From 30084d7be171cb82001496712ebbd11089bea9e2 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 2 Dec 2024 20:00:39 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/9xxx/CVE-2018-9380.json | 83 ++++++++++++++++++++++++++++++---- 2018/9xxx/CVE-2018-9381.json | 67 +++++++++++++++++++++++---- 2024/12xxx/CVE-2024-12049.json | 18 ++++++++ 2024/12xxx/CVE-2024-12050.json | 18 ++++++++ 2024/12xxx/CVE-2024-12051.json | 18 ++++++++ 2024/12xxx/CVE-2024-12052.json | 18 ++++++++ 2024/12xxx/CVE-2024-12053.json | 18 ++++++++ 2024/12xxx/CVE-2024-12054.json | 18 ++++++++ 2024/12xxx/CVE-2024-12055.json | 18 ++++++++ 2024/12xxx/CVE-2024-12056.json | 18 ++++++++ 2024/12xxx/CVE-2024-12057.json | 18 ++++++++ 2024/39xxx/CVE-2024-39343.json | 70 +++++++++++++++++++++++++--- 2024/53xxx/CVE-2024-53900.json | 71 ++++++++++++++++++++++++++--- 2024/54xxx/CVE-2024-54450.json | 18 ++++++++ 2024/54xxx/CVE-2024-54451.json | 18 ++++++++ 2024/54xxx/CVE-2024-54452.json | 18 ++++++++ 2024/54xxx/CVE-2024-54453.json | 18 ++++++++ 2024/54xxx/CVE-2024-54454.json | 18 ++++++++ 18 files changed, 515 insertions(+), 28 deletions(-) create mode 100644 2024/12xxx/CVE-2024-12049.json create mode 100644 2024/12xxx/CVE-2024-12050.json create mode 100644 2024/12xxx/CVE-2024-12051.json create mode 100644 2024/12xxx/CVE-2024-12052.json create mode 100644 2024/12xxx/CVE-2024-12053.json create mode 100644 2024/12xxx/CVE-2024-12054.json create mode 100644 2024/12xxx/CVE-2024-12055.json create mode 100644 2024/12xxx/CVE-2024-12056.json create mode 100644 2024/12xxx/CVE-2024-12057.json create mode 100644 2024/54xxx/CVE-2024-54450.json create mode 100644 2024/54xxx/CVE-2024-54451.json create mode 100644 2024/54xxx/CVE-2024-54452.json create mode 100644 2024/54xxx/CVE-2024-54453.json create mode 100644 2024/54xxx/CVE-2024-54454.json diff --git a/2018/9xxx/CVE-2018-9380.json b/2018/9xxx/CVE-2018-9380.json index ff73a2e054f..6fa8f632181 100644 --- a/2018/9xxx/CVE-2018-9380.json +++ b/2018/9xxx/CVE-2018-9380.json @@ -1,18 +1,85 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-9380", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2018-9380", + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In l2c_lcc_proc_pdu of l2c_fcr.cc, there is a possible out of bounds write\u00a0due to improper input validation. This could lead to remote escalation of\u00a0privilege with no additional execution privileges needed. User interaction\u00a0is needed for exploitation." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7" + }, + { + "version_affected": "=", + "version_value": "7.1.1" + }, + { + "version_affected": "=", + "version_value": "7.1.2" + }, + { + "version_affected": "=", + "version_value": "8" + }, + { + "version_affected": "=", + "version_value": "8.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01", + "refsource": "MISC", + "name": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2018/9xxx/CVE-2018-9381.json b/2018/9xxx/CVE-2018-9381.json index c126857c7ff..6eb9df91081 100644 --- a/2018/9xxx/CVE-2018-9381.json +++ b/2018/9xxx/CVE-2018-9381.json @@ -1,18 +1,69 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-9381", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2018-9381", + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In gatts_process_read_by_type_req of gatt_sr.c, there is a possible\u00a0information disclosure due to uninitialized data. This could lead to remote\u00a0information disclosure with no additional execution privileges needed. User\u00a0interaction is not needed for exploitation." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "8.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01", + "refsource": "MISC", + "name": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2024/12xxx/CVE-2024-12049.json b/2024/12xxx/CVE-2024-12049.json new file mode 100644 index 00000000000..bc2ad688e82 --- /dev/null +++ b/2024/12xxx/CVE-2024-12049.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12049", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/12xxx/CVE-2024-12050.json b/2024/12xxx/CVE-2024-12050.json new file mode 100644 index 00000000000..a652400773b --- /dev/null +++ b/2024/12xxx/CVE-2024-12050.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12050", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/12xxx/CVE-2024-12051.json b/2024/12xxx/CVE-2024-12051.json new file mode 100644 index 00000000000..b8863741d7b --- /dev/null +++ b/2024/12xxx/CVE-2024-12051.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12051", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/12xxx/CVE-2024-12052.json b/2024/12xxx/CVE-2024-12052.json new file mode 100644 index 00000000000..98797e91fc0 --- /dev/null +++ b/2024/12xxx/CVE-2024-12052.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12052", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/12xxx/CVE-2024-12053.json b/2024/12xxx/CVE-2024-12053.json new file mode 100644 index 00000000000..1200661769e --- /dev/null +++ b/2024/12xxx/CVE-2024-12053.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12053", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/12xxx/CVE-2024-12054.json b/2024/12xxx/CVE-2024-12054.json new file mode 100644 index 00000000000..788da7768e2 --- /dev/null +++ b/2024/12xxx/CVE-2024-12054.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12054", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/12xxx/CVE-2024-12055.json b/2024/12xxx/CVE-2024-12055.json new file mode 100644 index 00000000000..d97aec51c4a --- /dev/null +++ b/2024/12xxx/CVE-2024-12055.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12055", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/12xxx/CVE-2024-12056.json b/2024/12xxx/CVE-2024-12056.json new file mode 100644 index 00000000000..2aa34ca50df --- /dev/null +++ b/2024/12xxx/CVE-2024-12056.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12056", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/12xxx/CVE-2024-12057.json b/2024/12xxx/CVE-2024-12057.json new file mode 100644 index 00000000000..a14d57ad6fb --- /dev/null +++ b/2024/12xxx/CVE-2024-12057.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12057", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/39xxx/CVE-2024-39343.json b/2024/39xxx/CVE-2024-39343.json index 2d6847fc8a8..53e309341aa 100644 --- a/2024/39xxx/CVE-2024-39343.json +++ b/2024/39xxx/CVE-2024-39343.json @@ -1,18 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-39343", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-39343", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, Modem 5123, and Modem 5300. The baseband software does not properly check the length specified by the MM (Mobility Management) module, which can lead to Denial of Service." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "refsource": "MISC", + "name": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:L/I:L/PR:N/S:U/UI:N", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53900.json b/2024/53xxx/CVE-2024-53900.json index 6577dbfad73..4c488e91048 100644 --- a/2024/53xxx/CVE-2024-53900.json +++ b/2024/53xxx/CVE-2024-53900.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-53900", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-53900", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Mongoose before 8.8.3 can improperly use $where in match." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.npmjs.com/package/mongoose?activeTab=versions", + "refsource": "MISC", + "name": "https://www.npmjs.com/package/mongoose?activeTab=versions" + }, + { + "url": "https://github.com/Automattic/mongoose/releases", + "refsource": "MISC", + "name": "https://github.com/Automattic/mongoose/releases" + }, + { + "refsource": "MISC", + "name": "https://github.com/Automattic/mongoose/blob/master/CHANGELOG.md", + "url": "https://github.com/Automattic/mongoose/blob/master/CHANGELOG.md" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/Automattic/mongoose/commit/c9e86bff7eef477da75a29af62a06d41a835a156", + "url": "https://github.com/Automattic/mongoose/commit/c9e86bff7eef477da75a29af62a06d41a835a156" } ] } diff --git a/2024/54xxx/CVE-2024-54450.json b/2024/54xxx/CVE-2024-54450.json new file mode 100644 index 00000000000..257b003dded --- /dev/null +++ b/2024/54xxx/CVE-2024-54450.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-54450", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/54xxx/CVE-2024-54451.json b/2024/54xxx/CVE-2024-54451.json new file mode 100644 index 00000000000..747afaa3c47 --- /dev/null +++ b/2024/54xxx/CVE-2024-54451.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-54451", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/54xxx/CVE-2024-54452.json b/2024/54xxx/CVE-2024-54452.json new file mode 100644 index 00000000000..4a4721fb0b2 --- /dev/null +++ b/2024/54xxx/CVE-2024-54452.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-54452", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/54xxx/CVE-2024-54453.json b/2024/54xxx/CVE-2024-54453.json new file mode 100644 index 00000000000..e11c1494376 --- /dev/null +++ b/2024/54xxx/CVE-2024-54453.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-54453", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/54xxx/CVE-2024-54454.json b/2024/54xxx/CVE-2024-54454.json new file mode 100644 index 00000000000..f002eb0577e --- /dev/null +++ b/2024/54xxx/CVE-2024-54454.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-54454", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file