From 40d2ef6e384aeac24a14250f9d97c46ffec9395c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 23 Jan 2024 11:00:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/19xxx/CVE-2018-19183.json | 12 ++++++- 2023/51xxx/CVE-2023-51042.json | 61 ++++++++++++++++++++++++++++++---- 2023/51xxx/CVE-2023-51043.json | 61 ++++++++++++++++++++++++++++++---- 2024/22xxx/CVE-2024-22076.json | 61 ++++++++++++++++++++++++++++++---- 2024/22xxx/CVE-2024-22705.json | 61 ++++++++++++++++++++++++++++++---- 2024/23xxx/CVE-2024-23854.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23855.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23856.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23857.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23858.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23859.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23860.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23861.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23862.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23863.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23864.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23865.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23866.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23867.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23868.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23869.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23870.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23871.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23872.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23873.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23874.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23875.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23876.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23877.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23878.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23879.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23880.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23881.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23882.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23883.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23884.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23885.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23886.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23887.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23888.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23889.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23890.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23891.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23892.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23893.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23894.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23895.json | 18 ++++++++++ 2024/23xxx/CVE-2024-23896.json | 18 ++++++++++ 48 files changed, 1005 insertions(+), 25 deletions(-) create mode 100644 2024/23xxx/CVE-2024-23854.json create mode 100644 2024/23xxx/CVE-2024-23855.json create mode 100644 2024/23xxx/CVE-2024-23856.json create mode 100644 2024/23xxx/CVE-2024-23857.json create mode 100644 2024/23xxx/CVE-2024-23858.json create mode 100644 2024/23xxx/CVE-2024-23859.json create mode 100644 2024/23xxx/CVE-2024-23860.json create mode 100644 2024/23xxx/CVE-2024-23861.json create mode 100644 2024/23xxx/CVE-2024-23862.json create mode 100644 2024/23xxx/CVE-2024-23863.json create mode 100644 2024/23xxx/CVE-2024-23864.json create mode 100644 2024/23xxx/CVE-2024-23865.json create mode 100644 2024/23xxx/CVE-2024-23866.json create mode 100644 2024/23xxx/CVE-2024-23867.json create mode 100644 2024/23xxx/CVE-2024-23868.json create mode 100644 2024/23xxx/CVE-2024-23869.json create mode 100644 2024/23xxx/CVE-2024-23870.json create mode 100644 2024/23xxx/CVE-2024-23871.json create mode 100644 2024/23xxx/CVE-2024-23872.json create mode 100644 2024/23xxx/CVE-2024-23873.json create mode 100644 2024/23xxx/CVE-2024-23874.json create mode 100644 2024/23xxx/CVE-2024-23875.json create mode 100644 2024/23xxx/CVE-2024-23876.json create mode 100644 2024/23xxx/CVE-2024-23877.json create mode 100644 2024/23xxx/CVE-2024-23878.json create mode 100644 2024/23xxx/CVE-2024-23879.json create mode 100644 2024/23xxx/CVE-2024-23880.json create mode 100644 2024/23xxx/CVE-2024-23881.json create mode 100644 2024/23xxx/CVE-2024-23882.json create mode 100644 2024/23xxx/CVE-2024-23883.json create mode 100644 2024/23xxx/CVE-2024-23884.json create mode 100644 2024/23xxx/CVE-2024-23885.json create mode 100644 2024/23xxx/CVE-2024-23886.json create mode 100644 2024/23xxx/CVE-2024-23887.json create mode 100644 2024/23xxx/CVE-2024-23888.json create mode 100644 2024/23xxx/CVE-2024-23889.json create mode 100644 2024/23xxx/CVE-2024-23890.json create mode 100644 2024/23xxx/CVE-2024-23891.json create mode 100644 2024/23xxx/CVE-2024-23892.json create mode 100644 2024/23xxx/CVE-2024-23893.json create mode 100644 2024/23xxx/CVE-2024-23894.json create mode 100644 2024/23xxx/CVE-2024-23895.json create mode 100644 2024/23xxx/CVE-2024-23896.json diff --git a/2018/19xxx/CVE-2018-19183.json b/2018/19xxx/CVE-2018-19183.json index 612b11f57e3..4505e3877cd 100644 --- a/2018/19xxx/CVE-2018-19183.json +++ b/2018/19xxx/CVE-2018-19183.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "ethereumjs-vm 2.4.0 allows attackers to cause a denial of service (vm.runCode failure and REVERT) via a \"code: Buffer.from(my_code, 'hex')\" attribute." + "value": "** DISPUTED ** ethereumjs-vm 2.4.0 allows attackers to cause a denial of service (vm.runCode failure and REVERT) via a \"code: Buffer.from(my_code, 'hex')\" attribute. NOTE: the vendor disputes this because REVERT is a normal bytecode that can be triggered from high-level source code, leading to a normal programmatic execution result." } ] }, @@ -56,6 +56,16 @@ "name": "https://github.com/ethereumjs/ethereumjs-vm/issues/386", "refsource": "MISC", "url": "https://github.com/ethereumjs/ethereumjs-vm/issues/386" + }, + { + "refsource": "MISC", + "name": "https://github.com/ethereumjs/ethereumjs-monorepo/issues/395#issuecomment-472449204", + "url": "https://github.com/ethereumjs/ethereumjs-monorepo/issues/395#issuecomment-472449204" + }, + { + "refsource": "MISC", + "name": "https://github.com/ethereumjs/ethereumjs-monorepo/issues/386#issuecomment-439372074", + "url": "https://github.com/ethereumjs/ethereumjs-monorepo/issues/386#issuecomment-439372074" } ] } diff --git a/2023/51xxx/CVE-2023-51042.json b/2023/51xxx/CVE-2023-51042.json index b1e20adc99f..1b87c7264ac 100644 --- a/2023/51xxx/CVE-2023-51042.json +++ b/2023/51xxx/CVE-2023-51042.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-51042", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-51042", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12", + "refsource": "MISC", + "name": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12" + }, + { + "url": "https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628" } ] } diff --git a/2023/51xxx/CVE-2023-51043.json b/2023/51xxx/CVE-2023-51043.json index a929a09e9b9..730bd98ac13 100644 --- a/2023/51xxx/CVE-2023-51043.json +++ b/2023/51xxx/CVE-2023-51043.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-51043", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-51043", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/torvalds/linux/commit/4e076c73e4f6e90816b30fcd4a0d7ab365087255", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/4e076c73e4f6e90816b30fcd4a0d7ab365087255" + }, + { + "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.5", + "refsource": "MISC", + "name": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.5" } ] } diff --git a/2024/22xxx/CVE-2024-22076.json b/2024/22xxx/CVE-2024-22076.json index e8233edc1ad..1910f5e0cb7 100644 --- a/2024/22xxx/CVE-2024-22076.json +++ b/2024/22xxx/CVE-2024-22076.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-22076", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-22076", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "MyQ Print Server before 8.2 patch 43 allows Unauthenticated Remote Code Execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://docs.myq-solution.com/en/print-server/8.2/", + "refsource": "MISC", + "name": "https://docs.myq-solution.com/en/print-server/8.2/" + }, + { + "refsource": "MISC", + "name": "https://docs.myq-solution.com/en/print-server/8.2/technical-changelog#id-(8.2)ReleaseNotes-8.2(Patch43)", + "url": "https://docs.myq-solution.com/en/print-server/8.2/technical-changelog#id-(8.2)ReleaseNotes-8.2(Patch43)" } ] } diff --git a/2024/22xxx/CVE-2024-22705.json b/2024/22xxx/CVE-2024-22705.json index 8cede9bf29d..5b533021b4e 100644 --- a/2024/22xxx/CVE-2024-22705.json +++ b/2024/22xxx/CVE-2024-22705.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-22705", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-22705", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in ksmbd in the Linux kernel before 6.6.10. smb2_get_data_area_len in fs/smb/server/smb2misc.c can cause an smb_strndup_from_utf16 out-of-bounds access because the relationship between Name data and CreateContexts data is mishandled." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.10", + "refsource": "MISC", + "name": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.10" + }, + { + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d10c77873ba1e9e6b91905018e29e196fd5f863d", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d10c77873ba1e9e6b91905018e29e196fd5f863d" } ] } diff --git a/2024/23xxx/CVE-2024-23854.json b/2024/23xxx/CVE-2024-23854.json new file mode 100644 index 00000000000..e0593ba5416 --- /dev/null +++ b/2024/23xxx/CVE-2024-23854.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23854", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23855.json b/2024/23xxx/CVE-2024-23855.json new file mode 100644 index 00000000000..f926477bb84 --- /dev/null +++ b/2024/23xxx/CVE-2024-23855.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23855", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23856.json b/2024/23xxx/CVE-2024-23856.json new file mode 100644 index 00000000000..1cf18a3d007 --- /dev/null +++ b/2024/23xxx/CVE-2024-23856.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23856", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23857.json b/2024/23xxx/CVE-2024-23857.json new file mode 100644 index 00000000000..e6d045a1f35 --- /dev/null +++ b/2024/23xxx/CVE-2024-23857.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23857", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23858.json b/2024/23xxx/CVE-2024-23858.json new file mode 100644 index 00000000000..777b505c9b5 --- /dev/null +++ b/2024/23xxx/CVE-2024-23858.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23858", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23859.json b/2024/23xxx/CVE-2024-23859.json new file mode 100644 index 00000000000..324202b698d --- /dev/null +++ b/2024/23xxx/CVE-2024-23859.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23859", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23860.json b/2024/23xxx/CVE-2024-23860.json new file mode 100644 index 00000000000..04857b0fd5a --- /dev/null +++ b/2024/23xxx/CVE-2024-23860.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23860", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23861.json b/2024/23xxx/CVE-2024-23861.json new file mode 100644 index 00000000000..4d978f3a9ac --- /dev/null +++ b/2024/23xxx/CVE-2024-23861.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23861", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23862.json b/2024/23xxx/CVE-2024-23862.json new file mode 100644 index 00000000000..31047b0c834 --- /dev/null +++ b/2024/23xxx/CVE-2024-23862.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23862", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23863.json b/2024/23xxx/CVE-2024-23863.json new file mode 100644 index 00000000000..8062f17c4b5 --- /dev/null +++ b/2024/23xxx/CVE-2024-23863.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23863", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23864.json b/2024/23xxx/CVE-2024-23864.json new file mode 100644 index 00000000000..fae124dfeaf --- /dev/null +++ b/2024/23xxx/CVE-2024-23864.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23864", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23865.json b/2024/23xxx/CVE-2024-23865.json new file mode 100644 index 00000000000..96989fdeb2e --- /dev/null +++ b/2024/23xxx/CVE-2024-23865.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23865", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23866.json b/2024/23xxx/CVE-2024-23866.json new file mode 100644 index 00000000000..1b50b21a624 --- /dev/null +++ b/2024/23xxx/CVE-2024-23866.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23866", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23867.json b/2024/23xxx/CVE-2024-23867.json new file mode 100644 index 00000000000..64551177030 --- /dev/null +++ b/2024/23xxx/CVE-2024-23867.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23867", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23868.json b/2024/23xxx/CVE-2024-23868.json new file mode 100644 index 00000000000..06e56da336f --- /dev/null +++ b/2024/23xxx/CVE-2024-23868.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23868", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23869.json b/2024/23xxx/CVE-2024-23869.json new file mode 100644 index 00000000000..ac7faa35404 --- /dev/null +++ b/2024/23xxx/CVE-2024-23869.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23869", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23870.json b/2024/23xxx/CVE-2024-23870.json new file mode 100644 index 00000000000..904c390b7f3 --- /dev/null +++ b/2024/23xxx/CVE-2024-23870.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23870", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23871.json b/2024/23xxx/CVE-2024-23871.json new file mode 100644 index 00000000000..4f55c7e1dfb --- /dev/null +++ b/2024/23xxx/CVE-2024-23871.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23871", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23872.json b/2024/23xxx/CVE-2024-23872.json new file mode 100644 index 00000000000..e8f84840920 --- /dev/null +++ b/2024/23xxx/CVE-2024-23872.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23872", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23873.json b/2024/23xxx/CVE-2024-23873.json new file mode 100644 index 00000000000..224738781bd --- /dev/null +++ b/2024/23xxx/CVE-2024-23873.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23873", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23874.json b/2024/23xxx/CVE-2024-23874.json new file mode 100644 index 00000000000..1a5e0236e3f --- /dev/null +++ b/2024/23xxx/CVE-2024-23874.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23874", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23875.json b/2024/23xxx/CVE-2024-23875.json new file mode 100644 index 00000000000..53ff13f9a51 --- /dev/null +++ b/2024/23xxx/CVE-2024-23875.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23875", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23876.json b/2024/23xxx/CVE-2024-23876.json new file mode 100644 index 00000000000..c418ef67839 --- /dev/null +++ b/2024/23xxx/CVE-2024-23876.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23876", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23877.json b/2024/23xxx/CVE-2024-23877.json new file mode 100644 index 00000000000..f1e5d5bae6f --- /dev/null +++ b/2024/23xxx/CVE-2024-23877.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23877", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23878.json b/2024/23xxx/CVE-2024-23878.json new file mode 100644 index 00000000000..c391009749f --- /dev/null +++ b/2024/23xxx/CVE-2024-23878.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23878", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23879.json b/2024/23xxx/CVE-2024-23879.json new file mode 100644 index 00000000000..7284795a983 --- /dev/null +++ b/2024/23xxx/CVE-2024-23879.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23879", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23880.json b/2024/23xxx/CVE-2024-23880.json new file mode 100644 index 00000000000..ab5b44419eb --- /dev/null +++ b/2024/23xxx/CVE-2024-23880.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23880", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23881.json b/2024/23xxx/CVE-2024-23881.json new file mode 100644 index 00000000000..6480bb1e1fd --- /dev/null +++ b/2024/23xxx/CVE-2024-23881.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23881", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23882.json b/2024/23xxx/CVE-2024-23882.json new file mode 100644 index 00000000000..1df6fb44932 --- /dev/null +++ b/2024/23xxx/CVE-2024-23882.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23882", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23883.json b/2024/23xxx/CVE-2024-23883.json new file mode 100644 index 00000000000..42ee74c5548 --- /dev/null +++ b/2024/23xxx/CVE-2024-23883.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23883", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23884.json b/2024/23xxx/CVE-2024-23884.json new file mode 100644 index 00000000000..d2627e8b394 --- /dev/null +++ b/2024/23xxx/CVE-2024-23884.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23884", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23885.json b/2024/23xxx/CVE-2024-23885.json new file mode 100644 index 00000000000..784a20c1077 --- /dev/null +++ b/2024/23xxx/CVE-2024-23885.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23885", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23886.json b/2024/23xxx/CVE-2024-23886.json new file mode 100644 index 00000000000..7192bb00e05 --- /dev/null +++ b/2024/23xxx/CVE-2024-23886.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23886", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23887.json b/2024/23xxx/CVE-2024-23887.json new file mode 100644 index 00000000000..743f25a4e94 --- /dev/null +++ b/2024/23xxx/CVE-2024-23887.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23887", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23888.json b/2024/23xxx/CVE-2024-23888.json new file mode 100644 index 00000000000..d3c08a900ca --- /dev/null +++ b/2024/23xxx/CVE-2024-23888.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23888", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23889.json b/2024/23xxx/CVE-2024-23889.json new file mode 100644 index 00000000000..8535347663f --- /dev/null +++ b/2024/23xxx/CVE-2024-23889.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23889", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23890.json b/2024/23xxx/CVE-2024-23890.json new file mode 100644 index 00000000000..54914d452a0 --- /dev/null +++ b/2024/23xxx/CVE-2024-23890.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23890", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23891.json b/2024/23xxx/CVE-2024-23891.json new file mode 100644 index 00000000000..690a66bad4e --- /dev/null +++ b/2024/23xxx/CVE-2024-23891.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23891", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23892.json b/2024/23xxx/CVE-2024-23892.json new file mode 100644 index 00000000000..4de787a589f --- /dev/null +++ b/2024/23xxx/CVE-2024-23892.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23892", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23893.json b/2024/23xxx/CVE-2024-23893.json new file mode 100644 index 00000000000..5d4378340f6 --- /dev/null +++ b/2024/23xxx/CVE-2024-23893.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23893", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23894.json b/2024/23xxx/CVE-2024-23894.json new file mode 100644 index 00000000000..c92b2a4f9a7 --- /dev/null +++ b/2024/23xxx/CVE-2024-23894.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23894", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23895.json b/2024/23xxx/CVE-2024-23895.json new file mode 100644 index 00000000000..7eb6f4f29cf --- /dev/null +++ b/2024/23xxx/CVE-2024-23895.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23895", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23896.json b/2024/23xxx/CVE-2024-23896.json new file mode 100644 index 00000000000..7bc6669e1a6 --- /dev/null +++ b/2024/23xxx/CVE-2024-23896.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23896", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file