From 18af49f615a11e9510819f8d53b7688af91c6928 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 5 Feb 2025 22:00:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/36xxx/CVE-2020-36084.json | 56 +++++++++++++++++++++++++++---- 2024/13xxx/CVE-2024-13839.json | 18 ++++++++++ 2024/48xxx/CVE-2024-48394.json | 56 +++++++++++++++++++++++++++---- 2024/54xxx/CVE-2024-54853.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57063.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57064.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57065.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57066.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57067.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57068.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57069.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57071.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57072.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57074.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57075.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57076.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57077.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57078.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57079.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57080.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57081.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57082.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57084.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57085.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57086.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57520.json | 56 +++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57598.json | 61 ++++++++++++++++++++++++++++++---- 2024/57xxx/CVE-2024-57699.json | 61 ++++++++++++++++++++++++++++++---- 2025/1xxx/CVE-2025-1069.json | 18 ++++++++++ 2025/1xxx/CVE-2025-1070.json | 18 ++++++++++ 30 files changed, 1414 insertions(+), 162 deletions(-) create mode 100644 2024/13xxx/CVE-2024-13839.json create mode 100644 2025/1xxx/CVE-2025-1069.json create mode 100644 2025/1xxx/CVE-2025-1070.json diff --git a/2020/36xxx/CVE-2020-36084.json b/2020/36xxx/CVE-2020-36084.json index d3fcacf5fb6..00d37b7cda6 100644 --- a/2020/36xxx/CVE-2020-36084.json +++ b/2020/36xxx/CVE-2020-36084.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-36084", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-36084", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL Injection vulnerability in SourceCodester Responsive E-Learning System 1.0 allows remote attackers to inject sql query in /elearning/delete_teacher_students.php?id= parameter via id field." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/49357", + "url": "https://www.exploit-db.com/exploits/49357" } ] } diff --git a/2024/13xxx/CVE-2024-13839.json b/2024/13xxx/CVE-2024-13839.json new file mode 100644 index 00000000000..f6272f27406 --- /dev/null +++ b/2024/13xxx/CVE-2024-13839.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13839", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/48xxx/CVE-2024-48394.json b/2024/48xxx/CVE-2024-48394.json index 560765c2efe..c538b874751 100644 --- a/2024/48xxx/CVE-2024-48394.json +++ b/2024/48xxx/CVE-2024-48394.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-48394", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-48394", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in the driver of the NDD Print solution, which could allow an unprivileged user to exploit this flaw and gain SYSTEM-level access on the device. The vulnerability affects version 5.24.3 and before of the software." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://helpcenter-nddprint.ndd.tech/pt/seguranca-e-compliance/Current/dezembro-2024#0", + "url": "https://helpcenter-nddprint.ndd.tech/pt/seguranca-e-compliance/Current/dezembro-2024#0" } ] } diff --git a/2024/54xxx/CVE-2024-54853.json b/2024/54xxx/CVE-2024-54853.json index f63ec62b432..4e86e13cdcb 100644 --- a/2024/54xxx/CVE-2024-54853.json +++ b/2024/54xxx/CVE-2024-54853.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-54853", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-54853", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Stored Cross-Site Scripting (XSS) vulnerability was identified affecting Skybox Change Manager versions 13.2.170 and earlier that allows remote authenticated users to store malicious payloads in the affected field that would then execute in an unsuspecting victim's browser." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/KoratSec/CVEs/blob/main/CVE-2024-54853.txt", + "url": "https://github.com/KoratSec/CVEs/blob/main/CVE-2024-54853.txt" } ] } diff --git a/2024/57xxx/CVE-2024-57063.json b/2024/57xxx/CVE-2024-57063.json index 6e3ad3815ef..8d044238855 100644 --- a/2024/57xxx/CVE-2024-57063.json +++ b/2024/57xxx/CVE-2024-57063.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57063", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57063", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the lib function of php-date-formatter v1.3.6 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/dcb93b4788273c3ffb15f70dc45ca4e7", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/dcb93b4788273c3ffb15f70dc45ca4e7" } ] } diff --git a/2024/57xxx/CVE-2024-57064.json b/2024/57xxx/CVE-2024-57064.json index ff459842393..5fc91c271f8 100644 --- a/2024/57xxx/CVE-2024-57064.json +++ b/2024/57xxx/CVE-2024-57064.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57064", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57064", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the lib.setValue function of @syncfusion/ej2-spreadsheet v27.2.2 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/1b40dc7f3836813663c871535039760e", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/1b40dc7f3836813663c871535039760e" } ] } diff --git a/2024/57xxx/CVE-2024-57065.json b/2024/57xxx/CVE-2024-57065.json index f35ebe1ed80..d3ee44a4b0a 100644 --- a/2024/57xxx/CVE-2024-57065.json +++ b/2024/57xxx/CVE-2024-57065.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57065", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57065", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the lib.createPath function of utile v0.3.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/7b2c50ccdec39a030091e48a4ccde688", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/7b2c50ccdec39a030091e48a4ccde688" } ] } diff --git a/2024/57xxx/CVE-2024-57066.json b/2024/57xxx/CVE-2024-57066.json index 7c18dd85ded..7716ddbd59b 100644 --- a/2024/57xxx/CVE-2024-57066.json +++ b/2024/57xxx/CVE-2024-57066.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57066", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57066", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the lib.deep function of @ndhoule/defaults v2.0.1 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/8ee7327cc8b78df738cd32505cbbbd44", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/8ee7327cc8b78df738cd32505cbbbd44" } ] } diff --git a/2024/57xxx/CVE-2024-57067.json b/2024/57xxx/CVE-2024-57067.json index 6cb4aa8e385..d9642f4eb16 100644 --- a/2024/57xxx/CVE-2024-57067.json +++ b/2024/57xxx/CVE-2024-57067.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57067", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57067", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the lib.parse function of dot-qs v0.2.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/07dca101d8fe059dd11b3b0e1b4a6d46", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/07dca101d8fe059dd11b3b0e1b4a6d46" } ] } diff --git a/2024/57xxx/CVE-2024-57068.json b/2024/57xxx/CVE-2024-57068.json index c243f2d64a3..bccea50135b 100644 --- a/2024/57xxx/CVE-2024-57068.json +++ b/2024/57xxx/CVE-2024-57068.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57068", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57068", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the lib.mutateMergeDeep function of @tanstack/form-core v0.35.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/47fe5b1e584e9e573c0933588248d533", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/47fe5b1e584e9e573c0933588248d533" } ] } diff --git a/2024/57xxx/CVE-2024-57069.json b/2024/57xxx/CVE-2024-57069.json index 755654b0f03..19e2d3e5c60 100644 --- a/2024/57xxx/CVE-2024-57069.json +++ b/2024/57xxx/CVE-2024-57069.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57069", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57069", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the lib function of expand-object v0.4.2 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/68e06b00e3258d0d427257c6906bd300", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/68e06b00e3258d0d427257c6906bd300" } ] } diff --git a/2024/57xxx/CVE-2024-57071.json b/2024/57xxx/CVE-2024-57071.json index 47bf5211e68..7ed84654c0e 100644 --- a/2024/57xxx/CVE-2024-57071.json +++ b/2024/57xxx/CVE-2024-57071.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57071", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57071", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the lib.combine function of php-parser v3.2.1 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/b56500d3a8866467ee769df7453eedaa", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/b56500d3a8866467ee769df7453eedaa" } ] } diff --git a/2024/57xxx/CVE-2024-57072.json b/2024/57xxx/CVE-2024-57072.json index c41a0ad620d..53401d5f662 100644 --- a/2024/57xxx/CVE-2024-57072.json +++ b/2024/57xxx/CVE-2024-57072.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57072", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57072", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the lib.requireFromString function of module-from-string v3.3.1 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/8b1fe301dd1ea52952cef347daddee67", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/8b1fe301dd1ea52952cef347daddee67" } ] } diff --git a/2024/57xxx/CVE-2024-57074.json b/2024/57xxx/CVE-2024-57074.json index 17a7d5dfc33..21d6a905c6c 100644 --- a/2024/57xxx/CVE-2024-57074.json +++ b/2024/57xxx/CVE-2024-57074.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57074", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57074", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the lib.merge function of xe-utils v3.5.31 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/82e3eb472d03273a74e40242e8356297", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/82e3eb472d03273a74e40242e8356297" } ] } diff --git a/2024/57xxx/CVE-2024-57075.json b/2024/57xxx/CVE-2024-57075.json index 9d2cf2a3f3a..18859e617af 100644 --- a/2024/57xxx/CVE-2024-57075.json +++ b/2024/57xxx/CVE-2024-57075.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57075", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57075", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the lib.Logger function of eazy-logger v4.0.1 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/c601f7f85146510ca899a7406a03aba5", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/c601f7f85146510ca899a7406a03aba5" } ] } diff --git a/2024/57xxx/CVE-2024-57076.json b/2024/57xxx/CVE-2024-57076.json index eea17c35dad..495a183ebbd 100644 --- a/2024/57xxx/CVE-2024-57076.json +++ b/2024/57xxx/CVE-2024-57076.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57076", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57076", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the lib.post function of ajax-request v1.2.3 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/c432b93ee7d967c2e65bc1bf39241664", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/c432b93ee7d967c2e65bc1bf39241664" } ] } diff --git a/2024/57xxx/CVE-2024-57077.json b/2024/57xxx/CVE-2024-57077.json index 8a2260f80d4..8e196269ace 100644 --- a/2024/57xxx/CVE-2024-57077.json +++ b/2024/57xxx/CVE-2024-57077.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57077", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57077", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The latest version of utils-extend (1.0.8) is vulnerable to Prototype Pollution through the entry function(s) lib.extend. An attacker can supply a payload with Object.prototype setter to introduce or modify properties within the global prototype chain, causing denial of service (DoS) a the minimum consequence." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/64bac50f8c2706e6880e45d50a507114", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/64bac50f8c2706e6880e45d50a507114" } ] } diff --git a/2024/57xxx/CVE-2024-57078.json b/2024/57xxx/CVE-2024-57078.json index ca2af35941c..c1c8696ba91 100644 --- a/2024/57xxx/CVE-2024-57078.json +++ b/2024/57xxx/CVE-2024-57078.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57078", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57078", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the lib.merge function of cli-util v1.1.27 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/b58d7274d67e7b9fed4bd51368388a23", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/b58d7274d67e7b9fed4bd51368388a23" } ] } diff --git a/2024/57xxx/CVE-2024-57079.json b/2024/57xxx/CVE-2024-57079.json index 8830e68eea1..3ee7f1e0df6 100644 --- a/2024/57xxx/CVE-2024-57079.json +++ b/2024/57xxx/CVE-2024-57079.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57079", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57079", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the lib.deepMerge function of @zag-js/core v0.50.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/4778fc57084766b7b7fb6d25d20b7b9b", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/4778fc57084766b7b7fb6d25d20b7b9b" } ] } diff --git a/2024/57xxx/CVE-2024-57080.json b/2024/57xxx/CVE-2024-57080.json index e57e1117c8a..fee039d48c9 100644 --- a/2024/57xxx/CVE-2024-57080.json +++ b/2024/57xxx/CVE-2024-57080.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57080", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57080", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the lib.install function of vxe-table v4.8.10 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/c0b5fa2d7e4edd3f000e73fb7a10ccbc", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/c0b5fa2d7e4edd3f000e73fb7a10ccbc" } ] } diff --git a/2024/57xxx/CVE-2024-57081.json b/2024/57xxx/CVE-2024-57081.json index d755d8cdb16..582b3dbaeaf 100644 --- a/2024/57xxx/CVE-2024-57081.json +++ b/2024/57xxx/CVE-2024-57081.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57081", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57081", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the lib.fromQuery function of underscore-contrib v0.3.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/4b2c7273054f0d70ef162aa5b6daec01", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/4b2c7273054f0d70ef162aa5b6daec01" } ] } diff --git a/2024/57xxx/CVE-2024-57082.json b/2024/57xxx/CVE-2024-57082.json index b878dbf5c57..be9ad39dbb1 100644 --- a/2024/57xxx/CVE-2024-57082.json +++ b/2024/57xxx/CVE-2024-57082.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57082", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57082", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the lib.createUploader function of @rpldy/uploader v1.8.1 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/708e518de0c3b5af7430ec774f68f315", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/708e518de0c3b5af7430ec774f68f315" } ] } diff --git a/2024/57xxx/CVE-2024-57084.json b/2024/57xxx/CVE-2024-57084.json index 71e90eb1f1f..7fe398e9836 100644 --- a/2024/57xxx/CVE-2024-57084.json +++ b/2024/57xxx/CVE-2024-57084.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57084", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57084", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the function lib.parse of dot-properties v1.0.1 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/3dbeb208c3e22f90a601818ccd06a948", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/3dbeb208c3e22f90a601818ccd06a948" } ] } diff --git a/2024/57xxx/CVE-2024-57085.json b/2024/57xxx/CVE-2024-57085.json index 7cca9a77dd3..f20559a925c 100644 --- a/2024/57xxx/CVE-2024-57085.json +++ b/2024/57xxx/CVE-2024-57085.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57085", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57085", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the function deepMerge of @stryker-mutator/util v8.6.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/f59355f62dad6f8b53b42317f143ba0c", + "url": "https://gist.github.com/tariqhawis/f59355f62dad6f8b53b42317f143ba0c" } ] } diff --git a/2024/57xxx/CVE-2024-57086.json b/2024/57xxx/CVE-2024-57086.json index 2c8a758812c..20dcc963a2c 100644 --- a/2024/57xxx/CVE-2024-57086.json +++ b/2024/57xxx/CVE-2024-57086.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57086", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57086", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A prototype pollution in the function fieldsToJson of node-opcua-alarm-condition v2.134.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/tariqhawis/30acc3632cf595ca5825b7ec2b2f795a", + "refsource": "MISC", + "name": "https://gist.github.com/tariqhawis/30acc3632cf595ca5825b7ec2b2f795a" } ] } diff --git a/2024/57xxx/CVE-2024-57520.json b/2024/57xxx/CVE-2024-57520.json index a61b991b567..cb155dd41d6 100644 --- a/2024/57xxx/CVE-2024-57520.json +++ b/2024/57xxx/CVE-2024-57520.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57520", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57520", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insecure Permissions vulnerability in asterisk v22 allows a remote attacker to execute arbitrary code via the action_createconfig function" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gist.github.com/hyp164D1/ae76ab25acfbe263b2ed7b24b6e5c621", + "url": "https://gist.github.com/hyp164D1/ae76ab25acfbe263b2ed7b24b6e5c621" } ] } diff --git a/2024/57xxx/CVE-2024-57598.json b/2024/57xxx/CVE-2024-57598.json index 0766ed38b1c..e3024b74c3c 100644 --- a/2024/57xxx/CVE-2024-57598.json +++ b/2024/57xxx/CVE-2024-57598.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57598", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57598", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A floating point exception (divide-by-zero) vulnerability was discovered in Bento4 1.6.0-641 in function AP4_TfraAtom() of Ap4TfraAtom.cpp which allows a remote attacker to cause a denial of service vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://bento4.com", + "refsource": "MISC", + "name": "http://bento4.com" + }, + { + "refsource": "MISC", + "name": "https://github.com/JWH-96/Bugs-disclosure/blob/main/Bento4_FPE.md", + "url": "https://github.com/JWH-96/Bugs-disclosure/blob/main/Bento4_FPE.md" } ] } diff --git a/2024/57xxx/CVE-2024-57699.json b/2024/57xxx/CVE-2024-57699.json index d59ab1f04f4..3b2d8d507d7 100644 --- a/2024/57xxx/CVE-2024-57699.json +++ b/2024/57xxx/CVE-2024-57699.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57699", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57699", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A security issue was found in Netplex Json-smart 2.5.0 through 2.5.1. When loading a specially crafted JSON input, containing a large number of \u2019{\u2019, a stack exhaustion can be trigger, which could allow an attacker to cause a Denial of Service (DoS). This issue exists because of an incomplete fix for CVE-2023-1370." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370", + "refsource": "MISC", + "name": "https://nvd.nist.gov/vuln/detail/cve-2023-1370" + }, + { + "refsource": "MISC", + "name": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699", + "url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699" } ] } diff --git a/2025/1xxx/CVE-2025-1069.json b/2025/1xxx/CVE-2025-1069.json new file mode 100644 index 00000000000..2399226cf73 --- /dev/null +++ b/2025/1xxx/CVE-2025-1069.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1069", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1070.json b/2025/1xxx/CVE-2025-1070.json new file mode 100644 index 00000000000..814a331384d --- /dev/null +++ b/2025/1xxx/CVE-2025-1070.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1070", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file