From 65006b727f813b5aece456533d31ed68c629ab79 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 9 Jan 2025 06:01:59 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/10xxx/CVE-2024-10815.json | 81 +++++++++++++++++++++++++++++++--- 2024/12xxx/CVE-2024-12714.json | 81 +++++++++++++++++++++++++++++++--- 2024/12xxx/CVE-2024-12715.json | 81 +++++++++++++++++++++++++++++++--- 2024/12xxx/CVE-2024-12717.json | 81 +++++++++++++++++++++++++++++++--- 2024/57xxx/CVE-2024-57578.json | 18 ++++++++ 2024/57xxx/CVE-2024-57579.json | 18 ++++++++ 2024/57xxx/CVE-2024-57580.json | 18 ++++++++ 2024/57xxx/CVE-2024-57581.json | 18 ++++++++ 2024/57xxx/CVE-2024-57582.json | 18 ++++++++ 2024/57xxx/CVE-2024-57583.json | 18 ++++++++ 2024/57xxx/CVE-2024-57584.json | 18 ++++++++ 2024/57xxx/CVE-2024-57585.json | 18 ++++++++ 2024/57xxx/CVE-2024-57586.json | 18 ++++++++ 2024/57xxx/CVE-2024-57587.json | 18 ++++++++ 2024/57xxx/CVE-2024-57588.json | 18 ++++++++ 2024/57xxx/CVE-2024-57589.json | 18 ++++++++ 2024/57xxx/CVE-2024-57590.json | 18 ++++++++ 2024/57xxx/CVE-2024-57591.json | 18 ++++++++ 2024/57xxx/CVE-2024-57592.json | 18 ++++++++ 2024/57xxx/CVE-2024-57593.json | 18 ++++++++ 2024/57xxx/CVE-2024-57594.json | 18 ++++++++ 2024/57xxx/CVE-2024-57595.json | 18 ++++++++ 2024/57xxx/CVE-2024-57596.json | 18 ++++++++ 2024/57xxx/CVE-2024-57597.json | 18 ++++++++ 2024/57xxx/CVE-2024-57598.json | 18 ++++++++ 2024/57xxx/CVE-2024-57599.json | 18 ++++++++ 2024/57xxx/CVE-2024-57600.json | 18 ++++++++ 2024/57xxx/CVE-2024-57601.json | 18 ++++++++ 2024/57xxx/CVE-2024-57602.json | 18 ++++++++ 2024/57xxx/CVE-2024-57603.json | 18 ++++++++ 2024/57xxx/CVE-2024-57604.json | 18 ++++++++ 2024/57xxx/CVE-2024-57605.json | 18 ++++++++ 2024/57xxx/CVE-2024-57606.json | 18 ++++++++ 2024/57xxx/CVE-2024-57607.json | 18 ++++++++ 2024/57xxx/CVE-2024-57608.json | 18 ++++++++ 2024/57xxx/CVE-2024-57609.json | 18 ++++++++ 2024/57xxx/CVE-2024-57610.json | 18 ++++++++ 2024/57xxx/CVE-2024-57611.json | 18 ++++++++ 2024/57xxx/CVE-2024-57612.json | 18 ++++++++ 2024/57xxx/CVE-2024-57613.json | 18 ++++++++ 2024/57xxx/CVE-2024-57614.json | 18 ++++++++ 2024/57xxx/CVE-2024-57615.json | 18 ++++++++ 2024/57xxx/CVE-2024-57616.json | 18 ++++++++ 2024/57xxx/CVE-2024-57617.json | 18 ++++++++ 2024/57xxx/CVE-2024-57618.json | 18 ++++++++ 2024/57xxx/CVE-2024-57619.json | 18 ++++++++ 2024/57xxx/CVE-2024-57620.json | 18 ++++++++ 2024/57xxx/CVE-2024-57621.json | 18 ++++++++ 2024/57xxx/CVE-2024-57622.json | 18 ++++++++ 2024/57xxx/CVE-2024-57623.json | 18 ++++++++ 2024/57xxx/CVE-2024-57624.json | 18 ++++++++ 2024/57xxx/CVE-2024-57625.json | 18 ++++++++ 2024/57xxx/CVE-2024-57626.json | 18 ++++++++ 2024/57xxx/CVE-2024-57627.json | 18 ++++++++ 2024/57xxx/CVE-2024-57774.json | 18 ++++++++ 2024/57xxx/CVE-2024-57775.json | 18 ++++++++ 2024/57xxx/CVE-2024-57776.json | 18 ++++++++ 2024/57xxx/CVE-2024-57777.json | 18 ++++++++ 2024/57xxx/CVE-2024-57778.json | 18 ++++++++ 2024/57xxx/CVE-2024-57779.json | 18 ++++++++ 2024/57xxx/CVE-2024-57780.json | 18 ++++++++ 2024/57xxx/CVE-2024-57781.json | 18 ++++++++ 2024/57xxx/CVE-2024-57782.json | 18 ++++++++ 2024/57xxx/CVE-2024-57783.json | 18 ++++++++ 2024/57xxx/CVE-2024-57784.json | 18 ++++++++ 2024/57xxx/CVE-2024-57785.json | 18 ++++++++ 2024/57xxx/CVE-2024-57786.json | 18 ++++++++ 2024/57xxx/CVE-2024-57787.json | 18 ++++++++ 2024/57xxx/CVE-2024-57788.json | 18 ++++++++ 2024/57xxx/CVE-2024-57789.json | 18 ++++++++ 2024/57xxx/CVE-2024-57790.json | 18 ++++++++ 2025/22xxx/CVE-2025-22977.json | 18 ++++++++ 2025/22xxx/CVE-2025-22978.json | 18 ++++++++ 2025/22xxx/CVE-2025-22979.json | 18 ++++++++ 2025/22xxx/CVE-2025-22980.json | 18 ++++++++ 2025/22xxx/CVE-2025-22981.json | 18 ++++++++ 2025/22xxx/CVE-2025-22982.json | 18 ++++++++ 2025/22xxx/CVE-2025-22983.json | 18 ++++++++ 2025/22xxx/CVE-2025-22984.json | 18 ++++++++ 2025/22xxx/CVE-2025-22985.json | 18 ++++++++ 2025/22xxx/CVE-2025-22986.json | 18 ++++++++ 2025/22xxx/CVE-2025-22987.json | 18 ++++++++ 2025/22xxx/CVE-2025-22988.json | 18 ++++++++ 2025/22xxx/CVE-2025-22989.json | 18 ++++++++ 2025/22xxx/CVE-2025-22990.json | 18 ++++++++ 2025/22xxx/CVE-2025-22991.json | 18 ++++++++ 2025/22xxx/CVE-2025-22992.json | 18 ++++++++ 2025/22xxx/CVE-2025-22993.json | 18 ++++++++ 2025/22xxx/CVE-2025-22994.json | 18 ++++++++ 2025/22xxx/CVE-2025-22995.json | 18 ++++++++ 2025/22xxx/CVE-2025-22996.json | 18 ++++++++ 2025/22xxx/CVE-2025-22997.json | 18 ++++++++ 2025/22xxx/CVE-2025-22998.json | 18 ++++++++ 2025/22xxx/CVE-2025-22999.json | 18 ++++++++ 2025/23xxx/CVE-2025-23000.json | 18 ++++++++ 2025/23xxx/CVE-2025-23001.json | 18 ++++++++ 2025/23xxx/CVE-2025-23002.json | 18 ++++++++ 2025/23xxx/CVE-2025-23003.json | 18 ++++++++ 2025/23xxx/CVE-2025-23004.json | 18 ++++++++ 2025/23xxx/CVE-2025-23005.json | 18 ++++++++ 100 files changed, 2032 insertions(+), 20 deletions(-) create mode 100644 2024/57xxx/CVE-2024-57578.json create mode 100644 2024/57xxx/CVE-2024-57579.json create mode 100644 2024/57xxx/CVE-2024-57580.json create mode 100644 2024/57xxx/CVE-2024-57581.json create mode 100644 2024/57xxx/CVE-2024-57582.json create mode 100644 2024/57xxx/CVE-2024-57583.json create mode 100644 2024/57xxx/CVE-2024-57584.json create mode 100644 2024/57xxx/CVE-2024-57585.json create mode 100644 2024/57xxx/CVE-2024-57586.json create mode 100644 2024/57xxx/CVE-2024-57587.json create mode 100644 2024/57xxx/CVE-2024-57588.json create mode 100644 2024/57xxx/CVE-2024-57589.json create mode 100644 2024/57xxx/CVE-2024-57590.json create mode 100644 2024/57xxx/CVE-2024-57591.json create mode 100644 2024/57xxx/CVE-2024-57592.json create mode 100644 2024/57xxx/CVE-2024-57593.json create mode 100644 2024/57xxx/CVE-2024-57594.json create mode 100644 2024/57xxx/CVE-2024-57595.json create mode 100644 2024/57xxx/CVE-2024-57596.json create mode 100644 2024/57xxx/CVE-2024-57597.json create mode 100644 2024/57xxx/CVE-2024-57598.json create mode 100644 2024/57xxx/CVE-2024-57599.json create mode 100644 2024/57xxx/CVE-2024-57600.json create mode 100644 2024/57xxx/CVE-2024-57601.json create mode 100644 2024/57xxx/CVE-2024-57602.json create mode 100644 2024/57xxx/CVE-2024-57603.json create mode 100644 2024/57xxx/CVE-2024-57604.json create mode 100644 2024/57xxx/CVE-2024-57605.json create mode 100644 2024/57xxx/CVE-2024-57606.json create mode 100644 2024/57xxx/CVE-2024-57607.json create mode 100644 2024/57xxx/CVE-2024-57608.json create mode 100644 2024/57xxx/CVE-2024-57609.json create mode 100644 2024/57xxx/CVE-2024-57610.json create mode 100644 2024/57xxx/CVE-2024-57611.json create mode 100644 2024/57xxx/CVE-2024-57612.json create mode 100644 2024/57xxx/CVE-2024-57613.json create mode 100644 2024/57xxx/CVE-2024-57614.json create mode 100644 2024/57xxx/CVE-2024-57615.json create mode 100644 2024/57xxx/CVE-2024-57616.json create mode 100644 2024/57xxx/CVE-2024-57617.json create mode 100644 2024/57xxx/CVE-2024-57618.json create mode 100644 2024/57xxx/CVE-2024-57619.json create mode 100644 2024/57xxx/CVE-2024-57620.json create mode 100644 2024/57xxx/CVE-2024-57621.json create mode 100644 2024/57xxx/CVE-2024-57622.json create mode 100644 2024/57xxx/CVE-2024-57623.json create mode 100644 2024/57xxx/CVE-2024-57624.json create mode 100644 2024/57xxx/CVE-2024-57625.json create mode 100644 2024/57xxx/CVE-2024-57626.json create mode 100644 2024/57xxx/CVE-2024-57627.json create mode 100644 2024/57xxx/CVE-2024-57774.json create mode 100644 2024/57xxx/CVE-2024-57775.json create mode 100644 2024/57xxx/CVE-2024-57776.json create mode 100644 2024/57xxx/CVE-2024-57777.json create mode 100644 2024/57xxx/CVE-2024-57778.json create mode 100644 2024/57xxx/CVE-2024-57779.json create mode 100644 2024/57xxx/CVE-2024-57780.json create mode 100644 2024/57xxx/CVE-2024-57781.json create mode 100644 2024/57xxx/CVE-2024-57782.json create mode 100644 2024/57xxx/CVE-2024-57783.json create mode 100644 2024/57xxx/CVE-2024-57784.json create mode 100644 2024/57xxx/CVE-2024-57785.json create mode 100644 2024/57xxx/CVE-2024-57786.json create mode 100644 2024/57xxx/CVE-2024-57787.json create mode 100644 2024/57xxx/CVE-2024-57788.json create mode 100644 2024/57xxx/CVE-2024-57789.json create mode 100644 2024/57xxx/CVE-2024-57790.json create mode 100644 2025/22xxx/CVE-2025-22977.json create mode 100644 2025/22xxx/CVE-2025-22978.json create mode 100644 2025/22xxx/CVE-2025-22979.json create mode 100644 2025/22xxx/CVE-2025-22980.json create mode 100644 2025/22xxx/CVE-2025-22981.json create mode 100644 2025/22xxx/CVE-2025-22982.json create mode 100644 2025/22xxx/CVE-2025-22983.json create mode 100644 2025/22xxx/CVE-2025-22984.json create mode 100644 2025/22xxx/CVE-2025-22985.json create mode 100644 2025/22xxx/CVE-2025-22986.json create mode 100644 2025/22xxx/CVE-2025-22987.json create mode 100644 2025/22xxx/CVE-2025-22988.json create mode 100644 2025/22xxx/CVE-2025-22989.json create mode 100644 2025/22xxx/CVE-2025-22990.json create mode 100644 2025/22xxx/CVE-2025-22991.json create mode 100644 2025/22xxx/CVE-2025-22992.json create mode 100644 2025/22xxx/CVE-2025-22993.json create mode 100644 2025/22xxx/CVE-2025-22994.json create mode 100644 2025/22xxx/CVE-2025-22995.json create mode 100644 2025/22xxx/CVE-2025-22996.json create mode 100644 2025/22xxx/CVE-2025-22997.json create mode 100644 2025/22xxx/CVE-2025-22998.json create mode 100644 2025/22xxx/CVE-2025-22999.json create mode 100644 2025/23xxx/CVE-2025-23000.json create mode 100644 2025/23xxx/CVE-2025-23001.json create mode 100644 2025/23xxx/CVE-2025-23002.json create mode 100644 2025/23xxx/CVE-2025-23003.json create mode 100644 2025/23xxx/CVE-2025-23004.json create mode 100644 2025/23xxx/CVE-2025-23005.json diff --git a/2024/10xxx/CVE-2024-10815.json b/2024/10xxx/CVE-2024-10815.json index 5c189a4c01c..8ae41ef72f8 100644 --- a/2024/10xxx/CVE-2024-10815.json +++ b/2024/10xxx/CVE-2024-10815.json @@ -1,18 +1,89 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10815", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The PostLists WordPress plugin through 2.0.2 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers" } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-Site Scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "PostLists", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "affected", + "versionType": "semver", + "version": "0", + "lessThanOrEqual": "2.0.2" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://wpscan.com/vulnerability/309a445a-6261-4bd1-bac0-a78096d0c12b/", + "refsource": "MISC", + "name": "https://wpscan.com/vulnerability/309a445a-6261-4bd1-bac0-a78096d0c12b/" + } + ] + }, + "generator": { + "engine": "WPScan CVE Generator" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Bob Matyas" + }, + { + "lang": "en", + "value": "WPScan" + } + ] } \ No newline at end of file diff --git a/2024/12xxx/CVE-2024-12714.json b/2024/12xxx/CVE-2024-12714.json index feb02aa7c1d..c0111a30dd5 100644 --- a/2024/12xxx/CVE-2024-12714.json +++ b/2024/12xxx/CVE-2024-12714.json @@ -1,18 +1,89 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-12714", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Backlink Monitoring Manager WordPress plugin through 0.1.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-Site Scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Backlink Monitoring Manager", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "affected", + "versionType": "semver", + "version": "0", + "lessThanOrEqual": "0.1.3" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://wpscan.com/vulnerability/f7fb2aef-16ce-4ae7-927c-2ffbc45fbda5/", + "refsource": "MISC", + "name": "https://wpscan.com/vulnerability/f7fb2aef-16ce-4ae7-927c-2ffbc45fbda5/" + } + ] + }, + "generator": { + "engine": "WPScan CVE Generator" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Hassan Khan Yusufzai - Splint3r7" + }, + { + "lang": "en", + "value": "WPScan" + } + ] } \ No newline at end of file diff --git a/2024/12xxx/CVE-2024-12715.json b/2024/12xxx/CVE-2024-12715.json index 1df76b4fcae..8e1607ec7a0 100644 --- a/2024/12xxx/CVE-2024-12715.json +++ b/2024/12xxx/CVE-2024-12715.json @@ -1,18 +1,89 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-12715", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Asgard Security Scanner WordPress plugin through 0.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-Site Scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Asgard Security Scanner", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "affected", + "versionType": "semver", + "version": "0", + "lessThanOrEqual": "0.7" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://wpscan.com/vulnerability/e1456295-75ba-4dc2-9b1a-dc16a2000db2/", + "refsource": "MISC", + "name": "https://wpscan.com/vulnerability/e1456295-75ba-4dc2-9b1a-dc16a2000db2/" + } + ] + }, + "generator": { + "engine": "WPScan CVE Generator" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Hassan Khan Yusufzai - Splint3r7" + }, + { + "lang": "en", + "value": "WPScan" + } + ] } \ No newline at end of file diff --git a/2024/12xxx/CVE-2024-12717.json b/2024/12xxx/CVE-2024-12717.json index 45a9792b58b..a142cc9f2a5 100644 --- a/2024/12xxx/CVE-2024-12717.json +++ b/2024/12xxx/CVE-2024-12717.json @@ -1,18 +1,89 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-12717", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Aklamator INfeed WordPress plugin through 2.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-Site Scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Aklamator INfeed", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "affected", + "versionType": "semver", + "version": "0", + "lessThanOrEqual": "2.0.0" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://wpscan.com/vulnerability/5564926a-6b1d-43f4-8147-128472f6b93a/", + "refsource": "MISC", + "name": "https://wpscan.com/vulnerability/5564926a-6b1d-43f4-8147-128472f6b93a/" + } + ] + }, + "generator": { + "engine": "WPScan CVE Generator" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Bob Matyas" + }, + { + "lang": "en", + "value": "WPScan" + } + ] } \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57578.json b/2024/57xxx/CVE-2024-57578.json new file mode 100644 index 00000000000..b4aecefceef --- /dev/null +++ b/2024/57xxx/CVE-2024-57578.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57578", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57579.json b/2024/57xxx/CVE-2024-57579.json new file mode 100644 index 00000000000..e5e04c43adc --- /dev/null +++ b/2024/57xxx/CVE-2024-57579.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57579", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57580.json b/2024/57xxx/CVE-2024-57580.json new file mode 100644 index 00000000000..5942c38a076 --- /dev/null +++ b/2024/57xxx/CVE-2024-57580.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57580", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57581.json b/2024/57xxx/CVE-2024-57581.json new file mode 100644 index 00000000000..673586cb3b2 --- /dev/null +++ b/2024/57xxx/CVE-2024-57581.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57581", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57582.json b/2024/57xxx/CVE-2024-57582.json new file mode 100644 index 00000000000..9a8ce4a3c18 --- /dev/null +++ b/2024/57xxx/CVE-2024-57582.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57582", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57583.json b/2024/57xxx/CVE-2024-57583.json new file mode 100644 index 00000000000..766d3335cf6 --- /dev/null +++ b/2024/57xxx/CVE-2024-57583.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57583", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57584.json b/2024/57xxx/CVE-2024-57584.json new file mode 100644 index 00000000000..29f36987c36 --- /dev/null +++ b/2024/57xxx/CVE-2024-57584.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57584", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57585.json b/2024/57xxx/CVE-2024-57585.json new file mode 100644 index 00000000000..add36e733ed --- /dev/null +++ b/2024/57xxx/CVE-2024-57585.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57585", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57586.json b/2024/57xxx/CVE-2024-57586.json new file mode 100644 index 00000000000..d8dfd7e5bb5 --- /dev/null +++ b/2024/57xxx/CVE-2024-57586.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57586", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57587.json b/2024/57xxx/CVE-2024-57587.json new file mode 100644 index 00000000000..db876a2123e --- /dev/null +++ b/2024/57xxx/CVE-2024-57587.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57587", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57588.json b/2024/57xxx/CVE-2024-57588.json new file mode 100644 index 00000000000..a89d3084d9e --- /dev/null +++ b/2024/57xxx/CVE-2024-57588.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57588", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57589.json b/2024/57xxx/CVE-2024-57589.json new file mode 100644 index 00000000000..019bd091469 --- /dev/null +++ b/2024/57xxx/CVE-2024-57589.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57589", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57590.json b/2024/57xxx/CVE-2024-57590.json new file mode 100644 index 00000000000..6c49368cfb4 --- /dev/null +++ b/2024/57xxx/CVE-2024-57590.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57590", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57591.json b/2024/57xxx/CVE-2024-57591.json new file mode 100644 index 00000000000..6695885c50a --- /dev/null +++ b/2024/57xxx/CVE-2024-57591.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57591", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57592.json b/2024/57xxx/CVE-2024-57592.json new file mode 100644 index 00000000000..2f79c418eeb --- /dev/null +++ b/2024/57xxx/CVE-2024-57592.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57592", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57593.json b/2024/57xxx/CVE-2024-57593.json new file mode 100644 index 00000000000..0e96d119cbc --- /dev/null +++ b/2024/57xxx/CVE-2024-57593.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57593", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57594.json b/2024/57xxx/CVE-2024-57594.json new file mode 100644 index 00000000000..222d5191bf8 --- /dev/null +++ b/2024/57xxx/CVE-2024-57594.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57594", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57595.json b/2024/57xxx/CVE-2024-57595.json new file mode 100644 index 00000000000..a5f7bce6ac0 --- /dev/null +++ b/2024/57xxx/CVE-2024-57595.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57595", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57596.json b/2024/57xxx/CVE-2024-57596.json new file mode 100644 index 00000000000..96b5943d3d6 --- /dev/null +++ b/2024/57xxx/CVE-2024-57596.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57596", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57597.json b/2024/57xxx/CVE-2024-57597.json new file mode 100644 index 00000000000..e85e200e77f --- /dev/null +++ b/2024/57xxx/CVE-2024-57597.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57597", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57598.json b/2024/57xxx/CVE-2024-57598.json new file mode 100644 index 00000000000..0766ed38b1c --- /dev/null +++ b/2024/57xxx/CVE-2024-57598.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57598", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57599.json b/2024/57xxx/CVE-2024-57599.json new file mode 100644 index 00000000000..e5f3481768e --- /dev/null +++ b/2024/57xxx/CVE-2024-57599.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57599", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57600.json b/2024/57xxx/CVE-2024-57600.json new file mode 100644 index 00000000000..54bc81301c7 --- /dev/null +++ b/2024/57xxx/CVE-2024-57600.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57600", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57601.json b/2024/57xxx/CVE-2024-57601.json new file mode 100644 index 00000000000..8252aadf06d --- /dev/null +++ b/2024/57xxx/CVE-2024-57601.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57601", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57602.json b/2024/57xxx/CVE-2024-57602.json new file mode 100644 index 00000000000..3868a71fdff --- /dev/null +++ b/2024/57xxx/CVE-2024-57602.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57602", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57603.json b/2024/57xxx/CVE-2024-57603.json new file mode 100644 index 00000000000..420652281d8 --- /dev/null +++ b/2024/57xxx/CVE-2024-57603.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57603", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57604.json b/2024/57xxx/CVE-2024-57604.json new file mode 100644 index 00000000000..b8359aa3725 --- /dev/null +++ b/2024/57xxx/CVE-2024-57604.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57604", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57605.json b/2024/57xxx/CVE-2024-57605.json new file mode 100644 index 00000000000..b7a9c283f65 --- /dev/null +++ b/2024/57xxx/CVE-2024-57605.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57605", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57606.json b/2024/57xxx/CVE-2024-57606.json new file mode 100644 index 00000000000..18ccf48d310 --- /dev/null +++ b/2024/57xxx/CVE-2024-57606.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57606", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57607.json b/2024/57xxx/CVE-2024-57607.json new file mode 100644 index 00000000000..7dd1747d91d --- /dev/null +++ b/2024/57xxx/CVE-2024-57607.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57607", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57608.json b/2024/57xxx/CVE-2024-57608.json new file mode 100644 index 00000000000..879f487e96f --- /dev/null +++ b/2024/57xxx/CVE-2024-57608.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57608", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57609.json b/2024/57xxx/CVE-2024-57609.json new file mode 100644 index 00000000000..05ee24d076e --- /dev/null +++ b/2024/57xxx/CVE-2024-57609.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57609", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57610.json b/2024/57xxx/CVE-2024-57610.json new file mode 100644 index 00000000000..60cd4593d2b --- /dev/null +++ b/2024/57xxx/CVE-2024-57610.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57610", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57611.json b/2024/57xxx/CVE-2024-57611.json new file mode 100644 index 00000000000..069414c5076 --- /dev/null +++ b/2024/57xxx/CVE-2024-57611.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57611", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57612.json b/2024/57xxx/CVE-2024-57612.json new file mode 100644 index 00000000000..ddd385e4d84 --- /dev/null +++ b/2024/57xxx/CVE-2024-57612.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57612", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57613.json b/2024/57xxx/CVE-2024-57613.json new file mode 100644 index 00000000000..98e9b195646 --- /dev/null +++ b/2024/57xxx/CVE-2024-57613.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57613", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57614.json b/2024/57xxx/CVE-2024-57614.json new file mode 100644 index 00000000000..96973c36c79 --- /dev/null +++ b/2024/57xxx/CVE-2024-57614.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57614", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57615.json b/2024/57xxx/CVE-2024-57615.json new file mode 100644 index 00000000000..49a7531d595 --- /dev/null +++ b/2024/57xxx/CVE-2024-57615.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57615", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57616.json b/2024/57xxx/CVE-2024-57616.json new file mode 100644 index 00000000000..6da1be91f81 --- /dev/null +++ b/2024/57xxx/CVE-2024-57616.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57616", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57617.json b/2024/57xxx/CVE-2024-57617.json new file mode 100644 index 00000000000..76e7e93ca3d --- /dev/null +++ b/2024/57xxx/CVE-2024-57617.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57617", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57618.json b/2024/57xxx/CVE-2024-57618.json new file mode 100644 index 00000000000..157caa06cc6 --- /dev/null +++ b/2024/57xxx/CVE-2024-57618.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57618", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57619.json b/2024/57xxx/CVE-2024-57619.json new file mode 100644 index 00000000000..84924a6dfc5 --- /dev/null +++ b/2024/57xxx/CVE-2024-57619.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57619", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57620.json b/2024/57xxx/CVE-2024-57620.json new file mode 100644 index 00000000000..d06f87738a0 --- /dev/null +++ b/2024/57xxx/CVE-2024-57620.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57620", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57621.json b/2024/57xxx/CVE-2024-57621.json new file mode 100644 index 00000000000..371a53f976d --- /dev/null +++ b/2024/57xxx/CVE-2024-57621.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57621", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57622.json b/2024/57xxx/CVE-2024-57622.json new file mode 100644 index 00000000000..e25cb751eff --- /dev/null +++ b/2024/57xxx/CVE-2024-57622.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57622", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57623.json b/2024/57xxx/CVE-2024-57623.json new file mode 100644 index 00000000000..47b3fc64140 --- /dev/null +++ b/2024/57xxx/CVE-2024-57623.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57623", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57624.json b/2024/57xxx/CVE-2024-57624.json new file mode 100644 index 00000000000..d7a7721e1f0 --- /dev/null +++ b/2024/57xxx/CVE-2024-57624.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57624", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57625.json b/2024/57xxx/CVE-2024-57625.json new file mode 100644 index 00000000000..b8ec2141a53 --- /dev/null +++ b/2024/57xxx/CVE-2024-57625.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57625", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57626.json b/2024/57xxx/CVE-2024-57626.json new file mode 100644 index 00000000000..2b150c0e8e8 --- /dev/null +++ b/2024/57xxx/CVE-2024-57626.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57626", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57627.json b/2024/57xxx/CVE-2024-57627.json new file mode 100644 index 00000000000..9d4cc061133 --- /dev/null +++ b/2024/57xxx/CVE-2024-57627.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57627", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57774.json b/2024/57xxx/CVE-2024-57774.json new file mode 100644 index 00000000000..05e03519fe2 --- /dev/null +++ b/2024/57xxx/CVE-2024-57774.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57774", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57775.json b/2024/57xxx/CVE-2024-57775.json new file mode 100644 index 00000000000..a27f493acf2 --- /dev/null +++ b/2024/57xxx/CVE-2024-57775.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57775", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57776.json b/2024/57xxx/CVE-2024-57776.json new file mode 100644 index 00000000000..aa452a216a7 --- /dev/null +++ b/2024/57xxx/CVE-2024-57776.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57776", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57777.json b/2024/57xxx/CVE-2024-57777.json new file mode 100644 index 00000000000..be893ac36df --- /dev/null +++ b/2024/57xxx/CVE-2024-57777.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57777", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57778.json b/2024/57xxx/CVE-2024-57778.json new file mode 100644 index 00000000000..c4317d7abff --- /dev/null +++ b/2024/57xxx/CVE-2024-57778.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57778", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57779.json b/2024/57xxx/CVE-2024-57779.json new file mode 100644 index 00000000000..b82b7205e84 --- /dev/null +++ b/2024/57xxx/CVE-2024-57779.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57779", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57780.json b/2024/57xxx/CVE-2024-57780.json new file mode 100644 index 00000000000..eeeed75e4ea --- /dev/null +++ b/2024/57xxx/CVE-2024-57780.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57780", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57781.json b/2024/57xxx/CVE-2024-57781.json new file mode 100644 index 00000000000..d6433479afb --- /dev/null +++ b/2024/57xxx/CVE-2024-57781.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57781", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57782.json b/2024/57xxx/CVE-2024-57782.json new file mode 100644 index 00000000000..b3468645566 --- /dev/null +++ b/2024/57xxx/CVE-2024-57782.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57782", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57783.json b/2024/57xxx/CVE-2024-57783.json new file mode 100644 index 00000000000..45f84e2a54c --- /dev/null +++ b/2024/57xxx/CVE-2024-57783.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57783", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57784.json b/2024/57xxx/CVE-2024-57784.json new file mode 100644 index 00000000000..35ddcc76d2f --- /dev/null +++ b/2024/57xxx/CVE-2024-57784.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57784", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57785.json b/2024/57xxx/CVE-2024-57785.json new file mode 100644 index 00000000000..e8fccba5cdf --- /dev/null +++ b/2024/57xxx/CVE-2024-57785.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57785", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57786.json b/2024/57xxx/CVE-2024-57786.json new file mode 100644 index 00000000000..fd3a4a74a02 --- /dev/null +++ b/2024/57xxx/CVE-2024-57786.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57786", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57787.json b/2024/57xxx/CVE-2024-57787.json new file mode 100644 index 00000000000..870657881dc --- /dev/null +++ b/2024/57xxx/CVE-2024-57787.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57787", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57788.json b/2024/57xxx/CVE-2024-57788.json new file mode 100644 index 00000000000..2d7e0efead4 --- /dev/null +++ b/2024/57xxx/CVE-2024-57788.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57788", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57789.json b/2024/57xxx/CVE-2024-57789.json new file mode 100644 index 00000000000..21d974df739 --- /dev/null +++ b/2024/57xxx/CVE-2024-57789.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57789", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57790.json b/2024/57xxx/CVE-2024-57790.json new file mode 100644 index 00000000000..2bdbdd0b88c --- /dev/null +++ b/2024/57xxx/CVE-2024-57790.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-57790", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22977.json b/2025/22xxx/CVE-2025-22977.json new file mode 100644 index 00000000000..b2fe50633c3 --- /dev/null +++ b/2025/22xxx/CVE-2025-22977.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22977", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22978.json b/2025/22xxx/CVE-2025-22978.json new file mode 100644 index 00000000000..d1a109569a9 --- /dev/null +++ b/2025/22xxx/CVE-2025-22978.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22978", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22979.json b/2025/22xxx/CVE-2025-22979.json new file mode 100644 index 00000000000..8831d3603c6 --- /dev/null +++ b/2025/22xxx/CVE-2025-22979.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22979", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22980.json b/2025/22xxx/CVE-2025-22980.json new file mode 100644 index 00000000000..69c116c6dbc --- /dev/null +++ b/2025/22xxx/CVE-2025-22980.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22980", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22981.json b/2025/22xxx/CVE-2025-22981.json new file mode 100644 index 00000000000..f4aabc457fc --- /dev/null +++ b/2025/22xxx/CVE-2025-22981.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22981", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22982.json b/2025/22xxx/CVE-2025-22982.json new file mode 100644 index 00000000000..ed3840d8427 --- /dev/null +++ b/2025/22xxx/CVE-2025-22982.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22982", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22983.json b/2025/22xxx/CVE-2025-22983.json new file mode 100644 index 00000000000..4734dad205b --- /dev/null +++ b/2025/22xxx/CVE-2025-22983.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22983", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22984.json b/2025/22xxx/CVE-2025-22984.json new file mode 100644 index 00000000000..83f2321ab06 --- /dev/null +++ b/2025/22xxx/CVE-2025-22984.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22984", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22985.json b/2025/22xxx/CVE-2025-22985.json new file mode 100644 index 00000000000..77037676218 --- /dev/null +++ b/2025/22xxx/CVE-2025-22985.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22985", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22986.json b/2025/22xxx/CVE-2025-22986.json new file mode 100644 index 00000000000..930cabcbc2f --- /dev/null +++ b/2025/22xxx/CVE-2025-22986.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22986", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22987.json b/2025/22xxx/CVE-2025-22987.json new file mode 100644 index 00000000000..e6bce1534a4 --- /dev/null +++ b/2025/22xxx/CVE-2025-22987.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22987", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22988.json b/2025/22xxx/CVE-2025-22988.json new file mode 100644 index 00000000000..88cc0975a3b --- /dev/null +++ b/2025/22xxx/CVE-2025-22988.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22988", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22989.json b/2025/22xxx/CVE-2025-22989.json new file mode 100644 index 00000000000..4f56c65aede --- /dev/null +++ b/2025/22xxx/CVE-2025-22989.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22989", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22990.json b/2025/22xxx/CVE-2025-22990.json new file mode 100644 index 00000000000..9f89e16195d --- /dev/null +++ b/2025/22xxx/CVE-2025-22990.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22990", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22991.json b/2025/22xxx/CVE-2025-22991.json new file mode 100644 index 00000000000..6d076f8a4a7 --- /dev/null +++ b/2025/22xxx/CVE-2025-22991.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22991", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22992.json b/2025/22xxx/CVE-2025-22992.json new file mode 100644 index 00000000000..a0e7162866b --- /dev/null +++ b/2025/22xxx/CVE-2025-22992.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22992", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22993.json b/2025/22xxx/CVE-2025-22993.json new file mode 100644 index 00000000000..20283989ea4 --- /dev/null +++ b/2025/22xxx/CVE-2025-22993.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22993", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22994.json b/2025/22xxx/CVE-2025-22994.json new file mode 100644 index 00000000000..c45ab7ff844 --- /dev/null +++ b/2025/22xxx/CVE-2025-22994.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22994", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22995.json b/2025/22xxx/CVE-2025-22995.json new file mode 100644 index 00000000000..ee486339998 --- /dev/null +++ b/2025/22xxx/CVE-2025-22995.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22995", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22996.json b/2025/22xxx/CVE-2025-22996.json new file mode 100644 index 00000000000..e3e7ac58e9e --- /dev/null +++ b/2025/22xxx/CVE-2025-22996.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22996", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22997.json b/2025/22xxx/CVE-2025-22997.json new file mode 100644 index 00000000000..06b95ce9823 --- /dev/null +++ b/2025/22xxx/CVE-2025-22997.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22997", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22998.json b/2025/22xxx/CVE-2025-22998.json new file mode 100644 index 00000000000..15768076928 --- /dev/null +++ b/2025/22xxx/CVE-2025-22998.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22998", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22999.json b/2025/22xxx/CVE-2025-22999.json new file mode 100644 index 00000000000..4fa8da6bc6f --- /dev/null +++ b/2025/22xxx/CVE-2025-22999.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22999", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23000.json b/2025/23xxx/CVE-2025-23000.json new file mode 100644 index 00000000000..a42ae17ae47 --- /dev/null +++ b/2025/23xxx/CVE-2025-23000.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23000", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23001.json b/2025/23xxx/CVE-2025-23001.json new file mode 100644 index 00000000000..ae7f10ab644 --- /dev/null +++ b/2025/23xxx/CVE-2025-23001.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23001", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23002.json b/2025/23xxx/CVE-2025-23002.json new file mode 100644 index 00000000000..1ccb244f8c9 --- /dev/null +++ b/2025/23xxx/CVE-2025-23002.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23002", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23003.json b/2025/23xxx/CVE-2025-23003.json new file mode 100644 index 00000000000..af9571bbbc8 --- /dev/null +++ b/2025/23xxx/CVE-2025-23003.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23003", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23004.json b/2025/23xxx/CVE-2025-23004.json new file mode 100644 index 00000000000..395182fd621 --- /dev/null +++ b/2025/23xxx/CVE-2025-23004.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23004", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23005.json b/2025/23xxx/CVE-2025-23005.json new file mode 100644 index 00000000000..f35377aadc2 --- /dev/null +++ b/2025/23xxx/CVE-2025-23005.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23005", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file