From 603ef1afe435791c034d97ce2bbc2319cb816d60 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 18 Nov 2024 05:00:38 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/43xxx/CVE-2024-43704.json | 75 +++++++++++++++++++++++++++++++-- 2024/52xxx/CVE-2024-52925.json | 18 ++++++++ 2024/52xxx/CVE-2024-52926.json | 76 ++++++++++++++++++++++++++++++++++ 2024/52xxx/CVE-2024-52927.json | 18 ++++++++ 2024/52xxx/CVE-2024-52928.json | 18 ++++++++ 2024/52xxx/CVE-2024-52929.json | 18 ++++++++ 2024/52xxx/CVE-2024-52930.json | 18 ++++++++ 2024/52xxx/CVE-2024-52931.json | 18 ++++++++ 2024/52xxx/CVE-2024-52932.json | 18 ++++++++ 2024/52xxx/CVE-2024-52933.json | 18 ++++++++ 2024/52xxx/CVE-2024-52934.json | 18 ++++++++ 2024/52xxx/CVE-2024-52935.json | 18 ++++++++ 2024/52xxx/CVE-2024-52936.json | 18 ++++++++ 2024/52xxx/CVE-2024-52937.json | 18 ++++++++ 2024/52xxx/CVE-2024-52938.json | 18 ++++++++ 2024/52xxx/CVE-2024-52939.json | 18 ++++++++ 16 files changed, 399 insertions(+), 4 deletions(-) create mode 100644 2024/52xxx/CVE-2024-52925.json create mode 100644 2024/52xxx/CVE-2024-52926.json create mode 100644 2024/52xxx/CVE-2024-52927.json create mode 100644 2024/52xxx/CVE-2024-52928.json create mode 100644 2024/52xxx/CVE-2024-52929.json create mode 100644 2024/52xxx/CVE-2024-52930.json create mode 100644 2024/52xxx/CVE-2024-52931.json create mode 100644 2024/52xxx/CVE-2024-52932.json create mode 100644 2024/52xxx/CVE-2024-52933.json create mode 100644 2024/52xxx/CVE-2024-52934.json create mode 100644 2024/52xxx/CVE-2024-52935.json create mode 100644 2024/52xxx/CVE-2024-52936.json create mode 100644 2024/52xxx/CVE-2024-52937.json create mode 100644 2024/52xxx/CVE-2024-52938.json create mode 100644 2024/52xxx/CVE-2024-52939.json diff --git a/2024/43xxx/CVE-2024-43704.json b/2024/43xxx/CVE-2024-43704.json index a41fee96653..7767e842c22 100644 --- a/2024/43xxx/CVE-2024-43704.json +++ b/2024/43xxx/CVE-2024-43704.json @@ -1,18 +1,85 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-43704", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@imgtec.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Software installed and run as a non-privileged user may conduct improper GPU system calls to gain access to the graphics buffers of a parent process." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-668 Exposure of Resource to Wrong Sphere", + "cweId": "CWE-668" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Imagination Technologies", + "product": { + "product_data": [ + { + "product_name": "Graphics DDK", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThanOrEqual": "24.2 RTM1", + "status": "affected", + "version": "1.13 RTM", + "versionType": "custom" + }, + { + "status": "unaffected", + "version": "24.2 RTM2", + "versionType": "custom" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.imaginationtech.com/gpu-driver-vulnerabilities/", + "refsource": "MISC", + "name": "https://www.imaginationtech.com/gpu-driver-vulnerabilities/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2024/52xxx/CVE-2024-52925.json b/2024/52xxx/CVE-2024-52925.json new file mode 100644 index 00000000000..609e01ed83a --- /dev/null +++ b/2024/52xxx/CVE-2024-52925.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-52925", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/52xxx/CVE-2024-52926.json b/2024/52xxx/CVE-2024-52926.json new file mode 100644 index 00000000000..cbf726e1edf --- /dev/null +++ b/2024/52xxx/CVE-2024-52926.json @@ -0,0 +1,76 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-52926", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Delinea Privilege Manager before 12.0.2 mishandles the security of the Windows agent." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://docs.delinea.com/online-help/privilege-manager/release-notes/12.0.2-combined.htm", + "refsource": "MISC", + "name": "https://docs.delinea.com/online-help/privilege-manager/release-notes/12.0.2-combined.htm" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AC:L/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:R", + "version": "3.1" + } + } +} \ No newline at end of file diff --git a/2024/52xxx/CVE-2024-52927.json b/2024/52xxx/CVE-2024-52927.json new file mode 100644 index 00000000000..6c03b276a9e --- /dev/null +++ b/2024/52xxx/CVE-2024-52927.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-52927", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/52xxx/CVE-2024-52928.json b/2024/52xxx/CVE-2024-52928.json new file mode 100644 index 00000000000..1472e2f80ce --- /dev/null +++ b/2024/52xxx/CVE-2024-52928.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-52928", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/52xxx/CVE-2024-52929.json b/2024/52xxx/CVE-2024-52929.json new file mode 100644 index 00000000000..5904b83ba4f --- /dev/null +++ b/2024/52xxx/CVE-2024-52929.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-52929", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/52xxx/CVE-2024-52930.json b/2024/52xxx/CVE-2024-52930.json new file mode 100644 index 00000000000..c47c29f0002 --- /dev/null +++ b/2024/52xxx/CVE-2024-52930.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-52930", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/52xxx/CVE-2024-52931.json b/2024/52xxx/CVE-2024-52931.json new file mode 100644 index 00000000000..c539e486766 --- /dev/null +++ b/2024/52xxx/CVE-2024-52931.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-52931", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/52xxx/CVE-2024-52932.json b/2024/52xxx/CVE-2024-52932.json new file mode 100644 index 00000000000..1a5ffe7b2d6 --- /dev/null +++ b/2024/52xxx/CVE-2024-52932.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-52932", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/52xxx/CVE-2024-52933.json b/2024/52xxx/CVE-2024-52933.json new file mode 100644 index 00000000000..93bb8ae3d68 --- /dev/null +++ b/2024/52xxx/CVE-2024-52933.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-52933", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/52xxx/CVE-2024-52934.json b/2024/52xxx/CVE-2024-52934.json new file mode 100644 index 00000000000..363643e79f2 --- /dev/null +++ b/2024/52xxx/CVE-2024-52934.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-52934", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/52xxx/CVE-2024-52935.json b/2024/52xxx/CVE-2024-52935.json new file mode 100644 index 00000000000..8cd8ea5c66f --- /dev/null +++ b/2024/52xxx/CVE-2024-52935.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-52935", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/52xxx/CVE-2024-52936.json b/2024/52xxx/CVE-2024-52936.json new file mode 100644 index 00000000000..2fd21942e67 --- /dev/null +++ b/2024/52xxx/CVE-2024-52936.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-52936", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/52xxx/CVE-2024-52937.json b/2024/52xxx/CVE-2024-52937.json new file mode 100644 index 00000000000..8318601bf61 --- /dev/null +++ b/2024/52xxx/CVE-2024-52937.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-52937", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/52xxx/CVE-2024-52938.json b/2024/52xxx/CVE-2024-52938.json new file mode 100644 index 00000000000..1356c29dfcf --- /dev/null +++ b/2024/52xxx/CVE-2024-52938.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-52938", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/52xxx/CVE-2024-52939.json b/2024/52xxx/CVE-2024-52939.json new file mode 100644 index 00000000000..f6367ff52a0 --- /dev/null +++ b/2024/52xxx/CVE-2024-52939.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-52939", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file