diff --git a/2023/38xxx/CVE-2023-38137.json b/2023/38xxx/CVE-2023-38137.json index 1d79d15f310..bef779c72db 100644 --- a/2023/38xxx/CVE-2023-38137.json +++ b/2023/38xxx/CVE-2023-38137.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-38137", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/38xxx/CVE-2023-38262.json b/2023/38xxx/CVE-2023-38262.json index 656015f5284..a982f6d157b 100644 --- a/2023/38xxx/CVE-2023-38262.json +++ b/2023/38xxx/CVE-2023-38262.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-38262", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/39xxx/CVE-2023-39450.json b/2023/39xxx/CVE-2023-39450.json index 45a3a3862b2..03aba06d692 100644 --- a/2023/39xxx/CVE-2023-39450.json +++ b/2023/39xxx/CVE-2023-39450.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-39450", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/41xxx/CVE-2023-41703.json b/2023/41xxx/CVE-2023-41703.json index e1741f9515f..06fabd67226 100644 --- a/2023/41xxx/CVE-2023-41703.json +++ b/2023/41xxx/CVE-2023-41703.json @@ -69,6 +69,11 @@ "url": "http://seclists.org/fulldisclosure/2024/Feb/10", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2024/Feb/10" + }, + { + "url": "http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html" } ] }, diff --git a/2023/41xxx/CVE-2023-41704.json b/2023/41xxx/CVE-2023-41704.json index 6f29cae2603..f834a1eb9f4 100644 --- a/2023/41xxx/CVE-2023-41704.json +++ b/2023/41xxx/CVE-2023-41704.json @@ -69,6 +69,11 @@ "url": "http://seclists.org/fulldisclosure/2024/Feb/10", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2024/Feb/10" + }, + { + "url": "http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html" } ] }, diff --git a/2023/41xxx/CVE-2023-41705.json b/2023/41xxx/CVE-2023-41705.json index 8b54ac1d2a8..ac4d91d799b 100644 --- a/2023/41xxx/CVE-2023-41705.json +++ b/2023/41xxx/CVE-2023-41705.json @@ -67,6 +67,11 @@ "url": "http://seclists.org/fulldisclosure/2024/Feb/10", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2024/Feb/10" + }, + { + "url": "http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html" } ] }, diff --git a/2023/41xxx/CVE-2023-41706.json b/2023/41xxx/CVE-2023-41706.json index 5980e523bfa..0e34b15e564 100644 --- a/2023/41xxx/CVE-2023-41706.json +++ b/2023/41xxx/CVE-2023-41706.json @@ -69,6 +69,11 @@ "url": "http://seclists.org/fulldisclosure/2024/Feb/10", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2024/Feb/10" + }, + { + "url": "http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html" } ] }, diff --git a/2023/41xxx/CVE-2023-41707.json b/2023/41xxx/CVE-2023-41707.json index c4459a6f9f7..cc2a0a2ec0c 100644 --- a/2023/41xxx/CVE-2023-41707.json +++ b/2023/41xxx/CVE-2023-41707.json @@ -69,6 +69,11 @@ "url": "http://seclists.org/fulldisclosure/2024/Feb/10", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2024/Feb/10" + }, + { + "url": "http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html" } ] }, diff --git a/2023/41xxx/CVE-2023-41708.json b/2023/41xxx/CVE-2023-41708.json index 8ef337ff518..431eeb65319 100644 --- a/2023/41xxx/CVE-2023-41708.json +++ b/2023/41xxx/CVE-2023-41708.json @@ -69,6 +69,11 @@ "url": "http://seclists.org/fulldisclosure/2024/Feb/10", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2024/Feb/10" + }, + { + "url": "http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html" } ] }, diff --git a/2023/42xxx/CVE-2023-42437.json b/2023/42xxx/CVE-2023-42437.json index 8f09c916d25..3e4790638ec 100644 --- a/2023/42xxx/CVE-2023-42437.json +++ b/2023/42xxx/CVE-2023-42437.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-42437", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/42xxx/CVE-2023-42665.json b/2023/42xxx/CVE-2023-42665.json index 1bfd5a7381c..0db39b8c464 100644 --- a/2023/42xxx/CVE-2023-42665.json +++ b/2023/42xxx/CVE-2023-42665.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-42665", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/42xxx/CVE-2023-42775.json b/2023/42xxx/CVE-2023-42775.json index e0a2622f4e6..03d4292ddd8 100644 --- a/2023/42xxx/CVE-2023-42775.json +++ b/2023/42xxx/CVE-2023-42775.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-42775", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/43xxx/CVE-2023-43749.json b/2023/43xxx/CVE-2023-43749.json index acbd62c0eec..dca23dfd427 100644 --- a/2023/43xxx/CVE-2023-43749.json +++ b/2023/43xxx/CVE-2023-43749.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-43749", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/45xxx/CVE-2023-45224.json b/2023/45xxx/CVE-2023-45224.json index f9165f3084f..86c7bb9e948 100644 --- a/2023/45xxx/CVE-2023-45224.json +++ b/2023/45xxx/CVE-2023-45224.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-45224", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/45xxx/CVE-2023-45738.json b/2023/45xxx/CVE-2023-45738.json index 6c575fb5a3a..39c4bd4b4e0 100644 --- a/2023/45xxx/CVE-2023-45738.json +++ b/2023/45xxx/CVE-2023-45738.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-45738", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/45xxx/CVE-2023-45850.json b/2023/45xxx/CVE-2023-45850.json index 9e3f67bdb12..bbf4b5591c8 100644 --- a/2023/45xxx/CVE-2023-45850.json +++ b/2023/45xxx/CVE-2023-45850.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-45850", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/48xxx/CVE-2023-48729.json b/2023/48xxx/CVE-2023-48729.json index 70ff5ea38b2..e36debf7f36 100644 --- a/2023/48xxx/CVE-2023-48729.json +++ b/2023/48xxx/CVE-2023-48729.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-48729", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/48xxx/CVE-2023-48734.json b/2023/48xxx/CVE-2023-48734.json index ef6a0c5af13..d2a221f106a 100644 --- a/2023/48xxx/CVE-2023-48734.json +++ b/2023/48xxx/CVE-2023-48734.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-48734", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/49xxx/CVE-2023-49588.json b/2023/49xxx/CVE-2023-49588.json index 330367f0e3c..9a3e4e6745a 100644 --- a/2023/49xxx/CVE-2023-49588.json +++ b/2023/49xxx/CVE-2023-49588.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-49588", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/49xxx/CVE-2023-49590.json b/2023/49xxx/CVE-2023-49590.json index 7071d7e3ddd..66ddb981e25 100644 --- a/2023/49xxx/CVE-2023-49590.json +++ b/2023/49xxx/CVE-2023-49590.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-49590", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/49xxx/CVE-2023-49609.json b/2023/49xxx/CVE-2023-49609.json index c7888357db6..e71413643ae 100644 --- a/2023/49xxx/CVE-2023-49609.json +++ b/2023/49xxx/CVE-2023-49609.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-49609", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/49xxx/CVE-2023-49611.json b/2023/49xxx/CVE-2023-49611.json index 11f8fb1f770..c3cdcb9db93 100644 --- a/2023/49xxx/CVE-2023-49611.json +++ b/2023/49xxx/CVE-2023-49611.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-49611", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/49xxx/CVE-2023-49710.json b/2023/49xxx/CVE-2023-49710.json index 556c726d2be..965c0629592 100644 --- a/2023/49xxx/CVE-2023-49710.json +++ b/2023/49xxx/CVE-2023-49710.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-49710", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/49xxx/CVE-2023-49712.json b/2023/49xxx/CVE-2023-49712.json index 802ecebb386..6d894e53a42 100644 --- a/2023/49xxx/CVE-2023-49712.json +++ b/2023/49xxx/CVE-2023-49712.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-49712", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/49xxx/CVE-2023-49811.json b/2023/49xxx/CVE-2023-49811.json index c6d95dbc452..d9f0e453a3e 100644 --- a/2023/49xxx/CVE-2023-49811.json +++ b/2023/49xxx/CVE-2023-49811.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-49811", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/49xxx/CVE-2023-49870.json b/2023/49xxx/CVE-2023-49870.json index 43c7837958c..64857d3e2a5 100644 --- a/2023/49xxx/CVE-2023-49870.json +++ b/2023/49xxx/CVE-2023-49870.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-49870", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/49xxx/CVE-2023-49872.json b/2023/49xxx/CVE-2023-49872.json index 49e1722d426..a7121f9af75 100644 --- a/2023/49xxx/CVE-2023-49872.json +++ b/2023/49xxx/CVE-2023-49872.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-49872", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/50xxx/CVE-2023-50170.json b/2023/50xxx/CVE-2023-50170.json index 6bd39cf8031..f5daf57bc49 100644 --- a/2023/50xxx/CVE-2023-50170.json +++ b/2023/50xxx/CVE-2023-50170.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-50170", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/50xxx/CVE-2023-50174.json b/2023/50xxx/CVE-2023-50174.json index c3924e4cb99..f2dd5b9c7b3 100644 --- a/2023/50xxx/CVE-2023-50174.json +++ b/2023/50xxx/CVE-2023-50174.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-50174", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/50xxx/CVE-2023-50241.json b/2023/50xxx/CVE-2023-50241.json index f3c24ab37be..c2785615bb6 100644 --- a/2023/50xxx/CVE-2023-50241.json +++ b/2023/50xxx/CVE-2023-50241.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-50241", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/50xxx/CVE-2023-50293.json b/2023/50xxx/CVE-2023-50293.json index bdcec958410..c4cd588d8fc 100644 --- a/2023/50xxx/CVE-2023-50293.json +++ b/2023/50xxx/CVE-2023-50293.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-50293", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/50xxx/CVE-2023-50329.json b/2023/50xxx/CVE-2023-50329.json index 4fe9c3aefe8..defa909ddf5 100644 --- a/2023/50xxx/CVE-2023-50329.json +++ b/2023/50xxx/CVE-2023-50329.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-50329", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/50xxx/CVE-2023-50335.json b/2023/50xxx/CVE-2023-50335.json index c54d1b88b5a..9ad45097adb 100644 --- a/2023/50xxx/CVE-2023-50335.json +++ b/2023/50xxx/CVE-2023-50335.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-50335", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/50xxx/CVE-2023-50336.json b/2023/50xxx/CVE-2023-50336.json index 6f5aaa997b7..7f4c56bcb22 100644 --- a/2023/50xxx/CVE-2023-50336.json +++ b/2023/50xxx/CVE-2023-50336.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-50336", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/50xxx/CVE-2023-50337.json b/2023/50xxx/CVE-2023-50337.json index cd955cd6fca..00f16fec452 100644 --- a/2023/50xxx/CVE-2023-50337.json +++ b/2023/50xxx/CVE-2023-50337.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-50337", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/51xxx/CVE-2023-51754.json b/2023/51xxx/CVE-2023-51754.json index eb7009411e5..6ee49bc60b9 100644 --- a/2023/51xxx/CVE-2023-51754.json +++ b/2023/51xxx/CVE-2023-51754.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-51754", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/51xxx/CVE-2023-51755.json b/2023/51xxx/CVE-2023-51755.json index 04e18b93507..4ad373389ef 100644 --- a/2023/51xxx/CVE-2023-51755.json +++ b/2023/51xxx/CVE-2023-51755.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-51755", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/52xxx/CVE-2023-52392.json b/2023/52xxx/CVE-2023-52392.json index 7a5c1007555..7c7bed95daa 100644 --- a/2023/52xxx/CVE-2023-52392.json +++ b/2023/52xxx/CVE-2023-52392.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-52392", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/52xxx/CVE-2023-52395.json b/2023/52xxx/CVE-2023-52395.json index dd224b21dfd..ddc06d06153 100644 --- a/2023/52xxx/CVE-2023-52395.json +++ b/2023/52xxx/CVE-2023-52395.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-52395", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/52xxx/CVE-2023-52396.json b/2023/52xxx/CVE-2023-52396.json index 7ac0ddbad3f..3c6a6740048 100644 --- a/2023/52xxx/CVE-2023-52396.json +++ b/2023/52xxx/CVE-2023-52396.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-52396", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/52xxx/CVE-2023-52398.json b/2023/52xxx/CVE-2023-52398.json index c4904cabc83..7254f812b98 100644 --- a/2023/52xxx/CVE-2023-52398.json +++ b/2023/52xxx/CVE-2023-52398.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-52398", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2023/52xxx/CVE-2023-52399.json b/2023/52xxx/CVE-2023-52399.json index de61236ba60..6d27059976b 100644 --- a/2023/52xxx/CVE-2023-52399.json +++ b/2023/52xxx/CVE-2023-52399.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-52399", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This is unused." } ] } diff --git a/2024/0xxx/CVE-2024-0007.json b/2024/0xxx/CVE-2024-0007.json index 17f62e126e9..d2900778656 100644 --- a/2024/0xxx/CVE-2024-0007.json +++ b/2024/0xxx/CVE-2024-0007.json @@ -1,17 +1,261 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-0007", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@paloaltonetworks.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a malicious authenticated read-write administrator to store a JavaScript payload using the web interface on Panorama appliances. This enables the impersonation of another authenticated administrator." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Palo Alto Networks", + "product": { + "product_data": [ + { + "product_name": "PAN-OS", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "8.1.24-h1", + "status": "unaffected" + } + ], + "lessThan": "8.1.24-h1", + "status": "affected", + "version": "8.1", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "8.1.25", + "status": "unaffected" + } + ], + "lessThan": "8.1.25", + "status": "affected", + "version": "8.1", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "9.0.17", + "status": "unaffected" + } + ], + "lessThan": "9.0.17", + "status": "affected", + "version": "9.0", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "9.1.16", + "status": "unaffected" + } + ], + "lessThan": "9.1.16", + "status": "affected", + "version": "9.1", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "10.0.11", + "status": "unaffected" + } + ], + "lessThan": "10.0.11", + "status": "affected", + "version": "10.0", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "10.1.6", + "status": "unaffected" + } + ], + "lessThan": "10.1.6", + "status": "affected", + "version": "10.1", + "versionType": "custom" + }, + { + "status": "unaffected", + "version": "10.2" + }, + { + "status": "unaffected", + "version": "11.0" + }, + { + "status": "unaffected", + "version": "11.1" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "Prisma Access", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "All" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "Cloud NGFW", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "All" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2024-0007", + "refsource": "MISC", + "name": "https://security.paloaltonetworks.com/CVE-2024-0007" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "defect": [ + "PAN-173112" + ], + "discovery": "EXTERNAL" + }, + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.

Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 94996 (Applications and Threats content update 8810)." + } + ], + "value": "This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices .\n\nCustomers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 94996 (Applications and Threats content update 8810)." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.
" + } + ], + "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.\n" + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "This issue is fixed on Panorama in PAN-OS 8.1.24-h1, PAN-OS 9.0.17, PAN-OS 9.1.16, PAN-OS 10.0.11, PAN-OS 10.1.6, and all later PAN-OS versions.
" + } + ], + "value": "This issue is fixed on Panorama in PAN-OS 8.1.24-h1, PAN-OS 9.0.17, PAN-OS 9.1.16, PAN-OS 10.0.11, PAN-OS 10.1.6, and all later PAN-OS versions.\n" + } + ], + "credits": [ + { + "lang": "en", + "value": "Palo Alto Networks thanks an external reporter for discovering and reporting this issue." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/0xxx/CVE-2024-0008.json b/2024/0xxx/CVE-2024-0008.json index 78959f513fd..4644ea51b5a 100644 --- a/2024/0xxx/CVE-2024-0008.json +++ b/2024/0xxx/CVE-2024-0008.json @@ -1,17 +1,291 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-0008", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@paloaltonetworks.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Web sessions in the management interface in Palo Alto Networks PAN-OS software do not expire in certain situations, making it susceptible to unauthorized access." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-613 Insufficient Session Expiration", + "cweId": "CWE-613" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Palo Alto Networks", + "product": { + "product_data": [ + { + "product_name": "PAN-OS", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "9.0.17-h2", + "status": "unaffected" + } + ], + "lessThan": "9.0.17-h2", + "status": "affected", + "version": "9.0", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "9.0.18", + "status": "unaffected" + } + ], + "lessThan": "9.0.18", + "status": "affected", + "version": "9.0", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "9.1.17", + "status": "unaffected" + } + ], + "lessThan": "9.1.17", + "status": "affected", + "version": "9.1", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "10.0.12-h1", + "status": "unaffected" + } + ], + "lessThan": "10.0.12-h1", + "status": "affected", + "version": "10.0", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "10.0.13", + "status": "unaffected" + } + ], + "lessThan": "10.0.13", + "status": "affected", + "version": "10.0", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "10.1.10-h1", + "status": "unaffected" + } + ], + "lessThan": "10.1.10-h1", + "status": "affected", + "version": "10.1", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "10.1.11", + "status": "unaffected" + } + ], + "lessThan": "10.1.11", + "status": "affected", + "version": "10.1", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "10.2.5", + "status": "unaffected" + } + ], + "lessThan": "10.2.5", + "status": "affected", + "version": "10.2", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "11.0.2", + "status": "unaffected" + } + ], + "lessThan": "11.0.2", + "status": "affected", + "version": "11.0", + "versionType": "custom" + }, + { + "lessThan": "All", + "status": "unaffected", + "version": "11.1", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "Prisma Access", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "All" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "Cloud NGFW", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "All" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2024-0008", + "refsource": "MISC", + "name": "https://security.paloaltonetworks.com/CVE-2024-0008" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "defect": [ + "PAN-211664" + ], + "discovery": "EXTERNAL" + }, + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Ensure that inactivity-based screen locks are enforced on endpoints with access to the PAN-OS web interface." + } + ], + "value": "Ensure that inactivity-based screen locks are enforced on endpoints with access to the PAN-OS web interface." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.
" + } + ], + "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.\n" + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "This issue is fixed in PAN-OS 9.0.17-h2, PAN-OS 9.1.17, PAN-OS 10.0.12-h1, PAN-OS 10.1.10-h1, PAN-OS 10.2.5, PAN-OS 11.0.2, and all later PAN-OS versions." + } + ], + "value": "This issue is fixed in PAN-OS 9.0.17-h2, PAN-OS 9.1.17, PAN-OS 10.0.12-h1, PAN-OS 10.1.10-h1, PAN-OS 10.2.5, PAN-OS 11.0.2, and all later PAN-OS versions." + } + ], + "credits": [ + { + "lang": "en", + "value": "Palo Alto Networks thanks Brian Yaklin for discovering and reporting this issue." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "PHYSICAL", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/0xxx/CVE-2024-0009.json b/2024/0xxx/CVE-2024-0009.json index 87bfa6952ed..61b6c0736fc 100644 --- a/2024/0xxx/CVE-2024-0009.json +++ b/2024/0xxx/CVE-2024-0009.json @@ -1,17 +1,217 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-0009", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@paloaltonetworks.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper verification vulnerability in the GlobalProtect gateway feature of Palo Alto Networks PAN-OS software enables a malicious user with stolen credentials to establish a VPN connection from an unauthorized IP address." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-940 Improper Verification of Source of a Communication Channel", + "cweId": "CWE-940" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Palo Alto Networks", + "product": { + "product_data": [ + { + "product_name": "PAN-OS", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "9.0" + }, + { + "status": "unaffected", + "version": "9.1" + }, + { + "status": "unaffected", + "version": "10.1" + }, + { + "changes": [ + { + "at": "10.2.4", + "status": "unaffected" + } + ], + "lessThan": "10.2.4", + "status": "affected", + "version": "10.2", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "11.0.1", + "status": "unaffected" + } + ], + "lessThan": "11.0.1", + "status": "affected", + "version": "11.0", + "versionType": "custom" + }, + { + "status": "unaffected", + "version": "11.1" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "Prisma Access", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "All" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "Cloud NGFW", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "All" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2024-0009", + "refsource": "MISC", + "name": "https://security.paloaltonetworks.com/CVE-2024-0009" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "defect": [ + "PAN-209787" + ], + "discovery": "USER" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "This issue is applicable only to PAN-OS firewall configurations with a GlobalProtect gateway enabled. You can verify whether you have a GlobalProtect gateway configured by checking for entries in your firewall web interface (Network > GlobalProtect > Gateways)." + } + ], + "value": "This issue is applicable only to PAN-OS firewall configurations with a GlobalProtect gateway enabled. You can verify whether you have a GlobalProtect gateway configured by checking for entries in your firewall web interface (Network > GlobalProtect > Gateways)." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.
" + } + ], + "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.\n" + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "This issue is fixed in PAN-OS 10.2.4, PAN-OS 11.0.1, and all later PAN-OS versions." + } + ], + "value": "This issue is fixed in PAN-OS 10.2.4, PAN-OS 11.0.1, and all later PAN-OS versions." + } + ], + "credits": [ + { + "lang": "en", + "value": "Palo Alto Networks thanks Matthew Fong for discovering and reporting this issue." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/0xxx/CVE-2024-0010.json b/2024/0xxx/CVE-2024-0010.json index d6d9dbe3b25..19330c9a401 100644 --- a/2024/0xxx/CVE-2024-0010.json +++ b/2024/0xxx/CVE-2024-0010.json @@ -1,17 +1,266 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-0010", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@paloaltonetworks.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect portal feature of Palo Alto Networks PAN-OS software enables execution of malicious JavaScript (in the context of a user\u2019s browser) if a user clicks on a malicious link, allowing phishing attacks that could lead to credential theft." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Palo Alto Networks", + "product": { + "product_data": [ + { + "product_name": "PAN-OS", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "9.0.17-h4", + "status": "unaffected" + } + ], + "lessThan": "9.0.17-h4", + "status": "affected", + "version": "9.0", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "9.1.17", + "status": "unaffected" + } + ], + "lessThan": "9.1.17", + "status": "affected", + "version": "9.1", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "10.1.11-h1", + "status": "unaffected" + } + ], + "lessThan": "10.1.11-h1", + "status": "affected", + "version": "10.1", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "10.1.12", + "status": "unaffected" + } + ], + "lessThan": "10.1.12", + "status": "affected", + "version": "10.1", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "11.0.1", + "status": "unaffected" + } + ], + "lessThan": "11.0.1", + "status": "unaffected", + "version": "10.2", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "10.1.10-h1", + "status": "unaffected" + } + ], + "lessThan": "10.1.10-h1", + "status": "unaffected", + "version": "11.0", + "versionType": "custom" + }, + { + "status": "unaffected", + "version": "11.1" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "Prisma Access", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "All" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "Cloud NGFW", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "All" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2024-0010", + "refsource": "MISC", + "name": "https://security.paloaltonetworks.com/CVE-2024-0010" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "defect": [ + "PAN-216858" + ], + "discovery": "EXTERNAL" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "This issue is applicable only to PAN-OS firewall configurations with a GlobalProtect portal enabled. You can verify whether you have a GlobalProtect portal configured by checking for entries in your firewall web interface (Network > GlobalProtect > Portals)." + } + ], + "value": "This issue is applicable only to PAN-OS firewall configurations with a GlobalProtect portal enabled. You can verify whether you have a GlobalProtect portal configured by checking for entries in your firewall web interface (Network > GlobalProtect > Portals)." + } + ], + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 94972 (Applications and Threats content update 8810).
" + } + ], + "value": "Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 94972 (Applications and Threats content update 8810).\n" + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.
" + } + ], + "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.\n" + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "This issue is fixed in PAN-OS 9.0.17-h4, PAN-OS 9.1.17, PAN-OS 10.1.11-h1, PAN-OS 10.1.12, and all later PAN-OS versions." + } + ], + "value": "This issue is fixed in PAN-OS 9.0.17-h4, PAN-OS 9.1.17, PAN-OS 10.1.11-h1, PAN-OS 10.1.12, and all later PAN-OS versions." + } + ], + "credits": [ + { + "lang": "en", + "value": "Palo Alto Networks thanks Micha\u0142 Majchrowicz and Livio Victoriano from Afine Team for discovering and reporting this issue." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/0xxx/CVE-2024-0011.json b/2024/0xxx/CVE-2024-0011.json index c6df3b3be65..240c7d30650 100644 --- a/2024/0xxx/CVE-2024-0011.json +++ b/2024/0xxx/CVE-2024-0011.json @@ -1,17 +1,262 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-0011", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@paloaltonetworks.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A reflected cross-site scripting (XSS) vulnerability in the Captive Portal feature of Palo Alto Networks PAN-OS software enables execution of malicious JavaScript (in the context of an authenticated Captive Portal user\u2019s browser) if a user clicks on a malicious link, allowing phishing attacks that could lead to credential theft." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Palo Alto Networks", + "product": { + "product_data": [ + { + "product_name": "PAN-OS", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "8.1.24", + "status": "unaffected" + } + ], + "lessThan": "8.1.24", + "status": "affected", + "version": "8.1", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "9.0.17", + "status": "unaffected" + } + ], + "lessThan": "9.0.17", + "status": "affected", + "version": "9.0", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "9.1.13", + "status": "unaffected" + } + ], + "lessThan": "9.1.13", + "status": "affected", + "version": "9.1", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "10.0.11", + "status": "unaffected" + } + ], + "lessThan": "10.0.11", + "status": "affected", + "version": "10.0", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "10.1.3", + "status": "unaffected" + } + ], + "lessThan": "10.1.3", + "status": "affected", + "version": "10.1", + "versionType": "custom" + }, + { + "status": "unaffected", + "version": "10.2" + }, + { + "status": "unaffected", + "version": "11.0" + }, + { + "status": "unaffected", + "version": "11.1" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "Prisma Access", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "All" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "Cloud NGFW", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "All" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2024-0011", + "refsource": "MISC", + "name": "https://security.paloaltonetworks.com/CVE-2024-0011" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "defect": [ + "PAN-175970" + ], + "discovery": "EXTERNAL" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "This issue is applicable only to firewalls that are configured to use Captive Portal authentication. You can verify whether you have Captive Portal configured in the Captive Portal Settings page (Device > User Identification > Captive Portal Settings)." + } + ], + "value": "This issue is applicable only to firewalls that are configured to use Captive Portal authentication. You can verify whether you have Captive Portal configured in the Captive Portal Settings page (Device > User Identification > Captive Portal Settings)." + } + ], + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 93070 (Applications and Threats content update 8810).
" + } + ], + "value": "Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 93070 (Applications and Threats content update 8810).\n" + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.
" + } + ], + "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.\n" + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.13, PAN-OS 10.0.11, PAN-OS 10.1.3, and all later PAN-OS versions." + } + ], + "value": "This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.13, PAN-OS 10.0.11, PAN-OS 10.1.3, and all later PAN-OS versions." + } + ], + "credits": [ + { + "lang": "en", + "value": "Palo Alto Networks thanks Darek Jensen and an external reporter for discovering and reporting this issue." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/0xxx/CVE-2024-0911.json b/2024/0xxx/CVE-2024-0911.json index 442564bb27b..9f00fbdd237 100644 --- a/2024/0xxx/CVE-2024-0911.json +++ b/2024/0xxx/CVE-2024-0911.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A flaw was found in Indent. This issue may allow a local user to use a specially-crafted file to trigger a heap-based buffer overflow, which can lead to an application crash." + "value": "A flaw was found in indent, a program for formatting C code. This issue may allow an attacker to trick a user into processing a specially crafted file to trigger a heap-based buffer overflow, causing the application to crash." } ] }, @@ -36,18 +36,13 @@ "product": { "product_data": [ { - "product_name": "indent-2.2.13", + "product_name": "indent", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { - "versions": [ - { - "version": "7.fc40", - "status": "unaffected" - } - ] + "defaultStatus": "affected" } } ] @@ -100,7 +95,7 @@ { "version_value": "not down converted", "x_cve_json_5_version_data": { - "defaultStatus": "unknown" + "defaultStatus": "affected" } } ] @@ -113,7 +108,7 @@ { "version_value": "not down converted", "x_cve_json_5_version_data": { - "defaultStatus": "unknown" + "defaultStatus": "affected" } } ] @@ -136,9 +131,20 @@ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260399", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2260399" + }, + { + "url": "https://lists.gnu.org/archive/html/bug-indent/2024-01/msg00000.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/bug-indent/2024-01/msg00000.html" } ] }, + "work_around": [ + { + "lang": "en", + "value": "Do not process untrusted files with the indent program." + } + ], "impact": { "cvss": [ { @@ -149,10 +155,10 @@ "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } ] diff --git a/2024/1xxx/CVE-2024-1497.json b/2024/1xxx/CVE-2024-1497.json new file mode 100644 index 00000000000..d2d2ca6a583 --- /dev/null +++ b/2024/1xxx/CVE-2024-1497.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1497", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1498.json b/2024/1xxx/CVE-2024-1498.json new file mode 100644 index 00000000000..23daec262e2 --- /dev/null +++ b/2024/1xxx/CVE-2024-1498.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1498", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1499.json b/2024/1xxx/CVE-2024-1499.json new file mode 100644 index 00000000000..e4c7c309ee0 --- /dev/null +++ b/2024/1xxx/CVE-2024-1499.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1499", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1500.json b/2024/1xxx/CVE-2024-1500.json new file mode 100644 index 00000000000..beb141083e7 --- /dev/null +++ b/2024/1xxx/CVE-2024-1500.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1500", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1501.json b/2024/1xxx/CVE-2024-1501.json new file mode 100644 index 00000000000..ce53d720ecf --- /dev/null +++ b/2024/1xxx/CVE-2024-1501.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1501", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1502.json b/2024/1xxx/CVE-2024-1502.json new file mode 100644 index 00000000000..274066afbc4 --- /dev/null +++ b/2024/1xxx/CVE-2024-1502.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1502", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23306.json b/2024/23xxx/CVE-2024-23306.json index ab8d2ec0497..35df01895be 100644 --- a/2024/23xxx/CVE-2024-23306.json +++ b/2024/23xxx/CVE-2024-23306.json @@ -41,8 +41,8 @@ "version_data": [ { "version_affected": "<", - "version_name": "1.3", - "version_value": "1.5" + "version_name": "1.3.0", + "version_value": "1.5.0" } ] } @@ -53,8 +53,8 @@ "version_data": [ { "version_affected": "<", - "version_name": "1.0", - "version_value": "1.2" + "version_name": "1.0.0", + "version_value": "1.2.0" } ] } diff --git a/2024/24xxx/CVE-2024-24570.json b/2024/24xxx/CVE-2024-24570.json index 7311ea9e74b..511272ebf49 100644 --- a/2024/24xxx/CVE-2024-24570.json +++ b/2024/24xxx/CVE-2024-24570.json @@ -67,6 +67,11 @@ "url": "http://seclists.org/fulldisclosure/2024/Feb/17", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2024/Feb/17" + }, + { + "url": "http://packetstormsecurity.com/files/177133/Statamic-CMS-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/177133/Statamic-CMS-Cross-Site-Scripting.html" } ] }, diff --git a/2024/26xxx/CVE-2024-26028.json b/2024/26xxx/CVE-2024-26028.json new file mode 100644 index 00000000000..d92258416a0 --- /dev/null +++ b/2024/26xxx/CVE-2024-26028.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26028", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26029.json b/2024/26xxx/CVE-2024-26029.json new file mode 100644 index 00000000000..e8bddc3b7cc --- /dev/null +++ b/2024/26xxx/CVE-2024-26029.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26029", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26030.json b/2024/26xxx/CVE-2024-26030.json new file mode 100644 index 00000000000..7c3ef3b1ee0 --- /dev/null +++ b/2024/26xxx/CVE-2024-26030.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26030", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26031.json b/2024/26xxx/CVE-2024-26031.json new file mode 100644 index 00000000000..590bbb15997 --- /dev/null +++ b/2024/26xxx/CVE-2024-26031.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26031", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26032.json b/2024/26xxx/CVE-2024-26032.json new file mode 100644 index 00000000000..64ffa68b01a --- /dev/null +++ b/2024/26xxx/CVE-2024-26032.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26032", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26033.json b/2024/26xxx/CVE-2024-26033.json new file mode 100644 index 00000000000..205e5b33bca --- /dev/null +++ b/2024/26xxx/CVE-2024-26033.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26033", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26034.json b/2024/26xxx/CVE-2024-26034.json new file mode 100644 index 00000000000..420c3d71d17 --- /dev/null +++ b/2024/26xxx/CVE-2024-26034.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26034", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26035.json b/2024/26xxx/CVE-2024-26035.json new file mode 100644 index 00000000000..72db4ccabc0 --- /dev/null +++ b/2024/26xxx/CVE-2024-26035.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26035", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26036.json b/2024/26xxx/CVE-2024-26036.json new file mode 100644 index 00000000000..8aed9d64774 --- /dev/null +++ b/2024/26xxx/CVE-2024-26036.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26036", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26122.json b/2024/26xxx/CVE-2024-26122.json new file mode 100644 index 00000000000..676e3496b17 --- /dev/null +++ b/2024/26xxx/CVE-2024-26122.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26122", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26123.json b/2024/26xxx/CVE-2024-26123.json new file mode 100644 index 00000000000..cd0c6aae1d9 --- /dev/null +++ b/2024/26xxx/CVE-2024-26123.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26123", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26124.json b/2024/26xxx/CVE-2024-26124.json new file mode 100644 index 00000000000..c224bc9c3f7 --- /dev/null +++ b/2024/26xxx/CVE-2024-26124.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26124", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26125.json b/2024/26xxx/CVE-2024-26125.json new file mode 100644 index 00000000000..64c0f37d2aa --- /dev/null +++ b/2024/26xxx/CVE-2024-26125.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26125", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26126.json b/2024/26xxx/CVE-2024-26126.json new file mode 100644 index 00000000000..33e98b4934b --- /dev/null +++ b/2024/26xxx/CVE-2024-26126.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26126", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26127.json b/2024/26xxx/CVE-2024-26127.json new file mode 100644 index 00000000000..a480b296a1e --- /dev/null +++ b/2024/26xxx/CVE-2024-26127.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26127", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26128.json b/2024/26xxx/CVE-2024-26128.json new file mode 100644 index 00000000000..2cb2e0062f8 --- /dev/null +++ b/2024/26xxx/CVE-2024-26128.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26128", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26129.json b/2024/26xxx/CVE-2024-26129.json new file mode 100644 index 00000000000..48a0068a53e --- /dev/null +++ b/2024/26xxx/CVE-2024-26129.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26129", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26130.json b/2024/26xxx/CVE-2024-26130.json new file mode 100644 index 00000000000..008845c194f --- /dev/null +++ b/2024/26xxx/CVE-2024-26130.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26130", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26131.json b/2024/26xxx/CVE-2024-26131.json new file mode 100644 index 00000000000..633ca801b5d --- /dev/null +++ b/2024/26xxx/CVE-2024-26131.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26131", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26132.json b/2024/26xxx/CVE-2024-26132.json new file mode 100644 index 00000000000..a8fe78da0bb --- /dev/null +++ b/2024/26xxx/CVE-2024-26132.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26132", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26133.json b/2024/26xxx/CVE-2024-26133.json new file mode 100644 index 00000000000..bae0a5b8fe6 --- /dev/null +++ b/2024/26xxx/CVE-2024-26133.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26133", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26134.json b/2024/26xxx/CVE-2024-26134.json new file mode 100644 index 00000000000..adb2ed62614 --- /dev/null +++ b/2024/26xxx/CVE-2024-26134.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26134", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26135.json b/2024/26xxx/CVE-2024-26135.json new file mode 100644 index 00000000000..be4c80fbeac --- /dev/null +++ b/2024/26xxx/CVE-2024-26135.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26135", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26136.json b/2024/26xxx/CVE-2024-26136.json new file mode 100644 index 00000000000..2662810dc06 --- /dev/null +++ b/2024/26xxx/CVE-2024-26136.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26136", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26137.json b/2024/26xxx/CVE-2024-26137.json new file mode 100644 index 00000000000..e8269928b8e --- /dev/null +++ b/2024/26xxx/CVE-2024-26137.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26137", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26138.json b/2024/26xxx/CVE-2024-26138.json new file mode 100644 index 00000000000..beb0c339548 --- /dev/null +++ b/2024/26xxx/CVE-2024-26138.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26138", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26139.json b/2024/26xxx/CVE-2024-26139.json new file mode 100644 index 00000000000..538b1344b6c --- /dev/null +++ b/2024/26xxx/CVE-2024-26139.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26139", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26140.json b/2024/26xxx/CVE-2024-26140.json new file mode 100644 index 00000000000..8a3726b7410 --- /dev/null +++ b/2024/26xxx/CVE-2024-26140.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26140", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26141.json b/2024/26xxx/CVE-2024-26141.json new file mode 100644 index 00000000000..81bac8b4de3 --- /dev/null +++ b/2024/26xxx/CVE-2024-26141.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26141", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26142.json b/2024/26xxx/CVE-2024-26142.json new file mode 100644 index 00000000000..ac3fde5a339 --- /dev/null +++ b/2024/26xxx/CVE-2024-26142.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26142", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26143.json b/2024/26xxx/CVE-2024-26143.json new file mode 100644 index 00000000000..f791467892c --- /dev/null +++ b/2024/26xxx/CVE-2024-26143.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26143", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26144.json b/2024/26xxx/CVE-2024-26144.json new file mode 100644 index 00000000000..292aab2168d --- /dev/null +++ b/2024/26xxx/CVE-2024-26144.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26144", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26145.json b/2024/26xxx/CVE-2024-26145.json new file mode 100644 index 00000000000..368551d201c --- /dev/null +++ b/2024/26xxx/CVE-2024-26145.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26145", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26146.json b/2024/26xxx/CVE-2024-26146.json new file mode 100644 index 00000000000..ee8aea40d96 --- /dev/null +++ b/2024/26xxx/CVE-2024-26146.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26146", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26147.json b/2024/26xxx/CVE-2024-26147.json new file mode 100644 index 00000000000..d2af75877b9 --- /dev/null +++ b/2024/26xxx/CVE-2024-26147.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26147", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26148.json b/2024/26xxx/CVE-2024-26148.json new file mode 100644 index 00000000000..ccf4bd1369d --- /dev/null +++ b/2024/26xxx/CVE-2024-26148.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26148", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26149.json b/2024/26xxx/CVE-2024-26149.json new file mode 100644 index 00000000000..176ecc0f6fb --- /dev/null +++ b/2024/26xxx/CVE-2024-26149.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26149", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26150.json b/2024/26xxx/CVE-2024-26150.json new file mode 100644 index 00000000000..c854c4406bd --- /dev/null +++ b/2024/26xxx/CVE-2024-26150.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26150", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26151.json b/2024/26xxx/CVE-2024-26151.json new file mode 100644 index 00000000000..1a8cb89398b --- /dev/null +++ b/2024/26xxx/CVE-2024-26151.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26151", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26152.json b/2024/26xxx/CVE-2024-26152.json new file mode 100644 index 00000000000..cc1b01b8b30 --- /dev/null +++ b/2024/26xxx/CVE-2024-26152.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-26152", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file