diff --git a/2024/31xxx/CVE-2024-31497.json b/2024/31xxx/CVE-2024-31497.json index eb5f590d987..9fc991b635a 100644 --- a/2024/31xxx/CVE-2024-31497.json +++ b/2024/31xxx/CVE-2024-31497.json @@ -181,6 +181,11 @@ "refsource": "MLIST", "name": "[oss-security] 20240415 CVE-2024-31497: Secret Key Recovery of NIST P-521 Private Keys Through Biased ECDSA Nonces in PuTTY Client", "url": "http://www.openwall.com/lists/oss-security/2024/04/15/6" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20240620 [SECURITY] [DLA 3839-1] putty security update", + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00014.html" } ] } diff --git a/2024/6xxx/CVE-2024-6080.json b/2024/6xxx/CVE-2024-6080.json index 37f54e47b76..378d7192e12 100644 --- a/2024/6xxx/CVE-2024-6080.json +++ b/2024/6xxx/CVE-2024-6080.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability classified as critical was found in Intelbras InControl 2.21.56. This vulnerability affects unknown code. The manipulation leads to unquoted search path. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. VDB-268822 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability classified as critical was found in Intelbras InControl 2.21.56. This vulnerability affects unknown code. The manipulation leads to unquoted search path. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. VDB-268822 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure and plans to provide a solution within the next few weeks." }, { "lang": "deu", diff --git a/2024/6xxx/CVE-2024-6225.json b/2024/6xxx/CVE-2024-6225.json new file mode 100644 index 00000000000..0a04a347aa9 --- /dev/null +++ b/2024/6xxx/CVE-2024-6225.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6225", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6226.json b/2024/6xxx/CVE-2024-6226.json new file mode 100644 index 00000000000..8423671a70a --- /dev/null +++ b/2024/6xxx/CVE-2024-6226.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6226", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file