diff --git a/2022/39xxx/CVE-2022-39379.json b/2022/39xxx/CVE-2022-39379.json index 68dcbe286b3..947eca231f1 100644 --- a/2022/39xxx/CVE-2022-39379.json +++ b/2022/39xxx/CVE-2022-39379.json @@ -78,6 +78,11 @@ "name": "https://github.com/fluent/fluentd/commit/48e5b85dab1b6d4c273090d538fc11b3f2fd8135", "refsource": "MISC", "url": "https://github.com/fluent/fluentd/commit/48e5b85dab1b6d4c273090d538fc11b3f2fd8135" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2023-6b9e2a6534", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYD5QV66OLDHES6IKVYYM3Y3YID3VVCO/" } ] }, diff --git a/2022/43xxx/CVE-2022-43390.json b/2022/43xxx/CVE-2022-43390.json index b671f6440ff..20db493089e 100644 --- a/2022/43xxx/CVE-2022-43390.json +++ b/2022/43xxx/CVE-2022-43390.json @@ -15,7 +15,7 @@ "product": { "product_data": [ { - "product_name": "Nebula NR7101 firmware", + "product_name": "NR7101 firmware", "version": { "version_data": [ { @@ -62,7 +62,7 @@ "description_data": [ { "lang": "eng", - "value": "A command injection vulnerability in the CGI program of Zyxel Nebula NR7101 firmware prior to V1.15(ACCC.3)C0, which could allow an authenticated attacker to execute some OS commands on a vulnerable device by sending a crafted HTTP request." + "value": "A command injection vulnerability in the CGI program of Zyxel NR7101 firmware prior to V1.15(ACCC.3)C0, which could allow an authenticated attacker to execute some OS commands on a vulnerable device by sending a crafted HTTP request." } ] } diff --git a/2022/43xxx/CVE-2022-43391.json b/2022/43xxx/CVE-2022-43391.json index 2bce753dc63..ed6d0f48d09 100644 --- a/2022/43xxx/CVE-2022-43391.json +++ b/2022/43xxx/CVE-2022-43391.json @@ -66,4 +66,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2022/43xxx/CVE-2022-43392.json b/2022/43xxx/CVE-2022-43392.json index 6d69ef5077e..c680573ff34 100644 --- a/2022/43xxx/CVE-2022-43392.json +++ b/2022/43xxx/CVE-2022-43392.json @@ -66,4 +66,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2022/45xxx/CVE-2022-45939.json b/2022/45xxx/CVE-2022-45939.json index b00f2845da5..9f6d467e090 100644 --- a/2022/45xxx/CVE-2022-45939.json +++ b/2022/45xxx/CVE-2022-45939.json @@ -66,6 +66,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-d69c7f95a4", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOXIH2FDEQJEAARE52C3GHTLGQFBYPIB/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2022-e37f239f2e", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FOSK3J7BBAEI4IITW2DRUKLQYUZYKH6Y/" } ] } diff --git a/2022/46xxx/CVE-2022-46392.json b/2022/46xxx/CVE-2022-46392.json index 99162844399..567ba2aa259 100644 --- a/2022/46xxx/CVE-2022-46392.json +++ b/2022/46xxx/CVE-2022-46392.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2", "url": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2023-7456a62f60", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BR7ZCVKLPGCOEEALUHZMFHXQHR6S4QL/" } ] } diff --git a/2022/46xxx/CVE-2022-46393.json b/2022/46xxx/CVE-2022-46393.json index 0b97fee2957..eae17a709e5 100644 --- a/2022/46xxx/CVE-2022-46393.json +++ b/2022/46xxx/CVE-2022-46393.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2", "url": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2023-7456a62f60", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BR7ZCVKLPGCOEEALUHZMFHXQHR6S4QL/" } ] } diff --git a/2022/48xxx/CVE-2022-48253.json b/2022/48xxx/CVE-2022-48253.json new file mode 100644 index 00000000000..f8bcb5db4b8 --- /dev/null +++ b/2022/48xxx/CVE-2022-48253.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2022-48253", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "nhttpd in Nostromo before 2.1 is vulnerable to a path traversal that may allow an attacker to execute arbitrary commands on the remote server. The vulnerability occurs when the homedirs option is used." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://nazgul.ch/dev/nostromo_cl.txt", + "refsource": "MISC", + "name": "https://nazgul.ch/dev/nostromo_cl.txt" + } + ] + } +} \ No newline at end of file diff --git a/2023/0xxx/CVE-2023-0049.json b/2023/0xxx/CVE-2023-0049.json index 94332d9f56f..0098846abd3 100644 --- a/2023/0xxx/CVE-2023-0049.json +++ b/2023/0xxx/CVE-2023-0049.json @@ -79,6 +79,11 @@ "name": "https://github.com/vim/vim/commit/7b17eb4b063a234376c1ec909ee293e42cff290c", "refsource": "MISC", "url": "https://github.com/vim/vim/commit/7b17eb4b063a234376c1ec909ee293e42cff290c" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2023-0f6a9433cf", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Y752EAVACVC5XY2TMGGOAIU25VQRPDW/" } ] }, diff --git a/2023/0xxx/CVE-2023-0165.json b/2023/0xxx/CVE-2023-0165.json new file mode 100644 index 00000000000..fd9bb623d94 --- /dev/null +++ b/2023/0xxx/CVE-2023-0165.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-0165", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22953.json b/2023/22xxx/CVE-2023-22953.json new file mode 100644 index 00000000000..b7f73b9eb76 --- /dev/null +++ b/2023/22xxx/CVE-2023-22953.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22953", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22954.json b/2023/22xxx/CVE-2023-22954.json new file mode 100644 index 00000000000..30b2eb4fbf0 --- /dev/null +++ b/2023/22xxx/CVE-2023-22954.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22954", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22955.json b/2023/22xxx/CVE-2023-22955.json new file mode 100644 index 00000000000..1df2b385dd4 --- /dev/null +++ b/2023/22xxx/CVE-2023-22955.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22955", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22956.json b/2023/22xxx/CVE-2023-22956.json new file mode 100644 index 00000000000..b47231133c4 --- /dev/null +++ b/2023/22xxx/CVE-2023-22956.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22956", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22957.json b/2023/22xxx/CVE-2023-22957.json new file mode 100644 index 00000000000..2d08de39a90 --- /dev/null +++ b/2023/22xxx/CVE-2023-22957.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-22957", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22958.json b/2023/22xxx/CVE-2023-22958.json new file mode 100644 index 00000000000..b0545461021 --- /dev/null +++ b/2023/22xxx/CVE-2023-22958.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2023-22958", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Syracom Secure Login plugin before 3.1.1.0 for Jira may allow spoofing of 2FA PIN validation via the plugins/servlet/twofactor/public/pinvalidation target parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/piuppi/Proof-of-Concepts/blob/main/Syracom/SecureLogin2FA-OpenRedirect.md", + "refsource": "MISC", + "name": "https://github.com/piuppi/Proof-of-Concepts/blob/main/Syracom/SecureLogin2FA-OpenRedirect.md" + } + ] + } +} \ No newline at end of file