From f1f0872be6b64a669eee719a2759419b463afe58 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 19 Jan 2023 23:00:40 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/31xxx/CVE-2022-31901.json | 56 ++++++++++++++++++++--- 2022/3xxx/CVE-2022-3704.json | 2 +- 2022/46xxx/CVE-2022-46476.json | 56 ++++++++++++++++++++--- 2023/22xxx/CVE-2023-22745.json | 81 ++++++++++++++++++++++++++++++++-- 2023/23xxx/CVE-2023-23949.json | 18 ++++++++ 2023/23xxx/CVE-2023-23950.json | 18 ++++++++ 2023/23xxx/CVE-2023-23951.json | 18 ++++++++ 2023/23xxx/CVE-2023-23952.json | 18 ++++++++ 2023/23xxx/CVE-2023-23953.json | 18 ++++++++ 2023/23xxx/CVE-2023-23954.json | 18 ++++++++ 2023/23xxx/CVE-2023-23955.json | 18 ++++++++ 2023/23xxx/CVE-2023-23956.json | 18 ++++++++ 2023/23xxx/CVE-2023-23957.json | 18 ++++++++ 2023/23xxx/CVE-2023-23958.json | 18 ++++++++ 2023/23xxx/CVE-2023-23959.json | 18 ++++++++ 2023/23xxx/CVE-2023-23960.json | 18 ++++++++ 2023/23xxx/CVE-2023-23961.json | 18 ++++++++ 2023/23xxx/CVE-2023-23962.json | 18 ++++++++ 2023/23xxx/CVE-2023-23963.json | 18 ++++++++ 2023/23xxx/CVE-2023-23964.json | 18 ++++++++ 2023/23xxx/CVE-2023-23965.json | 18 ++++++++ 2023/23xxx/CVE-2023-23966.json | 18 ++++++++ 2023/23xxx/CVE-2023-23967.json | 18 ++++++++ 2023/23xxx/CVE-2023-23968.json | 18 ++++++++ 24 files changed, 538 insertions(+), 17 deletions(-) create mode 100644 2023/23xxx/CVE-2023-23949.json create mode 100644 2023/23xxx/CVE-2023-23950.json create mode 100644 2023/23xxx/CVE-2023-23951.json create mode 100644 2023/23xxx/CVE-2023-23952.json create mode 100644 2023/23xxx/CVE-2023-23953.json create mode 100644 2023/23xxx/CVE-2023-23954.json create mode 100644 2023/23xxx/CVE-2023-23955.json create mode 100644 2023/23xxx/CVE-2023-23956.json create mode 100644 2023/23xxx/CVE-2023-23957.json create mode 100644 2023/23xxx/CVE-2023-23958.json create mode 100644 2023/23xxx/CVE-2023-23959.json create mode 100644 2023/23xxx/CVE-2023-23960.json create mode 100644 2023/23xxx/CVE-2023-23961.json create mode 100644 2023/23xxx/CVE-2023-23962.json create mode 100644 2023/23xxx/CVE-2023-23963.json create mode 100644 2023/23xxx/CVE-2023-23964.json create mode 100644 2023/23xxx/CVE-2023-23965.json create mode 100644 2023/23xxx/CVE-2023-23966.json create mode 100644 2023/23xxx/CVE-2023-23967.json create mode 100644 2023/23xxx/CVE-2023-23968.json diff --git a/2022/31xxx/CVE-2022-31901.json b/2022/31xxx/CVE-2022-31901.json index 73b5334844e..3ce47cfabc7 100644 --- a/2022/31xxx/CVE-2022-31901.json +++ b/2022/31xxx/CVE-2022-31901.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-31901", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-31901", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Buffer overflow in function Notepad_plus::addHotSpot in Notepad++ v8.4.3 and earlier allows attackers to crash the application via two crafted files." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/CDACesec/CVE-2022-31901", + "url": "https://github.com/CDACesec/CVE-2022-31901" } ] } diff --git a/2022/3xxx/CVE-2022-3704.json b/2022/3xxx/CVE-2022-3704.json index 730288bf7ce..849fd45ee6d 100644 --- a/2022/3xxx/CVE-2022-3704.json +++ b/2022/3xxx/CVE-2022-3704.json @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability classified as problematic has been found in Ruby on Rails. This affects an unknown part of the file actionpack/lib/action_dispatch/middleware/templates/routes/_table.html.erb. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is be177e4566747b73ff63fd5f529fab564e475ed4. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-212319." + "value": "** DISPUTED ** A vulnerability classified as problematic has been found in Ruby on Rails. This affects an unknown part of the file actionpack/lib/action_dispatch/middleware/templates/routes/_table.html.erb. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The real existence of this vulnerability is still doubted at the moment. The name of the patch is be177e4566747b73ff63fd5f529fab564e475ed4. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-212319. NOTE: Maintainer declares that there isn\u2019t a valid attack vector. The issue was wrongly reported as a security vulnerability by a non-member of the Rails team." } ] }, diff --git a/2022/46xxx/CVE-2022-46476.json b/2022/46xxx/CVE-2022-46476.json index fae16201f6e..1fa3008d424 100644 --- a/2022/46xxx/CVE-2022-46476.json +++ b/2022/46xxx/CVE-2022-46476.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-46476", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-46476", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "D-Link DIR-859 A1 1.05 was discovered to contain a command injection vulnerability via the service= variable in the soapcgi_main function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Insight8991/iot/blob/main/dir859%20Command%20Execution%20Vulnerability.md", + "refsource": "MISC", + "name": "https://github.com/Insight8991/iot/blob/main/dir859%20Command%20Execution%20Vulnerability.md" } ] } diff --git a/2023/22xxx/CVE-2023-22745.json b/2023/22xxx/CVE-2023-22745.json index 7d9df47bf16..8eb634d7123 100644 --- a/2023/22xxx/CVE-2023-22745.json +++ b/2023/22xxx/CVE-2023-22745.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-22745", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "tpm2-software", + "product": { + "product_data": [ + { + "product_name": "tpm2-tss", + "version": { + "version_data": [ + { + "version_value": "<= 4.0.0", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-4j3v-fh23-vx67", + "refsource": "MISC", + "name": "https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-4j3v-fh23-vx67" + }, + { + "url": "https://github.com/tpm2-software/tpm2-tss/commit/306490c8d848c367faa2d9df81f5e69dab46ffb5", + "refsource": "MISC", + "name": "https://github.com/tpm2-software/tpm2-tss/commit/306490c8d848c367faa2d9df81f5e69dab46ffb5" + } + ] + }, + "source": { + "advisory": "GHSA-4j3v-fh23-vx67", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/23xxx/CVE-2023-23949.json b/2023/23xxx/CVE-2023-23949.json new file mode 100644 index 00000000000..5cd82db37b8 --- /dev/null +++ b/2023/23xxx/CVE-2023-23949.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23949", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23950.json b/2023/23xxx/CVE-2023-23950.json new file mode 100644 index 00000000000..8a90105b97f --- /dev/null +++ b/2023/23xxx/CVE-2023-23950.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23950", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23951.json b/2023/23xxx/CVE-2023-23951.json new file mode 100644 index 00000000000..ebdcb7a26e2 --- /dev/null +++ b/2023/23xxx/CVE-2023-23951.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23951", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23952.json b/2023/23xxx/CVE-2023-23952.json new file mode 100644 index 00000000000..3e0932a90ab --- /dev/null +++ b/2023/23xxx/CVE-2023-23952.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23952", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23953.json b/2023/23xxx/CVE-2023-23953.json new file mode 100644 index 00000000000..e1cd3c6be42 --- /dev/null +++ b/2023/23xxx/CVE-2023-23953.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23953", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23954.json b/2023/23xxx/CVE-2023-23954.json new file mode 100644 index 00000000000..4b081022599 --- /dev/null +++ b/2023/23xxx/CVE-2023-23954.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23954", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23955.json b/2023/23xxx/CVE-2023-23955.json new file mode 100644 index 00000000000..88010192533 --- /dev/null +++ b/2023/23xxx/CVE-2023-23955.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23955", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23956.json b/2023/23xxx/CVE-2023-23956.json new file mode 100644 index 00000000000..35dabebd11a --- /dev/null +++ b/2023/23xxx/CVE-2023-23956.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23956", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23957.json b/2023/23xxx/CVE-2023-23957.json new file mode 100644 index 00000000000..38ad4e3c42c --- /dev/null +++ b/2023/23xxx/CVE-2023-23957.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23957", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23958.json b/2023/23xxx/CVE-2023-23958.json new file mode 100644 index 00000000000..ed71a9f3b10 --- /dev/null +++ b/2023/23xxx/CVE-2023-23958.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23958", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23959.json b/2023/23xxx/CVE-2023-23959.json new file mode 100644 index 00000000000..66f21cb8dfa --- /dev/null +++ b/2023/23xxx/CVE-2023-23959.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23959", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23960.json b/2023/23xxx/CVE-2023-23960.json new file mode 100644 index 00000000000..da9feb6db16 --- /dev/null +++ b/2023/23xxx/CVE-2023-23960.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23960", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23961.json b/2023/23xxx/CVE-2023-23961.json new file mode 100644 index 00000000000..a5dbb81a96a --- /dev/null +++ b/2023/23xxx/CVE-2023-23961.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23961", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23962.json b/2023/23xxx/CVE-2023-23962.json new file mode 100644 index 00000000000..f78ecb7ca7f --- /dev/null +++ b/2023/23xxx/CVE-2023-23962.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23962", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23963.json b/2023/23xxx/CVE-2023-23963.json new file mode 100644 index 00000000000..8bf0ff87880 --- /dev/null +++ b/2023/23xxx/CVE-2023-23963.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23963", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23964.json b/2023/23xxx/CVE-2023-23964.json new file mode 100644 index 00000000000..a43b0effaa7 --- /dev/null +++ b/2023/23xxx/CVE-2023-23964.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23964", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23965.json b/2023/23xxx/CVE-2023-23965.json new file mode 100644 index 00000000000..0612f1ceb4a --- /dev/null +++ b/2023/23xxx/CVE-2023-23965.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23965", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23966.json b/2023/23xxx/CVE-2023-23966.json new file mode 100644 index 00000000000..2cc079bdc89 --- /dev/null +++ b/2023/23xxx/CVE-2023-23966.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23966", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23967.json b/2023/23xxx/CVE-2023-23967.json new file mode 100644 index 00000000000..74c06052f7b --- /dev/null +++ b/2023/23xxx/CVE-2023-23967.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23967", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/23xxx/CVE-2023-23968.json b/2023/23xxx/CVE-2023-23968.json new file mode 100644 index 00000000000..080d8b4c385 --- /dev/null +++ b/2023/23xxx/CVE-2023-23968.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-23968", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file