From 5ec1e17f8dc2d02a723f776c387247dc4953ac56 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 26 Apr 2024 20:01:05 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/48xxx/CVE-2022-48611.json | 54 +++++++++++++++++++++++++++--- 2024/24xxx/CVE-2024-24777.json | 18 ++++++++++ 2024/25xxx/CVE-2024-25343.json | 61 ++++++++++++++++++++++++++++++---- 2024/31xxx/CVE-2024-31152.json | 18 ++++++++++ 2024/32xxx/CVE-2024-32946.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33793.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33794.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33795.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33796.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33797.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33798.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33799.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33800.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33801.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33802.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33803.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33804.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33805.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33806.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33807.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33808.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33809.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33810.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33811.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33812.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33813.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33814.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33815.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33816.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33817.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33818.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33819.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33820.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33821.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33822.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33823.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33824.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33825.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33826.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33827.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33828.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33829.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33830.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33831.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33832.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33833.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33834.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33835.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33836.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33837.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33838.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33839.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33840.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33841.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33842.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33843.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33844.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33845.json | 18 ++++++++++ 2024/33xxx/CVE-2024-33846.json | 18 ++++++++++ 2024/4xxx/CVE-2024-4269.json | 18 ++++++++++ 2024/4xxx/CVE-2024-4270.json | 18 ++++++++++ 2024/4xxx/CVE-2024-4271.json | 18 ++++++++++ 2024/4xxx/CVE-2024-4272.json | 18 ++++++++++ 2024/4xxx/CVE-2024-4273.json | 18 ++++++++++ 2024/4xxx/CVE-2024-4274.json | 18 ++++++++++ 65 files changed, 1239 insertions(+), 10 deletions(-) create mode 100644 2024/24xxx/CVE-2024-24777.json create mode 100644 2024/31xxx/CVE-2024-31152.json create mode 100644 2024/32xxx/CVE-2024-32946.json create mode 100644 2024/33xxx/CVE-2024-33793.json create mode 100644 2024/33xxx/CVE-2024-33794.json create mode 100644 2024/33xxx/CVE-2024-33795.json create mode 100644 2024/33xxx/CVE-2024-33796.json create mode 100644 2024/33xxx/CVE-2024-33797.json create mode 100644 2024/33xxx/CVE-2024-33798.json create mode 100644 2024/33xxx/CVE-2024-33799.json create mode 100644 2024/33xxx/CVE-2024-33800.json create mode 100644 2024/33xxx/CVE-2024-33801.json create mode 100644 2024/33xxx/CVE-2024-33802.json create mode 100644 2024/33xxx/CVE-2024-33803.json create mode 100644 2024/33xxx/CVE-2024-33804.json create mode 100644 2024/33xxx/CVE-2024-33805.json create mode 100644 2024/33xxx/CVE-2024-33806.json create mode 100644 2024/33xxx/CVE-2024-33807.json create mode 100644 2024/33xxx/CVE-2024-33808.json create mode 100644 2024/33xxx/CVE-2024-33809.json create mode 100644 2024/33xxx/CVE-2024-33810.json create mode 100644 2024/33xxx/CVE-2024-33811.json create mode 100644 2024/33xxx/CVE-2024-33812.json create mode 100644 2024/33xxx/CVE-2024-33813.json create mode 100644 2024/33xxx/CVE-2024-33814.json create mode 100644 2024/33xxx/CVE-2024-33815.json create mode 100644 2024/33xxx/CVE-2024-33816.json create mode 100644 2024/33xxx/CVE-2024-33817.json create mode 100644 2024/33xxx/CVE-2024-33818.json create mode 100644 2024/33xxx/CVE-2024-33819.json create mode 100644 2024/33xxx/CVE-2024-33820.json create mode 100644 2024/33xxx/CVE-2024-33821.json create mode 100644 2024/33xxx/CVE-2024-33822.json create mode 100644 2024/33xxx/CVE-2024-33823.json create mode 100644 2024/33xxx/CVE-2024-33824.json create mode 100644 2024/33xxx/CVE-2024-33825.json create mode 100644 2024/33xxx/CVE-2024-33826.json create mode 100644 2024/33xxx/CVE-2024-33827.json create mode 100644 2024/33xxx/CVE-2024-33828.json create mode 100644 2024/33xxx/CVE-2024-33829.json create mode 100644 2024/33xxx/CVE-2024-33830.json create mode 100644 2024/33xxx/CVE-2024-33831.json create mode 100644 2024/33xxx/CVE-2024-33832.json create mode 100644 2024/33xxx/CVE-2024-33833.json create mode 100644 2024/33xxx/CVE-2024-33834.json create mode 100644 2024/33xxx/CVE-2024-33835.json create mode 100644 2024/33xxx/CVE-2024-33836.json create mode 100644 2024/33xxx/CVE-2024-33837.json create mode 100644 2024/33xxx/CVE-2024-33838.json create mode 100644 2024/33xxx/CVE-2024-33839.json create mode 100644 2024/33xxx/CVE-2024-33840.json create mode 100644 2024/33xxx/CVE-2024-33841.json create mode 100644 2024/33xxx/CVE-2024-33842.json create mode 100644 2024/33xxx/CVE-2024-33843.json create mode 100644 2024/33xxx/CVE-2024-33844.json create mode 100644 2024/33xxx/CVE-2024-33845.json create mode 100644 2024/33xxx/CVE-2024-33846.json create mode 100644 2024/4xxx/CVE-2024-4269.json create mode 100644 2024/4xxx/CVE-2024-4270.json create mode 100644 2024/4xxx/CVE-2024-4271.json create mode 100644 2024/4xxx/CVE-2024-4272.json create mode 100644 2024/4xxx/CVE-2024-4273.json create mode 100644 2024/4xxx/CVE-2024-4274.json diff --git a/2022/48xxx/CVE-2022-48611.json b/2022/48xxx/CVE-2022-48611.json index 66f3d1e65c3..04eea7c856c 100644 --- a/2022/48xxx/CVE-2022-48611.json +++ b/2022/48xxx/CVE-2022-48611.json @@ -1,17 +1,63 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-48611", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A logic issue was addressed with improved checks. This issue is fixed in iTunes 12.12.4 for Windows. A local attacker may be able to elevate their privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "A local attacker may be able to elevate their privileges" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "iTunes for Windows", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "12.12.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.claris.com/s/answerview?anum=000041674&language=en_US", + "refsource": "MISC", + "name": "https://support.claris.com/s/answerview?anum=000041674&language=en_US" } ] } diff --git a/2024/24xxx/CVE-2024-24777.json b/2024/24xxx/CVE-2024-24777.json new file mode 100644 index 00000000000..1b3699fa7d0 --- /dev/null +++ b/2024/24xxx/CVE-2024-24777.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24777", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/25xxx/CVE-2024-25343.json b/2024/25xxx/CVE-2024-25343.json index e369b33d3d4..1b543af4e23 100644 --- a/2024/25xxx/CVE-2024-25343.json +++ b/2024/25xxx/CVE-2024-25343.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-25343", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-25343", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Tenda N300 F3 router vulnerability allows users to bypass intended security policy and create weak passwords." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://tenda.com", + "refsource": "MISC", + "name": "http://tenda.com" + }, + { + "refsource": "MISC", + "name": "https://github.com/ShravanSinghRathore/Tenda-N300-F3-Router/wiki/Password-Policy-Bypass-Vulnerability-CVE%E2%80%902024%E2%80%9025343", + "url": "https://github.com/ShravanSinghRathore/Tenda-N300-F3-Router/wiki/Password-Policy-Bypass-Vulnerability-CVE%E2%80%902024%E2%80%9025343" } ] } diff --git a/2024/31xxx/CVE-2024-31152.json b/2024/31xxx/CVE-2024-31152.json new file mode 100644 index 00000000000..368d93ad2ab --- /dev/null +++ b/2024/31xxx/CVE-2024-31152.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31152", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32946.json b/2024/32xxx/CVE-2024-32946.json new file mode 100644 index 00000000000..fdf47c45056 --- /dev/null +++ b/2024/32xxx/CVE-2024-32946.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32946", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33793.json b/2024/33xxx/CVE-2024-33793.json new file mode 100644 index 00000000000..09e5d4dc9ad --- /dev/null +++ b/2024/33xxx/CVE-2024-33793.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33793", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33794.json b/2024/33xxx/CVE-2024-33794.json new file mode 100644 index 00000000000..55f7b5bd2ba --- /dev/null +++ b/2024/33xxx/CVE-2024-33794.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33794", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33795.json b/2024/33xxx/CVE-2024-33795.json new file mode 100644 index 00000000000..8c484a7bbc3 --- /dev/null +++ b/2024/33xxx/CVE-2024-33795.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33795", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33796.json b/2024/33xxx/CVE-2024-33796.json new file mode 100644 index 00000000000..74e75bb275c --- /dev/null +++ b/2024/33xxx/CVE-2024-33796.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33796", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33797.json b/2024/33xxx/CVE-2024-33797.json new file mode 100644 index 00000000000..dac47e27ec8 --- /dev/null +++ b/2024/33xxx/CVE-2024-33797.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33797", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33798.json b/2024/33xxx/CVE-2024-33798.json new file mode 100644 index 00000000000..bb799332329 --- /dev/null +++ b/2024/33xxx/CVE-2024-33798.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33798", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33799.json b/2024/33xxx/CVE-2024-33799.json new file mode 100644 index 00000000000..fc70d964728 --- /dev/null +++ b/2024/33xxx/CVE-2024-33799.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33799", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33800.json b/2024/33xxx/CVE-2024-33800.json new file mode 100644 index 00000000000..82d74e4004a --- /dev/null +++ b/2024/33xxx/CVE-2024-33800.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33800", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33801.json b/2024/33xxx/CVE-2024-33801.json new file mode 100644 index 00000000000..9a1b581eb8d --- /dev/null +++ b/2024/33xxx/CVE-2024-33801.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33801", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33802.json b/2024/33xxx/CVE-2024-33802.json new file mode 100644 index 00000000000..636740da252 --- /dev/null +++ b/2024/33xxx/CVE-2024-33802.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33802", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33803.json b/2024/33xxx/CVE-2024-33803.json new file mode 100644 index 00000000000..d9859e7a9ff --- /dev/null +++ b/2024/33xxx/CVE-2024-33803.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33803", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33804.json b/2024/33xxx/CVE-2024-33804.json new file mode 100644 index 00000000000..f90ccdca314 --- /dev/null +++ b/2024/33xxx/CVE-2024-33804.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33804", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33805.json b/2024/33xxx/CVE-2024-33805.json new file mode 100644 index 00000000000..fdfe42fb0cc --- /dev/null +++ b/2024/33xxx/CVE-2024-33805.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33805", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33806.json b/2024/33xxx/CVE-2024-33806.json new file mode 100644 index 00000000000..73b3a9a2115 --- /dev/null +++ b/2024/33xxx/CVE-2024-33806.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33806", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33807.json b/2024/33xxx/CVE-2024-33807.json new file mode 100644 index 00000000000..c5a8acb3cd5 --- /dev/null +++ b/2024/33xxx/CVE-2024-33807.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33807", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33808.json b/2024/33xxx/CVE-2024-33808.json new file mode 100644 index 00000000000..51037f50d2d --- /dev/null +++ b/2024/33xxx/CVE-2024-33808.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33808", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33809.json b/2024/33xxx/CVE-2024-33809.json new file mode 100644 index 00000000000..e2b8c4c7c61 --- /dev/null +++ b/2024/33xxx/CVE-2024-33809.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33809", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33810.json b/2024/33xxx/CVE-2024-33810.json new file mode 100644 index 00000000000..ed140523705 --- /dev/null +++ b/2024/33xxx/CVE-2024-33810.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33810", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33811.json b/2024/33xxx/CVE-2024-33811.json new file mode 100644 index 00000000000..c99beb156b1 --- /dev/null +++ b/2024/33xxx/CVE-2024-33811.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33811", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33812.json b/2024/33xxx/CVE-2024-33812.json new file mode 100644 index 00000000000..0dd288e29be --- /dev/null +++ b/2024/33xxx/CVE-2024-33812.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33812", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33813.json b/2024/33xxx/CVE-2024-33813.json new file mode 100644 index 00000000000..c19d918bfe2 --- /dev/null +++ b/2024/33xxx/CVE-2024-33813.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33813", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33814.json b/2024/33xxx/CVE-2024-33814.json new file mode 100644 index 00000000000..75e93479365 --- /dev/null +++ b/2024/33xxx/CVE-2024-33814.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33814", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33815.json b/2024/33xxx/CVE-2024-33815.json new file mode 100644 index 00000000000..2f21faad421 --- /dev/null +++ b/2024/33xxx/CVE-2024-33815.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33815", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33816.json b/2024/33xxx/CVE-2024-33816.json new file mode 100644 index 00000000000..1c44a54f983 --- /dev/null +++ b/2024/33xxx/CVE-2024-33816.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33816", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33817.json b/2024/33xxx/CVE-2024-33817.json new file mode 100644 index 00000000000..1e411f8d925 --- /dev/null +++ b/2024/33xxx/CVE-2024-33817.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33817", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33818.json b/2024/33xxx/CVE-2024-33818.json new file mode 100644 index 00000000000..d24179b8860 --- /dev/null +++ b/2024/33xxx/CVE-2024-33818.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33818", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33819.json b/2024/33xxx/CVE-2024-33819.json new file mode 100644 index 00000000000..a7f74b66d22 --- /dev/null +++ b/2024/33xxx/CVE-2024-33819.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33819", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33820.json b/2024/33xxx/CVE-2024-33820.json new file mode 100644 index 00000000000..0bc7640a364 --- /dev/null +++ b/2024/33xxx/CVE-2024-33820.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33820", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33821.json b/2024/33xxx/CVE-2024-33821.json new file mode 100644 index 00000000000..4299aaf78ed --- /dev/null +++ b/2024/33xxx/CVE-2024-33821.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33821", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33822.json b/2024/33xxx/CVE-2024-33822.json new file mode 100644 index 00000000000..e43fb350c61 --- /dev/null +++ b/2024/33xxx/CVE-2024-33822.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33822", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33823.json b/2024/33xxx/CVE-2024-33823.json new file mode 100644 index 00000000000..bb03c802c29 --- /dev/null +++ b/2024/33xxx/CVE-2024-33823.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33823", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33824.json b/2024/33xxx/CVE-2024-33824.json new file mode 100644 index 00000000000..f1f2cc031ae --- /dev/null +++ b/2024/33xxx/CVE-2024-33824.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33824", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33825.json b/2024/33xxx/CVE-2024-33825.json new file mode 100644 index 00000000000..02122660b6c --- /dev/null +++ b/2024/33xxx/CVE-2024-33825.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33825", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33826.json b/2024/33xxx/CVE-2024-33826.json new file mode 100644 index 00000000000..3a8f5df1cfc --- /dev/null +++ b/2024/33xxx/CVE-2024-33826.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33826", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33827.json b/2024/33xxx/CVE-2024-33827.json new file mode 100644 index 00000000000..3e3f4b5ceca --- /dev/null +++ b/2024/33xxx/CVE-2024-33827.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33827", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33828.json b/2024/33xxx/CVE-2024-33828.json new file mode 100644 index 00000000000..cf607e58535 --- /dev/null +++ b/2024/33xxx/CVE-2024-33828.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33828", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33829.json b/2024/33xxx/CVE-2024-33829.json new file mode 100644 index 00000000000..38b1d2e3ed6 --- /dev/null +++ b/2024/33xxx/CVE-2024-33829.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33829", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33830.json b/2024/33xxx/CVE-2024-33830.json new file mode 100644 index 00000000000..7a8af4d34e1 --- /dev/null +++ b/2024/33xxx/CVE-2024-33830.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33830", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33831.json b/2024/33xxx/CVE-2024-33831.json new file mode 100644 index 00000000000..3a4b9f962d2 --- /dev/null +++ b/2024/33xxx/CVE-2024-33831.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33831", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33832.json b/2024/33xxx/CVE-2024-33832.json new file mode 100644 index 00000000000..e10731373dd --- /dev/null +++ b/2024/33xxx/CVE-2024-33832.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33832", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33833.json b/2024/33xxx/CVE-2024-33833.json new file mode 100644 index 00000000000..5029e7fa39d --- /dev/null +++ b/2024/33xxx/CVE-2024-33833.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33833", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33834.json b/2024/33xxx/CVE-2024-33834.json new file mode 100644 index 00000000000..6d8f6f11544 --- /dev/null +++ b/2024/33xxx/CVE-2024-33834.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33834", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33835.json b/2024/33xxx/CVE-2024-33835.json new file mode 100644 index 00000000000..40368a574ea --- /dev/null +++ b/2024/33xxx/CVE-2024-33835.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33835", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33836.json b/2024/33xxx/CVE-2024-33836.json new file mode 100644 index 00000000000..86092003f2a --- /dev/null +++ b/2024/33xxx/CVE-2024-33836.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33836", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33837.json b/2024/33xxx/CVE-2024-33837.json new file mode 100644 index 00000000000..7d257174492 --- /dev/null +++ b/2024/33xxx/CVE-2024-33837.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33837", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33838.json b/2024/33xxx/CVE-2024-33838.json new file mode 100644 index 00000000000..dc48aa35c39 --- /dev/null +++ b/2024/33xxx/CVE-2024-33838.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33838", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33839.json b/2024/33xxx/CVE-2024-33839.json new file mode 100644 index 00000000000..05b07a2a570 --- /dev/null +++ b/2024/33xxx/CVE-2024-33839.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33839", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33840.json b/2024/33xxx/CVE-2024-33840.json new file mode 100644 index 00000000000..61df31ad361 --- /dev/null +++ b/2024/33xxx/CVE-2024-33840.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33840", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33841.json b/2024/33xxx/CVE-2024-33841.json new file mode 100644 index 00000000000..20cbfcc61e4 --- /dev/null +++ b/2024/33xxx/CVE-2024-33841.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33841", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33842.json b/2024/33xxx/CVE-2024-33842.json new file mode 100644 index 00000000000..84d6b22c65e --- /dev/null +++ b/2024/33xxx/CVE-2024-33842.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33842", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33843.json b/2024/33xxx/CVE-2024-33843.json new file mode 100644 index 00000000000..eecff055ee1 --- /dev/null +++ b/2024/33xxx/CVE-2024-33843.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33843", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33844.json b/2024/33xxx/CVE-2024-33844.json new file mode 100644 index 00000000000..895a1b53c76 --- /dev/null +++ b/2024/33xxx/CVE-2024-33844.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33844", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33845.json b/2024/33xxx/CVE-2024-33845.json new file mode 100644 index 00000000000..a9a99b5b74d --- /dev/null +++ b/2024/33xxx/CVE-2024-33845.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33845", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/33xxx/CVE-2024-33846.json b/2024/33xxx/CVE-2024-33846.json new file mode 100644 index 00000000000..4a498fca024 --- /dev/null +++ b/2024/33xxx/CVE-2024-33846.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-33846", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4269.json b/2024/4xxx/CVE-2024-4269.json new file mode 100644 index 00000000000..0a3fcf5118d --- /dev/null +++ b/2024/4xxx/CVE-2024-4269.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4269", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4270.json b/2024/4xxx/CVE-2024-4270.json new file mode 100644 index 00000000000..d367633ab5c --- /dev/null +++ b/2024/4xxx/CVE-2024-4270.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4270", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4271.json b/2024/4xxx/CVE-2024-4271.json new file mode 100644 index 00000000000..6645dd4e2f7 --- /dev/null +++ b/2024/4xxx/CVE-2024-4271.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4271", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4272.json b/2024/4xxx/CVE-2024-4272.json new file mode 100644 index 00000000000..66e7b163684 --- /dev/null +++ b/2024/4xxx/CVE-2024-4272.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4272", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4273.json b/2024/4xxx/CVE-2024-4273.json new file mode 100644 index 00000000000..aeae331165a --- /dev/null +++ b/2024/4xxx/CVE-2024-4273.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4273", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4274.json b/2024/4xxx/CVE-2024-4274.json new file mode 100644 index 00000000000..05b32b474a8 --- /dev/null +++ b/2024/4xxx/CVE-2024-4274.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4274", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file