From 588914bd6bfdfb0043200ba1f43059dc52e38123 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 12 Dec 2024 16:01:00 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/12xxx/CVE-2024-12573.json | 18 +++++ 2024/12xxx/CVE-2024-12574.json | 18 +++++ 2024/12xxx/CVE-2024-12575.json | 18 +++++ 2024/12xxx/CVE-2024-12576.json | 18 +++++ 2024/12xxx/CVE-2024-12577.json | 18 +++++ 2024/12xxx/CVE-2024-12578.json | 18 +++++ 2024/12xxx/CVE-2024-12579.json | 18 +++++ 2024/50xxx/CVE-2024-50018.json | 89 +------------------- 2024/50xxx/CVE-2024-50089.json | 143 +-------------------------------- 2024/53xxx/CVE-2024-53102.json | 100 +---------------------- 2024/54xxx/CVE-2024-54842.json | 56 +++++++++++-- 2024/55xxx/CVE-2024-55099.json | 56 +++++++++++-- 2024/55xxx/CVE-2024-55885.json | 18 +++++ 2024/55xxx/CVE-2024-55886.json | 18 +++++ 2024/55xxx/CVE-2024-55887.json | 18 +++++ 2024/55xxx/CVE-2024-55888.json | 18 +++++ 2024/55xxx/CVE-2024-55889.json | 18 +++++ 2024/55xxx/CVE-2024-55890.json | 18 +++++ 2024/55xxx/CVE-2024-55891.json | 18 +++++ 2024/55xxx/CVE-2024-55892.json | 18 +++++ 2024/55xxx/CVE-2024-55893.json | 18 +++++ 2024/55xxx/CVE-2024-55894.json | 18 +++++ 22 files changed, 412 insertions(+), 338 deletions(-) create mode 100644 2024/12xxx/CVE-2024-12573.json create mode 100644 2024/12xxx/CVE-2024-12574.json create mode 100644 2024/12xxx/CVE-2024-12575.json create mode 100644 2024/12xxx/CVE-2024-12576.json create mode 100644 2024/12xxx/CVE-2024-12577.json create mode 100644 2024/12xxx/CVE-2024-12578.json create mode 100644 2024/12xxx/CVE-2024-12579.json create mode 100644 2024/55xxx/CVE-2024-55885.json create mode 100644 2024/55xxx/CVE-2024-55886.json create mode 100644 2024/55xxx/CVE-2024-55887.json create mode 100644 2024/55xxx/CVE-2024-55888.json create mode 100644 2024/55xxx/CVE-2024-55889.json create mode 100644 2024/55xxx/CVE-2024-55890.json create mode 100644 2024/55xxx/CVE-2024-55891.json create mode 100644 2024/55xxx/CVE-2024-55892.json create mode 100644 2024/55xxx/CVE-2024-55893.json create mode 100644 2024/55xxx/CVE-2024-55894.json diff --git a/2024/12xxx/CVE-2024-12573.json b/2024/12xxx/CVE-2024-12573.json new file mode 100644 index 00000000000..91b4cefe0cf --- /dev/null +++ b/2024/12xxx/CVE-2024-12573.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12573", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/12xxx/CVE-2024-12574.json b/2024/12xxx/CVE-2024-12574.json new file mode 100644 index 00000000000..a729d636100 --- /dev/null +++ b/2024/12xxx/CVE-2024-12574.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12574", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/12xxx/CVE-2024-12575.json b/2024/12xxx/CVE-2024-12575.json new file mode 100644 index 00000000000..9c6b69f4715 --- /dev/null +++ b/2024/12xxx/CVE-2024-12575.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12575", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/12xxx/CVE-2024-12576.json b/2024/12xxx/CVE-2024-12576.json new file mode 100644 index 00000000000..6af66ef3928 --- /dev/null +++ b/2024/12xxx/CVE-2024-12576.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12576", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/12xxx/CVE-2024-12577.json b/2024/12xxx/CVE-2024-12577.json new file mode 100644 index 00000000000..f655fded93b --- /dev/null +++ b/2024/12xxx/CVE-2024-12577.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12577", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/12xxx/CVE-2024-12578.json b/2024/12xxx/CVE-2024-12578.json new file mode 100644 index 00000000000..1228848c245 --- /dev/null +++ b/2024/12xxx/CVE-2024-12578.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12578", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/12xxx/CVE-2024-12579.json b/2024/12xxx/CVE-2024-12579.json new file mode 100644 index 00000000000..8a0c168e581 --- /dev/null +++ b/2024/12xxx/CVE-2024-12579.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12579", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/50xxx/CVE-2024-50018.json b/2024/50xxx/CVE-2024-50018.json index 2b4e711f332..0e36cf5c5f6 100644 --- a/2024/50xxx/CVE-2024-50018.json +++ b/2024/50xxx/CVE-2024-50018.json @@ -5,99 +5,14 @@ "CVE_data_meta": { "ID": "CVE-2024-50018", "ASSIGNER": "cve@kernel.org", - "STATE": "PUBLIC" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: napi: Prevent overflow of napi_defer_hard_irqs\n\nIn commit 6f8b12d661d0 (\"net: napi: add hard irqs deferral feature\")\nnapi_defer_irqs was added to net_device and napi_defer_irqs_count was\nadded to napi_struct, both as type int.\n\nThis value never goes below zero, so there is not reason for it to be a\nsigned int. Change the type for both from int to u32, and add an\noverflow check to sysfs to limit the value to S32_MAX.\n\nThe limit of S32_MAX was chosen because the practical limit before this\npatch was S32_MAX (anything larger was an overflow) and thus there are\nno behavioral changes introduced. If the extra bit is needed in the\nfuture, the limit can be raised.\n\nBefore this patch:\n\n$ sudo bash -c 'echo 2147483649 > /sys/class/net/eth4/napi_defer_hard_irqs'\n$ cat /sys/class/net/eth4/napi_defer_hard_irqs\n-2147483647\n\nAfter this patch:\n\n$ sudo bash -c 'echo 2147483649 > /sys/class/net/eth4/napi_defer_hard_irqs'\nbash: line 0: echo: write error: Numerical result out of range\n\nSimilarly, /sys/class/net/XXXXX/tx_queue_len is defined as unsigned:\n\ninclude/linux/netdevice.h: unsigned int tx_queue_len;\n\nAnd has an overflow check:\n\ndev_change_tx_queue_len(..., unsigned long new_len):\n\n if (new_len != (unsigned int)new_len)\n return -ERANGE;" + "value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Linux", - "product": { - "product_data": [ - { - "product_name": "Linux", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "1da177e4c3f4", - "version_value": "d694ad8b7e50" - }, - { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "versions": [ - { - "version": "6.10.14", - "lessThanOrEqual": "6.10.*", - "status": "unaffected", - "versionType": "semver" - }, - { - "version": "6.11.3", - "lessThanOrEqual": "6.11.*", - "status": "unaffected", - "versionType": "semver" - }, - { - "version": "6.12", - "lessThanOrEqual": "*", - "status": "unaffected", - "versionType": "original_commit_for_fix" - } - ], - "defaultStatus": "affected" - } - } - ] - } - } - ] - } - } - ] - } - }, - "references": { - "reference_data": [ - { - "url": "https://git.kernel.org/stable/c/d694ad8b7e5004df86ecd415cb2320d543723672", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/d694ad8b7e5004df86ecd415cb2320d543723672" - }, - { - "url": "https://git.kernel.org/stable/c/5e753b743d3b38a3e10be666c32c5434423d0093", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/5e753b743d3b38a3e10be666c32c5434423d0093" - }, - { - "url": "https://git.kernel.org/stable/c/08062af0a52107a243f7608fd972edb54ca5b7f8", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/08062af0a52107a243f7608fd972edb54ca5b7f8" - } - ] - }, - "generator": { - "engine": "bippy-8e903de6a542" } } \ No newline at end of file diff --git a/2024/50xxx/CVE-2024-50089.json b/2024/50xxx/CVE-2024-50089.json index b26ddf27dca..218269c98ba 100644 --- a/2024/50xxx/CVE-2024-50089.json +++ b/2024/50xxx/CVE-2024-50089.json @@ -5,153 +5,14 @@ "CVE_data_meta": { "ID": "CVE-2024-50089", "ASSIGNER": "cve@kernel.org", - "STATE": "PUBLIC" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nunicode: Don't special case ignorable code points\n\nWe don't need to handle them separately. Instead, just let them\ndecompose/casefold to themselves." + "value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Linux", - "product": { - "product_data": [ - { - "product_name": "Linux", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "955405d1174e", - "version_value": "18b5f47e7da4" - }, - { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "versions": [ - { - "version": "5.2", - "status": "affected" - }, - { - "version": "0", - "lessThan": "5.2", - "status": "unaffected", - "versionType": "semver" - }, - { - "version": "5.4.285", - "lessThanOrEqual": "5.4.*", - "status": "unaffected", - "versionType": "semver" - }, - { - "version": "5.10.227", - "lessThanOrEqual": "5.10.*", - "status": "unaffected", - "versionType": "semver" - }, - { - "version": "5.15.168", - "lessThanOrEqual": "5.15.*", - "status": "unaffected", - "versionType": "semver" - }, - { - "version": "6.1.113", - "lessThanOrEqual": "6.1.*", - "status": "unaffected", - "versionType": "semver" - }, - { - "version": "6.6.57", - "lessThanOrEqual": "6.6.*", - "status": "unaffected", - "versionType": "semver" - }, - { - "version": "6.11.4", - "lessThanOrEqual": "6.11.*", - "status": "unaffected", - "versionType": "semver" - }, - { - "version": "6.12", - "lessThanOrEqual": "*", - "status": "unaffected", - "versionType": "original_commit_for_fix" - } - ], - "defaultStatus": "affected" - } - } - ] - } - } - ] - } - } - ] - } - }, - "references": { - "reference_data": [ - { - "url": "https://git.kernel.org/stable/c/18b5f47e7da46d3a0d7331e48befcaf151ed2ddf", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/18b5f47e7da46d3a0d7331e48befcaf151ed2ddf" - }, - { - "url": "https://git.kernel.org/stable/c/39fffca572844d733b137a0ff9eacd67b9b0c8e3", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/39fffca572844d733b137a0ff9eacd67b9b0c8e3" - }, - { - "url": "https://git.kernel.org/stable/c/651b954cd8d5b0a358ceb47c93876bb6201224e4", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/651b954cd8d5b0a358ceb47c93876bb6201224e4" - }, - { - "url": "https://git.kernel.org/stable/c/21526498d25e54bda3c650f756493d63fd9131b7", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/21526498d25e54bda3c650f756493d63fd9131b7" - }, - { - "url": "https://git.kernel.org/stable/c/ac20736861f3c9c8e0a78273a4c57e9bcb0d8cc6", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/ac20736861f3c9c8e0a78273a4c57e9bcb0d8cc6" - }, - { - "url": "https://git.kernel.org/stable/c/876d3577a5b353e482d9228d45fa0d82bf1af53a", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/876d3577a5b353e482d9228d45fa0d82bf1af53a" - }, - { - "url": "https://git.kernel.org/stable/c/5c26d2f1d3f5e4be3e196526bead29ecb139cf91", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/5c26d2f1d3f5e4be3e196526bead29ecb139cf91" - } - ] - }, - "generator": { - "engine": "bippy-8e903de6a542" } } \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53102.json b/2024/53xxx/CVE-2024-53102.json index b8132695c62..399e9b46b61 100644 --- a/2024/53xxx/CVE-2024-53102.json +++ b/2024/53xxx/CVE-2024-53102.json @@ -5,110 +5,14 @@ "CVE_data_meta": { "ID": "CVE-2024-53102", "ASSIGNER": "cve@kernel.org", - "STATE": "PUBLIC" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme: make keep-alive synchronous operation\n\nThe nvme keep-alive operation, which executes at a periodic interval,\ncould potentially sneak in while shutting down a fabric controller.\nThis may lead to a race between the fabric controller admin queue\ndestroy code path (invoked while shutting down controller) and hw/hctx\nqueue dispatcher called from the nvme keep-alive async request queuing\noperation. This race could lead to the kernel crash shown below:\n\nCall Trace:\n autoremove_wake_function+0x0/0xbc (unreliable)\n __blk_mq_sched_dispatch_requests+0x114/0x24c\n blk_mq_sched_dispatch_requests+0x44/0x84\n blk_mq_run_hw_queue+0x140/0x220\n nvme_keep_alive_work+0xc8/0x19c [nvme_core]\n process_one_work+0x200/0x4e0\n worker_thread+0x340/0x504\n kthread+0x138/0x140\n start_kernel_thread+0x14/0x18\n\nWhile shutting down fabric controller, if nvme keep-alive request sneaks\nin then it would be flushed off. The nvme_keep_alive_end_io function is\nthen invoked to handle the end of the keep-alive operation which\ndecrements the admin->q_usage_counter and assuming this is the last/only\nrequest in the admin queue then the admin->q_usage_counter becomes zero.\nIf that happens then blk-mq destroy queue operation (blk_mq_destroy_\nqueue()) which could be potentially running simultaneously on another\ncpu (as this is the controller shutdown code path) would forward\nprogress and deletes the admin queue. So, now from this point onward\nwe are not supposed to access the admin queue resources. However the\nissue here's that the nvme keep-alive thread running hw/hctx queue\ndispatch operation hasn't yet finished its work and so it could still\npotentially access the admin queue resource while the admin queue had\nbeen already deleted and that causes the above crash.\n\nThis fix helps avoid the observed crash by implementing keep-alive as a\nsynchronous operation so that we decrement admin->q_usage_counter only\nafter keep-alive command finished its execution and returns the command\nstatus back up to its caller (blk_execute_rq()). This would ensure that\nfabric shutdown code path doesn't destroy the fabric admin queue until\nkeep-alive request finished execution and also keep-alive thread is not\nrunning hw/hctx queue dispatch operation." + "value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Linux", - "product": { - "product_data": [ - { - "product_name": "Linux", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "1da177e4c3f4", - "version_value": "afa229465399" - }, - { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "versions": [ - { - "version": "6.1.118", - "lessThanOrEqual": "6.1.*", - "status": "unaffected", - "versionType": "semver" - }, - { - "version": "6.6.62", - "lessThanOrEqual": "6.6.*", - "status": "unaffected", - "versionType": "semver" - }, - { - "version": "6.11.9", - "lessThanOrEqual": "6.11.*", - "status": "unaffected", - "versionType": "semver" - }, - { - "version": "6.12", - "lessThanOrEqual": "*", - "status": "unaffected", - "versionType": "original_commit_for_fix" - } - ], - "defaultStatus": "affected" - } - } - ] - } - } - ] - } - } - ] - } - }, - "references": { - "reference_data": [ - { - "url": "https://git.kernel.org/stable/c/afa229465399f89d3af9d72ced865144c9748846", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/afa229465399f89d3af9d72ced865144c9748846" - }, - { - "url": "https://git.kernel.org/stable/c/1a1bcca5c9efd2c72c8d2fcbadf2d673cceb2ea7", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/1a1bcca5c9efd2c72c8d2fcbadf2d673cceb2ea7" - }, - { - "url": "https://git.kernel.org/stable/c/ccc1d82dfaad0ad27d21139da22e57add73d2a5e", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/ccc1d82dfaad0ad27d21139da22e57add73d2a5e" - }, - { - "url": "https://git.kernel.org/stable/c/d06923670b5a5f609603d4a9fee4dec02d38de9c", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/d06923670b5a5f609603d4a9fee4dec02d38de9c" - } - ] - }, - "generator": { - "engine": "bippy-8e903de6a542" } } \ No newline at end of file diff --git a/2024/54xxx/CVE-2024-54842.json b/2024/54xxx/CVE-2024-54842.json index 1fb94103cf3..bf9e87378c5 100644 --- a/2024/54xxx/CVE-2024-54842.json +++ b/2024/54xxx/CVE-2024-54842.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-54842", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-54842", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A SQL injection vulnerability was found in phpgurukul Online Nurse Hiring System v1.0 in /admin/password-recovery.php via the mobileno parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/achchhelalchauhan/phpgurukul/blob/main/SQL%20injection%20ONHP-forgetpass-mobileno.pdf", + "refsource": "MISC", + "name": "https://github.com/achchhelalchauhan/phpgurukul/blob/main/SQL%20injection%20ONHP-forgetpass-mobileno.pdf" } ] } diff --git a/2024/55xxx/CVE-2024-55099.json b/2024/55xxx/CVE-2024-55099.json index 20c7dd05230..4a3821a49f5 100644 --- a/2024/55xxx/CVE-2024-55099.json +++ b/2024/55xxx/CVE-2024-55099.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-55099", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-55099", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A SQL Injection vulnerability was found in /admin/index.php in phpgurukul Online Nurse Hiring System v1.0, which allows remote attackers to execute arbitrary SQL commands to get unauthorized database access via the username parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/achchhelalchauhan/phpgurukul/blob/main/SQL%20injection%20ONHP-username.pdf", + "url": "https://github.com/achchhelalchauhan/phpgurukul/blob/main/SQL%20injection%20ONHP-username.pdf" } ] } diff --git a/2024/55xxx/CVE-2024-55885.json b/2024/55xxx/CVE-2024-55885.json new file mode 100644 index 00000000000..63024bc5732 --- /dev/null +++ b/2024/55xxx/CVE-2024-55885.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-55885", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/55xxx/CVE-2024-55886.json b/2024/55xxx/CVE-2024-55886.json new file mode 100644 index 00000000000..c1f47c1dbd7 --- /dev/null +++ b/2024/55xxx/CVE-2024-55886.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-55886", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/55xxx/CVE-2024-55887.json b/2024/55xxx/CVE-2024-55887.json new file mode 100644 index 00000000000..e84bc535d4d --- /dev/null +++ b/2024/55xxx/CVE-2024-55887.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-55887", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/55xxx/CVE-2024-55888.json b/2024/55xxx/CVE-2024-55888.json new file mode 100644 index 00000000000..e7fdc8dcaa2 --- /dev/null +++ b/2024/55xxx/CVE-2024-55888.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-55888", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/55xxx/CVE-2024-55889.json b/2024/55xxx/CVE-2024-55889.json new file mode 100644 index 00000000000..c49faabb44c --- /dev/null +++ b/2024/55xxx/CVE-2024-55889.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-55889", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/55xxx/CVE-2024-55890.json b/2024/55xxx/CVE-2024-55890.json new file mode 100644 index 00000000000..2d6487a6fc6 --- /dev/null +++ b/2024/55xxx/CVE-2024-55890.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-55890", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/55xxx/CVE-2024-55891.json b/2024/55xxx/CVE-2024-55891.json new file mode 100644 index 00000000000..185da80b438 --- /dev/null +++ b/2024/55xxx/CVE-2024-55891.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-55891", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/55xxx/CVE-2024-55892.json b/2024/55xxx/CVE-2024-55892.json new file mode 100644 index 00000000000..6757e773c6b --- /dev/null +++ b/2024/55xxx/CVE-2024-55892.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-55892", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/55xxx/CVE-2024-55893.json b/2024/55xxx/CVE-2024-55893.json new file mode 100644 index 00000000000..bb60ff3e691 --- /dev/null +++ b/2024/55xxx/CVE-2024-55893.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-55893", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/55xxx/CVE-2024-55894.json b/2024/55xxx/CVE-2024-55894.json new file mode 100644 index 00000000000..47c2a7722ad --- /dev/null +++ b/2024/55xxx/CVE-2024-55894.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-55894", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file