From 0d4a81c04ec45a0f966412d57bb4dabf6c52ba98 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 19 Apr 2024 18:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/40xxx/CVE-2022-40745.json | 84 +++++++++++++++++- 2023/47xxx/CVE-2023-47435.json | 56 ++++++++++-- 2024/2xxx/CVE-2024-2440.json | 151 ++++++++++++++++++++++++++++++++- 2024/31xxx/CVE-2024-31546.json | 56 ++++++++++-- 2024/31xxx/CVE-2024-31547.json | 56 ++++++++++-- 2024/32xxx/CVE-2024-32931.json | 18 ++++ 2024/32xxx/CVE-2024-32932.json | 18 ++++ 2024/32xxx/CVE-2024-32933.json | 18 ++++ 2024/32xxx/CVE-2024-32934.json | 18 ++++ 2024/32xxx/CVE-2024-32935.json | 18 ++++ 2024/4xxx/CVE-2024-4006.json | 18 ++++ 2024/4xxx/CVE-2024-4007.json | 18 ++++ 2024/4xxx/CVE-2024-4008.json | 18 ++++ 2024/4xxx/CVE-2024-4009.json | 18 ++++ 2024/4xxx/CVE-2024-4010.json | 18 ++++ 2024/4xxx/CVE-2024-4011.json | 18 ++++ 2024/4xxx/CVE-2024-4012.json | 18 ++++ 2024/4xxx/CVE-2024-4013.json | 18 ++++ 18 files changed, 611 insertions(+), 26 deletions(-) create mode 100644 2024/32xxx/CVE-2024-32931.json create mode 100644 2024/32xxx/CVE-2024-32932.json create mode 100644 2024/32xxx/CVE-2024-32933.json create mode 100644 2024/32xxx/CVE-2024-32934.json create mode 100644 2024/32xxx/CVE-2024-32935.json create mode 100644 2024/4xxx/CVE-2024-4006.json create mode 100644 2024/4xxx/CVE-2024-4007.json create mode 100644 2024/4xxx/CVE-2024-4008.json create mode 100644 2024/4xxx/CVE-2024-4009.json create mode 100644 2024/4xxx/CVE-2024-4010.json create mode 100644 2024/4xxx/CVE-2024-4011.json create mode 100644 2024/4xxx/CVE-2024-4012.json create mode 100644 2024/4xxx/CVE-2024-4013.json diff --git a/2022/40xxx/CVE-2022-40745.json b/2022/40xxx/CVE-2022-40745.json index f83ed4b61eb..b3443c53830 100644 --- a/2022/40xxx/CVE-2022-40745.json +++ b/2022/40xxx/CVE-2022-40745.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-40745", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Aspera Faspex 5.0.0 through 5.0.7 could allow a local user to obtain sensitive information due to weaker than expected security. IBM X-Force ID: 236452." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-326 Inadequate Encryption Strength", + "cweId": "CWE-326" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Aspera Faspex", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "5.0.0", + "version_value": "5.0.7" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/7148632", + "refsource": "MISC", + "name": "https://www.ibm.com/support/pages/node/7148632" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/236452", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/236452" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2023/47xxx/CVE-2023-47435.json b/2023/47xxx/CVE-2023-47435.json index 7cc89044523..e85a3b1875e 100644 --- a/2023/47xxx/CVE-2023-47435.json +++ b/2023/47xxx/CVE-2023-47435.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-47435", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-47435", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in the verifyPassword function of hexo-theme-matery v2.0.0 allows attackers to bypass authentication and access password protected pages." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/blinkfox/hexo-theme-matery/issues/897", + "refsource": "MISC", + "name": "https://github.com/blinkfox/hexo-theme-matery/issues/897" } ] } diff --git a/2024/2xxx/CVE-2024-2440.json b/2024/2xxx/CVE-2024-2440.json index f34cf05adcd..6ed554208a8 100644 --- a/2024/2xxx/CVE-2024-2440.json +++ b/2024/2xxx/CVE-2024-2440.json @@ -1,17 +1,160 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-2440", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-cna@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A race condition in GitHub Enterprise Server allowed an existing admin to maintain permissions on a detached repository by making a GraphQL mutation to alter repository permissions while the repository is detached.\u00a0This vulnerability affected all versions of GitHub Enterprise Server prior to 3.13 and was fixed in versions 3.9.13, 3.10.10, 3.11.8 and 3.12.1.\u00a0This vulnerability was reported via the GitHub Bug Bounty program. " + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition", + "cweId": "CWE-367" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitHub", + "product": { + "product_data": [ + { + "product_name": "Enterprise Server", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "3.9.13", + "status": "unaffected" + } + ], + "lessThanOrEqual": "3.9.12", + "status": "affected", + "version": "3.9", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "3.10.10", + "status": "unaffected" + } + ], + "lessThanOrEqual": "3.10.9", + "status": "affected", + "version": "3.10", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "3.11.8", + "status": "unaffected" + } + ], + "lessThanOrEqual": "3.11.7", + "status": "affected", + "version": "3.11", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "3.12.1", + "status": "unaffected" + } + ], + "lessThanOrEqual": "3.12.0", + "status": "affected", + "version": "3.12", + "versionType": "semver" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.13", + "refsource": "MISC", + "name": "https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.13" + }, + { + "url": "https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.10", + "refsource": "MISC", + "name": "https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.10" + }, + { + "url": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.8", + "refsource": "MISC", + "name": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.8" + }, + { + "url": "https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.2", + "refsource": "MISC", + "name": "https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.2" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "inspector-ambitious" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L", + "version": "3.1" } ] } diff --git a/2024/31xxx/CVE-2024-31546.json b/2024/31xxx/CVE-2024-31546.json index 965a7722a41..d17651b7cad 100644 --- a/2024/31xxx/CVE-2024-31546.json +++ b/2024/31xxx/CVE-2024-31546.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-31546", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-31546", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Computer Laboratory Management System v1.0 is vulnerable to SQL Injection via the \"id\" parameter of /admin/damage/view_damage.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-2-Computer-Laboratory-Management-System-PoC.md", + "refsource": "MISC", + "name": "https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-2-Computer-Laboratory-Management-System-PoC.md" } ] } diff --git a/2024/31xxx/CVE-2024-31547.json b/2024/31xxx/CVE-2024-31547.json index 78556b4124b..332dcf22029 100644 --- a/2024/31xxx/CVE-2024-31547.json +++ b/2024/31xxx/CVE-2024-31547.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-31547", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-31547", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Computer Laboratory Management System v1.0 is vulnerable to SQL Injection via the \"id\" parameter of /admin/item/view_item.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-3-Computer-Laboratory-Management-System-PoC.md", + "refsource": "MISC", + "name": "https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-3-Computer-Laboratory-Management-System-PoC.md" } ] } diff --git a/2024/32xxx/CVE-2024-32931.json b/2024/32xxx/CVE-2024-32931.json new file mode 100644 index 00000000000..516278d8568 --- /dev/null +++ b/2024/32xxx/CVE-2024-32931.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32931", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32932.json b/2024/32xxx/CVE-2024-32932.json new file mode 100644 index 00000000000..5103bf75134 --- /dev/null +++ b/2024/32xxx/CVE-2024-32932.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32932", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32933.json b/2024/32xxx/CVE-2024-32933.json new file mode 100644 index 00000000000..edd531df34e --- /dev/null +++ b/2024/32xxx/CVE-2024-32933.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32933", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32934.json b/2024/32xxx/CVE-2024-32934.json new file mode 100644 index 00000000000..756a8481958 --- /dev/null +++ b/2024/32xxx/CVE-2024-32934.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32934", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32935.json b/2024/32xxx/CVE-2024-32935.json new file mode 100644 index 00000000000..0508dac0406 --- /dev/null +++ b/2024/32xxx/CVE-2024-32935.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32935", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4006.json b/2024/4xxx/CVE-2024-4006.json new file mode 100644 index 00000000000..6ef8a8863b2 --- /dev/null +++ b/2024/4xxx/CVE-2024-4006.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4006", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4007.json b/2024/4xxx/CVE-2024-4007.json new file mode 100644 index 00000000000..1bb37a13a2a --- /dev/null +++ b/2024/4xxx/CVE-2024-4007.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4007", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4008.json b/2024/4xxx/CVE-2024-4008.json new file mode 100644 index 00000000000..4a9992774d7 --- /dev/null +++ b/2024/4xxx/CVE-2024-4008.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4008", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4009.json b/2024/4xxx/CVE-2024-4009.json new file mode 100644 index 00000000000..ad4b5722cb8 --- /dev/null +++ b/2024/4xxx/CVE-2024-4009.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4009", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4010.json b/2024/4xxx/CVE-2024-4010.json new file mode 100644 index 00000000000..d655a7c0773 --- /dev/null +++ b/2024/4xxx/CVE-2024-4010.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4010", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4011.json b/2024/4xxx/CVE-2024-4011.json new file mode 100644 index 00000000000..2868defbaf5 --- /dev/null +++ b/2024/4xxx/CVE-2024-4011.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4011", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4012.json b/2024/4xxx/CVE-2024-4012.json new file mode 100644 index 00000000000..f260cc89d74 --- /dev/null +++ b/2024/4xxx/CVE-2024-4012.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4012", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4013.json b/2024/4xxx/CVE-2024-4013.json new file mode 100644 index 00000000000..18c132248be --- /dev/null +++ b/2024/4xxx/CVE-2024-4013.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4013", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file