"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-01-24 02:00:34 +00:00
parent 98b4e4c90b
commit 49e6ac0213
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
5 changed files with 247 additions and 12 deletions

View File

@ -1,17 +1,105 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-21765",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Electronic Delivery Check System (Doboku) Ver.18.1.0 and earlier, Electronic Delivery Check System (Dentsu) Ver.12.1.0 and earlier, Electronic Delivery Check System (Kikai) Ver.10.1.0 and earlier, and Electronic delivery item Inspection Support SystemVer.4.0.31 and earlier improperly restrict XML external entity references (XXE). By processing a specially crafted XML file, arbitrary files on the system may be read by an attacker."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "XML external entities (XXE)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Ministry of Land, Infrastructure, Transport and Tourism, Japan",
"product": {
"product_data": [
{
"product_name": "Electronic Delivery Check System (Doboku)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Ver.18.1.0 and earlier"
}
]
}
},
{
"product_name": "Electronic Delivery Check System (Dentsu)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Ver.12.1.0 and earlier"
}
]
}
},
{
"product_name": "Electronic Delivery Check System (Kikai)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Ver.10.1.0 and earlier"
}
]
}
},
{
"product_name": "Electronic delivery item Inspection Support System",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Ver.4.0.31 and earlier"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://www.cals-ed.go.jp/checksys-release-20231130/",
"refsource": "MISC",
"name": "http://www.cals-ed.go.jp/checksys-release-20231130/"
},
{
"url": "https://www.ysk.nilim.go.jp/cals/",
"refsource": "MISC",
"name": "https://www.ysk.nilim.go.jp/cals/"
},
{
"url": "https://jvn.jp/en/jp/JVN77736613/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN77736613/"
}
]
}

View File

@ -1,17 +1,78 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-21796",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Electronic Deliverables Creation Support Tool (Construction Edition) prior to Ver1.0.4 and Electronic Deliverables Creation Support Tool (Design & Survey Edition) prior to Ver1.0.4 improperly restrict XML external entity references (XXE). By processing a specially crafted XML file, arbitrary files on the system may be read by an attacker."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "XML external entities (XXE)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Ministry of Defense",
"product": {
"product_data": [
{
"product_name": "Electronic Deliverables Creation Support Tool (Construction Edition)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "prior to Ver1.0.4"
}
]
}
},
{
"product_name": "Electronic Deliverables Creation Support Tool (Design & Survey Edition)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "prior to Ver1.0.4"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.dfeg.mod.go.jp/hp/contents-dfis/tool.html",
"refsource": "MISC",
"name": "https://www.dfeg.mod.go.jp/hp/contents-dfis/tool.html"
},
{
"url": "https://jvn.jp/en/jp/JVN40049211/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN40049211/"
}
]
}

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-22380",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Electronic Delivery Check System (Ministry of Agriculture, Forestry and Fisheries The Agriculture and Rural Development Project Version) March, Heisei 31 era edition Ver.14.0.001.002 and earlier improperly restricts XML external entity references (XXE). By processing a specially crafted XML file, arbitrary files on the system may be read by an attacker."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "XML external entities (XXE)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Ministry of Agriculture, Forestry and Fisheries",
"product": {
"product_data": [
{
"product_name": "Electronic Delivery Check System (Ministry of Agriculture, Forestry and Fisheries The Agriculture and Rural Development Project Version) March, Heisei 31 era edition",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Ver.14.0.001.002 and earlier"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.maff.go.jp/j/nousin/seko/nouhin_youryou/densi.html",
"refsource": "MISC",
"name": "https://www.maff.go.jp/j/nousin/seko/nouhin_youryou/densi.html"
},
{
"url": "https://jvn.jp/en/jp/JVN01434915/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN01434915/"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-23940",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-23941",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}