diff --git a/2024/44xxx/CVE-2024-44459.json b/2024/44xxx/CVE-2024-44459.json index d08fa03b8c2..164a671fa2f 100644 --- a/2024/44xxx/CVE-2024-44459.json +++ b/2024/44xxx/CVE-2024-44459.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-44459", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-44459", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A memory allocation issue in vernemq v2.0.1 allows attackers to cause a Denial of Service (DoS) via excessive memory consumption." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/zzh-newlearner/MQTT_Crash/blob/main/Vernemq_crash.md", + "refsource": "MISC", + "name": "https://github.com/zzh-newlearner/MQTT_Crash/blob/main/Vernemq_crash.md" } ] } diff --git a/2024/44xxx/CVE-2024-44460.json b/2024/44xxx/CVE-2024-44460.json index e1e5fbdc147..a14a13a1633 100644 --- a/2024/44xxx/CVE-2024-44460.json +++ b/2024/44xxx/CVE-2024-44460.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-44460", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-44460", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An invalid read size in Nanomq v0.21.9 allows attackers to cause a Denial of Service (DoS)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/zzh-newlearner/MQTT_Crash/blob/main/Nanomq_invalid_read.md", + "refsource": "MISC", + "name": "https://github.com/zzh-newlearner/MQTT_Crash/blob/main/Nanomq_invalid_read.md" } ] } diff --git a/2024/45xxx/CVE-2024-45845.json b/2024/45xxx/CVE-2024-45845.json index 82b2e00b03c..3fc281f16b8 100644 --- a/2024/45xxx/CVE-2024-45845.json +++ b/2024/45xxx/CVE-2024-45845.json @@ -1,71 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2024-45845", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-45845", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "nix 2.24 through 2.24.5 allows directory traversal via a symlink in a nar file, because of mishandling of a directory containing a symlink and a directory of the same name, aka GHSA-h4vv-h3jq-v493." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://puckipedia.com/7hkj-98sq/qixt", - "refsource": "MISC", - "name": "https://puckipedia.com/7hkj-98sq/qixt" - }, - { - "url": "https://github.com/NixOS/nix/tags", - "refsource": "MISC", - "name": "https://github.com/NixOS/nix/tags" - }, - { - "url": "https://news.ycombinator.com/item?id=41492994", - "refsource": "MISC", - "name": "https://news.ycombinator.com/item?id=41492994" + "value": "** REJECT ** DO NOT USE THIS CVE RECORD. Consult IDs: CVE-2024-45593. Reason: This record is a reservation duplicate of CVE-2024-45593. Notes: All CVE users should reference CVE-2024-45593 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage." } ] } diff --git a/2024/6xxx/CVE-2024-6077.json b/2024/6xxx/CVE-2024-6077.json index 372368d5507..1ad0f2dbac2 100644 --- a/2024/6xxx/CVE-2024-6077.json +++ b/2024/6xxx/CVE-2024-6077.json @@ -163,10 +163,10 @@ { "base64": false, "type": "text/html", - "value": "

Affected Family

 

 

 

 

First Known in Software/Firmware Version

 

 

 

 

Corrected in Software/Firmware Version

 

 

 

 

CompactLogix 5380

 

 

 

 

 

 

 

v.32 .011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

CompactLogix 5380 Process

 

 

 

 

v.33.011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

Compact GuardLogix 5380 SIL 2

 

 

 

 

v.32.013

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

Compact GuardLogix 5380 SIL 3

 

 

 

 

v.32.011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

CompactLogix 5480

 

 

 

 

v.32.011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

ControlLogix\u00ae 5580

 

 

 

 

v.32.011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

ControlLogix\u00ae 5580 Process

 

 

 

 

v.33.011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

GuardLogix 5580

 

 

 

 

v.32.011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

1756-EN4

 

 

 

 

v2.001

 

 

 

 

v6.001 and later

 

 

 

\n\n
" + "value": "

Affected Family

 

 

 

 

First Known in Software/Firmware Version

 

 

 

 

Corrected in Software/Firmware Version

 

 

 

 

CompactLogix 5380

 

 

 

 

 

 

 

v.32 .011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

CompactLogix 5380 Process

 

 

 

 

v.33.011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

Compact GuardLogix 5380 SIL 2

 

 

 

 

v.32.013

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

Compact GuardLogix 5380 SIL 3

 

 

 

 

v.32.011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

CompactLogix 5480

 

 

 

 

v.32.011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

ControlLogix\u00ae 5580

 

 

 

 

v.32.011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

ControlLogix\u00ae 5580 Process

 

 

 

 

v.33.011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

GuardLogix 5580

 

 

 

 

v.32.011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

1756-EN4

 

 

 

 

v2.001

 

 

 

 

v6.001 and later

 

 

 

\n\n\n\n

Mitigations and Workarounds
Customers who are unable to upgrade to the corrected software versions are encouraged to apply the following risk mitigations.

For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices to minimize the risk of the vulnerability. Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.

\n\n
" } ], - "value": "Affected Family \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nFirst Known in Software/Firmware Version\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCorrected in Software/Firmware Version\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompactLogix 5380\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32 .011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompactLogix 5380 Process \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.33.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompact GuardLogix 5380 SIL 2 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.013\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompact GuardLogix 5380 SIL 3 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompactLogix 5480 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nControlLogix\u00ae 5580 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nControlLogix\u00ae 5580 Process \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.33.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nGuardLogix 5580 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n1756-EN4\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv2.001\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv6.001 and later" + "value": "Affected Family \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nFirst Known in Software/Firmware Version\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCorrected in Software/Firmware Version\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompactLogix 5380\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32 .011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompactLogix 5380 Process \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.33.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompact GuardLogix 5380 SIL 2 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.013\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompact GuardLogix 5380 SIL 3 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompactLogix 5480 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nControlLogix\u00ae 5580 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nControlLogix\u00ae 5580 Process \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.33.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nGuardLogix 5580 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n1756-EN4\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv2.001\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv6.001 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\n\n\n\nMitigations and Workarounds \nCustomers who are unable to upgrade to the corrected software versions are encouraged to apply the following risk mitigations. \n\n * Users who do not wish to use CIP security can disable the feature per device. See \"Disable CIP Security\" in Chapter 2 of \"CIP Security with Rockwell Automation Products\" (publication SECURE-AT001)\n\n\n\n\nFor information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight \u00a0to minimize the risk of the vulnerability. Customers can use Stakeholder-Specific Vulnerability Categorization https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc \u00a0to generate more environment-specific prioritization." } ] } \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7960.json b/2024/7xxx/CVE-2024-7960.json index 9d2af165cf6..49121d0f544 100644 --- a/2024/7xxx/CVE-2024-7960.json +++ b/2024/7xxx/CVE-2024-7960.json @@ -1,18 +1,84 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-7960", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "PSIRT@rockwellautomation.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Rockwell Automation affected product contains a vulnerability that allows a threat actor to view sensitive information and change settings. The vulnerability exists due to having an incorrect privilege matrix that allows users to have access to functions they should not." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-269: Improper Privilege Management", + "cweId": "CWE-269" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Rockwell Automation", + "product": { + "product_data": [ + { + "product_name": "Pavilion8\u00ae", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "


 

Affected Product

 

 

 

 

Affected Software Version

 

 

 

 

Corrected in Software Version

 

 

 

 

Pavilion8\u00ae

 

 

 

 

          <V5.20

 

 

 

 

V6.0 and later  

 


\n\n

Mitigations and Workarounds
Customers using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible.\u202f\u202f\u202f 

\n\n\n\n
" + } + ], + "value": "Affected Product \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nAffected Software Version \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCorrected in Software Version \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nPavilion8\u00ae \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0



Affected Product

 

 

 

 

Affected Software Version

 

 

 

 

Corrected in Software Version

 

 

 

 

Pavilion8\u00ae

 

 

 

 

          <V5.20

 

 

 

 

V6.0 and later  



\n\n

Mitigations and Workarounds
Customers using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible.\u202f\u202f\u202f 

\n\n
" + } + ], + "value": "Affected Product \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nAffected Software Version \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCorrected in Software Version \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nPavilion8\u00ae \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0


Affected Product

 

 

 

 

First Known in Software Version

 

 

 

 

Corrected in Software Version

 

 

 

 

2800C OptixPanel\u2122 Compact

 

 

 

 

4.0.0.325

 

 

 

 

4.0.2.116

 

 

 

 

2800S OptixPanel\u2122 Standard

 

 

 

 

4.0.0.350

 

 

 

 

4.0.2.123

 

 

 

 

Embedded Edge Compute Module

 

 

 

 

4.0.0.347

 

 

 

 

4.0.2.106

 


\n\n

Mitigations and Workarounds
Customers using the affected software are encouraged to apply security best practices

  • For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices to minimize the risk of the vulnerability.

\n\n\n\n
" + } + ], + "value": "Affected Product\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nFirst Known in Software Version\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCorrected in Software Version\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n2800C OptixPanel\u2122 Compact\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n4.0.0.325\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n4.0.2.116\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n2800S OptixPanel\u2122 Standard\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n4.0.0.350\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n4.0.2.123\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nEmbedded Edge Compute Module\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n4.0.0.347\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n4.0.2.106\n\n\u00a0\n\n\n\n\nMitigations and Workarounds \nCustomers using the affected software are encouraged to apply security best practices\n\n * For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight \u00a0to minimize the risk of the vulnerability." + } + ] } \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8763.json b/2024/8xxx/CVE-2024-8763.json new file mode 100644 index 00000000000..2fbb843f295 --- /dev/null +++ b/2024/8xxx/CVE-2024-8763.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8763", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8764.json b/2024/8xxx/CVE-2024-8764.json new file mode 100644 index 00000000000..84beddb3646 --- /dev/null +++ b/2024/8xxx/CVE-2024-8764.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8764", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8765.json b/2024/8xxx/CVE-2024-8765.json new file mode 100644 index 00000000000..1b74c104bf5 --- /dev/null +++ b/2024/8xxx/CVE-2024-8765.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8765", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8766.json b/2024/8xxx/CVE-2024-8766.json new file mode 100644 index 00000000000..d871b3280b4 --- /dev/null +++ b/2024/8xxx/CVE-2024-8766.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8766", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8767.json b/2024/8xxx/CVE-2024-8767.json new file mode 100644 index 00000000000..e93239605c9 --- /dev/null +++ b/2024/8xxx/CVE-2024-8767.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8767", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file