diff --git a/2015/20xxx/CVE-2015-20109.json b/2015/20xxx/CVE-2015-20109.json index 09c3960523f..1f1fe94a8e9 100644 --- a/2015/20xxx/CVE-2015-20109.json +++ b/2015/20xxx/CVE-2015-20109.json @@ -56,6 +56,11 @@ "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18036", "refsource": "MISC", "name": "https://sourceware.org/bugzilla/show_bug.cgi?id=18036" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230731-0009/", + "url": "https://security.netapp.com/advisory/ntap-20230731-0009/" } ] } diff --git a/2022/26xxx/CVE-2022-26872.json b/2022/26xxx/CVE-2022-26872.json index 97c02629822..f1a143766a4 100644 --- a/2022/26xxx/CVE-2022-26872.json +++ b/2022/26xxx/CVE-2022-26872.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "AMI Megarac Password reset interception via API" + "value": "AMI Megarac Password reset interception via API " } ] }, @@ -40,8 +40,9 @@ "version": { "version_data": [ { - "version_value": "0", - "version_affected": "=" + "version_affected": "<=", + "version_name": "0", + "version_value": "SPx12-Update-6.00" } ] } @@ -51,8 +52,9 @@ "version": { "version_data": [ { - "version_value": "0", - "version_affected": "=" + "version_affected": "<=", + "version_name": "0", + "version_value": "SPx13-Update-4.00" } ] } @@ -69,6 +71,11 @@ "url": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023001.pdf", "refsource": "MISC", "name": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023001.pdf" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0008/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0008/" } ] }, diff --git a/2022/2xxx/CVE-2022-2127.json b/2022/2xxx/CVE-2022-2127.json index 17ba4e5dca7..634f7a064d0 100644 --- a/2022/2xxx/CVE-2022-2127.json +++ b/2022/2xxx/CVE-2022-2127.json @@ -186,6 +186,11 @@ "url": "https://www.samba.org/samba/security/CVE-2022-2127.html", "refsource": "MISC", "name": "https://www.samba.org/samba/security/CVE-2022-2127.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0010/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0010/" } ] }, diff --git a/2022/40xxx/CVE-2022-40258.json b/2022/40xxx/CVE-2022-40258.json index a10e7e56271..08837a4a3a1 100644 --- a/2022/40xxx/CVE-2022-40258.json +++ b/2022/40xxx/CVE-2022-40258.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "AMI Megarac Weak password hashes for Redfish & API" + "value": "AMI Megarac Weak password hashes for\nRedfish & API \n\n\n\n" } ] }, @@ -40,8 +40,9 @@ "version": { "version_data": [ { - "version_value": "0", - "version_affected": "=" + "version_affected": "<=", + "version_name": "0", + "version_value": "SPx12-Update-6.00" } ] } @@ -51,8 +52,9 @@ "version": { "version_data": [ { - "version_value": "0", - "version_affected": "=" + "version_affected": "<=", + "version_name": "0", + "version_value": "SPx13-Update-4.00" } ] } @@ -69,6 +71,11 @@ "url": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023001.pdf", "refsource": "MISC", "name": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023001.pdf" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0008/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0008/" } ] }, diff --git a/2023/1xxx/CVE-2023-1295.json b/2023/1xxx/CVE-2023-1295.json index c78c4de4560..4a25c6bdc4a 100644 --- a/2023/1xxx/CVE-2023-1295.json +++ b/2023/1xxx/CVE-2023-1295.json @@ -79,6 +79,11 @@ "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb", "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0006/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0006/" } ] }, diff --git a/2023/23xxx/CVE-2023-23487.json b/2023/23xxx/CVE-2023-23487.json index 49660155b61..34cdd29200b 100644 --- a/2023/23xxx/CVE-2023-23487.json +++ b/2023/23xxx/CVE-2023-23487.json @@ -62,6 +62,11 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/245918", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/245918" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0007/" } ] }, diff --git a/2023/29xxx/CVE-2023-29256.json b/2023/29xxx/CVE-2023-29256.json index 3f6cbc8b108..59ced94389b 100644 --- a/2023/29xxx/CVE-2023-29256.json +++ b/2023/29xxx/CVE-2023-29256.json @@ -62,6 +62,11 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/252046", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/252046" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0007/" } ] }, diff --git a/2023/2xxx/CVE-2023-2636.json b/2023/2xxx/CVE-2023-2636.json index 26fec607acc..1d3861e048b 100644 --- a/2023/2xxx/CVE-2023-2636.json +++ b/2023/2xxx/CVE-2023-2636.json @@ -67,6 +67,11 @@ "url": "https://wpscan.com/vulnerability/6a3bfd88-1251-4d40-b26f-62950a3ce0b5", "refsource": "MISC", "name": "https://wpscan.com/vulnerability/6a3bfd88-1251-4d40-b26f-62950a3ce0b5" + }, + { + "url": "http://packetstormsecurity.com/files/173815/WordPress-AN_Gradebook-5.0.1-SQL-Injection.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173815/WordPress-AN_Gradebook-5.0.1-SQL-Injection.html" } ] }, diff --git a/2023/2xxx/CVE-2023-2908.json b/2023/2xxx/CVE-2023-2908.json index d6805e2c1e5..a1c15347d16 100644 --- a/2023/2xxx/CVE-2023-2908.json +++ b/2023/2xxx/CVE-2023-2908.json @@ -189,6 +189,11 @@ "url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/479", "refsource": "MISC", "name": "https://gitlab.com/libtiff/libtiff/-/merge_requests/479" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0004/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0004/" } ] }, diff --git a/2023/30xxx/CVE-2023-30367.json b/2023/30xxx/CVE-2023-30367.json index 365bd88abac..056e2c3bff3 100644 --- a/2023/30xxx/CVE-2023-30367.json +++ b/2023/30xxx/CVE-2023-30367.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://github.com/S1lkys/CVE-2023-30367-mRemoteNG-password-dumper", "url": "https://github.com/S1lkys/CVE-2023-30367-mRemoteNG-password-dumper" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173829/mRemoteNG-1.77.3.1784-NB-Sensitive-Information-Extraction.html", + "url": "http://packetstormsecurity.com/files/173829/mRemoteNG-1.77.3.1784-NB-Sensitive-Information-Extraction.html" } ] } diff --git a/2023/30xxx/CVE-2023-30431.json b/2023/30xxx/CVE-2023-30431.json index d86f74562e8..b9abc94cf17 100644 --- a/2023/30xxx/CVE-2023-30431.json +++ b/2023/30xxx/CVE-2023-30431.json @@ -63,6 +63,11 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/252184", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/252184" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0007/" } ] }, diff --git a/2023/30xxx/CVE-2023-30442.json b/2023/30xxx/CVE-2023-30442.json index 32ebc2e6a0e..8ac9c15de95 100644 --- a/2023/30xxx/CVE-2023-30442.json +++ b/2023/30xxx/CVE-2023-30442.json @@ -63,6 +63,11 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/253202", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/253202" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0007/" } ] }, diff --git a/2023/30xxx/CVE-2023-30445.json b/2023/30xxx/CVE-2023-30445.json index e0a16719d1d..0288b79f856 100644 --- a/2023/30xxx/CVE-2023-30445.json +++ b/2023/30xxx/CVE-2023-30445.json @@ -63,6 +63,11 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/253357", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/253357" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0007/" } ] }, diff --git a/2023/30xxx/CVE-2023-30446.json b/2023/30xxx/CVE-2023-30446.json index 92fe62ff966..0742a9e3a92 100644 --- a/2023/30xxx/CVE-2023-30446.json +++ b/2023/30xxx/CVE-2023-30446.json @@ -63,6 +63,11 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/253361", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/253361" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0007/" } ] }, diff --git a/2023/30xxx/CVE-2023-30447.json b/2023/30xxx/CVE-2023-30447.json index a5504f4c69d..638429cd9fe 100644 --- a/2023/30xxx/CVE-2023-30447.json +++ b/2023/30xxx/CVE-2023-30447.json @@ -63,6 +63,11 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/253436", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/253436" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0007/" } ] }, diff --git a/2023/30xxx/CVE-2023-30448.json b/2023/30xxx/CVE-2023-30448.json index c6f9aa61bdb..d1b5fcdb043 100644 --- a/2023/30xxx/CVE-2023-30448.json +++ b/2023/30xxx/CVE-2023-30448.json @@ -63,6 +63,11 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/253437", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/253437" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0007/" } ] }, diff --git a/2023/30xxx/CVE-2023-30449.json b/2023/30xxx/CVE-2023-30449.json index 6d7b5adf886..d7dab868907 100644 --- a/2023/30xxx/CVE-2023-30449.json +++ b/2023/30xxx/CVE-2023-30449.json @@ -63,6 +63,11 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/253439", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/253439" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0007/" } ] }, diff --git a/2023/30xxx/CVE-2023-30625.json b/2023/30xxx/CVE-2023-30625.json index 8e5974cbf1b..44cde02bc24 100644 --- a/2023/30xxx/CVE-2023-30625.json +++ b/2023/30xxx/CVE-2023-30625.json @@ -88,6 +88,11 @@ "url": "https://github.com/rudderlabs/rudder-server/commit/9c009d9775abc99e72fc470f4c4c8e8f1775e82a", "refsource": "MISC", "name": "https://github.com/rudderlabs/rudder-server/commit/9c009d9775abc99e72fc470f4c4c8e8f1775e82a" + }, + { + "url": "http://packetstormsecurity.com/files/173837/Rudder-Server-SQL-Injection-Remote-Code-Execution.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173837/Rudder-Server-SQL-Injection-Remote-Code-Execution.html" } ] }, diff --git a/2023/34xxx/CVE-2023-34966.json b/2023/34xxx/CVE-2023-34966.json index cfe4f379640..9246a088dca 100644 --- a/2023/34xxx/CVE-2023-34966.json +++ b/2023/34xxx/CVE-2023-34966.json @@ -186,6 +186,11 @@ "url": "https://www.samba.org/samba/security/CVE-2023-34966", "refsource": "MISC", "name": "https://www.samba.org/samba/security/CVE-2023-34966" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0010/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0010/" } ] }, diff --git a/2023/34xxx/CVE-2023-34967.json b/2023/34xxx/CVE-2023-34967.json index 093a034c856..e4f9a567e25 100644 --- a/2023/34xxx/CVE-2023-34967.json +++ b/2023/34xxx/CVE-2023-34967.json @@ -186,6 +186,11 @@ "url": "https://www.samba.org/samba/security/CVE-2023-34967.html", "refsource": "MISC", "name": "https://www.samba.org/samba/security/CVE-2023-34967.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0010/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0010/" } ] }, diff --git a/2023/34xxx/CVE-2023-34968.json b/2023/34xxx/CVE-2023-34968.json index 50555169870..eb142731e99 100644 --- a/2023/34xxx/CVE-2023-34968.json +++ b/2023/34xxx/CVE-2023-34968.json @@ -185,6 +185,11 @@ "url": "https://www.samba.org/samba/security/CVE-2023-34968.html", "refsource": "MISC", "name": "https://www.samba.org/samba/security/CVE-2023-34968.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0010/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0010/" } ] }, diff --git a/2023/35xxx/CVE-2023-35946.json b/2023/35xxx/CVE-2023-35946.json index 24941e8ddad..9e3cc15fed1 100644 --- a/2023/35xxx/CVE-2023-35946.json +++ b/2023/35xxx/CVE-2023-35946.json @@ -77,6 +77,11 @@ "url": "https://docs.gradle.org/current/userguide/dependency_verification.html", "refsource": "MISC", "name": "https://docs.gradle.org/current/userguide/dependency_verification.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0003/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0003/" } ] }, diff --git a/2023/36xxx/CVE-2023-36266.json b/2023/36xxx/CVE-2023-36266.json index 6f0e859e618..e960f159042 100644 --- a/2023/36xxx/CVE-2023-36266.json +++ b/2023/36xxx/CVE-2023-36266.json @@ -56,6 +56,11 @@ "url": "https://harkenzo.tlstickle.com/2023-06-12-Keeper-Password-Dumping/", "refsource": "MISC", "name": "https://harkenzo.tlstickle.com/2023-06-12-Keeper-Password-Dumping/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173809/Keeper-Security-Desktop-16.10.2-Browser-Extension-16.5.4-Password-Dumper.html", + "url": "http://packetstormsecurity.com/files/173809/Keeper-Security-Desktop-16.10.2-Browser-Extension-16.5.4-Password-Dumper.html" } ] } diff --git a/2023/37xxx/CVE-2023-37474.json b/2023/37xxx/CVE-2023-37474.json index 41356a47400..d124e1d66e2 100644 --- a/2023/37xxx/CVE-2023-37474.json +++ b/2023/37xxx/CVE-2023-37474.json @@ -63,6 +63,11 @@ "url": "https://github.com/9001/copyparty/commit/043e3c7dd683113e2b1c15cacb9c8e68f76513ff", "refsource": "MISC", "name": "https://github.com/9001/copyparty/commit/043e3c7dd683113e2b1c15cacb9c8e68f76513ff" + }, + { + "url": "http://packetstormsecurity.com/files/173822/Copyparty-1.8.2-Directory-Traversal.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173822/Copyparty-1.8.2-Directory-Traversal.html" } ] }, diff --git a/2023/38xxx/CVE-2023-38501.json b/2023/38xxx/CVE-2023-38501.json index 8025cbff035..9bb1180d883 100644 --- a/2023/38xxx/CVE-2023-38501.json +++ b/2023/38xxx/CVE-2023-38501.json @@ -63,6 +63,11 @@ "url": "https://github.com/9001/copyparty/commit/007d948cb982daa05bc6619cd20ee55b7e834c38", "refsource": "MISC", "name": "https://github.com/9001/copyparty/commit/007d948cb982daa05bc6619cd20ee55b7e834c38" + }, + { + "url": "http://packetstormsecurity.com/files/173821/Copyparty-1.8.6-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173821/Copyparty-1.8.6-Cross-Site-Scripting.html" } ] }, diff --git a/2023/3xxx/CVE-2023-3090.json b/2023/3xxx/CVE-2023-3090.json index 058a8237e4b..fb42930509e 100644 --- a/2023/3xxx/CVE-2023-3090.json +++ b/2023/3xxx/CVE-2023-3090.json @@ -74,6 +74,11 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html", "refsource": "MISC", "name": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0002/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0002/" } ] }, diff --git a/2023/3xxx/CVE-2023-3312.json b/2023/3xxx/CVE-2023-3312.json index 0ca94172a50..7104a7677b6 100644 --- a/2023/3xxx/CVE-2023-3312.json +++ b/2023/3xxx/CVE-2023-3312.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://patchwork.kernel.org/project/linux-pm/patch/20230323174026.950622-1-krzysztof.kozlowski@linaro.org/", "url": "https://patchwork.kernel.org/project/linux-pm/patch/20230323174026.950622-1-krzysztof.kozlowski@linaro.org/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230731-0005/", + "url": "https://security.netapp.com/advisory/ntap-20230731-0005/" } ] }, diff --git a/2023/3xxx/CVE-2023-3347.json b/2023/3xxx/CVE-2023-3347.json index 4cca4911377..ccbed0ea710 100644 --- a/2023/3xxx/CVE-2023-3347.json +++ b/2023/3xxx/CVE-2023-3347.json @@ -207,6 +207,11 @@ "url": "https://www.samba.org/samba/security/CVE-2023-3347.html", "refsource": "MISC", "name": "https://www.samba.org/samba/security/CVE-2023-3347.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0010/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0010/" } ] }, diff --git a/2023/3xxx/CVE-2023-3389.json b/2023/3xxx/CVE-2023-3389.json index 9dd29e3abde..41889e9bbf7 100644 --- a/2023/3xxx/CVE-2023-3389.json +++ b/2023/3xxx/CVE-2023-3389.json @@ -89,6 +89,11 @@ "url": "https://kernel.dance/ef7dfac51d8ed961b742218f526bd589f3900a59", "refsource": "MISC", "name": "https://kernel.dance/ef7dfac51d8ed961b742218f526bd589f3900a59" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230731-0001/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230731-0001/" } ] }, diff --git a/2023/3xxx/CVE-2023-3983.json b/2023/3xxx/CVE-2023-3983.json index 84c91a89bdb..3d7465c0f8a 100644 --- a/2023/3xxx/CVE-2023-3983.json +++ b/2023/3xxx/CVE-2023-3983.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-3983", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vulnreport@tenable.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Advantech iView", + "version": { + "version_data": [ + { + "version_value": "versions prior to v5.7.4 build 6752" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "SQL Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.tenable.com/security/research/tra-2023-24", + "url": "https://www.tenable.com/security/research/tra-2023-24" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An authenticated SQL injection vulnerability exists in Advantech iView versions prior to v5.7.4 build 6752. An authenticated remote attacker can bypass checks in com.imc.iview.utils.CUtils.checkSQLInjection() to perform blind SQL injection." } ] } diff --git a/2023/4xxx/CVE-2023-4032.json b/2023/4xxx/CVE-2023-4032.json new file mode 100644 index 00000000000..36504f55e21 --- /dev/null +++ b/2023/4xxx/CVE-2023-4032.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-4032", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file