diff --git a/2022/43xxx/CVE-2022-43403.json b/2022/43xxx/CVE-2022-43403.json index 4567d4acd77e..dc088aa9f1ef 100644 --- a/2022/43xxx/CVE-2022-43403.json +++ b/2022/43xxx/CVE-2022-43403.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[oss-security] 20221019 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2022/10/19/3" + }, + { + "refsource": "MISC", + "name": "https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/", + "url": "https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/" } ] } diff --git a/2023/1xxx/CVE-2023-1103.json b/2023/1xxx/CVE-2023-1103.json new file mode 100644 index 000000000000..74f4cf34641a --- /dev/null +++ b/2023/1xxx/CVE-2023-1103.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1103", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1104.json b/2023/1xxx/CVE-2023-1104.json new file mode 100644 index 000000000000..9ccc57d28343 --- /dev/null +++ b/2023/1xxx/CVE-2023-1104.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1104", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1105.json b/2023/1xxx/CVE-2023-1105.json new file mode 100644 index 000000000000..66b70e50f8fe --- /dev/null +++ b/2023/1xxx/CVE-2023-1105.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1105", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1106.json b/2023/1xxx/CVE-2023-1106.json new file mode 100644 index 000000000000..306b119986de --- /dev/null +++ b/2023/1xxx/CVE-2023-1106.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1106", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1107.json b/2023/1xxx/CVE-2023-1107.json new file mode 100644 index 000000000000..a9dfe15d3b96 --- /dev/null +++ b/2023/1xxx/CVE-2023-1107.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1107", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1108.json b/2023/1xxx/CVE-2023-1108.json new file mode 100644 index 000000000000..b54ecaabd00e --- /dev/null +++ b/2023/1xxx/CVE-2023-1108.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1108", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/24xxx/CVE-2023-24045.json b/2023/24xxx/CVE-2023-24045.json index 0745d4af011e..8e581cf95cb1 100644 --- a/2023/24xxx/CVE-2023-24045.json +++ b/2023/24xxx/CVE-2023-24045.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-24045", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-24045", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Dataiku DSS 11.2.1, an attacker can download other Dataiku files that were uploaded to the myfiles section by specifying the target username in a download request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://dataiku.com", + "refsource": "MISC", + "name": "https://dataiku.com" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/alert3/04e2d0a934001180104f846cfa00552b", + "url": "https://gist.github.com/alert3/04e2d0a934001180104f846cfa00552b" } ] } diff --git a/2023/26xxx/CVE-2023-26608.json b/2023/26xxx/CVE-2023-26608.json index c92b00d7de03..7f97760a54a8 100644 --- a/2023/26xxx/CVE-2023-26608.json +++ b/2023/26xxx/CVE-2023-26608.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-26608", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-26608", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SOLDR (System of Orchestration, Lifecycle control, Detection and Response) 1.1.0 allows stored XSS via the module editor." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/vxcontrol/soldr/compare/v1.1.0...v1.2.0", + "refsource": "MISC", + "name": "https://github.com/vxcontrol/soldr/compare/v1.1.0...v1.2.0" + }, + { + "refsource": "MISC", + "name": "https://github.com/vxcontrol/soldr/issues/89", + "url": "https://github.com/vxcontrol/soldr/issues/89" } ] } diff --git a/2023/27xxx/CVE-2023-27375.json b/2023/27xxx/CVE-2023-27375.json new file mode 100644 index 000000000000..4c6f4579d76f --- /dev/null +++ b/2023/27xxx/CVE-2023-27375.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-27375", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/27xxx/CVE-2023-27376.json b/2023/27xxx/CVE-2023-27376.json new file mode 100644 index 000000000000..4aaae66afe5a --- /dev/null +++ b/2023/27xxx/CVE-2023-27376.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-27376", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/27xxx/CVE-2023-27377.json b/2023/27xxx/CVE-2023-27377.json new file mode 100644 index 000000000000..c758ddf5503b --- /dev/null +++ b/2023/27xxx/CVE-2023-27377.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-27377", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file