diff --git a/2024/44xxx/CVE-2024-44459.json b/2024/44xxx/CVE-2024-44459.json
index d08fa03b8c2..164a671fa2f 100644
--- a/2024/44xxx/CVE-2024-44459.json
+++ b/2024/44xxx/CVE-2024-44459.json
@@ -1,17 +1,61 @@
{
- "data_type": "CVE",
- "data_format": "MITRE",
- "data_version": "4.0",
"CVE_data_meta": {
- "ID": "CVE-2024-44459",
"ASSIGNER": "cve@mitre.org",
- "STATE": "RESERVED"
+ "ID": "CVE-2024-44459",
+ "STATE": "PUBLIC"
},
+ "affects": {
+ "vendor": {
+ "vendor_data": [
+ {
+ "product": {
+ "product_data": [
+ {
+ "product_name": "n/a",
+ "version": {
+ "version_data": [
+ {
+ "version_value": "n/a"
+ }
+ ]
+ }
+ }
+ ]
+ },
+ "vendor_name": "n/a"
+ }
+ ]
+ }
+ },
+ "data_format": "MITRE",
+ "data_type": "CVE",
+ "data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
- "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ "value": "A memory allocation issue in vernemq v2.0.1 allows attackers to cause a Denial of Service (DoS) via excessive memory consumption."
+ }
+ ]
+ },
+ "problemtype": {
+ "problemtype_data": [
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "n/a"
+ }
+ ]
+ }
+ ]
+ },
+ "references": {
+ "reference_data": [
+ {
+ "url": "https://github.com/zzh-newlearner/MQTT_Crash/blob/main/Vernemq_crash.md",
+ "refsource": "MISC",
+ "name": "https://github.com/zzh-newlearner/MQTT_Crash/blob/main/Vernemq_crash.md"
}
]
}
diff --git a/2024/44xxx/CVE-2024-44460.json b/2024/44xxx/CVE-2024-44460.json
index e1e5fbdc147..a14a13a1633 100644
--- a/2024/44xxx/CVE-2024-44460.json
+++ b/2024/44xxx/CVE-2024-44460.json
@@ -1,17 +1,61 @@
{
- "data_type": "CVE",
- "data_format": "MITRE",
- "data_version": "4.0",
"CVE_data_meta": {
- "ID": "CVE-2024-44460",
"ASSIGNER": "cve@mitre.org",
- "STATE": "RESERVED"
+ "ID": "CVE-2024-44460",
+ "STATE": "PUBLIC"
},
+ "affects": {
+ "vendor": {
+ "vendor_data": [
+ {
+ "product": {
+ "product_data": [
+ {
+ "product_name": "n/a",
+ "version": {
+ "version_data": [
+ {
+ "version_value": "n/a"
+ }
+ ]
+ }
+ }
+ ]
+ },
+ "vendor_name": "n/a"
+ }
+ ]
+ }
+ },
+ "data_format": "MITRE",
+ "data_type": "CVE",
+ "data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
- "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ "value": "An invalid read size in Nanomq v0.21.9 allows attackers to cause a Denial of Service (DoS)."
+ }
+ ]
+ },
+ "problemtype": {
+ "problemtype_data": [
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "n/a"
+ }
+ ]
+ }
+ ]
+ },
+ "references": {
+ "reference_data": [
+ {
+ "url": "https://github.com/zzh-newlearner/MQTT_Crash/blob/main/Nanomq_invalid_read.md",
+ "refsource": "MISC",
+ "name": "https://github.com/zzh-newlearner/MQTT_Crash/blob/main/Nanomq_invalid_read.md"
}
]
}
diff --git a/2024/45xxx/CVE-2024-45845.json b/2024/45xxx/CVE-2024-45845.json
index 82b2e00b03c..3fc281f16b8 100644
--- a/2024/45xxx/CVE-2024-45845.json
+++ b/2024/45xxx/CVE-2024-45845.json
@@ -1,71 +1,17 @@
{
- "CVE_data_meta": {
- "ASSIGNER": "cve@mitre.org",
- "ID": "CVE-2024-45845",
- "STATE": "PUBLIC"
- },
- "affects": {
- "vendor": {
- "vendor_data": [
- {
- "product": {
- "product_data": [
- {
- "product_name": "n/a",
- "version": {
- "version_data": [
- {
- "version_value": "n/a"
- }
- ]
- }
- }
- ]
- },
- "vendor_name": "n/a"
- }
- ]
- }
- },
- "data_format": "MITRE",
"data_type": "CVE",
+ "data_format": "MITRE",
"data_version": "4.0",
+ "CVE_data_meta": {
+ "ID": "CVE-2024-45845",
+ "ASSIGNER": "cve@mitre.org",
+ "STATE": "REJECT"
+ },
"description": {
"description_data": [
{
"lang": "eng",
- "value": "nix 2.24 through 2.24.5 allows directory traversal via a symlink in a nar file, because of mishandling of a directory containing a symlink and a directory of the same name, aka GHSA-h4vv-h3jq-v493."
- }
- ]
- },
- "problemtype": {
- "problemtype_data": [
- {
- "description": [
- {
- "lang": "eng",
- "value": "n/a"
- }
- ]
- }
- ]
- },
- "references": {
- "reference_data": [
- {
- "url": "https://puckipedia.com/7hkj-98sq/qixt",
- "refsource": "MISC",
- "name": "https://puckipedia.com/7hkj-98sq/qixt"
- },
- {
- "url": "https://github.com/NixOS/nix/tags",
- "refsource": "MISC",
- "name": "https://github.com/NixOS/nix/tags"
- },
- {
- "url": "https://news.ycombinator.com/item?id=41492994",
- "refsource": "MISC",
- "name": "https://news.ycombinator.com/item?id=41492994"
+ "value": "** REJECT ** DO NOT USE THIS CVE RECORD. Consult IDs: CVE-2024-45593. Reason: This record is a reservation duplicate of CVE-2024-45593. Notes: All CVE users should reference CVE-2024-45593 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage."
}
]
}
diff --git a/2024/6xxx/CVE-2024-6077.json b/2024/6xxx/CVE-2024-6077.json
index 372368d5507..1ad0f2dbac2 100644
--- a/2024/6xxx/CVE-2024-6077.json
+++ b/2024/6xxx/CVE-2024-6077.json
@@ -163,10 +163,10 @@
{
"base64": false,
"type": "text/html",
- "value": "
Affected Family | First Known in Software/Firmware Version | Corrected in Software/Firmware Version |
CompactLogix 5380 | v.32 .011 | v33.017, v34.014, v35.013, v36.011 and later |
CompactLogix 5380 Process | v.33.011 | v33.017, v34.014, v35.013, v36.011 and later |
Compact GuardLogix 5380 SIL 2 | v.32.013 | v33.017, v34.014, v35.013, v36.011 and later |
Compact GuardLogix 5380 SIL 3 | v.32.011 | v33.017, v34.014, v35.013, v36.011 and later |
CompactLogix 5480 | v.32.011 | v33.017, v34.014, v35.013, v36.011 and later |
ControlLogix\u00ae 5580 | v.32.011 | v33.017, v34.014, v35.013, v36.011 and later |
ControlLogix\u00ae 5580 Process | v.33.011 | v33.017, v34.014, v35.013, v36.011 and later |
GuardLogix 5580 | v.32.011 | v33.017, v34.014, v35.013, v36.011 and later |
1756-EN4 | v2.001 | v6.001 and later |
\n\n
"
+ "value": "Affected Family | First Known in Software/Firmware Version | Corrected in Software/Firmware Version |
CompactLogix 5380 | v.32 .011 | v33.017, v34.014, v35.013, v36.011 and later |
CompactLogix 5380 Process | v.33.011 | v33.017, v34.014, v35.013, v36.011 and later |
Compact GuardLogix 5380 SIL 2 | v.32.013 | v33.017, v34.014, v35.013, v36.011 and later |
Compact GuardLogix 5380 SIL 3 | v.32.011 | v33.017, v34.014, v35.013, v36.011 and later |
CompactLogix 5480 | v.32.011 | v33.017, v34.014, v35.013, v36.011 and later |
ControlLogix\u00ae 5580 | v.32.011 | v33.017, v34.014, v35.013, v36.011 and later |
ControlLogix\u00ae 5580 Process | v.33.011 | v33.017, v34.014, v35.013, v36.011 and later |
GuardLogix 5580 | v.32.011 | v33.017, v34.014, v35.013, v36.011 and later |
1756-EN4 | v2.001 | v6.001 and later |
\n\n\n\nMitigations and Workarounds
Customers who are unable to upgrade to the corrected software versions are encouraged to apply the following risk mitigations.
For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices to minimize the risk of the vulnerability. Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.
\n\n
"
}
],
- "value": "Affected Family \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nFirst Known in Software/Firmware Version\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCorrected in Software/Firmware Version\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompactLogix 5380\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32 .011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompactLogix 5380 Process \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.33.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompact GuardLogix 5380 SIL 2 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.013\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompact GuardLogix 5380 SIL 3 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompactLogix 5480 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nControlLogix\u00ae 5580 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nControlLogix\u00ae 5580 Process \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.33.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nGuardLogix 5580 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n1756-EN4\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv2.001\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv6.001 and later"
+ "value": "Affected Family \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nFirst Known in Software/Firmware Version\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCorrected in Software/Firmware Version\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompactLogix 5380\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32 .011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompactLogix 5380 Process \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.33.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompact GuardLogix 5380 SIL 2 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.013\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompact GuardLogix 5380 SIL 3 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompactLogix 5480 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nControlLogix\u00ae 5580 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nControlLogix\u00ae 5580 Process \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.33.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nGuardLogix 5580 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n1756-EN4\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv2.001\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv6.001 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\n\n\n\nMitigations and Workarounds \nCustomers who are unable to upgrade to the corrected software versions are encouraged to apply the following risk mitigations. \n\n * Users who do not wish to use CIP security can disable the feature per device. See \"Disable CIP Security\" in Chapter 2 of \"CIP Security with Rockwell Automation Products\" (publication SECURE-AT001)\n\n\n\n\nFor information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight \u00a0to minimize the risk of the vulnerability. Customers can use Stakeholder-Specific Vulnerability Categorization https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc \u00a0to generate more environment-specific prioritization."
}
]
}
\ No newline at end of file
diff --git a/2024/7xxx/CVE-2024-7960.json b/2024/7xxx/CVE-2024-7960.json
index 9d2af165cf6..49121d0f544 100644
--- a/2024/7xxx/CVE-2024-7960.json
+++ b/2024/7xxx/CVE-2024-7960.json
@@ -1,18 +1,84 @@
{
+ "data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
- "data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-7960",
- "ASSIGNER": "cve@mitre.org",
- "STATE": "RESERVED"
+ "ASSIGNER": "PSIRT@rockwellautomation.com",
+ "STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
- "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ "value": "The Rockwell Automation affected product contains a vulnerability that allows a threat actor to view sensitive information and change settings. The vulnerability exists due to having an incorrect privilege matrix that allows users to have access to functions they should not."
}
]
- }
+ },
+ "problemtype": {
+ "problemtype_data": [
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "CWE-269: Improper Privilege Management",
+ "cweId": "CWE-269"
+ }
+ ]
+ }
+ ]
+ },
+ "affects": {
+ "vendor": {
+ "vendor_data": [
+ {
+ "vendor_name": "Rockwell Automation",
+ "product": {
+ "product_data": [
+ {
+ "product_name": "Pavilion8\u00ae",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "=",
+ "version_value": "
Affected Product | Affected Software Version | Corrected in Software Version |
Pavilion8\u00ae | <V5.20 | V6.0 and later |
\n\nMitigations and Workarounds
Customers using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible.\u202f\u202f\u202f
\n\n\n\n
"
+ }
+ ],
+ "value": "Affected Product \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nAffected Software Version \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCorrected in Software Version \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nPavilion8\u00ae \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0
Affected Product
| Affected Software Version | Corrected in Software Version |
Pavilion8\u00ae | <V5.20 | V6.0 and later |
\n\nMitigations and Workarounds
Customers using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible.\u202f\u202f\u202f
\n\n
"
+ }
+ ],
+ "value": "Affected Product \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nAffected Software Version \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCorrected in Software Version \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nPavilion8\u00ae \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Affected Product
| First Known in Software Version | Corrected in Software Version |
2800C OptixPanel\u2122 Compact | 4.0.0.325 | 4.0.2.116 |
2800S OptixPanel\u2122 Standard | 4.0.0.350 | 4.0.2.123 |
Embedded Edge Compute Module | 4.0.0.347 | 4.0.2.106 |
\n\nMitigations and Workarounds
Customers using the affected software are encouraged to apply security best practices
\n\n\n\n
"
+ }
+ ],
+ "value": "Affected Product\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nFirst Known in Software Version\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCorrected in Software Version\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n2800C OptixPanel\u2122 Compact\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n4.0.0.325\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n4.0.2.116\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n2800S OptixPanel\u2122 Standard\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n4.0.0.350\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n4.0.2.123\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nEmbedded Edge Compute Module\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n4.0.0.347\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n4.0.2.106\n\n\u00a0\n\n\n\n\nMitigations and Workarounds \nCustomers using the affected software are encouraged to apply security best practices\n\n * For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight \u00a0to minimize the risk of the vulnerability."
+ }
+ ]
}
\ No newline at end of file
diff --git a/2024/8xxx/CVE-2024-8763.json b/2024/8xxx/CVE-2024-8763.json
new file mode 100644
index 00000000000..2fbb843f295
--- /dev/null
+++ b/2024/8xxx/CVE-2024-8763.json
@@ -0,0 +1,18 @@
+{
+ "data_type": "CVE",
+ "data_format": "MITRE",
+ "data_version": "4.0",
+ "CVE_data_meta": {
+ "ID": "CVE-2024-8763",
+ "ASSIGNER": "cve@mitre.org",
+ "STATE": "RESERVED"
+ },
+ "description": {
+ "description_data": [
+ {
+ "lang": "eng",
+ "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ }
+ ]
+ }
+}
\ No newline at end of file
diff --git a/2024/8xxx/CVE-2024-8764.json b/2024/8xxx/CVE-2024-8764.json
new file mode 100644
index 00000000000..84beddb3646
--- /dev/null
+++ b/2024/8xxx/CVE-2024-8764.json
@@ -0,0 +1,18 @@
+{
+ "data_type": "CVE",
+ "data_format": "MITRE",
+ "data_version": "4.0",
+ "CVE_data_meta": {
+ "ID": "CVE-2024-8764",
+ "ASSIGNER": "cve@mitre.org",
+ "STATE": "RESERVED"
+ },
+ "description": {
+ "description_data": [
+ {
+ "lang": "eng",
+ "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ }
+ ]
+ }
+}
\ No newline at end of file
diff --git a/2024/8xxx/CVE-2024-8765.json b/2024/8xxx/CVE-2024-8765.json
new file mode 100644
index 00000000000..1b74c104bf5
--- /dev/null
+++ b/2024/8xxx/CVE-2024-8765.json
@@ -0,0 +1,18 @@
+{
+ "data_type": "CVE",
+ "data_format": "MITRE",
+ "data_version": "4.0",
+ "CVE_data_meta": {
+ "ID": "CVE-2024-8765",
+ "ASSIGNER": "cve@mitre.org",
+ "STATE": "RESERVED"
+ },
+ "description": {
+ "description_data": [
+ {
+ "lang": "eng",
+ "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ }
+ ]
+ }
+}
\ No newline at end of file
diff --git a/2024/8xxx/CVE-2024-8766.json b/2024/8xxx/CVE-2024-8766.json
new file mode 100644
index 00000000000..d871b3280b4
--- /dev/null
+++ b/2024/8xxx/CVE-2024-8766.json
@@ -0,0 +1,18 @@
+{
+ "data_type": "CVE",
+ "data_format": "MITRE",
+ "data_version": "4.0",
+ "CVE_data_meta": {
+ "ID": "CVE-2024-8766",
+ "ASSIGNER": "cve@mitre.org",
+ "STATE": "RESERVED"
+ },
+ "description": {
+ "description_data": [
+ {
+ "lang": "eng",
+ "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ }
+ ]
+ }
+}
\ No newline at end of file
diff --git a/2024/8xxx/CVE-2024-8767.json b/2024/8xxx/CVE-2024-8767.json
new file mode 100644
index 00000000000..e93239605c9
--- /dev/null
+++ b/2024/8xxx/CVE-2024-8767.json
@@ -0,0 +1,18 @@
+{
+ "data_type": "CVE",
+ "data_format": "MITRE",
+ "data_version": "4.0",
+ "CVE_data_meta": {
+ "ID": "CVE-2024-8767",
+ "ASSIGNER": "cve@mitre.org",
+ "STATE": "RESERVED"
+ },
+ "description": {
+ "description_data": [
+ {
+ "lang": "eng",
+ "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ }
+ ]
+ }
+}
\ No newline at end of file