diff --git a/2023/43xxx/CVE-2023-43453.json b/2023/43xxx/CVE-2023-43453.json index 4ba3534169f..ed458f0a4bd 100644 --- a/2023/43xxx/CVE-2023-43453.json +++ b/2023/43xxx/CVE-2023-43453.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-43453", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-43453", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in TOTOLINK X6000R V9.4.0cu.652_B20230116 and V9.4.0cu.852_B20230719 allows a remote attacker to execute arbitrary code via the IP parameter of the setDiagnosisCfg component." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/tharsis1024/vuln/blob/main/TOTOLINK/X6000R/2.md", + "refsource": "MISC", + "name": "https://github.com/tharsis1024/vuln/blob/main/TOTOLINK/X6000R/2.md" } ] } diff --git a/2023/43xxx/CVE-2023-43455.json b/2023/43xxx/CVE-2023-43455.json index 0c528b106de..e329585e897 100644 --- a/2023/43xxx/CVE-2023-43455.json +++ b/2023/43xxx/CVE-2023-43455.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-43455", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-43455", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in TOTOLINK X6000R V9.4.0cu.652_B20230116 and V9.4.0cu.852_B20230719 allows a remote attacker to execute arbitrary code via the command parameter of the setting/setTracerouteCfg component." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/tharsis1024/vuln/blob/main/TOTOLINK/X6000R/3.md", + "refsource": "MISC", + "name": "https://github.com/tharsis1024/vuln/blob/main/TOTOLINK/X6000R/3.md" } ] } diff --git a/2023/47xxx/CVE-2023-47359.json b/2023/47xxx/CVE-2023-47359.json index b54d2dbabdf..771a2d11143 100644 --- a/2023/47xxx/CVE-2023-47359.json +++ b/2023/47xxx/CVE-2023-47359.json @@ -56,6 +56,11 @@ "url": "https://0xariana.github.io/blog/real_bugs/vlc/mms", "refsource": "MISC", "name": "https://0xariana.github.io/blog/real_bugs/vlc/mms" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20231130 [SECURITY] [DLA 3679-1] vlc security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00034.html" } ] } diff --git a/2023/47xxx/CVE-2023-47360.json b/2023/47xxx/CVE-2023-47360.json index 1c460030071..b453804491b 100644 --- a/2023/47xxx/CVE-2023-47360.json +++ b/2023/47xxx/CVE-2023-47360.json @@ -56,6 +56,11 @@ "url": "https://0xariana.github.io/blog/real_bugs/vlc/mms", "refsource": "MISC", "name": "https://0xariana.github.io/blog/real_bugs/vlc/mms" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20231130 [SECURITY] [DLA 3679-1] vlc security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00034.html" } ] } diff --git a/2023/49xxx/CVE-2023-49877.json b/2023/49xxx/CVE-2023-49877.json new file mode 100644 index 00000000000..59c3105920c --- /dev/null +++ b/2023/49xxx/CVE-2023-49877.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49877", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49878.json b/2023/49xxx/CVE-2023-49878.json new file mode 100644 index 00000000000..9de1d44e2c5 --- /dev/null +++ b/2023/49xxx/CVE-2023-49878.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49878", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49879.json b/2023/49xxx/CVE-2023-49879.json new file mode 100644 index 00000000000..481cb352da0 --- /dev/null +++ b/2023/49xxx/CVE-2023-49879.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49879", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49880.json b/2023/49xxx/CVE-2023-49880.json new file mode 100644 index 00000000000..0942356157b --- /dev/null +++ b/2023/49xxx/CVE-2023-49880.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49880", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49881.json b/2023/49xxx/CVE-2023-49881.json new file mode 100644 index 00000000000..111b9a768d1 --- /dev/null +++ b/2023/49xxx/CVE-2023-49881.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49881", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49882.json b/2023/49xxx/CVE-2023-49882.json new file mode 100644 index 00000000000..5ccc20179f3 --- /dev/null +++ b/2023/49xxx/CVE-2023-49882.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49882", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49883.json b/2023/49xxx/CVE-2023-49883.json new file mode 100644 index 00000000000..c5dbfe46f81 --- /dev/null +++ b/2023/49xxx/CVE-2023-49883.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49883", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49884.json b/2023/49xxx/CVE-2023-49884.json new file mode 100644 index 00000000000..8ef3a0d9fbe --- /dev/null +++ b/2023/49xxx/CVE-2023-49884.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49884", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49885.json b/2023/49xxx/CVE-2023-49885.json new file mode 100644 index 00000000000..ad1d6370b63 --- /dev/null +++ b/2023/49xxx/CVE-2023-49885.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49885", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/49xxx/CVE-2023-49886.json b/2023/49xxx/CVE-2023-49886.json new file mode 100644 index 00000000000..1e234ee539b --- /dev/null +++ b/2023/49xxx/CVE-2023-49886.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-49886", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file