE-2023-42567.json new file mode 100644 index 00000000000..3ab72bb1589 --- /dev/null +++ b/2023/42xxx/CVE-2023-42567.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42567", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42568.json b/2023/42xxx/CVE-2023-42568.json new file mode 100644 index 00000000000..20eda680d94 --- /dev/null +++ b/2023/42xxx/CVE-2023-42568.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42568", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42569.json b/2023/42xxx/CVE-2023-42569.json new file mode 100644 index 00000000000..3eb8041ef72 --- /dev/null +++ b/2023/42xxx/CVE-2023-42569.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42569", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42570.json b/2023/42xxx/CVE-2023-42570.json new file mode 100644 index 00000000000..a36ce89e33d --- /dev/null +++ b/2023/42xxx/CVE-2023-42570.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42570", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42571.json b/2023/42xxx/CVE-2023-42571.json new file mode 100644 index 00000000000..e97c17cb333 --- /dev/null +++ b/2023/42xxx/CVE-2023-42571.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42571", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42572.json b/2023/42xxx/CVE-2023-42572.json new file mode 100644 index 00000000000..43f1fb6c08a --- /dev/null +++ b/2023/42xxx/CVE-2023-42572.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42572", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42573.json b/2023/42xxx/CVE-2023-42573.json new file mode 100644 index 00000000000..8b1e763d697 --- /dev/null +++ b/2023/42xxx/CVE-2023-42573.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42573", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42574.json b/2023/42xxx/CVE-2023-42574.json new file mode 100644 index 00000000000..9ec672397d0 --- /dev/null +++ b/2023/42xxx/CVE-2023-42574.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42574", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42575.json b/2023/42xxx/CVE-2023-42575.json new file mode 100644 index 00000000000..f31c2df768a --- /dev/null +++ b/2023/42xxx/CVE-2023-42575.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42575", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42576.json b/2023/42xxx/CVE-2023-42576.json new file mode 100644 index 00000000000..0970a8eaa18 --- /dev/null +++ b/2023/42xxx/CVE-2023-42576.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42576", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42577.json b/2023/42xxx/CVE-2023-42577.json new file mode 100644 index 00000000000..ddccbe0f423 --- /dev/null +++ b/2023/42xxx/CVE-2023-42577.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42577", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42578.json b/2023/42xxx/CVE-2023-42578.json new file mode 100644 index 00000000000..aa990bf824a --- /dev/null +++ b/2023/42xxx/CVE-2023-42578.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42578", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42579.json b/2023/42xxx/CVE-2023-42579.json new file mode 100644 index 00000000000..bfb07971a5d --- /dev/null +++ b/2023/42xxx/CVE-2023-42579.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42579", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42580.json b/2023/42xxx/CVE-2023-42580.json new file mode 100644 index 00000000000..41e9a157280 --- /dev/null +++ b/2023/42xxx/CVE-2023-42580.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42580", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42581.json b/2023/42xxx/CVE-2023-42581.json new file mode 100644 index 00000000000..23ed2853f72 --- /dev/null +++ b/2023/42xxx/CVE-2023-42581.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42581", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42582.json b/2023/42xxx/CVE-2023-42582.json new file mode 100644 index 00000000000..1d1004976b6 --- /dev/null +++ b/2023/42xxx/CVE-2023-42582.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42582", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42583.json b/2023/42xxx/CVE-2023-42583.json new file mode 100644 index 00000000000..f171ecb68ae --- /dev/null +++ b/2023/42xxx/CVE-2023-42583.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42583", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42584.json b/2023/42xxx/CVE-2023-42584.json new file mode 100644 index 00000000000..85cb3d27ddb --- /dev/null +++ b/2023/42xxx/CVE-2023-42584.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42584", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42585.json b/2023/42xxx/CVE-2023-42585.json new file mode 100644 index 00000000000..2832ec410d3 --- /dev/null +++ b/2023/42xxx/CVE-2023-42585.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42585", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42586.json b/2023/42xxx/CVE-2023-42586.json new file mode 100644 index 00000000000..fcd56f0bdcd --- /dev/null +++ b/2023/42xxx/CVE-2023-42586.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42586", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42587.json b/2023/42xxx/CVE-2023-42587.json new file mode 100644 index 00000000000..70f382baf8a --- /dev/null +++ b/2023/42xxx/CVE-2023-42587.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42587", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42588.json b/2023/42xxx/CVE-2023-42588.json new file mode 100644 index 00000000000..98a9a9c0a4e --- /dev/null +++ b/2023/42xxx/CVE-2023-42588.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42588", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42589.json b/2023/42xxx/CVE-2023-42589.json new file mode 100644 index 00000000000..d16ad758407 --- /dev/null +++ b/2023/42xxx/CVE-2023-42589.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42589", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42590.json b/2023/42xxx/CVE-2023-42590.json new file mode 100644 index 00000000000..00248af30cf --- /dev/null +++ b/2023/42xxx/CVE-2023-42590.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42590", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42591.json b/2023/42xxx/CVE-2023-42591.json new file mode 100644 index 00000000000..01acb0154bc --- /dev/null +++ b/2023/42xxx/CVE-2023-42591.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42591", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42592.json b/2023/42xxx/CVE-2023-42592.json new file mode 100644 index 00000000000..e85a1b44727 --- /dev/null +++ b/2023/42xxx/CVE-2023-42592.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42592", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42593.json b/2023/42xxx/CVE-2023-42593.json new file mode 100644 index 00000000000..3ea8bdd8a7d --- /dev/null +++ b/2023/42xxx/CVE-2023-42593.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42593", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42594.json b/2023/42xxx/CVE-2023-42594.json new file mode 100644 index 00000000000..5ea4b87ce5a --- /dev/null +++ b/2023/42xxx/CVE-2023-42594.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42594", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42595.json b/2023/42xxx/CVE-2023-42595.json new file mode 100644 index 00000000000..07127d3c109 --- /dev/null +++ b/2023/42xxx/CVE-2023-42595.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42595", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42596.json b/2023/42xxx/CVE-2023-42596.json new file mode 100644 index 00000000000..dc49e1049ac --- /dev/null +++ b/2023/42xxx/CVE-2023-42596.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42596", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42597.json b/2023/42xxx/CVE-2023-42597.json new file mode 100644 index 00000000000..43b2d70c838 --- /dev/null +++ b/2023/42xxx/CVE-2023-42597.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42597", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42598.json b/2023/42xxx/CVE-2023-42598.json new file mode 100644 index 00000000000..9f834284e92 --- /dev/null +++ b/2023/42xxx/CVE-2023-42598.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42598", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42599.json b/2023/42xxx/CVE-2023-42599.json new file mode 100644 index 00000000000..eea4a3bed0e --- /dev/null +++ b/2023/42xxx/CVE-2023-42599.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42599", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42600.json b/2023/42xxx/CVE-2023-42600.json new file mode 100644 index 00000000000..47247555a47 --- /dev/null +++ b/2023/42xxx/CVE-2023-42600.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42600", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42601.json b/2023/42xxx/CVE-2023-42601.json new file mode 100644 index 00000000000..3092c1b54ad --- /dev/null +++ b/2023/42xxx/CVE-2023-42601.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42601", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42602.json b/2023/42xxx/CVE-2023-42602.json new file mode 100644 index 00000000000..d47df1d9889 --- /dev/null +++ b/2023/42xxx/CVE-2023-42602.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42602", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42603.json b/2023/42xxx/CVE-2023-42603.json new file mode 100644 index 00000000000..079f31d249a --- /dev/null +++ b/2023/42xxx/CVE-2023-42603.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42603", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42604.json b/2023/42xxx/CVE-2023-42604.json new file mode 100644 index 00000000000..6b9759961d5 --- /dev/null +++ b/2023/42xxx/CVE-2023-42604.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42604", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42605.json b/2023/42xxx/CVE-2023-42605.json new file mode 100644 index 00000000000..b6d1850f617 --- /dev/null +++ b/2023/42xxx/CVE-2023-42605.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42605", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42606.json b/2023/42xxx/CVE-2023-42606.json new file mode 100644 index 00000000000..2c40ee4435b --- /dev/null +++ b/2023/42xxx/CVE-2023-42606.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42606", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42607.json b/2023/42xxx/CVE-2023-42607.json new file mode 100644 index 00000000000..b40438c8385 --- /dev/null +++ b/2023/42xxx/CVE-2023-42607.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42607", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/4xxx/CVE-2023-4898.json b/2023/4xxx/CVE-2023-4898.json new file mode 100644 index 00000000000..04056a85600 --- /dev/null +++ b/2023/4xxx/CVE-2023-4898.json @@ -0,0 +1,92 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2023-4898", + "ASSIGNER": "security@huntr.dev", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Authentication Bypass by Primary Weakness in GitHub repository mintplex-labs/anything-llm prior to 0.0.1." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-305 Authentication Bypass by Primary Weakness", + "cweId": "CWE-305" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "mintplex-labs", + "product": { + "product_data": [ + { + "product_name": "mintplex-labs/anything-llm", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "0.0.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://huntr.dev/bounties/a3dda692-7e8a-44a9-bd96-24cfd3f721d2", + "refsource": "MISC", + "name": "https://huntr.dev/bounties/a3dda692-7e8a-44a9-bd96-24cfd3f721d2" + }, + { + "url": "https://github.com/mintplex-labs/anything-llm/commit/dc3dfbf31495fe316b21ee184b9317b38101d30e", + "refsource": "MISC", + "name": "https://github.com/mintplex-labs/anything-llm/commit/dc3dfbf31495fe316b21ee184b9317b38101d30e" + } + ] + }, + "source": { + "advisory": "a3dda692-7e8a-44a9-bd96-24cfd3f721d2", + "discovery": "EXTERNAL" + }, + "impact": { + "cvss": [ + { + "version": "3.0", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 8.2, + "baseSeverity": "HIGH" + } + ] + } +} \ No newline at end of file diff --git a/2023/4xxx/CVE-2023-4899.json b/2023/4xxx/CVE-2023-4899.json new file mode 100644 index 00000000000..2e7bcedc812 --- /dev/null +++ b/2023/4xxx/CVE-2023-4899.json @@ -0,0 +1,92 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2023-4899", + "ASSIGNER": "security@huntr.dev", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": " SQL Injection in GitHub repository mintplex-labs/anything-llm prior to 0.0.1." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "mintplex-labs", + "product": { + "product_data": [ + { + "product_name": "mintplex-labs/anything-llm", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "0.0.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://huntr.dev/bounties/70a2fb18-f030-4abb-9ddc-13f94107ac9d", + "refsource": "MISC", + "name": "https://huntr.dev/bounties/70a2fb18-f030-4abb-9ddc-13f94107ac9d" + }, + { + "url": "https://github.com/mintplex-labs/anything-llm/commit/dc3dfbf31495fe316b21ee184b9317b38101d30e", + "refsource": "MISC", + "name": "https://github.com/mintplex-labs/anything-llm/commit/dc3dfbf31495fe316b21ee184b9317b38101d30e" + } + ] + }, + "source": { + "advisory": "70a2fb18-f030-4abb-9ddc-13f94107ac9d", + "discovery": "EXTERNAL" + }, + "impact": { + "cvss": [ + { + "version": "3.0", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH" + } + ] + } +} \ No newline at end of file