"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-04-11 20:01:11 +00:00
parent aa04ba2f98
commit 4ff3710f69
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
98 changed files with 374 additions and 107 deletions

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "C300 information leak due to an analysis feature which allows extracting more memory over the network than required by the function."
"value": "C300 information leak due to an analysis feature which allows extracting more memory over the network than required by the function.\u00a0Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. \n\n"
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "Server receiving a malformed message that where the GCL message hostname may be too large which may cause a stack overflow; resulting in possible remote code execution."
"value": "Server receiving a malformed message that where the GCL message hostname may be too large which may cause a stack overflow; resulting in possible remote code execution.\u00a0Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. \n\n"
}
]
},

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
"value": "CWE-125: Out-of-bounds Read",
"cweId": "CWE-125"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
"value": "CWE-125: Out-of-bounds Read",
"cweId": "CWE-125"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Denial of Service"
"value": "CWE-476: NULL Pointer Dereference",
"cweId": "CWE-476"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
"value": "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')",
"cweId": "CWE-843"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
"value": "CWE-822: Untrusted Pointer Dereference",
"cweId": "CWE-822"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
"value": "CWE-822: Untrusted Pointer Dereference",
"cweId": "CWE-822"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')",
"cweId": "CWE-77"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')",
"cweId": "CWE-77"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Spoofing"
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
"value": "CWE-822: Untrusted Pointer Dereference",
"cweId": "CWE-822"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
"value": "CWE-416: Use After Free",
"cweId": "CWE-416"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-822: Untrusted Pointer Dereference",
"cweId": "CWE-822"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
"value": "CWE-416: Use After Free",
"cweId": "CWE-416"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Denial of Service"
"value": "CWE-20: Improper Input Validation",
"cweId": "CWE-20"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
"value": "CWE-591: Sensitive Data Storage in Improperly Locked Memory",
"cweId": "CWE-591"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Denial of Service"
"value": "CWE-125: Out-of-bounds Read",
"cweId": "CWE-125"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Spoofing"
"value": "CWE-310: Cryptographic Issues",
"cweId": "CWE-310"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
"value": "CWE-125: Out-of-bounds Read",
"cweId": "CWE-125"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
"value": "CWE-326: Inadequate Encryption Strength",
"cweId": "CWE-326"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
"value": "CWE-908: Use of Uninitialized Resource",
"cweId": "CWE-908"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
"value": "CWE-284: Improper Access Control",
"cweId": "CWE-284"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "Windows Libarchive Remote Code Execution Vulnerability"
"value": "Windows libarchive Remote Code Execution Vulnerability"
}
]
},
@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "Windows Libarchive Remote Code Execution Vulnerability"
"value": "Windows libarchive Remote Code Execution Vulnerability"
}
]
},
@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
"value": "CWE-190: Integer Overflow or Wraparound",
"cweId": "CWE-190"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
"cweId": "CWE-362"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-416: Use After Free",
"cweId": "CWE-416"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
"value": "CWE-191: Integer Underflow (Wrap or Wraparound)",
"cweId": "CWE-191"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
"value": "CWE-197: Numeric Truncation Error",
"cweId": "CWE-197"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
"value": "CWE-125: Out-of-bounds Read",
"cweId": "CWE-125"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Denial of Service"
"value": "CWE-20: Improper Input Validation",
"cweId": "CWE-20"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
"value": "CWE-209: Generation of Error Message Containing Sensitive Information",
"cweId": "CWE-209"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
"value": "CWE-125: Out-of-bounds Read",
"cweId": "CWE-125"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
"value": "CWE-20: Improper Input Validation",
"cweId": "CWE-20"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Security Feature Bypass"
"value": "CWE-20: Improper Input Validation",
"cweId": "CWE-20"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-502: Deserialization of Untrusted Data",
"cweId": "CWE-502"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Denial of Service"
"value": "CWE-20: Improper Input Validation",
"cweId": "CWE-20"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Spoofing"
"value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
"cweId": "CWE-200"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-426: Untrusted Search Path",
"cweId": "CWE-426"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Spoofing"
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Spoofing"
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
"value": "CWE-59: Improper Link Resolution Before File Access ('Link Following')",
"cweId": "CWE-59"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
"value": "CWE-822: Untrusted Pointer Dereference",
"cweId": "CWE-822"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-416: Use After Free",
"cweId": "CWE-416"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
"value": "CWE-126: Buffer Over-read",
"cweId": "CWE-126"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Denial of Service"
"value": "CWE-400: Uncontrolled Resource Consumption",
"cweId": "CWE-400"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Denial of Service"
"value": "CWE-125: Out-of-bounds Read",
"cweId": "CWE-125"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Denial of Service"
"value": "CWE-125: Out-of-bounds Read",
"cweId": "CWE-125"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
"value": "CWE-822: Untrusted Pointer Dereference",
"cweId": "CWE-822"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Denial of Service"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-190: Integer Overflow or Wraparound",
"cweId": "CWE-190"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-197: Numeric Truncation Error",
"cweId": "CWE-197"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
"value": "CWE-591: Sensitive Data Storage in Improperly Locked Memory",
"cweId": "CWE-591"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Denial of Service"
"value": "CWE-476: NULL Pointer Dereference",
"cweId": "CWE-476"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')",
"cweId": "CWE-843"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Security Feature Bypass"
"value": "CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition",
"cweId": "CWE-367"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')",
"cweId": "CWE-843"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
"value": "CWE-284: Improper Access Control",
"cweId": "CWE-284"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
"value": "CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition",
"cweId": "CWE-367"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-190: Integer Overflow or Wraparound",
"cweId": "CWE-190"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
"value": "CWE-20: Improper Input Validation",
"cweId": "CWE-20"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-416: Use After Free",
"cweId": "CWE-416"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-284: Improper Access Control",
"cweId": "CWE-284"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
"value": "CWE-197: Numeric Truncation Error",
"cweId": "CWE-197"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-94: Improper Control of Generation of Code ('Code Injection')",
"cweId": "CWE-94"
}
]
}
@ -102,8 +103,8 @@
{
"version": "3.1",
"baseSeverity": "HIGH",
"baseScore": 8,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"
"baseScore": 8.8,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-190: Integer Overflow or Wraparound",
"cweId": "CWE-190"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
"value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
"cweId": "CWE-200"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Spoofing"
"value": "CWE-352: Cross-Site Request Forgery (CSRF)",
"cweId": "CWE-352"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-416: Use After Free",
"cweId": "CWE-416"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Denial of Service"
"value": "CWE-400: Uncontrolled Resource Consumption",
"cweId": "CWE-400"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Spoofing"
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}

View File

@ -21,7 +21,8 @@
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
"value": "CWE-197: Numeric Truncation Error",
"cweId": "CWE-197"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-22721",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2024-22721",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Cross Site Request Forgery (CSRF) vulnerability in Form Tools 3.1.1 allows attackers to manipulate sensitive user data via crafted link."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hakaisecurity.io/error-404-your-security-not-found-tales-of-web-vulnerabilities/",
"url": "https://hakaisecurity.io/error-404-your-security-not-found-tales-of-web-vulnerabilities/"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-29454",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2024-29454",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue discovered in packages or nodes in ROS2 Humble Hawksbill with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to execute arbitrary commands potentially leading to unauthorized system control, data breaches, system and network compromise, and operational disruption."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://github.com/yashpatelphd/CVE-2024-29454",
"url": "https://github.com/yashpatelphd/CVE-2024-29454"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-3670",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-3671",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-3672",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-3673",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-3674",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}