diff --git a/2022/4xxx/CVE-2022-4886.json b/2022/4xxx/CVE-2022-4886.json index a401c79d487..f6244288324 100644 --- a/2022/4xxx/CVE-2022-4886.json +++ b/2022/4xxx/CVE-2022-4886.json @@ -82,6 +82,11 @@ "url": "http://www.openwall.com/lists/oss-security/2023/10/25/5", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2023/10/25/5" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0013/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0013/" } ] }, diff --git a/2023/27xxx/CVE-2023-27859.json b/2023/27xxx/CVE-2023-27859.json index f3d2c86a2d7..ad71ac67eb2 100644 --- a/2023/27xxx/CVE-2023-27859.json +++ b/2023/27xxx/CVE-2023-27859.json @@ -62,6 +62,11 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/249205", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/249205" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0002/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0002/" } ] }, diff --git a/2023/45xxx/CVE-2023-45193.json b/2023/45xxx/CVE-2023-45193.json index 9d0a2a701a1..3e87fb4db39 100644 --- a/2023/45xxx/CVE-2023-45193.json +++ b/2023/45xxx/CVE-2023-45193.json @@ -63,6 +63,11 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/268759", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/268759" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0001/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0001/" } ] }, diff --git a/2023/45xxx/CVE-2023-45229.json b/2023/45xxx/CVE-2023-45229.json index 1d6616e95b6..2faba695d8f 100644 --- a/2023/45xxx/CVE-2023-45229.json +++ b/2023/45xxx/CVE-2023-45229.json @@ -68,6 +68,11 @@ "url": "http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html", "refsource": "MISC", "name": "http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0011/" } ] }, diff --git a/2023/45xxx/CVE-2023-45230.json b/2023/45xxx/CVE-2023-45230.json index f926ae41504..28ebd9714ce 100644 --- a/2023/45xxx/CVE-2023-45230.json +++ b/2023/45xxx/CVE-2023-45230.json @@ -68,6 +68,11 @@ "url": "http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html", "refsource": "MISC", "name": "http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0011/" } ] }, diff --git a/2023/45xxx/CVE-2023-45231.json b/2023/45xxx/CVE-2023-45231.json index 7f4f99aa61f..88bc8def44d 100644 --- a/2023/45xxx/CVE-2023-45231.json +++ b/2023/45xxx/CVE-2023-45231.json @@ -68,6 +68,11 @@ "url": "http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html", "refsource": "MISC", "name": "http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0011/" } ] }, diff --git a/2023/45xxx/CVE-2023-45232.json b/2023/45xxx/CVE-2023-45232.json index 64079fe0aa8..4a0f68bbe7e 100644 --- a/2023/45xxx/CVE-2023-45232.json +++ b/2023/45xxx/CVE-2023-45232.json @@ -68,6 +68,11 @@ "url": "http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html", "refsource": "MISC", "name": "http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0011/" } ] }, diff --git a/2023/45xxx/CVE-2023-45233.json b/2023/45xxx/CVE-2023-45233.json index 743cef588e3..46f8d2536f3 100644 --- a/2023/45xxx/CVE-2023-45233.json +++ b/2023/45xxx/CVE-2023-45233.json @@ -68,6 +68,11 @@ "url": "http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html", "refsource": "MISC", "name": "http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0011/" } ] }, diff --git a/2023/45xxx/CVE-2023-45234.json b/2023/45xxx/CVE-2023-45234.json index fc51bb19435..9f4d76e724b 100644 --- a/2023/45xxx/CVE-2023-45234.json +++ b/2023/45xxx/CVE-2023-45234.json @@ -68,6 +68,11 @@ "url": "http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html", "refsource": "MISC", "name": "http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0011/" } ] }, diff --git a/2023/45xxx/CVE-2023-45235.json b/2023/45xxx/CVE-2023-45235.json index 5f2c7f6d63d..812e4001ff0 100644 --- a/2023/45xxx/CVE-2023-45235.json +++ b/2023/45xxx/CVE-2023-45235.json @@ -68,6 +68,11 @@ "url": "http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html", "refsource": "MISC", "name": "http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0011/" } ] }, diff --git a/2023/45xxx/CVE-2023-45236.json b/2023/45xxx/CVE-2023-45236.json index ed67a7fc713..49a8076a6b0 100644 --- a/2023/45xxx/CVE-2023-45236.json +++ b/2023/45xxx/CVE-2023-45236.json @@ -63,6 +63,11 @@ "url": "http://www.openwall.com/lists/oss-security/2024/01/16/2", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2024/01/16/2" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0011/" } ] }, diff --git a/2023/45xxx/CVE-2023-45237.json b/2023/45xxx/CVE-2023-45237.json index 86a9aa9adc8..ca63d8a2607 100644 --- a/2023/45xxx/CVE-2023-45237.json +++ b/2023/45xxx/CVE-2023-45237.json @@ -63,6 +63,11 @@ "url": "http://www.openwall.com/lists/oss-security/2024/01/16/2", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2024/01/16/2" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0011/" } ] }, diff --git a/2023/47xxx/CVE-2023-47141.json b/2023/47xxx/CVE-2023-47141.json index db3be3ec8a9..da074c65026 100644 --- a/2023/47xxx/CVE-2023-47141.json +++ b/2023/47xxx/CVE-2023-47141.json @@ -63,6 +63,11 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270264", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270264" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0001/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0001/" } ] }, diff --git a/2023/47xxx/CVE-2023-47145.json b/2023/47xxx/CVE-2023-47145.json index 7683331f3de..fa37d755188 100644 --- a/2023/47xxx/CVE-2023-47145.json +++ b/2023/47xxx/CVE-2023-47145.json @@ -62,6 +62,11 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270402", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270402" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0003/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0003/" } ] }, diff --git a/2023/47xxx/CVE-2023-47152.json b/2023/47xxx/CVE-2023-47152.json index 3f4e67bae0c..008b3bfb6f4 100644 --- a/2023/47xxx/CVE-2023-47152.json +++ b/2023/47xxx/CVE-2023-47152.json @@ -62,6 +62,11 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270730", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270730" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0001/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0001/" } ] }, diff --git a/2023/47xxx/CVE-2023-47158.json b/2023/47xxx/CVE-2023-47158.json index 8c60bac6a11..92378bf0468 100644 --- a/2023/47xxx/CVE-2023-47158.json +++ b/2023/47xxx/CVE-2023-47158.json @@ -63,6 +63,11 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270750", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270750" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0002/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0002/" } ] }, diff --git a/2023/47xxx/CVE-2023-47746.json b/2023/47xxx/CVE-2023-47746.json index 49037d84094..3038abaab56 100644 --- a/2023/47xxx/CVE-2023-47746.json +++ b/2023/47xxx/CVE-2023-47746.json @@ -63,6 +63,11 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/272644", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/272644" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0003/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0003/" } ] }, diff --git a/2023/47xxx/CVE-2023-47747.json b/2023/47xxx/CVE-2023-47747.json index 1c1d7f706f0..b4d83da684c 100644 --- a/2023/47xxx/CVE-2023-47747.json +++ b/2023/47xxx/CVE-2023-47747.json @@ -63,6 +63,11 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/272646", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/272646" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0002/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0002/" } ] }, diff --git a/2023/50xxx/CVE-2023-50308.json b/2023/50xxx/CVE-2023-50308.json index af904ee0750..4a28d7708f2 100644 --- a/2023/50xxx/CVE-2023-50308.json +++ b/2023/50xxx/CVE-2023-50308.json @@ -63,6 +63,11 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/273393", "refsource": "MISC", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/273393" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0001/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0001/" } ] }, diff --git a/2023/50xxx/CVE-2023-50387.json b/2023/50xxx/CVE-2023-50387.json index 70f1f285bc2..d8f64fd6b3e 100644 --- a/2023/50xxx/CVE-2023-50387.json +++ b/2023/50xxx/CVE-2023-50387.json @@ -191,6 +191,11 @@ "refsource": "FEDORA", "name": "FEDORA-2024-fae88b73eb", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20240307-0007/", + "url": "https://security.netapp.com/advisory/ntap-20240307-0007/" } ] } diff --git a/2023/50xxx/CVE-2023-50868.json b/2023/50xxx/CVE-2023-50868.json index 56ede367f7b..cc2574ca1c2 100644 --- a/2023/50xxx/CVE-2023-50868.json +++ b/2023/50xxx/CVE-2023-50868.json @@ -161,6 +161,11 @@ "refsource": "FEDORA", "name": "FEDORA-2024-fae88b73eb", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20240307-0008/", + "url": "https://security.netapp.com/advisory/ntap-20240307-0008/" } ] } diff --git a/2023/52xxx/CVE-2023-52426.json b/2023/52xxx/CVE-2023-52426.json index d1353d8963e..09f6af69546 100644 --- a/2023/52xxx/CVE-2023-52426.json +++ b/2023/52xxx/CVE-2023-52426.json @@ -76,6 +76,11 @@ "refsource": "FEDORA", "name": "FEDORA-2024-b8656bc059", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20240307-0005/", + "url": "https://security.netapp.com/advisory/ntap-20240307-0005/" } ] } diff --git a/2023/5xxx/CVE-2023-5043.json b/2023/5xxx/CVE-2023-5043.json index 2d526b97a62..73f3460d857 100644 --- a/2023/5xxx/CVE-2023-5043.json +++ b/2023/5xxx/CVE-2023-5043.json @@ -82,6 +82,11 @@ "url": "http://www.openwall.com/lists/oss-security/2023/10/25/4", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2023/10/25/4" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0012/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0012/" } ] }, diff --git a/2023/5xxx/CVE-2023-5044.json b/2023/5xxx/CVE-2023-5044.json index a66167ed0d7..117cf31d6f6 100644 --- a/2023/5xxx/CVE-2023-5044.json +++ b/2023/5xxx/CVE-2023-5044.json @@ -82,6 +82,11 @@ "url": "http://www.openwall.com/lists/oss-security/2023/10/25/3", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2023/10/25/3" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0012/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0012/" } ] }, diff --git a/2023/6xxx/CVE-2023-6816.json b/2023/6xxx/CVE-2023-6816.json index f3a457ea1ea..80352e0f109 100644 --- a/2023/6xxx/CVE-2023-6816.json +++ b/2023/6xxx/CVE-2023-6816.json @@ -531,6 +531,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0006/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0006/" } ] }, diff --git a/2024/0xxx/CVE-2024-0408.json b/2024/0xxx/CVE-2024-0408.json index 4bd62867d70..973672cd47c 100644 --- a/2024/0xxx/CVE-2024-0408.json +++ b/2024/0xxx/CVE-2024-0408.json @@ -247,6 +247,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0006/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0006/" } ] }, diff --git a/2024/0xxx/CVE-2024-0409.json b/2024/0xxx/CVE-2024-0409.json index 325d51b0abe..8fa697f084d 100644 --- a/2024/0xxx/CVE-2024-0409.json +++ b/2024/0xxx/CVE-2024-0409.json @@ -247,6 +247,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0006/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0006/" } ] }, diff --git a/2024/0xxx/CVE-2024-0853.json b/2024/0xxx/CVE-2024-0853.json index fdfd7b767f4..33052ad39f4 100644 --- a/2024/0xxx/CVE-2024-0853.json +++ b/2024/0xxx/CVE-2024-0853.json @@ -68,6 +68,11 @@ "url": "https://hackerone.com/reports/2298922", "refsource": "MISC", "name": "https://hackerone.com/reports/2298922" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0004/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0004/" } ] }, diff --git a/2024/1xxx/CVE-2024-1442.json b/2024/1xxx/CVE-2024-1442.json index 4abd7d23cb8..ada3a135712 100644 --- a/2024/1xxx/CVE-2024-1442.json +++ b/2024/1xxx/CVE-2024-1442.json @@ -1,17 +1,108 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-1442", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@grafana.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": " A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.\nDoing this will grant the user access to read, query, edit and delete all data sources within the organization.\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-269", + "cweId": "CWE-269" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Grafana", + "product": { + "product_data": [ + { + "product_name": "Grafana", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "8.5.0", + "version_value": "9.5.7" + }, + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.12" + }, + { + "version_affected": "<", + "version_name": "10.1.0", + "version_value": "10.1.8" + }, + { + "version_affected": "<", + "version_name": "10.2.0", + "version_value": "10.2.5" + }, + { + "version_affected": "<", + "version_name": "10.3.0", + "version_value": "10.3.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://grafana.com/security/security-advisories/cve-2024-1442/", + "refsource": "MISC", + "name": "https://grafana.com/security/security-advisories/cve-2024-1442/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "INTERNAL" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/1xxx/CVE-2024-1889.json b/2024/1xxx/CVE-2024-1889.json index b1850b2c2f1..9365a76c360 100644 --- a/2024/1xxx/CVE-2024-1889.json +++ b/2024/1xxx/CVE-2024-1889.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Cross-Site Request Forgery vulnerability in SMA Cluster Controller, affecting version 01.05.01.R. This vulnerability could allow an attacker to send a malicious link to an authenticated user to perform actions with these user permissions on the affected device." + "value": "** UNSUPPPORTED WHEN ASSIGNED ** Cross-Site Request Forgery vulnerability in SMA Cluster Controller, affecting version 01.05.01.R. This vulnerability could allow an attacker to send a malicious link to an authenticated user to perform actions with these user permissions on the affected device." } ] }, diff --git a/2024/1xxx/CVE-2024-1890.json b/2024/1xxx/CVE-2024-1890.json index 3306098fa17..bb7ca128d21 100644 --- a/2024/1xxx/CVE-2024-1890.json +++ b/2024/1xxx/CVE-2024-1890.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Vulnerability whereby an attacker could send a malicious link to an authenticated operator, which could allow remote attackers to perform a clickjacking attack on Sunny WebBox firmware version 1.6.1 and earlier." + "value": "** UNSUPPPORTED WHEN ASSIGNED ** Vulnerability whereby an attacker could send a malicious link to an authenticated operator, which could allow remote attackers to perform a clickjacking attack on Sunny WebBox firmware version 1.6.1 and earlier." } ] }, diff --git a/2024/22xxx/CVE-2024-22752.json b/2024/22xxx/CVE-2024-22752.json index ecfbded1b49..6cb8e21c0c3 100644 --- a/2024/22xxx/CVE-2024-22752.json +++ b/2024/22xxx/CVE-2024-22752.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-22752", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-22752", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insecure permissions issue in EaseUS MobiMover 6.0.5 Build 21620 allows attackers to gain escalated privileges via use of crafted executable launched from the application installation directory." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/hacker625/CVE-2024-22752", + "url": "https://github.com/hacker625/CVE-2024-22752" } ] } diff --git a/2024/25xxx/CVE-2024-25710.json b/2024/25xxx/CVE-2024-25710.json index eb862815fca..ac34b0c81b0 100644 --- a/2024/25xxx/CVE-2024-25710.json +++ b/2024/25xxx/CVE-2024-25710.json @@ -64,6 +64,11 @@ "url": "http://www.openwall.com/lists/oss-security/2024/02/19/1", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2024/02/19/1" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0010/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0010/" } ] }, diff --git a/2024/26xxx/CVE-2024-26308.json b/2024/26xxx/CVE-2024-26308.json index bf17ee447eb..ddfef98da95 100644 --- a/2024/26xxx/CVE-2024-26308.json +++ b/2024/26xxx/CVE-2024-26308.json @@ -64,6 +64,11 @@ "url": "http://www.openwall.com/lists/oss-security/2024/02/19/2", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2024/02/19/2" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0009/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240307-0009/" } ] }, diff --git a/2024/27xxx/CVE-2024-27733.json b/2024/27xxx/CVE-2024-27733.json index f3af65e6043..ec3600eee0a 100644 --- a/2024/27xxx/CVE-2024-27733.json +++ b/2024/27xxx/CVE-2024-27733.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-27733", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-27733", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "File Upload vulnerability in Byzro Network Smart s42 Management Platform v.S42 allows a local attacker to execute arbitrary code via the useratte/userattestation.php component." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Sadw11v/cve/blob/main/upload.md", + "refsource": "MISC", + "name": "https://github.com/Sadw11v/cve/blob/main/upload.md" } ] } diff --git a/2024/2xxx/CVE-2024-2289.json b/2024/2xxx/CVE-2024-2289.json new file mode 100644 index 00000000000..5e7ed106564 --- /dev/null +++ b/2024/2xxx/CVE-2024-2289.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-2289", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/2xxx/CVE-2024-2290.json b/2024/2xxx/CVE-2024-2290.json new file mode 100644 index 00000000000..4c6d02c0ed0 --- /dev/null +++ b/2024/2xxx/CVE-2024-2290.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-2290", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/2xxx/CVE-2024-2291.json b/2024/2xxx/CVE-2024-2291.json new file mode 100644 index 00000000000..da50c404697 --- /dev/null +++ b/2024/2xxx/CVE-2024-2291.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-2291", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/2xxx/CVE-2024-2292.json b/2024/2xxx/CVE-2024-2292.json new file mode 100644 index 00000000000..c6bc72d86b4 --- /dev/null +++ b/2024/2xxx/CVE-2024-2292.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-2292", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/2xxx/CVE-2024-2293.json b/2024/2xxx/CVE-2024-2293.json new file mode 100644 index 00000000000..0ac9c352533 --- /dev/null +++ b/2024/2xxx/CVE-2024-2293.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-2293", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/2xxx/CVE-2024-2294.json b/2024/2xxx/CVE-2024-2294.json new file mode 100644 index 00000000000..a114c5bf458 --- /dev/null +++ b/2024/2xxx/CVE-2024-2294.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-2294", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/2xxx/CVE-2024-2295.json b/2024/2xxx/CVE-2024-2295.json new file mode 100644 index 00000000000..f69b72c3b00 --- /dev/null +++ b/2024/2xxx/CVE-2024-2295.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-2295", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/2xxx/CVE-2024-2296.json b/2024/2xxx/CVE-2024-2296.json new file mode 100644 index 00000000000..2762484aa9f --- /dev/null +++ b/2024/2xxx/CVE-2024-2296.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-2296", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file