diff --git a/2022/26xxx/CVE-2022-26579.json b/2022/26xxx/CVE-2022-26579.json index d4e45fd2b0b..0260c851088 100644 --- a/2022/26xxx/CVE-2022-26579.json +++ b/2022/26xxx/CVE-2022-26579.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2022/CVEs/CVE-2022-26579.md", "url": "https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2022/CVEs/CVE-2022-26579.md" + }, + { + "refsource": "MISC", + "name": "https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/", + "url": "https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/" } ] } diff --git a/2022/26xxx/CVE-2022-26580.json b/2022/26xxx/CVE-2022-26580.json index c674253f758..988392099ff 100644 --- a/2022/26xxx/CVE-2022-26580.json +++ b/2022/26xxx/CVE-2022-26580.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2022/CVEs/CVE-2022-26580.md", "url": "https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2022/CVEs/CVE-2022-26580.md" + }, + { + "refsource": "MISC", + "name": "https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/", + "url": "https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/" } ] } diff --git a/2022/26xxx/CVE-2022-26581.json b/2022/26xxx/CVE-2022-26581.json index 6e554d68e9c..c82973d3788 100644 --- a/2022/26xxx/CVE-2022-26581.json +++ b/2022/26xxx/CVE-2022-26581.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2022/CVEs/CVE-2022-26581.md", "url": "https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2022/CVEs/CVE-2022-26581.md" + }, + { + "refsource": "MISC", + "name": "https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/", + "url": "https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/" } ] } diff --git a/2022/26xxx/CVE-2022-26582.json b/2022/26xxx/CVE-2022-26582.json index 8cc38f501f9..bd8f6bf352b 100644 --- a/2022/26xxx/CVE-2022-26582.json +++ b/2022/26xxx/CVE-2022-26582.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2022/CVEs/CVE-2022-26582.md", "url": "https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2022/CVEs/CVE-2022-26582.md" + }, + { + "refsource": "MISC", + "name": "https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/", + "url": "https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/" } ] } diff --git a/2022/46xxx/CVE-2022-46966.json b/2022/46xxx/CVE-2022-46966.json index bbfecc4445c..a74ffba7dce 100644 --- a/2022/46xxx/CVE-2022-46966.json +++ b/2022/46xxx/CVE-2022-46966.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://packetstormsecurity.com/files/169916/Revenue-Collection-System-1.0-SQL-Injection-Remote-Code-Execution.html", "url": "https://packetstormsecurity.com/files/169916/Revenue-Collection-System-1.0-SQL-Injection-Remote-Code-Execution.html" + }, + { + "refsource": "MISC", + "name": "https://cxsecurity.com/issue/WLB-2022110026", + "url": "https://cxsecurity.com/issue/WLB-2022110026" } ] } diff --git a/2023/27xxx/CVE-2023-27197.json b/2023/27xxx/CVE-2023-27197.json index 701f75bed26..74bdb3edb6a 100644 --- a/2023/27xxx/CVE-2023-27197.json +++ b/2023/27xxx/CVE-2023-27197.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2023/CVEs/CVE-2023-27197.md", "url": "https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2023/CVEs/CVE-2023-27197.md" + }, + { + "refsource": "MISC", + "name": "https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2023/", + "url": "https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2023/" } ] } diff --git a/2023/27xxx/CVE-2023-27198.json b/2023/27xxx/CVE-2023-27198.json index a829dc9698e..d536a5510de 100644 --- a/2023/27xxx/CVE-2023-27198.json +++ b/2023/27xxx/CVE-2023-27198.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2023/CVEs/CVE-2023-27198.md", "url": "https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2023/CVEs/CVE-2023-27198.md" + }, + { + "refsource": "MISC", + "name": "https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2023/", + "url": "https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2023/" } ] } diff --git a/2023/27xxx/CVE-2023-27199.json b/2023/27xxx/CVE-2023-27199.json index a46619a74a1..9588e31899d 100644 --- a/2023/27xxx/CVE-2023-27199.json +++ b/2023/27xxx/CVE-2023-27199.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2023/CVEs/CVE-2023-27199.md", "url": "https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2023/CVEs/CVE-2023-27199.md" + }, + { + "refsource": "MISC", + "name": "https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2023/", + "url": "https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2023/" } ] } diff --git a/2024/26xxx/CVE-2024-26922.json b/2024/26xxx/CVE-2024-26922.json index 37a38da16c6..48b29111242 100644 --- a/2024/26xxx/CVE-2024-26922.json +++ b/2024/26xxx/CVE-2024-26922.json @@ -1,18 +1,91 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-26922", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: validate the parameters of bo mapping operations more clearly\n\nVerify the parameters of\namdgpu_vm_bo_(map/replace_map/clearing_mappings) in one common place." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "dc54d3d1744d", + "version_value": "6fef2d4c00b5" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "4.12", + "status": "affected" + }, + { + "version": "0", + "lessThan": "4.12", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "6.9-rc5", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/6fef2d4c00b5b8561ad68dd2b68173f5c6af1e75", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/6fef2d4c00b5b8561ad68dd2b68173f5c6af1e75" + } + ] + }, + "generator": { + "engine": "bippy-d175d3acf727" } } \ No newline at end of file diff --git a/2024/28xxx/CVE-2024-28627.json b/2024/28xxx/CVE-2024-28627.json index a5e98a19166..4fc353a58fb 100644 --- a/2024/28xxx/CVE-2024-28627.json +++ b/2024/28xxx/CVE-2024-28627.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-28627", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-28627", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in Flipsnack v.18/03/2024 allows a local attacker to obtain sensitive information via the reader.gz.js file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.flipsnack.com/", + "refsource": "MISC", + "name": "https://www.flipsnack.com/" + }, + { + "refsource": "CONFIRM", + "name": "https://labs.integrity.pt/advisories/cve-2024-28627/", + "url": "https://labs.integrity.pt/advisories/cve-2024-28627/" } ] } diff --git a/2024/2xxx/CVE-2024-2477.json b/2024/2xxx/CVE-2024-2477.json index d3573065029..a7d5bb94229 100644 --- a/2024/2xxx/CVE-2024-2477.json +++ b/2024/2xxx/CVE-2024-2477.json @@ -1,17 +1,84 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-2477", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The wpDiscuz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Alternative Text' field of an uploaded image in all versions up to, and including, 7.6.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "advancedcoding", + "product": { + "product_data": [ + { + "product_name": "Comments \u2013 wpDiscuz", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "7.6.15" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3eddc03d-ecff-4b50-a574-7b6b62e53af0?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3eddc03d-ecff-4b50-a574-7b6b62e53af0?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3060040/wpdiscuz/trunk/utils/class.WpdiscuzHelperUpload.php", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/3060040/wpdiscuz/trunk/utils/class.WpdiscuzHelperUpload.php" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Ng\u00f4 Thi\u00ean An" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/4xxx/CVE-2024-4063.json b/2024/4xxx/CVE-2024-4063.json new file mode 100644 index 00000000000..0763c617573 --- /dev/null +++ b/2024/4xxx/CVE-2024-4063.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4063", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4064.json b/2024/4xxx/CVE-2024-4064.json new file mode 100644 index 00000000000..bd6f96006af --- /dev/null +++ b/2024/4xxx/CVE-2024-4064.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4064", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4065.json b/2024/4xxx/CVE-2024-4065.json new file mode 100644 index 00000000000..78f33e05da1 --- /dev/null +++ b/2024/4xxx/CVE-2024-4065.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4065", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4066.json b/2024/4xxx/CVE-2024-4066.json new file mode 100644 index 00000000000..077d0833b3f --- /dev/null +++ b/2024/4xxx/CVE-2024-4066.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4066", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4067.json b/2024/4xxx/CVE-2024-4067.json new file mode 100644 index 00000000000..be8ceb4f2fb --- /dev/null +++ b/2024/4xxx/CVE-2024-4067.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4067", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4068.json b/2024/4xxx/CVE-2024-4068.json new file mode 100644 index 00000000000..ea92da68906 --- /dev/null +++ b/2024/4xxx/CVE-2024-4068.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4068", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4069.json b/2024/4xxx/CVE-2024-4069.json new file mode 100644 index 00000000000..70563d9248e --- /dev/null +++ b/2024/4xxx/CVE-2024-4069.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4069", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4070.json b/2024/4xxx/CVE-2024-4070.json new file mode 100644 index 00000000000..e30688574b6 --- /dev/null +++ b/2024/4xxx/CVE-2024-4070.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4070", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4071.json b/2024/4xxx/CVE-2024-4071.json new file mode 100644 index 00000000000..ef28d971d3c --- /dev/null +++ b/2024/4xxx/CVE-2024-4071.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4071", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4072.json b/2024/4xxx/CVE-2024-4072.json new file mode 100644 index 00000000000..29e5f7e54ec --- /dev/null +++ b/2024/4xxx/CVE-2024-4072.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4072", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4073.json b/2024/4xxx/CVE-2024-4073.json new file mode 100644 index 00000000000..1444e3ae0b2 --- /dev/null +++ b/2024/4xxx/CVE-2024-4073.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4073", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4074.json b/2024/4xxx/CVE-2024-4074.json new file mode 100644 index 00000000000..21df47517df --- /dev/null +++ b/2024/4xxx/CVE-2024-4074.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4074", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4075.json b/2024/4xxx/CVE-2024-4075.json new file mode 100644 index 00000000000..3611768a6e6 --- /dev/null +++ b/2024/4xxx/CVE-2024-4075.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4075", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4076.json b/2024/4xxx/CVE-2024-4076.json new file mode 100644 index 00000000000..166fe158cf2 --- /dev/null +++ b/2024/4xxx/CVE-2024-4076.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4076", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file