diff --git a/2023/22xxx/CVE-2023-22506.json b/2023/22xxx/CVE-2023-22506.json index 6009227860d..a21c9f7c6f7 100644 --- a/2023/22xxx/CVE-2023-22506.json +++ b/2023/22xxx/CVE-2023-22506.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "This High severity Injection and RCE (Remote Code Execution) vulnerability known as CVE-2023-22506 was introduced in in version 8.0.0 of Bamboo Data Center.\n\u00a0\n\nThis Injection and RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.5, allows an authenticated attacker to\nmodify the actions taken by a system call and execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction.\n\u00a0\n\u00a0\nAtlassian recommends that you upgrade your instance to latest version. If you're unable to upgrade to latest, upgrade to one of these fixed versions: 9.2.3 and 9.3.1. See the release notes ([https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html|https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html]). You can download the latest version of Bamboo Data Center and Bamboo Server from the download center ([https://www.atlassian.com/software/bamboo/download-archives|https://www.atlassian.com/software/bamboo/download-archives]).\n\u00a0\n\nThis vulnerability was reported via our Penetration Testing program." + "value": "This High severity Injection and RCE (Remote Code Execution) vulnerability known as CVE-2023-22506 was introduced in version 8.0.0 of Bamboo Data Center.\n\u00a0\n\nThis Injection and RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.5, allows an authenticated attacker to\nmodify the actions taken by a system call and execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction.\n\u00a0\n\u00a0\nAtlassian recommends that you upgrade your instance to latest version. If you're unable to upgrade to latest, upgrade to one of these fixed versions: 9.2.3 and 9.3.1. See the release notes ([https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html|https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html]). You can download the latest version of Bamboo Data Center and Bamboo Server from the download center ([https://www.atlassian.com/software/bamboo/download-archives|https://www.atlassian.com/software/bamboo/download-archives]).\n\u00a0\n\nThis vulnerability was reported via our Penetration Testing program." } ] }, diff --git a/2023/33xxx/CVE-2023-33253.json b/2023/33xxx/CVE-2023-33253.json index eb7fbd179e3..476099276ff 100644 --- a/2023/33xxx/CVE-2023-33253.json +++ b/2023/33xxx/CVE-2023-33253.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://github.com/Toxich4/CVE-2023-33253", "url": "https://github.com/Toxich4/CVE-2023-33253" + }, + { + "refsource": "MISC", + "name": "https://labcollector.com/changelog-labcollector/", + "url": "https://labcollector.com/changelog-labcollector/" } ] } diff --git a/2023/33xxx/CVE-2023-33876.json b/2023/33xxx/CVE-2023-33876.json index 4e851de10b7..cacc910240d 100644 --- a/2023/33xxx/CVE-2023-33876.json +++ b/2023/33xxx/CVE-2023-33876.json @@ -58,11 +58,6 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1796", "refsource": "MISC", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1796" - }, - { - "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1796", - "refsource": "MISC", - "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1796" } ] }, diff --git a/2023/37xxx/CVE-2023-37748.json b/2023/37xxx/CVE-2023-37748.json index e3a65c4e32c..9c3969a09e3 100644 --- a/2023/37xxx/CVE-2023-37748.json +++ b/2023/37xxx/CVE-2023-37748.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-37748", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-37748", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ngiflib commit 5e7292 was discovered to contain an infinite loop via the function DecodeGifImg at ngiflib.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/miniupnp/ngiflib/issues/25", + "refsource": "MISC", + "name": "https://github.com/miniupnp/ngiflib/issues/25" + }, + { + "url": "https://github.com/miniupnp/ngiflib/", + "refsource": "MISC", + "name": "https://github.com/miniupnp/ngiflib/" } ] } diff --git a/2023/3xxx/CVE-2023-3777.json b/2023/3xxx/CVE-2023-3777.json new file mode 100644 index 00000000000..3958803e158 --- /dev/null +++ b/2023/3xxx/CVE-2023-3777.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-3777", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/3xxx/CVE-2023-3778.json b/2023/3xxx/CVE-2023-3778.json new file mode 100644 index 00000000000..4781d509643 --- /dev/null +++ b/2023/3xxx/CVE-2023-3778.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-3778", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/3xxx/CVE-2023-3779.json b/2023/3xxx/CVE-2023-3779.json new file mode 100644 index 00000000000..f662ce082e2 --- /dev/null +++ b/2023/3xxx/CVE-2023-3779.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-3779", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file