From 672d2e945f8163e27affad4e548ced6f275f8e8b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 17 Jun 2024 19:00:35 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/25xxx/CVE-2018-25103.json | 90 +++++++++++++++++++++++++++-- 2024/0xxx/CVE-2024-0397.json | 5 ++ 2024/33xxx/CVE-2024-33373.json | 5 ++ 2024/33xxx/CVE-2024-33374.json | 5 ++ 2024/33xxx/CVE-2024-33375.json | 5 ++ 2024/36xxx/CVE-2024-36543.json | 61 ++++++++++++++++++-- 2024/37xxx/CVE-2024-37840.json | 56 ++++++++++++++++-- 2024/38xxx/CVE-2024-38449.json | 66 ++++++++++++++++++++-- 2024/38xxx/CVE-2024-38478.json | 18 ++++++ 2024/38xxx/CVE-2024-38479.json | 18 ++++++ 2024/4xxx/CVE-2024-4032.json | 5 ++ 2024/6xxx/CVE-2024-6059.json | 100 +++++++++++++++++++++++++++++++-- 2024/6xxx/CVE-2024-6088.json | 18 ++++++ 2024/6xxx/CVE-2024-6089.json | 18 ++++++ 2024/6xxx/CVE-2024-6090.json | 18 ++++++ 2024/6xxx/CVE-2024-6091.json | 18 ++++++ 2024/6xxx/CVE-2024-6092.json | 18 ++++++ 2024/6xxx/CVE-2024-6093.json | 18 ++++++ 2024/6xxx/CVE-2024-6094.json | 18 ++++++ 2024/6xxx/CVE-2024-6095.json | 18 ++++++ 20 files changed, 551 insertions(+), 27 deletions(-) create mode 100644 2024/38xxx/CVE-2024-38478.json create mode 100644 2024/38xxx/CVE-2024-38479.json create mode 100644 2024/6xxx/CVE-2024-6088.json create mode 100644 2024/6xxx/CVE-2024-6089.json create mode 100644 2024/6xxx/CVE-2024-6090.json create mode 100644 2024/6xxx/CVE-2024-6091.json create mode 100644 2024/6xxx/CVE-2024-6092.json create mode 100644 2024/6xxx/CVE-2024-6093.json create mode 100644 2024/6xxx/CVE-2024-6094.json create mode 100644 2024/6xxx/CVE-2024-6095.json diff --git a/2018/25xxx/CVE-2018-25103.json b/2018/25xxx/CVE-2018-25103.json index 6ece71d2bc2..b23f3cac3d3 100644 --- a/2018/25xxx/CVE-2018-25103.json +++ b/2018/25xxx/CVE-2018-25103.json @@ -1,18 +1,98 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2018-25103", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cert@cert.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There exists a use-after-free-vulnerability in lighttpd <= 1.4.50 that can allow access to do a case-insensitive comparison against the reused pointer." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-416: Use After Free" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "lighttpd", + "product": { + "product_data": [ + { + "product_name": "lighttpd", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "1.4.50" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.runzero.com/blog/lighttpd/", + "refsource": "MISC", + "name": "https://www.runzero.com/blog/lighttpd/" + }, + { + "url": "https://github.com/lighttpd/lighttpd1.4/commit/df8e4f95614e476276a55e34da2aa8b00b1148e9", + "refsource": "MISC", + "name": "https://github.com/lighttpd/lighttpd1.4/commit/df8e4f95614e476276a55e34da2aa8b00b1148e9" + }, + { + "url": "https://www.binarly.io/blog/lighttpd-gains-new-life", + "refsource": "MISC", + "name": "https://www.binarly.io/blog/lighttpd-gains-new-life" + }, + { + "url": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2024/AMI-SA-2024002.pdf", + "refsource": "MISC", + "name": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2024/AMI-SA-2024002.pdf" + }, + { + "url": "https://blogvdoo.wordpress.com/2018/11/06/giving-back-securing-open-source-iot-projects/#more-736", + "refsource": "MISC", + "name": "https://blogvdoo.wordpress.com/2018/11/06/giving-back-securing-open-source-iot-projects/#more-736" + } + ] + }, + "generator": { + "engine": "VINCE 3.0.4", + "env": "prod", + "origin": "https://cveawg.mitre.org/api/cve/CVE-2018-25103" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Thanks to VDOO Embedded Security part of JFROG for reporting this vulnerability." + } + ] } \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0397.json b/2024/0xxx/CVE-2024-0397.json index b5f825e15b4..a565c393bcb 100644 --- a/2024/0xxx/CVE-2024-0397.json +++ b/2024/0xxx/CVE-2024-0397.json @@ -113,6 +113,11 @@ "url": "https://github.com/python/cpython/commit/bce693111bff906ccf9281c22371331aaff766ab", "refsource": "MISC", "name": "https://github.com/python/cpython/commit/bce693111bff906ccf9281c22371331aaff766ab" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/06/17/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/06/17/2" } ] }, diff --git a/2024/33xxx/CVE-2024-33373.json b/2024/33xxx/CVE-2024-33373.json index 97923944515..8b199f609e4 100644 --- a/2024/33xxx/CVE-2024-33373.json +++ b/2024/33xxx/CVE-2024-33373.json @@ -56,6 +56,11 @@ "refsource": "CONFIRM", "name": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-lb-link-bl-w1210m-router/", "url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-lb-link-bl-w1210m-router/" + }, + { + "refsource": "MISC", + "name": "https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Password-Policy-Bypass--%7C--Inconsistent-Password-Policy-(CVE%E2%80%902024%E2%80%9033373)", + "url": "https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Password-Policy-Bypass--%7C--Inconsistent-Password-Policy-(CVE%E2%80%902024%E2%80%9033373)" } ] } diff --git a/2024/33xxx/CVE-2024-33374.json b/2024/33xxx/CVE-2024-33374.json index 3e3dae13a77..9c19cf80b78 100644 --- a/2024/33xxx/CVE-2024-33374.json +++ b/2024/33xxx/CVE-2024-33374.json @@ -56,6 +56,11 @@ "refsource": "CONFIRM", "name": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-lb-link-bl-w1210m-router/", "url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-lb-link-bl-w1210m-router/" + }, + { + "refsource": "MISC", + "name": "https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Incorrect-Access-Control-(CVE%E2%80%902024%E2%80%9033374)", + "url": "https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Incorrect-Access-Control-(CVE%E2%80%902024%E2%80%9033374)" } ] } diff --git a/2024/33xxx/CVE-2024-33375.json b/2024/33xxx/CVE-2024-33375.json index 35219e51e0c..23008962bb6 100644 --- a/2024/33xxx/CVE-2024-33375.json +++ b/2024/33xxx/CVE-2024-33375.json @@ -56,6 +56,11 @@ "refsource": "CONFIRM", "name": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-lb-link-bl-w1210m-router/", "url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-lb-link-bl-w1210m-router/" + }, + { + "refsource": "MISC", + "name": "https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Credentials-Stored-in-Cleartext--%7C--Unencrypted-Credentials-(CVE%E2%80%902024%E2%80%9033375)", + "url": "https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Credentials-Stored-in-Cleartext--%7C--Unencrypted-Credentials-(CVE%E2%80%902024%E2%80%9033375)" } ] } diff --git a/2024/36xxx/CVE-2024-36543.json b/2024/36xxx/CVE-2024-36543.json index 7ccc243cbf5..f6c32a38fa3 100644 --- a/2024/36xxx/CVE-2024-36543.json +++ b/2024/36xxx/CVE-2024-36543.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-36543", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-36543", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Incorrect access control in the Kafka Connect REST API in the STRIMZI Project 0.41.0 and earlier allows an attacker to deny the service for Kafka Mirroring, potentially mirror the topics' content to his Kafka cluster via a malicious connector (bypassing Kafka ACL if it exists), and potentially steal Kafka SASL credentials, by querying the MirrorMaker Kafka REST API." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://strimzi.com", + "refsource": "MISC", + "name": "http://strimzi.com" + }, + { + "refsource": "MISC", + "name": "https://github.com/almounah/vulnerability-research/tree/main/CVE-2024-36543", + "url": "https://github.com/almounah/vulnerability-research/tree/main/CVE-2024-36543" } ] } diff --git a/2024/37xxx/CVE-2024-37840.json b/2024/37xxx/CVE-2024-37840.json index 52187317ade..f728b26c29c 100644 --- a/2024/37xxx/CVE-2024-37840.json +++ b/2024/37xxx/CVE-2024-37840.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-37840", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-37840", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL injection vulnerability in processscore.php in Itsourcecode Learning Management System Project In PHP With Source Code v1.0 allows remote attackers to execute arbitrary SQL commands via the LessonID parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ganzhi-qcy/cve/issues/4", + "refsource": "MISC", + "name": "https://github.com/ganzhi-qcy/cve/issues/4" } ] } diff --git a/2024/38xxx/CVE-2024-38449.json b/2024/38xxx/CVE-2024-38449.json index d8191df5820..2f2eed09f78 100644 --- a/2024/38xxx/CVE-2024-38449.json +++ b/2024/38xxx/CVE-2024-38449.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-38449", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-38449", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Directory Traversal vulnerability in KasmVNC 1.3.1.230e50f7b89663316c70de7b0e3db6f6b9340489 and possibly earlier versions allows remote authenticated attackers to browse parent directories and read the content of files outside the scope of the application." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kasmweb.atlassian.net/servicedesk/customer/portal/3/topic/30ffee7f-4b85-4783-b118-6ae4fd8b0c52", + "refsource": "MISC", + "name": "https://kasmweb.atlassian.net/servicedesk/customer/portal/3/topic/30ffee7f-4b85-4783-b118-6ae4fd8b0c52" + }, + { + "url": "https://kasmweb.com/kasmvnc", + "refsource": "MISC", + "name": "https://kasmweb.com/kasmvnc" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/kasmtech/KasmVNC/issues/254", + "url": "https://github.com/kasmtech/KasmVNC/issues/254" } ] } diff --git a/2024/38xxx/CVE-2024-38478.json b/2024/38xxx/CVE-2024-38478.json new file mode 100644 index 00000000000..4bbdf992674 --- /dev/null +++ b/2024/38xxx/CVE-2024-38478.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-38478", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/38xxx/CVE-2024-38479.json b/2024/38xxx/CVE-2024-38479.json new file mode 100644 index 00000000000..81f29443e41 --- /dev/null +++ b/2024/38xxx/CVE-2024-38479.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-38479", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4032.json b/2024/4xxx/CVE-2024-4032.json index 5543d69dfdd..c5a65f1f2ff 100644 --- a/2024/4xxx/CVE-2024-4032.json +++ b/2024/4xxx/CVE-2024-4032.json @@ -113,6 +113,11 @@ "url": "https://github.com/python/cpython/commit/f86b17ac511e68192ba71f27e752321a3252cee3", "refsource": "MISC", "name": "https://github.com/python/cpython/commit/f86b17ac511e68192ba71f27e752321a3252cee3" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/06/17/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/06/17/3" } ] }, diff --git a/2024/6xxx/CVE-2024-6059.json b/2024/6xxx/CVE-2024-6059.json index 1294a684d2e..3f031189425 100644 --- a/2024/6xxx/CVE-2024-6059.json +++ b/2024/6xxx/CVE-2024-6059.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-6059", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability, which was classified as problematic, has been found in Ingenico Estate Manager 2023. This issue affects some unknown processing of the file /emgui/rest/ums/messages of the component News Feed. The manipulation of the argument message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268787. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Eine Schwachstelle wurde in Ingenico Estate Manager 2023 entdeckt. Sie wurde als problematisch eingestuft. Dies betrifft einen unbekannten Teil der Datei /emgui/rest/ums/messages der Komponente News Feed. Mit der Manipulation des Arguments message mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross Site Scripting", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Ingenico", + "product": { + "product_data": [ + { + "product_name": "Estate Manager", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2023" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.268787", + "refsource": "MISC", + "name": "https://vuldb.com/?id.268787" + }, + { + "url": "https://vuldb.com/?ctiid.268787", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.268787" + }, + { + "url": "https://vuldb.com/?submit.353237", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.353237" + }, + { + "url": "https://gentle-khaan-c53.notion.site/Stored-XSS-in-Ingenico-The-Estate-Manager-90089eaef5574b929fe019c3d0686b63", + "refsource": "MISC", + "name": "https://gentle-khaan-c53.notion.site/Stored-XSS-in-Ingenico-The-Estate-Manager-90089eaef5574b929fe019c3d0686b63" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Farouk (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 2.4, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 2.4, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 3.3, + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N" } ] } diff --git a/2024/6xxx/CVE-2024-6088.json b/2024/6xxx/CVE-2024-6088.json new file mode 100644 index 00000000000..2092253db48 --- /dev/null +++ b/2024/6xxx/CVE-2024-6088.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6088", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6089.json b/2024/6xxx/CVE-2024-6089.json new file mode 100644 index 00000000000..edc18e1fb0d --- /dev/null +++ b/2024/6xxx/CVE-2024-6089.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6089", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6090.json b/2024/6xxx/CVE-2024-6090.json new file mode 100644 index 00000000000..0bd56beb736 --- /dev/null +++ b/2024/6xxx/CVE-2024-6090.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6090", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6091.json b/2024/6xxx/CVE-2024-6091.json new file mode 100644 index 00000000000..220304933e4 --- /dev/null +++ b/2024/6xxx/CVE-2024-6091.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6091", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6092.json b/2024/6xxx/CVE-2024-6092.json new file mode 100644 index 00000000000..c981cfb5213 --- /dev/null +++ b/2024/6xxx/CVE-2024-6092.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6092", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6093.json b/2024/6xxx/CVE-2024-6093.json new file mode 100644 index 00000000000..7d7d1a85ae8 --- /dev/null +++ b/2024/6xxx/CVE-2024-6093.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6093", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6094.json b/2024/6xxx/CVE-2024-6094.json new file mode 100644 index 00000000000..16f953478f4 --- /dev/null +++ b/2024/6xxx/CVE-2024-6094.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6094", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6095.json b/2024/6xxx/CVE-2024-6095.json new file mode 100644 index 00000000000..850457ae013 --- /dev/null +++ b/2024/6xxx/CVE-2024-6095.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6095", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file