From 3cc374bdcfc4f53ec50040ea02134cb9edb86152 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 8 Feb 2024 19:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/1xxx/CVE-2024-1355.json | 18 +++++++++ 2024/1xxx/CVE-2024-1356.json | 18 +++++++++ 2024/1xxx/CVE-2024-1357.json | 18 +++++++++ 2024/1xxx/CVE-2024-1358.json | 18 +++++++++ 2024/1xxx/CVE-2024-1359.json | 18 +++++++++ 2024/1xxx/CVE-2024-1360.json | 18 +++++++++ 2024/1xxx/CVE-2024-1361.json | 18 +++++++++ 2024/1xxx/CVE-2024-1362.json | 18 +++++++++ 2024/22xxx/CVE-2024-22795.json | 66 ++++++++++++++++++++++++++++--- 2024/23xxx/CVE-2024-23764.json | 61 ++++++++++++++++++++++++++--- 2024/24xxx/CVE-2024-24213.json | 71 +++++++++++++++++++++++++++++++--- 2024/24xxx/CVE-2024-24215.json | 66 ++++++++++++++++++++++++++++--- 2024/25xxx/CVE-2024-25611.json | 18 +++++++++ 2024/25xxx/CVE-2024-25612.json | 18 +++++++++ 2024/25xxx/CVE-2024-25613.json | 18 +++++++++ 2024/25xxx/CVE-2024-25614.json | 18 +++++++++ 2024/25xxx/CVE-2024-25615.json | 18 +++++++++ 2024/25xxx/CVE-2024-25616.json | 18 +++++++++ 18 files changed, 492 insertions(+), 24 deletions(-) create mode 100644 2024/1xxx/CVE-2024-1355.json create mode 100644 2024/1xxx/CVE-2024-1356.json create mode 100644 2024/1xxx/CVE-2024-1357.json create mode 100644 2024/1xxx/CVE-2024-1358.json create mode 100644 2024/1xxx/CVE-2024-1359.json create mode 100644 2024/1xxx/CVE-2024-1360.json create mode 100644 2024/1xxx/CVE-2024-1361.json create mode 100644 2024/1xxx/CVE-2024-1362.json create mode 100644 2024/25xxx/CVE-2024-25611.json create mode 100644 2024/25xxx/CVE-2024-25612.json create mode 100644 2024/25xxx/CVE-2024-25613.json create mode 100644 2024/25xxx/CVE-2024-25614.json create mode 100644 2024/25xxx/CVE-2024-25615.json create mode 100644 2024/25xxx/CVE-2024-25616.json diff --git a/2024/1xxx/CVE-2024-1355.json b/2024/1xxx/CVE-2024-1355.json new file mode 100644 index 00000000000..d0b1b8a2738 --- /dev/null +++ b/2024/1xxx/CVE-2024-1355.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1355", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1356.json b/2024/1xxx/CVE-2024-1356.json new file mode 100644 index 00000000000..00d6622fb12 --- /dev/null +++ b/2024/1xxx/CVE-2024-1356.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1356", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1357.json b/2024/1xxx/CVE-2024-1357.json new file mode 100644 index 00000000000..9ab8e46eb2a --- /dev/null +++ b/2024/1xxx/CVE-2024-1357.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1357", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1358.json b/2024/1xxx/CVE-2024-1358.json new file mode 100644 index 00000000000..07f69006615 --- /dev/null +++ b/2024/1xxx/CVE-2024-1358.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1358", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1359.json b/2024/1xxx/CVE-2024-1359.json new file mode 100644 index 00000000000..7faba303200 --- /dev/null +++ b/2024/1xxx/CVE-2024-1359.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1359", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1360.json b/2024/1xxx/CVE-2024-1360.json new file mode 100644 index 00000000000..a3cdcb07da3 --- /dev/null +++ b/2024/1xxx/CVE-2024-1360.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1360", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1361.json b/2024/1xxx/CVE-2024-1361.json new file mode 100644 index 00000000000..ab24172f24c --- /dev/null +++ b/2024/1xxx/CVE-2024-1361.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1361", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1362.json b/2024/1xxx/CVE-2024-1362.json new file mode 100644 index 00000000000..8fa4cedb48a --- /dev/null +++ b/2024/1xxx/CVE-2024-1362.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1362", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/22xxx/CVE-2024-22795.json b/2024/22xxx/CVE-2024-22795.json index 2fa46367afb..5f5c779e948 100644 --- a/2024/22xxx/CVE-2024-22795.json +++ b/2024/22xxx/CVE-2024-22795.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-22795", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-22795", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insecure Permissions vulnerability in Forescout SecureConnector v.11.3.06.0063 allows a local attacker to escalate privileges via the Recheck Compliance Status component." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.forescout.com/", + "refsource": "MISC", + "name": "https://www.forescout.com/" + }, + { + "url": "https://github.com/Hagrid29/ForeScout-SecureConnector-EoP", + "refsource": "MISC", + "name": "https://github.com/Hagrid29/ForeScout-SecureConnector-EoP" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Hagrid29/aea0dc35a1e87813dbbb7b317853d023", + "url": "https://gist.github.com/Hagrid29/aea0dc35a1e87813dbbb7b317853d023" } ] } diff --git a/2024/23xxx/CVE-2024-23764.json b/2024/23xxx/CVE-2024-23764.json index c6c42f00cf8..ff9735edc0e 100644 --- a/2024/23xxx/CVE-2024-23764.json +++ b/2024/23xxx/CVE-2024-23764.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-23764", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-23764", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Certain WithSecure products allow Local Privilege Escalation. This affects WithSecure Client Security 15 and later, WithSecure Server Security 15 and later, WithSecure Email and Server Security 15 and later, and WithSecure Elements Endpoint Protection 17 and later." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.withsecure.com/en/support/security-advisories", + "refsource": "MISC", + "name": "https://www.withsecure.com/en/support/security-advisories" + }, + { + "refsource": "MISC", + "name": "https://www.withsecure.com/en/support/security-advisories/cve-2024-23764", + "url": "https://www.withsecure.com/en/support/security-advisories/cve-2024-23764" } ] } diff --git a/2024/24xxx/CVE-2024-24213.json b/2024/24xxx/CVE-2024-24213.json index 8c9ed6d1059..df06700aeed 100644 --- a/2024/24xxx/CVE-2024-24213.json +++ b/2024/24xxx/CVE-2024-24213.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-24213", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-24213", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Supabase PostgreSQL v15.1 was discovered to contain a SQL injection vulnerability via the component /pg_meta/default/query." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://app.flows.sh:8443/project/default,", + "refsource": "MISC", + "name": "https://app.flows.sh:8443/project/default," + }, + { + "url": "https://reference1.example.com/project/default/logs/explorer,", + "refsource": "MISC", + "name": "https://reference1.example.com/project/default/logs/explorer," + }, + { + "url": "https://postfixadmin.ballardini.com.ar:8443/project/default/logs/explorer.", + "refsource": "MISC", + "name": "https://postfixadmin.ballardini.com.ar:8443/project/default/logs/explorer." + }, + { + "refsource": "MISC", + "name": "https://github.com/940198871/Vulnerability-details/blob/main/CVE-2024-24213", + "url": "https://github.com/940198871/Vulnerability-details/blob/main/CVE-2024-24213" } ] } diff --git a/2024/24xxx/CVE-2024-24215.json b/2024/24xxx/CVE-2024-24215.json index e5167a9f225..0c0e8a5e5bc 100644 --- a/2024/24xxx/CVE-2024-24215.json +++ b/2024/24xxx/CVE-2024-24215.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-24215", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-24215", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in the component /cgi-bin/GetJsonValue.cgi of Cellinx NVT Web Server 5.0.0.014 allows attackers to leak configuration information via a crafted POST request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://reference4.example.com", + "refsource": "MISC", + "name": "https://reference4.example.com" + }, + { + "url": "https://reference3.example.com//1.222.228.4/,", + "refsource": "MISC", + "name": "https://reference3.example.com//1.222.228.4/," + }, + { + "refsource": "MISC", + "name": "https://github.com/940198871/Vulnerability-details/blob/main/CVE-2024-24215", + "url": "https://github.com/940198871/Vulnerability-details/blob/main/CVE-2024-24215" } ] } diff --git a/2024/25xxx/CVE-2024-25611.json b/2024/25xxx/CVE-2024-25611.json new file mode 100644 index 00000000000..7e74591f733 --- /dev/null +++ b/2024/25xxx/CVE-2024-25611.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-25611", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/25xxx/CVE-2024-25612.json b/2024/25xxx/CVE-2024-25612.json new file mode 100644 index 00000000000..9f69eda3eaf --- /dev/null +++ b/2024/25xxx/CVE-2024-25612.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-25612", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/25xxx/CVE-2024-25613.json b/2024/25xxx/CVE-2024-25613.json new file mode 100644 index 00000000000..cb081f6a9a4 --- /dev/null +++ b/2024/25xxx/CVE-2024-25613.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-25613", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/25xxx/CVE-2024-25614.json b/2024/25xxx/CVE-2024-25614.json new file mode 100644 index 00000000000..815e43e0402 --- /dev/null +++ b/2024/25xxx/CVE-2024-25614.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-25614", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/25xxx/CVE-2024-25615.json b/2024/25xxx/CVE-2024-25615.json new file mode 100644 index 00000000000..922bd9beb59 --- /dev/null +++ b/2024/25xxx/CVE-2024-25615.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-25615", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/25xxx/CVE-2024-25616.json b/2024/25xxx/CVE-2024-25616.json new file mode 100644 index 00000000000..76c0686c6a7 --- /dev/null +++ b/2024/25xxx/CVE-2024-25616.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-25616", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file