From 45db265ed9f364177cdc4a07652ec469000a0f99 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 29 Apr 2024 04:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/4xxx/CVE-2023-4692.json | 5 ++ 2023/4xxx/CVE-2023-4693.json | 5 ++ 2024/1xxx/CVE-2024-1874.json | 133 +++++++++++++++++++++++++++++++++-- 2024/2xxx/CVE-2024-2756.json | 107 ++++++++++++++++++++++++++-- 2024/2xxx/CVE-2024-2757.json | 85 ++++++++++++++++++++-- 2024/3xxx/CVE-2024-3096.json | 120 +++++++++++++++++++++++++++++-- 2024/4xxx/CVE-2024-4299.json | 105 +++++++++++++++++++++++++-- 2024/4xxx/CVE-2024-4300.json | 103 +++++++++++++++++++++++++++ 2024/4xxx/CVE-2024-4301.json | 18 +++++ 2024/4xxx/CVE-2024-4302.json | 18 +++++ 2024/4xxx/CVE-2024-4303.json | 18 +++++ 11 files changed, 697 insertions(+), 20 deletions(-) create mode 100644 2024/4xxx/CVE-2024-4300.json create mode 100644 2024/4xxx/CVE-2024-4301.json create mode 100644 2024/4xxx/CVE-2024-4302.json create mode 100644 2024/4xxx/CVE-2024-4303.json diff --git a/2023/4xxx/CVE-2023-4692.json b/2023/4xxx/CVE-2023-4692.json index 8afe763c01e..a86b8c71f19 100644 --- a/2023/4xxx/CVE-2023-4692.json +++ b/2023/4xxx/CVE-2023-4692.json @@ -121,6 +121,11 @@ "url": "https://security.netapp.com/advisory/ntap-20231208-0002/", "refsource": "MISC", "name": "https://security.netapp.com/advisory/ntap-20231208-0002/" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUU42E7CPYLATXOYVYNW6YTXXULAOV6L/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUU42E7CPYLATXOYVYNW6YTXXULAOV6L/" } ] }, diff --git a/2023/4xxx/CVE-2023-4693.json b/2023/4xxx/CVE-2023-4693.json index 9e6d4a175ac..35a359c9357 100644 --- a/2023/4xxx/CVE-2023-4693.json +++ b/2023/4xxx/CVE-2023-4693.json @@ -121,6 +121,11 @@ "url": "https://security.netapp.com/advisory/ntap-20231208-0002/", "refsource": "MISC", "name": "https://security.netapp.com/advisory/ntap-20231208-0002/" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUU42E7CPYLATXOYVYNW6YTXXULAOV6L/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUU42E7CPYLATXOYVYNW6YTXXULAOV6L/" } ] }, diff --git a/2024/1xxx/CVE-2024-1874.json b/2024/1xxx/CVE-2024-1874.json index 8e42bdd23a1..ca5e1cf1a89 100644 --- a/2024/1xxx/CVE-2024-1874.json +++ b/2024/1xxx/CVE-2024-1874.json @@ -1,17 +1,142 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-1874", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@php.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.\u00a0\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-116 Improper Encoding or Escaping of Output", + "cweId": "CWE-116" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "PHP Group", + "product": { + "product_data": [ + { + "product_name": "PHP", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "8.1.28", + "status": "affected", + "version": "8.1.*", + "versionType": "semver" + }, + { + "lessThan": "8.2.18", + "status": "affected", + "version": "8.2.*", + "versionType": "semver" + }, + { + "lessThan": "8.3.5", + "status": "affected", + "version": "8.3.*", + "versionType": "semver" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7", + "refsource": "MISC", + "name": "https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "https://github.com/php/php-src/security/advisories/GHSA-pc52-254", + "discovery": "EXTERNAL" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "This problem only present in Windows versions of PHP. " + } + ], + "value": "This problem only present in Windows versions of PHP.\u00a0" + } + ], + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Using proc_open() string syntax avoids the problem. " + } + ], + "value": "Using proc_open() string syntax avoids the problem.\u00a0" + } + ], + "credits": [ + { + "lang": "en", + "value": "RyotaK" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 9.4, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "version": "3.1" } ] } diff --git a/2024/2xxx/CVE-2024-2756.json b/2024/2xxx/CVE-2024-2756.json index 54f7b038e0e..d021d10ce86 100644 --- a/2024/2xxx/CVE-2024-2756.json +++ b/2024/2xxx/CVE-2024-2756.json @@ -1,17 +1,116 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-2756", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@php.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Due to an incomplete fix to CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host-\u00a0or __Secure-\u00a0cookie by PHP applications.\u00a0\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "PHP Group", + "product": { + "product_data": [ + { + "product_name": "PHP", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "8.1.28", + "status": "affected", + "version": "8.1.*", + "versionType": "semver" + }, + { + "lessThan": "8.2.18", + "status": "affected", + "version": "8.2.*", + "versionType": "semver" + }, + { + "lessThan": "8.3.5", + "status": "affected", + "version": "8.3.*", + "versionType": "semver" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4", + "refsource": "MISC", + "name": "https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5", + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Marco Squarcina" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "version": "3.1" } ] } diff --git a/2024/2xxx/CVE-2024-2757.json b/2024/2xxx/CVE-2024-2757.json index a2e54327e8b..fa22990fe62 100644 --- a/2024/2xxx/CVE-2024-2757.json +++ b/2024/2xxx/CVE-2024-2757.json @@ -1,17 +1,94 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-2757", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@php.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In PHP 8.3.* before 8.3.5, function\u00a0mb_encode_mimeheader() runs endlessly for some inputs that contain long strings of non-space characters followed by a space. This could lead to a potential DoS attack if a hostile user sends data to an application that uses this function.\u00a0\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "PHP Group", + "product": { + "product_data": [ + { + "product_name": "PHP", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "8.3.*", + "version_value": "8.3.5" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/php/php-src/security/advisories/GHSA-fjp9-9hwx-59fq", + "refsource": "MISC", + "name": "https://github.com/php/php-src/security/advisories/GHSA-fjp9-9hwx-59fq" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "https://github.com/php/php-src/security/advisories/GHSA-fjp9-9hw", + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Benjamin Gehrels" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/3xxx/CVE-2024-3096.json b/2024/3xxx/CVE-2024-3096.json index 6f7197ded3f..06207394df1 100644 --- a/2024/3xxx/CVE-2024-3096.json +++ b/2024/3xxx/CVE-2024-3096.json @@ -1,17 +1,129 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-3096", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@php.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In PHP\u00a0 version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if\u00a0a password stored with password_hash() starts with a null byte (\\x00), testing a blank string as the password via password_verify() will incorrectly return true.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "PHP Group", + "product": { + "product_data": [ + { + "product_name": "PHP", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "8.1.28", + "status": "affected", + "version": "8.1.*", + "versionType": "semver" + }, + { + "lessThan": "8.2.18", + "status": "affected", + "version": "8.2.*", + "versionType": "semver" + }, + { + "lessThan": "8.3.5", + "status": "affected", + "version": "8.3.*", + "versionType": "semver" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/php/php-src/security/advisories/GHSA-h746-cjrr-wfmr", + "refsource": "MISC", + "name": "https://github.com/php/php-src/security/advisories/GHSA-h746-cjrr-wfmr" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "https://github.com/php/php-src/security/advisories/GHSA-h746-cjr", + "discovery": "EXTERNAL" + }, + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Pre-filter potential password strings to ensure they do not contain NUL bytes. " + } + ], + "value": "Pre-filter potential password strings to ensure they do not contain NUL bytes.\u00a0" + } + ], + "credits": [ + { + "lang": "en", + "value": "Eric Stern" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/4xxx/CVE-2024-4299.json b/2024/4xxx/CVE-2024-4299.json index 988d643945c..c2e6390dbb3 100644 --- a/2024/4xxx/CVE-2024-4299.json +++ b/2024/4xxx/CVE-2024-4299.json @@ -1,17 +1,114 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-4299", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@cert.org.tw", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSherock, AuditSherlock) fails to filter special characters in certain function parameters, allowing remote attackers with administrative privileges to exploit this vulnerability for Command Injection attacks, enabling execution of arbitrary system commands." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", + "cweId": "CWE-78" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "HGiga ", + "product": { + "product_data": [ + { + "product_name": "iSherlock 4.5", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "earlier", + "version_value": "4.5-147" + } + ] + } + }, + { + "product_name": "iSherlock 5.5", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "earlier", + "version_value": "5.5-147" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.twcert.org.tw/tw/cp-132-7771-36c50-1.html", + "refsource": "MISC", + "name": "https://www.twcert.org.tw/tw/cp-132-7771-36c50-1.html" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "\tTVN-202404010", + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update the iSherlock-sysinfo package to version 4.5-147 or later for iSherlock 4.5, and to version 5.5-147 or later for iSherlock 5.5." + } + ], + "value": "Update the iSherlock-sysinfo package to version 4.5-147 or later for iSherlock 4.5, and to version 5.5-147 or later for iSherlock 5.5." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/4xxx/CVE-2024-4300.json b/2024/4xxx/CVE-2024-4300.json new file mode 100644 index 00000000000..8fdec26c042 --- /dev/null +++ b/2024/4xxx/CVE-2024-4300.json @@ -0,0 +1,103 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2024-4300", + "ASSIGNER": "cve@cert.org.tw", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "E-WEBInformationCo. FS-EZViewer(Web) exposes sensitive information in the service. A remote attacker can obtain the database configuration file path through the webpage source code without login. Accessing this path allows attacker to obtain the database credential with the highest privilege and database host IP address. With this information, attackers can connect to the database and perform actions such as adding, modifying, or deleting database contents." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", + "cweId": "CWE-200" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "E-WEBInformationCo.", + "product": { + "product_data": [ + { + "product_name": "FS-EZViewer(Web)", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "earlier", + "version_value": "10.4.0.x" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.twcert.org.tw/tw/cp-132-7774-fbd01-1.html", + "refsource": "MISC", + "name": "https://www.twcert.org.tw/tw/cp-132-7774-fbd01-1.html" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "\tTVN-202404011", + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 10.4.1.0 or later version" + } + ], + "value": "Update to 10.4.1.0 or later version" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4301.json b/2024/4xxx/CVE-2024-4301.json new file mode 100644 index 00000000000..cd969326eed --- /dev/null +++ b/2024/4xxx/CVE-2024-4301.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4301", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4302.json b/2024/4xxx/CVE-2024-4302.json new file mode 100644 index 00000000000..952e38d1b9d --- /dev/null +++ b/2024/4xxx/CVE-2024-4302.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4302", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4303.json b/2024/4xxx/CVE-2024-4303.json new file mode 100644 index 00000000000..8ccf427a7e8 --- /dev/null +++ b/2024/4xxx/CVE-2024-4303.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4303", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file