From 02590733d628cc221707dd71189da1cdda07f296 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 30 Oct 2024 16:00:44 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/4xxx/CVE-2023-4571.json | 2 +- 2024/22xxx/CVE-2024-22455.json | 8 ++-- 2024/50xxx/CVE-2024-50344.json | 81 ++++++++++++++++++++++++++++++++-- 2024/51xxx/CVE-2024-51665.json | 18 ++++++++ 2024/51xxx/CVE-2024-51666.json | 18 ++++++++ 2024/51xxx/CVE-2024-51667.json | 18 ++++++++ 2024/51xxx/CVE-2024-51668.json | 18 ++++++++ 2024/51xxx/CVE-2024-51669.json | 18 ++++++++ 2024/51xxx/CVE-2024-51670.json | 18 ++++++++ 2024/51xxx/CVE-2024-51671.json | 18 ++++++++ 2024/51xxx/CVE-2024-51672.json | 18 ++++++++ 2024/51xxx/CVE-2024-51673.json | 18 ++++++++ 2024/51xxx/CVE-2024-51674.json | 18 ++++++++ 2024/51xxx/CVE-2024-51675.json | 18 ++++++++ 2024/51xxx/CVE-2024-51676.json | 18 ++++++++ 2024/51xxx/CVE-2024-51677.json | 18 ++++++++ 2024/51xxx/CVE-2024-51678.json | 18 ++++++++ 2024/51xxx/CVE-2024-51679.json | 18 ++++++++ 2024/51xxx/CVE-2024-51680.json | 18 ++++++++ 2024/51xxx/CVE-2024-51681.json | 18 ++++++++ 2024/51xxx/CVE-2024-51682.json | 18 ++++++++ 2024/51xxx/CVE-2024-51683.json | 18 ++++++++ 2024/51xxx/CVE-2024-51684.json | 18 ++++++++ 2024/51xxx/CVE-2024-51685.json | 18 ++++++++ 2024/51xxx/CVE-2024-51686.json | 18 ++++++++ 2024/51xxx/CVE-2024-51687.json | 18 ++++++++ 2024/51xxx/CVE-2024-51688.json | 18 ++++++++ 2024/51xxx/CVE-2024-51689.json | 18 ++++++++ 2024/51xxx/CVE-2024-51690.json | 18 ++++++++ 2024/51xxx/CVE-2024-51691.json | 18 ++++++++ 2024/51xxx/CVE-2024-51692.json | 18 ++++++++ 2024/51xxx/CVE-2024-51693.json | 18 ++++++++ 2024/51xxx/CVE-2024-51694.json | 18 ++++++++ 2024/51xxx/CVE-2024-51695.json | 18 ++++++++ 2024/51xxx/CVE-2024-51696.json | 18 ++++++++ 2024/51xxx/CVE-2024-51697.json | 18 ++++++++ 2024/51xxx/CVE-2024-51698.json | 18 ++++++++ 2024/51xxx/CVE-2024-51699.json | 18 ++++++++ 2024/51xxx/CVE-2024-51700.json | 18 ++++++++ 2024/51xxx/CVE-2024-51701.json | 18 ++++++++ 2024/51xxx/CVE-2024-51702.json | 18 ++++++++ 2024/51xxx/CVE-2024-51703.json | 18 ++++++++ 2024/51xxx/CVE-2024-51704.json | 18 ++++++++ 2024/51xxx/CVE-2024-51705.json | 18 ++++++++ 2024/51xxx/CVE-2024-51706.json | 18 ++++++++ 2024/51xxx/CVE-2024-51707.json | 18 ++++++++ 2024/51xxx/CVE-2024-51708.json | 18 ++++++++ 2024/51xxx/CVE-2024-51709.json | 18 ++++++++ 2024/51xxx/CVE-2024-51710.json | 18 ++++++++ 2024/51xxx/CVE-2024-51711.json | 18 ++++++++ 2024/51xxx/CVE-2024-51712.json | 18 ++++++++ 2024/51xxx/CVE-2024-51713.json | 18 ++++++++ 2024/51xxx/CVE-2024-51714.json | 18 ++++++++ 2024/51xxx/CVE-2024-51715.json | 18 ++++++++ 2024/51xxx/CVE-2024-51716.json | 18 ++++++++ 2024/51xxx/CVE-2024-51717.json | 18 ++++++++ 2024/51xxx/CVE-2024-51718.json | 18 ++++++++ 2024/51xxx/CVE-2024-51719.json | 18 ++++++++ 58 files changed, 1072 insertions(+), 9 deletions(-) create mode 100644 2024/51xxx/CVE-2024-51665.json create mode 100644 2024/51xxx/CVE-2024-51666.json create mode 100644 2024/51xxx/CVE-2024-51667.json create mode 100644 2024/51xxx/CVE-2024-51668.json create mode 100644 2024/51xxx/CVE-2024-51669.json create mode 100644 2024/51xxx/CVE-2024-51670.json create mode 100644 2024/51xxx/CVE-2024-51671.json create mode 100644 2024/51xxx/CVE-2024-51672.json create mode 100644 2024/51xxx/CVE-2024-51673.json create mode 100644 2024/51xxx/CVE-2024-51674.json create mode 100644 2024/51xxx/CVE-2024-51675.json create mode 100644 2024/51xxx/CVE-2024-51676.json create mode 100644 2024/51xxx/CVE-2024-51677.json create mode 100644 2024/51xxx/CVE-2024-51678.json create mode 100644 2024/51xxx/CVE-2024-51679.json create mode 100644 2024/51xxx/CVE-2024-51680.json create mode 100644 2024/51xxx/CVE-2024-51681.json create mode 100644 2024/51xxx/CVE-2024-51682.json create mode 100644 2024/51xxx/CVE-2024-51683.json create mode 100644 2024/51xxx/CVE-2024-51684.json create mode 100644 2024/51xxx/CVE-2024-51685.json create mode 100644 2024/51xxx/CVE-2024-51686.json create mode 100644 2024/51xxx/CVE-2024-51687.json create mode 100644 2024/51xxx/CVE-2024-51688.json create mode 100644 2024/51xxx/CVE-2024-51689.json create mode 100644 2024/51xxx/CVE-2024-51690.json create mode 100644 2024/51xxx/CVE-2024-51691.json create mode 100644 2024/51xxx/CVE-2024-51692.json create mode 100644 2024/51xxx/CVE-2024-51693.json create mode 100644 2024/51xxx/CVE-2024-51694.json create mode 100644 2024/51xxx/CVE-2024-51695.json create mode 100644 2024/51xxx/CVE-2024-51696.json create mode 100644 2024/51xxx/CVE-2024-51697.json create mode 100644 2024/51xxx/CVE-2024-51698.json create mode 100644 2024/51xxx/CVE-2024-51699.json create mode 100644 2024/51xxx/CVE-2024-51700.json create mode 100644 2024/51xxx/CVE-2024-51701.json create mode 100644 2024/51xxx/CVE-2024-51702.json create mode 100644 2024/51xxx/CVE-2024-51703.json create mode 100644 2024/51xxx/CVE-2024-51704.json create mode 100644 2024/51xxx/CVE-2024-51705.json create mode 100644 2024/51xxx/CVE-2024-51706.json create mode 100644 2024/51xxx/CVE-2024-51707.json create mode 100644 2024/51xxx/CVE-2024-51708.json create mode 100644 2024/51xxx/CVE-2024-51709.json create mode 100644 2024/51xxx/CVE-2024-51710.json create mode 100644 2024/51xxx/CVE-2024-51711.json create mode 100644 2024/51xxx/CVE-2024-51712.json create mode 100644 2024/51xxx/CVE-2024-51713.json create mode 100644 2024/51xxx/CVE-2024-51714.json create mode 100644 2024/51xxx/CVE-2024-51715.json create mode 100644 2024/51xxx/CVE-2024-51716.json create mode 100644 2024/51xxx/CVE-2024-51717.json create mode 100644 2024/51xxx/CVE-2024-51718.json create mode 100644 2024/51xxx/CVE-2024-51719.json diff --git a/2023/4xxx/CVE-2023-4571.json b/2023/4xxx/CVE-2023-4571.json index d6a16481099..67a8e62c008 100644 --- a/2023/4xxx/CVE-2023-4571.json +++ b/2023/4xxx/CVE-2023-4571.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "In Splunk IT Service Intelligence (ITSI) versions below below 4.13.3, 4.15.3, or 4.17.1, a malicious actor can inject American National Standards Institute (ANSI) escape codes into Splunk ITSI log files that, when a vulnerable terminal application reads them, can run malicious code in the vulnerable application. This attack requires a user to use a terminal application that translates ANSI escape codes to read the malicious log file locally in the vulnerable terminal. The vulnerability also requires additional user interaction to succeed. \n\nThe vulnerability does not directly affect Splunk ITSI. The indirect impact on Splunk ITSI can vary significantly depending on the permissions in the vulnerable terminal application, as well as where and how the user reads the malicious log file. For example, users can copy the malicious file from Splunk ITSI and read it on their local machine." + "value": "In Splunk IT Service Intelligence (ITSI) versions below 4.13.3 or 4.15.3, a malicious actor can inject American National Standards Institute (ANSI) escape codes into Splunk ITSI log files that, when a vulnerable terminal application reads them, can run malicious code in the vulnerable application. This attack requires a user to use a terminal application that translates ANSI escape codes to read the malicious log file locally in the vulnerable terminal. The vulnerability also requires additional user interaction to succeed. \n\nThe vulnerability does not directly affect Splunk ITSI. The indirect impact on Splunk ITSI can vary significantly depending on the permissions in the vulnerable terminal application, as well as where and how the user reads the malicious log file. For example, users can copy the malicious file from Splunk ITSI and read it on their local machine." } ] }, diff --git a/2024/22xxx/CVE-2024-22455.json b/2024/22xxx/CVE-2024-22455.json index 3a49eaf857f..97e1d3a4f8e 100644 --- a/2024/22xxx/CVE-2024-22455.json +++ b/2024/22xxx/CVE-2024-22455.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "\nDell E-Lab Navigator, [3.1.9, 3.2.0], contains an Insecure Direct Object Reference Vulnerability in Feedback submission. An attacker could potentially exploit this vulnerability, to manipulate the email's appearance, potentially deceiving recipients and causing reputational and security risks.\n\n" + "value": "Dell Mobility - E-Lab Navigator, version(s) 3.1.9, 3.2.0, contain(s) an Authorization Bypass Through User-Controlled Key vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Launch of phishing attacks." } ] }, @@ -21,8 +21,8 @@ "description": [ { "lang": "eng", - "value": "CWE-451: User Interface (UI) Misrepresentation of Critical Information", - "cweId": "CWE-451" + "value": "CWE-639: Authorization Bypass Through User-Controlled Key", + "cweId": "CWE-639" } ] } @@ -42,7 +42,7 @@ { "version_affected": "<=", "version_name": "3.1.9", - "version_value": " 3.2.0" + "version_value": "3.2.0" } ] } diff --git a/2024/50xxx/CVE-2024-50344.json b/2024/50xxx/CVE-2024-50344.json index 7684b78777c..66111beb7ff 100644 --- a/2024/50xxx/CVE-2024-50344.json +++ b/2024/50xxx/CVE-2024-50344.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-50344", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "I, Librarian is an open-source version of a PDF managing SaaS. Supplemental Files are allowed to be viewed in the browser, only if they have a white-listed MIME type. Unfortunately, this logic is broken, thus allowing unsafe files containing Javascript to be executed with the application context. An attacker can exploit this vulnerability by uploading a supplementary file that contains a malicious code or script. This code will then be executed when the file is loaded in the browser. The vulnerability was fixed in version 5.11.2." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", + "cweId": "CWE-80" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "mkucej", + "product": { + "product_data": [ + { + "product_name": "i-librarian-free", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 5.11.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/mkucej/i-librarian-free/security/advisories/GHSA-c2rm-w62w-5xmj", + "refsource": "MISC", + "name": "https://github.com/mkucej/i-librarian-free/security/advisories/GHSA-c2rm-w62w-5xmj" + }, + { + "url": "https://github.com/mkucej/i-librarian-free/commit/a67d7949ffb02fd912ebdcf552df006b44066d78", + "refsource": "MISC", + "name": "https://github.com/mkucej/i-librarian-free/commit/a67d7949ffb02fd912ebdcf552df006b44066d78" + } + ] + }, + "source": { + "advisory": "GHSA-c2rm-w62w-5xmj", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/51xxx/CVE-2024-51665.json b/2024/51xxx/CVE-2024-51665.json new file mode 100644 index 00000000000..e537595454b --- /dev/null +++ b/2024/51xxx/CVE-2024-51665.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51665", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51666.json b/2024/51xxx/CVE-2024-51666.json new file mode 100644 index 00000000000..6f91fbf550c --- /dev/null +++ b/2024/51xxx/CVE-2024-51666.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51666", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51667.json b/2024/51xxx/CVE-2024-51667.json new file mode 100644 index 00000000000..3c8b001bd66 --- /dev/null +++ b/2024/51xxx/CVE-2024-51667.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51667", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51668.json b/2024/51xxx/CVE-2024-51668.json new file mode 100644 index 00000000000..1e3a7d8af9e --- /dev/null +++ b/2024/51xxx/CVE-2024-51668.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51668", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51669.json b/2024/51xxx/CVE-2024-51669.json new file mode 100644 index 00000000000..a4f3f51e31f --- /dev/null +++ b/2024/51xxx/CVE-2024-51669.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51669", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51670.json b/2024/51xxx/CVE-2024-51670.json new file mode 100644 index 00000000000..7cb34d485a5 --- /dev/null +++ b/2024/51xxx/CVE-2024-51670.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51670", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51671.json b/2024/51xxx/CVE-2024-51671.json new file mode 100644 index 00000000000..0f851b961ce --- /dev/null +++ b/2024/51xxx/CVE-2024-51671.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51671", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51672.json b/2024/51xxx/CVE-2024-51672.json new file mode 100644 index 00000000000..8261e334e41 --- /dev/null +++ b/2024/51xxx/CVE-2024-51672.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51672", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51673.json b/2024/51xxx/CVE-2024-51673.json new file mode 100644 index 00000000000..02eaa931552 --- /dev/null +++ b/2024/51xxx/CVE-2024-51673.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51673", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51674.json b/2024/51xxx/CVE-2024-51674.json new file mode 100644 index 00000000000..73e3d722075 --- /dev/null +++ b/2024/51xxx/CVE-2024-51674.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51674", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51675.json b/2024/51xxx/CVE-2024-51675.json new file mode 100644 index 00000000000..0471fd1da90 --- /dev/null +++ b/2024/51xxx/CVE-2024-51675.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51675", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51676.json b/2024/51xxx/CVE-2024-51676.json new file mode 100644 index 00000000000..4134e645f9b --- /dev/null +++ b/2024/51xxx/CVE-2024-51676.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51676", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51677.json b/2024/51xxx/CVE-2024-51677.json new file mode 100644 index 00000000000..bea55645790 --- /dev/null +++ b/2024/51xxx/CVE-2024-51677.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51677", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51678.json b/2024/51xxx/CVE-2024-51678.json new file mode 100644 index 00000000000..fb97c6ad55c --- /dev/null +++ b/2024/51xxx/CVE-2024-51678.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51678", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51679.json b/2024/51xxx/CVE-2024-51679.json new file mode 100644 index 00000000000..81e45938294 --- /dev/null +++ b/2024/51xxx/CVE-2024-51679.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51679", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51680.json b/2024/51xxx/CVE-2024-51680.json new file mode 100644 index 00000000000..2489ab93be3 --- /dev/null +++ b/2024/51xxx/CVE-2024-51680.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51680", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51681.json b/2024/51xxx/CVE-2024-51681.json new file mode 100644 index 00000000000..0b9c8215475 --- /dev/null +++ b/2024/51xxx/CVE-2024-51681.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51681", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51682.json b/2024/51xxx/CVE-2024-51682.json new file mode 100644 index 00000000000..e4e887ba04a --- /dev/null +++ b/2024/51xxx/CVE-2024-51682.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51682", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51683.json b/2024/51xxx/CVE-2024-51683.json new file mode 100644 index 00000000000..19f040fb486 --- /dev/null +++ b/2024/51xxx/CVE-2024-51683.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51683", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51684.json b/2024/51xxx/CVE-2024-51684.json new file mode 100644 index 00000000000..568a96bac62 --- /dev/null +++ b/2024/51xxx/CVE-2024-51684.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51684", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51685.json b/2024/51xxx/CVE-2024-51685.json new file mode 100644 index 00000000000..876a7264dd6 --- /dev/null +++ b/2024/51xxx/CVE-2024-51685.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51685", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51686.json b/2024/51xxx/CVE-2024-51686.json new file mode 100644 index 00000000000..883f8ed2cdb --- /dev/null +++ b/2024/51xxx/CVE-2024-51686.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51686", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51687.json b/2024/51xxx/CVE-2024-51687.json new file mode 100644 index 00000000000..43ad466022d --- /dev/null +++ b/2024/51xxx/CVE-2024-51687.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51687", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51688.json b/2024/51xxx/CVE-2024-51688.json new file mode 100644 index 00000000000..021cf10a677 --- /dev/null +++ b/2024/51xxx/CVE-2024-51688.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51688", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51689.json b/2024/51xxx/CVE-2024-51689.json new file mode 100644 index 00000000000..344c74a7061 --- /dev/null +++ b/2024/51xxx/CVE-2024-51689.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51689", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51690.json b/2024/51xxx/CVE-2024-51690.json new file mode 100644 index 00000000000..55149fd1da0 --- /dev/null +++ b/2024/51xxx/CVE-2024-51690.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51690", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51691.json b/2024/51xxx/CVE-2024-51691.json new file mode 100644 index 00000000000..6b04655fe67 --- /dev/null +++ b/2024/51xxx/CVE-2024-51691.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51691", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51692.json b/2024/51xxx/CVE-2024-51692.json new file mode 100644 index 00000000000..bdee83dc23f --- /dev/null +++ b/2024/51xxx/CVE-2024-51692.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51692", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51693.json b/2024/51xxx/CVE-2024-51693.json new file mode 100644 index 00000000000..37b460622c1 --- /dev/null +++ b/2024/51xxx/CVE-2024-51693.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51693", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51694.json b/2024/51xxx/CVE-2024-51694.json new file mode 100644 index 00000000000..355a8d12c93 --- /dev/null +++ b/2024/51xxx/CVE-2024-51694.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51694", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51695.json b/2024/51xxx/CVE-2024-51695.json new file mode 100644 index 00000000000..6a510b2e360 --- /dev/null +++ b/2024/51xxx/CVE-2024-51695.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51695", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51696.json b/2024/51xxx/CVE-2024-51696.json new file mode 100644 index 00000000000..92efc97b86e --- /dev/null +++ b/2024/51xxx/CVE-2024-51696.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51696", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51697.json b/2024/51xxx/CVE-2024-51697.json new file mode 100644 index 00000000000..359a4abfe0f --- /dev/null +++ b/2024/51xxx/CVE-2024-51697.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51697", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51698.json b/2024/51xxx/CVE-2024-51698.json new file mode 100644 index 00000000000..5865d8dc3bf --- /dev/null +++ b/2024/51xxx/CVE-2024-51698.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51698", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51699.json b/2024/51xxx/CVE-2024-51699.json new file mode 100644 index 00000000000..a85c687d91c --- /dev/null +++ b/2024/51xxx/CVE-2024-51699.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51699", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51700.json b/2024/51xxx/CVE-2024-51700.json new file mode 100644 index 00000000000..4c74e4df22b --- /dev/null +++ b/2024/51xxx/CVE-2024-51700.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51700", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51701.json b/2024/51xxx/CVE-2024-51701.json new file mode 100644 index 00000000000..36797121b3e --- /dev/null +++ b/2024/51xxx/CVE-2024-51701.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51701", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51702.json b/2024/51xxx/CVE-2024-51702.json new file mode 100644 index 00000000000..a0f81186556 --- /dev/null +++ b/2024/51xxx/CVE-2024-51702.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51702", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51703.json b/2024/51xxx/CVE-2024-51703.json new file mode 100644 index 00000000000..d86496d1249 --- /dev/null +++ b/2024/51xxx/CVE-2024-51703.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51703", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51704.json b/2024/51xxx/CVE-2024-51704.json new file mode 100644 index 00000000000..a3d58a0d270 --- /dev/null +++ b/2024/51xxx/CVE-2024-51704.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51704", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51705.json b/2024/51xxx/CVE-2024-51705.json new file mode 100644 index 00000000000..9148cce48c0 --- /dev/null +++ b/2024/51xxx/CVE-2024-51705.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51705", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51706.json b/2024/51xxx/CVE-2024-51706.json new file mode 100644 index 00000000000..c8e3e784704 --- /dev/null +++ b/2024/51xxx/CVE-2024-51706.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51706", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51707.json b/2024/51xxx/CVE-2024-51707.json new file mode 100644 index 00000000000..f0bb45c7e6a --- /dev/null +++ b/2024/51xxx/CVE-2024-51707.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51707", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51708.json b/2024/51xxx/CVE-2024-51708.json new file mode 100644 index 00000000000..efb71dece90 --- /dev/null +++ b/2024/51xxx/CVE-2024-51708.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51708", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51709.json b/2024/51xxx/CVE-2024-51709.json new file mode 100644 index 00000000000..9a963a561ee --- /dev/null +++ b/2024/51xxx/CVE-2024-51709.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51709", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51710.json b/2024/51xxx/CVE-2024-51710.json new file mode 100644 index 00000000000..b7e2c2bf078 --- /dev/null +++ b/2024/51xxx/CVE-2024-51710.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51710", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51711.json b/2024/51xxx/CVE-2024-51711.json new file mode 100644 index 00000000000..f7d49410eeb --- /dev/null +++ b/2024/51xxx/CVE-2024-51711.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51711", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51712.json b/2024/51xxx/CVE-2024-51712.json new file mode 100644 index 00000000000..88f292b8627 --- /dev/null +++ b/2024/51xxx/CVE-2024-51712.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51712", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51713.json b/2024/51xxx/CVE-2024-51713.json new file mode 100644 index 00000000000..21ee7e56c80 --- /dev/null +++ b/2024/51xxx/CVE-2024-51713.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51713", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51714.json b/2024/51xxx/CVE-2024-51714.json new file mode 100644 index 00000000000..6afef640dcb --- /dev/null +++ b/2024/51xxx/CVE-2024-51714.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51714", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51715.json b/2024/51xxx/CVE-2024-51715.json new file mode 100644 index 00000000000..8011e307a0c --- /dev/null +++ b/2024/51xxx/CVE-2024-51715.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51715", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51716.json b/2024/51xxx/CVE-2024-51716.json new file mode 100644 index 00000000000..e2cd910013b --- /dev/null +++ b/2024/51xxx/CVE-2024-51716.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51716", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51717.json b/2024/51xxx/CVE-2024-51717.json new file mode 100644 index 00000000000..3bb21e4eaf4 --- /dev/null +++ b/2024/51xxx/CVE-2024-51717.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51717", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51718.json b/2024/51xxx/CVE-2024-51718.json new file mode 100644 index 00000000000..ca83f693aea --- /dev/null +++ b/2024/51xxx/CVE-2024-51718.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51718", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51719.json b/2024/51xxx/CVE-2024-51719.json new file mode 100644 index 00000000000..e4958e6590e --- /dev/null +++ b/2024/51xxx/CVE-2024-51719.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51719", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file