diff --git a/2013/4xxx/CVE-2013-4407.json b/2013/4xxx/CVE-2013-4407.json index 4edb78ed045..f558ac1c258 100644 --- a/2013/4xxx/CVE-2013-4407.json +++ b/2013/4xxx/CVE-2013-4407.json @@ -87,6 +87,11 @@ "url": "http://git.shadowcat.co.uk/gitweb/gitweb.cgi?p=catagits/HTTP-Body.git;a=commit;h=cc75c886256f187cda388641931e8dafad6c2346", "refsource": "MISC", "name": "http://git.shadowcat.co.uk/gitweb/gitweb.cgi?p=catagits/HTTP-Body.git;a=commit;h=cc75c886256f187cda388641931e8dafad6c2346" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20240407 HTTP::Body before 1.23 for Perl is still vulnerable to CVE-2013-4407", + "url": "http://www.openwall.com/lists/oss-security/2024/04/07/1" } ] } diff --git a/2023/23xxx/CVE-2023-23019.json b/2023/23xxx/CVE-2023-23019.json index c58cc204879..ad22efccf33 100644 --- a/2023/23xxx/CVE-2023-23019.json +++ b/2023/23xxx/CVE-2023-23019.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-23019", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-23019", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross site scripting (XSS) vulnerability in file main.php in sourcecodester oretnom23 Blog Site 1.0 via the name and email parameters to function user_add.\\" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://gist.github.com/enferas/fc3a1b4b3826d0e10cc4a021e5ec1822", + "url": "https://gist.github.com/enferas/fc3a1b4b3826d0e10cc4a021e5ec1822" } ] } diff --git a/2023/26xxx/CVE-2023-26793.json b/2023/26xxx/CVE-2023-26793.json index d18eea47669..8615dca06ea 100644 --- a/2023/26xxx/CVE-2023-26793.json +++ b/2023/26xxx/CVE-2023-26793.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-26793", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-26793", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "libmodbus v3.1.10 has a heap-based buffer overflow vulnerability in read_io_status function in src/modbus.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://github.com/stephane/libmodbus/issues/683", + "url": "https://github.com/stephane/libmodbus/issues/683" } ] } diff --git a/2023/28xxx/CVE-2023-28746.json b/2023/28xxx/CVE-2023-28746.json index 0a20fc10791..7eb4f6ed7de 100644 --- a/2023/28xxx/CVE-2023-28746.json +++ b/2023/28xxx/CVE-2023-28746.json @@ -77,6 +77,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/12/13", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/12/13" } ] }, diff --git a/2023/33xxx/CVE-2023-33567.json b/2023/33xxx/CVE-2023-33567.json index da7c81f1b25..ae320355e01 100644 --- a/2023/33xxx/CVE-2023-33567.json +++ b/2023/33xxx/CVE-2023-33567.json @@ -71,11 +71,6 @@ "refsource": "MLIST", "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", "url": "http://www.openwall.com/lists/oss-security/2024/04/23/3" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", - "url": "http://www.openwall.com/lists/oss-security/2024/04/23/5" } ] } diff --git a/2023/41xxx/CVE-2023-41313.json b/2023/41xxx/CVE-2023-41313.json index 757e365cd2d..d58c7a3e27e 100644 --- a/2023/41xxx/CVE-2023-41313.json +++ b/2023/41xxx/CVE-2023-41313.json @@ -59,6 +59,11 @@ "url": "https://lists.apache.org/thread/jqczy3vxzs6q6rz9o0626j5nks9fnv95", "refsource": "MISC", "name": "https://lists.apache.org/thread/jqczy3vxzs6q6rz9o0626j5nks9fnv95" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/10/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/10/2" } ] }, diff --git a/2023/42xxx/CVE-2023-42843.json b/2023/42xxx/CVE-2023-42843.json index ff9f92af9fd..ad6fdcdea1d 100644 --- a/2023/42xxx/CVE-2023-42843.json +++ b/2023/42xxx/CVE-2023-42843.json @@ -97,6 +97,11 @@ "url": "https://support.apple.com/en-us/HT213982", "refsource": "MISC", "name": "https://support.apple.com/en-us/HT213982" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/26/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/26/1" } ] } diff --git a/2023/42xxx/CVE-2023-42950.json b/2023/42xxx/CVE-2023-42950.json index ab918c3cf2b..ff91d91fe44 100644 --- a/2023/42xxx/CVE-2023-42950.json +++ b/2023/42xxx/CVE-2023-42950.json @@ -126,6 +126,11 @@ "url": "https://support.apple.com/en-us/HT214041", "refsource": "MISC", "name": "https://support.apple.com/en-us/HT214041" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/26/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/26/1" } ] } diff --git a/2023/42xxx/CVE-2023-42956.json b/2023/42xxx/CVE-2023-42956.json index c638cc969cc..6a8ba2ae9eb 100644 --- a/2023/42xxx/CVE-2023-42956.json +++ b/2023/42xxx/CVE-2023-42956.json @@ -92,6 +92,11 @@ "url": "https://support.apple.com/en-us/HT214036", "refsource": "MISC", "name": "https://support.apple.com/en-us/HT214036" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/26/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/26/1" } ] } diff --git a/2023/45xxx/CVE-2023-45139.json b/2023/45xxx/CVE-2023-45139.json index 3aead437370..677cb55b405 100644 --- a/2023/45xxx/CVE-2023-45139.json +++ b/2023/45xxx/CVE-2023-45139.json @@ -73,6 +73,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VY63B4SGY4QOQGUXMECRGD6K3YT3GJ75/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VY63B4SGY4QOQGUXMECRGD6K3YT3GJ75/" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/09/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/09/1" } ] }, diff --git a/2023/46xxx/CVE-2023-46288.json b/2023/46xxx/CVE-2023-46288.json index 836ccb85acd..21dcd6681dd 100644 --- a/2023/46xxx/CVE-2023-46288.json +++ b/2023/46xxx/CVE-2023-46288.json @@ -64,6 +64,11 @@ "url": "https://lists.apache.org/thread/yw4vzm0c5lqkwm0bxv6qy03yfd1od4nw", "refsource": "MISC", "name": "https://lists.apache.org/thread/yw4vzm0c5lqkwm0bxv6qy03yfd1od4nw" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/17/10", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/17/10" } ] }, diff --git a/2023/50xxx/CVE-2023-50378.json b/2023/50xxx/CVE-2023-50378.json index 4bfee292286..4f67bbdf298 100644 --- a/2023/50xxx/CVE-2023-50378.json +++ b/2023/50xxx/CVE-2023-50378.json @@ -59,6 +59,11 @@ "url": "https://lists.apache.org/thread/6hn0thq743vz9gh283s2d87wz8tqh37c", "refsource": "MISC", "name": "https://lists.apache.org/thread/6hn0thq743vz9gh283s2d87wz8tqh37c" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/01/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/01/5" } ] }, diff --git a/2023/50xxx/CVE-2023-50740.json b/2023/50xxx/CVE-2023-50740.json index 27e4bbfc8d7..9d3cfec32d6 100644 --- a/2023/50xxx/CVE-2023-50740.json +++ b/2023/50xxx/CVE-2023-50740.json @@ -59,6 +59,11 @@ "url": "https://lists.apache.org/thread/5o342chnpyd6rps68ygzfkzycxl998yo", "refsource": "MISC", "name": "https://lists.apache.org/thread/5o342chnpyd6rps68ygzfkzycxl998yo" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/06/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/06/2" } ] }, diff --git a/2023/51xxx/CVE-2023-51200.json b/2023/51xxx/CVE-2023-51200.json index e070dd85dab..b48d7141e0b 100644 --- a/2023/51xxx/CVE-2023-51200.json +++ b/2023/51xxx/CVE-2023-51200.json @@ -71,11 +71,6 @@ "refsource": "MLIST", "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", "url": "http://www.openwall.com/lists/oss-security/2024/04/23/3" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", - "url": "http://www.openwall.com/lists/oss-security/2024/04/23/5" } ] } diff --git a/2023/51xxx/CVE-2023-51786.json b/2023/51xxx/CVE-2023-51786.json index 47a85c8a3a7..a5cf1f89caa 100644 --- a/2023/51xxx/CVE-2023-51786.json +++ b/2023/51xxx/CVE-2023-51786.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "http://lists.lustre.org/pipermail/lustre-announce-lustre.org/2024/000270.html", "url": "http://lists.lustre.org/pipermail/lustre-announce-lustre.org/2024/000270.html" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20240312 CVE-2023-51786: Lustre: incorrect access control resulting in potential data compromise or privilege escalation", + "url": "http://www.openwall.com/lists/oss-security/2024/03/12/2" } ] } diff --git a/2023/52xxx/CVE-2023-52425.json b/2023/52xxx/CVE-2023-52425.json index 627abcf34fc..0ab055be985 100644 --- a/2023/52xxx/CVE-2023-52425.json +++ b/2023/52xxx/CVE-2023-52425.json @@ -71,6 +71,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20240409 [SECURITY] [DLA 3783-1] expat security update", "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00006.html" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20240320 Security fixes in Python 3.10.14, 3.9.19, and 3.8.19 (CVE-2023-6597 & CVE-2024-0450)", + "url": "http://www.openwall.com/lists/oss-security/2024/03/20/5" } ] } diff --git a/2023/52xxx/CVE-2023-52564.json b/2023/52xxx/CVE-2023-52564.json index 6feb100fa6b..5bbdf10aa88 100644 --- a/2023/52xxx/CVE-2023-52564.json +++ b/2023/52xxx/CVE-2023-52564.json @@ -146,6 +146,21 @@ "url": "http://www.openwall.com/lists/oss-security/2024/04/11/9", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2024/04/11/9" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/11/11", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/11/11" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/12/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/12/2" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/12/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/12/1" } ] }, diff --git a/2023/6xxx/CVE-2023-6546.json b/2023/6xxx/CVE-2023-6546.json index 833c96d2e15..bc3dfccabb9 100644 --- a/2023/6xxx/CVE-2023-6546.json +++ b/2023/6xxx/CVE-2023-6546.json @@ -413,10 +413,25 @@ "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2024/04/11/7" }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/10/18", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/10/18" + }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/16/2", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2024/04/16/2" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/12/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/12/2" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/12/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/12/1" } ] }, diff --git a/2023/6xxx/CVE-2023-6597.json b/2023/6xxx/CVE-2023-6597.json index 5c4f61c80bb..91a2efbefe6 100644 --- a/2023/6xxx/CVE-2023-6597.json +++ b/2023/6xxx/CVE-2023-6597.json @@ -118,6 +118,11 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html", "refsource": "MISC", "name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/20/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/20/5" } ] }, diff --git a/2024/0xxx/CVE-2024-0450.json b/2024/0xxx/CVE-2024-0450.json index ee355531b75..238b076b31f 100644 --- a/2024/0xxx/CVE-2024-0450.json +++ b/2024/0xxx/CVE-2024-0450.json @@ -129,6 +129,11 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html", "refsource": "MISC", "name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/20/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/20/5" } ] }, diff --git a/2024/22xxx/CVE-2024-22201.json b/2024/22xxx/CVE-2024-22201.json index d832fddb4a1..e6567388757 100644 --- a/2024/22xxx/CVE-2024-22201.json +++ b/2024/22xxx/CVE-2024-22201.json @@ -85,6 +85,11 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00002.html", "refsource": "MISC", "name": "https://lists.debian.org/debian-lts-announce/2024/04/msg00002.html" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/20/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/20/2" } ] }, diff --git a/2024/22xxx/CVE-2024-22830.json b/2024/22xxx/CVE-2024-22830.json index c3e23aba934..971f949f3ca 100644 --- a/2024/22xxx/CVE-2024-22830.json +++ b/2024/22xxx/CVE-2024-22830.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-22830", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-22830", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Anti-Cheat Expert's Windows kernel module \"ACE-BASE.sys\" version 1.0.2202.6217 does not perform proper access control when handling system resources. This allows a local attacker to escalate privileges from regular user to System or PPL level." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://anti-cheat.com", + "refsource": "MISC", + "name": "http://anti-cheat.com" + }, + { + "refsource": "MISC", + "name": "https://intl.anticheatexpert.com/#/tool-center", + "url": "https://intl.anticheatexpert.com/#/tool-center" + }, + { + "refsource": "MISC", + "name": "https://www.defencetech.it/wp-content/uploads/2024/04/Report-CVE-2024-22830.pdf", + "url": "https://www.defencetech.it/wp-content/uploads/2024/04/Report-CVE-2024-22830.pdf" } ] } diff --git a/2024/23xxx/CVE-2024-23254.json b/2024/23xxx/CVE-2024-23254.json index e13ac16d612..65fa3469725 100644 --- a/2024/23xxx/CVE-2024-23254.json +++ b/2024/23xxx/CVE-2024-23254.json @@ -163,6 +163,16 @@ "url": "http://seclists.org/fulldisclosure/2024/Mar/24", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2024/Mar/24" + }, + { + "url": "http://seclists.org/fulldisclosure/2024/Mar/26", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2024/Mar/26" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/26/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/26/1" } ] } diff --git a/2024/23xxx/CVE-2024-23263.json b/2024/23xxx/CVE-2024-23263.json index a934e68cd90..198cfe63300 100644 --- a/2024/23xxx/CVE-2024-23263.json +++ b/2024/23xxx/CVE-2024-23263.json @@ -188,6 +188,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/26/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/26/1" } ] } diff --git a/2024/23xxx/CVE-2024-23280.json b/2024/23xxx/CVE-2024-23280.json index 5f7193177b5..ac39078ed9f 100644 --- a/2024/23xxx/CVE-2024-23280.json +++ b/2024/23xxx/CVE-2024-23280.json @@ -161,6 +161,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/26/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/26/1" } ] } diff --git a/2024/23xxx/CVE-2024-23284.json b/2024/23xxx/CVE-2024-23284.json index c32aa15bba7..c7555ae92c6 100644 --- a/2024/23xxx/CVE-2024-23284.json +++ b/2024/23xxx/CVE-2024-23284.json @@ -188,6 +188,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/26/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/26/1" } ] } diff --git a/2024/24xxx/CVE-2024-24312.json b/2024/24xxx/CVE-2024-24312.json index d0e07ae203f..73e2af5ccf2 100644 --- a/2024/24xxx/CVE-2024-24312.json +++ b/2024/24xxx/CVE-2024-24312.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-24312", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-24312", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL injection vulnerability in Vaales Technologies V_QRS v.2024-01-17 allows a remote attacker to obtain sensitive information via the Models/UserModel.php component." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www2.deloitte.com/xe/en/pages/about-deloitte/articles/sustainable-strategies/unveiling-vulnerabilities-in-cybersecurity.html", + "url": "https://www2.deloitte.com/xe/en/pages/about-deloitte/articles/sustainable-strategies/unveiling-vulnerabilities-in-cybersecurity.html" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:L/A:N/C:H/I:N/PR:N/S:C/UI:N", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24313.json b/2024/24xxx/CVE-2024-24313.json index b03afc3bc18..cd5bbde4470 100644 --- a/2024/24xxx/CVE-2024-24313.json +++ b/2024/24xxx/CVE-2024-24313.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-24313", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-24313", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in Vaales Technologies V_QRS v.2024-01-17 allows a remote attacker to obtain sensitive information via the Models/FormModel.php and QRModel.php component." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www2.deloitte.com/xe/en/pages/about-deloitte/articles/sustainable-strategies/unveiling-vulnerabilities-in-cybersecurity.html", + "url": "https://www2.deloitte.com/xe/en/pages/about-deloitte/articles/sustainable-strategies/unveiling-vulnerabilities-in-cybersecurity.html" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:L/A:N/C:L/I:N/PR:N/S:U/UI:N", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24683.json b/2024/24xxx/CVE-2024-24683.json index e692ec14c65..cb7a30e2647 100644 --- a/2024/24xxx/CVE-2024-24683.json +++ b/2024/24xxx/CVE-2024-24683.json @@ -59,6 +59,11 @@ "url": "https://lists.apache.org/thread/ts203zssv1n9qth1wdlhk2bhos3vcq6t", "refsource": "MISC", "name": "https://lists.apache.org/thread/ts203zssv1n9qth1wdlhk2bhos3vcq6t" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/18/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/18/1" } ] }, diff --git a/2024/24xxx/CVE-2024-24746.json b/2024/24xxx/CVE-2024-24746.json index f8cb4e7345f..fba6440307c 100644 --- a/2024/24xxx/CVE-2024-24746.json +++ b/2024/24xxx/CVE-2024-24746.json @@ -64,6 +64,11 @@ "url": "https://github.com/apache/mynewt-nimble/commit/d42a0ebe6632bd0c318560e4293a522634f60594", "refsource": "MISC", "name": "https://github.com/apache/mynewt-nimble/commit/d42a0ebe6632bd0c318560e4293a522634f60594" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/05/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/05/2" } ] }, diff --git a/2024/25xxx/CVE-2024-25355.json b/2024/25xxx/CVE-2024-25355.json index d8d02e69313..b943325a3ef 100644 --- a/2024/25xxx/CVE-2024-25355.json +++ b/2024/25xxx/CVE-2024-25355.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-25355", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-25355", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "s3-url-parser 1.0.3 is vulnerable to Denial of service via the regexes component." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://gist.github.com/6en6ar/a4977866c59cbcfc716f0f2717b812bf", + "url": "https://gist.github.com/6en6ar/a4977866c59cbcfc716f0f2717b812bf" } ] } diff --git a/2024/25xxx/CVE-2024-25458.json b/2024/25xxx/CVE-2024-25458.json index 1e83abb44d9..15157acc971 100644 --- a/2024/25xxx/CVE-2024-25458.json +++ b/2024/25xxx/CVE-2024-25458.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-25458", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-25458", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in CYCZCAM, SHIX ZHAO, SHIXCAM A9 Camera (circuit board identifier A9-48B-V1.0) firmware v.CYCAM_48B_BC01_v87_0903 allows a remote attacker to obtain sensitive information via a crafted request to a UDP port." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://tanzhuyin.com/posts/cve-2024-25458/", + "url": "https://tanzhuyin.com/posts/cve-2024-25458/" } ] } diff --git a/2024/26xxx/CVE-2024-26280.json b/2024/26xxx/CVE-2024-26280.json index c1a16c82ae7..0fd79ac2f3e 100644 --- a/2024/26xxx/CVE-2024-26280.json +++ b/2024/26xxx/CVE-2024-26280.json @@ -64,6 +64,11 @@ "url": "https://lists.apache.org/thread/knskxxxml95091rsnpxkpo1jjp8rj0fh", "refsource": "MISC", "name": "https://lists.apache.org/thread/knskxxxml95091rsnpxkpo1jjp8rj0fh" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/01/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/01/1" } ] }, diff --git a/2024/26xxx/CVE-2024-26504.json b/2024/26xxx/CVE-2024-26504.json index ccd7b06c4e6..7e25f91abae 100644 --- a/2024/26xxx/CVE-2024-26504.json +++ b/2024/26xxx/CVE-2024-26504.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-26504", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-26504", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in Wifire Hotspot v.4.5.3 allows a local attacker to execute arbitrary code via a crafted payload to the dst parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://cwe.mitre.org/data/definitions/601.html", + "refsource": "MISC", + "name": "https://cwe.mitre.org/data/definitions/601.html" + }, + { + "url": "https://portswigger.net/kb/issues/00500100_open-redirection-reflected", + "refsource": "MISC", + "name": "https://portswigger.net/kb/issues/00500100_open-redirection-reflected" + }, + { + "url": "https://wifire.me/en/hotspot", + "refsource": "MISC", + "name": "https://wifire.me/en/hotspot" + }, + { + "refsource": "MISC", + "name": "https://tomiodarim.io/posts/cve-2024-26504/", + "url": "https://tomiodarim.io/posts/cve-2024-26504/" } ] } diff --git a/2024/27xxx/CVE-2024-27309.json b/2024/27xxx/CVE-2024-27309.json index 47769a4cfd8..d5f38030898 100644 --- a/2024/27xxx/CVE-2024-27309.json +++ b/2024/27xxx/CVE-2024-27309.json @@ -64,6 +64,11 @@ "url": "https://lists.apache.org/thread/6536rmzyg076lzzdw2xdktvnz163mjpy", "refsource": "MISC", "name": "https://lists.apache.org/thread/6536rmzyg076lzzdw2xdktvnz163mjpy" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/12/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/12/3" } ] }, diff --git a/2024/27xxx/CVE-2024-27349.json b/2024/27xxx/CVE-2024-27349.json index e6c203061b1..cb4b5c86931 100644 --- a/2024/27xxx/CVE-2024-27349.json +++ b/2024/27xxx/CVE-2024-27349.json @@ -59,6 +59,11 @@ "url": "https://lists.apache.org/thread/dz9n9lndqfsf64t72o73r7sttrc6ocsd", "refsource": "MISC", "name": "https://lists.apache.org/thread/dz9n9lndqfsf64t72o73r7sttrc6ocsd" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/22/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/22/4" } ] }, diff --git a/2024/27xxx/CVE-2024-27439.json b/2024/27xxx/CVE-2024-27439.json index ba6ad619d4c..c780190089d 100644 --- a/2024/27xxx/CVE-2024-27439.json +++ b/2024/27xxx/CVE-2024-27439.json @@ -73,6 +73,11 @@ "url": "https://lists.apache.org/thread/o825rvjjtmz3qv21ps5k7m2w9193g1lo", "refsource": "MISC", "name": "https://lists.apache.org/thread/o825rvjjtmz3qv21ps5k7m2w9193g1lo" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/19/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/19/2" } ] }, diff --git a/2024/27xxx/CVE-2024-27919.json b/2024/27xxx/CVE-2024-27919.json index 4e6fa5a8ec3..833efe4be66 100644 --- a/2024/27xxx/CVE-2024-27919.json +++ b/2024/27xxx/CVE-2024-27919.json @@ -68,11 +68,6 @@ "url": "http://www.openwall.com/lists/oss-security/2024/04/05/3", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2024/04/05/3" - }, - { - "url": "http://www.openwall.com/lists/oss-security/2024/04/03/16", - "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2024/04/03/16" } ] }, diff --git a/2024/28xxx/CVE-2024-28085.json b/2024/28xxx/CVE-2024-28085.json index 6ec74835098..51f8c9b2c46 100644 --- a/2024/28xxx/CVE-2024-28085.json +++ b/2024/28xxx/CVE-2024-28085.json @@ -102,25 +102,10 @@ "name": "[oss-security] 20240327 Re: CVE-2024-28085: Escape sequence injection in util-linux wall", "url": "http://www.openwall.com/lists/oss-security/2024/03/27/8" }, - { - "refsource": "MLIST", - "name": "[oss-security] 20240327 Re: CVE-2024-28085: Escape sequence injection in util-linux wall", - "url": "http://www.openwall.com/lists/oss-security/2024/03/27/7" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20240328 Re: Re: CVE-2024-28085: Escape sequence injection in util-linux wall", - "url": "http://www.openwall.com/lists/oss-security/2024/03/28/2" - }, { "refsource": "MLIST", "name": "[oss-security] 20240328 Re: CVE-2024-28085: Escape sequence injection in util-linux wall", "url": "http://www.openwall.com/lists/oss-security/2024/03/28/3" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20240327 CVE-2024-28085: Escape sequence injection in util-linux wall", - "url": "http://www.openwall.com/lists/oss-security/2024/03/27/5" } ] } diff --git a/2024/28xxx/CVE-2024-28752.json b/2024/28xxx/CVE-2024-28752.json index 1257760b271..34a51176261 100644 --- a/2024/28xxx/CVE-2024-28752.json +++ b/2024/28xxx/CVE-2024-28752.json @@ -59,6 +59,11 @@ "url": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt", "refsource": "MISC", "name": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/14/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/14/3" } ] }, diff --git a/2024/28xxx/CVE-2024-28834.json b/2024/28xxx/CVE-2024-28834.json index da4ce309400..5d07795f4d5 100644 --- a/2024/28xxx/CVE-2024-28834.json +++ b/2024/28xxx/CVE-2024-28834.json @@ -258,6 +258,16 @@ "url": "https://people.redhat.com/~hkario/marvin/", "refsource": "MISC", "name": "https://people.redhat.com/~hkario/marvin/" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/22/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/22/1" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/22/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/22/2" } ] }, diff --git a/2024/28xxx/CVE-2024-28835.json b/2024/28xxx/CVE-2024-28835.json index 3f9edf3a0ac..8abcfc2d0b6 100644 --- a/2024/28xxx/CVE-2024-28835.json +++ b/2024/28xxx/CVE-2024-28835.json @@ -169,6 +169,16 @@ "url": "https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html", "refsource": "MISC", "name": "https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/22/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/22/1" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/22/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/22/2" } ] }, diff --git a/2024/29xxx/CVE-2024-29131.json b/2024/29xxx/CVE-2024-29131.json index 8696ea781f6..11d825658ea 100644 --- a/2024/29xxx/CVE-2024-29131.json +++ b/2024/29xxx/CVE-2024-29131.json @@ -69,6 +69,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNKDKEEKZNL5FGCTZKJ6CFXFVWFL5FJ7/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNKDKEEKZNL5FGCTZKJ6CFXFVWFL5FJ7/" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/20/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/20/4" } ] }, diff --git a/2024/29xxx/CVE-2024-29440.json b/2024/29xxx/CVE-2024-29440.json index 007e9b5bb9d..53708501e9d 100644 --- a/2024/29xxx/CVE-2024-29440.json +++ b/2024/29xxx/CVE-2024-29440.json @@ -71,11 +71,6 @@ "refsource": "MLIST", "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", "url": "http://www.openwall.com/lists/oss-security/2024/04/23/3" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", - "url": "http://www.openwall.com/lists/oss-security/2024/04/23/5" } ] } diff --git a/2024/29xxx/CVE-2024-29444.json b/2024/29xxx/CVE-2024-29444.json index 56843bccd38..a61725bb52e 100644 --- a/2024/29xxx/CVE-2024-29444.json +++ b/2024/29xxx/CVE-2024-29444.json @@ -71,11 +71,6 @@ "refsource": "MLIST", "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", "url": "http://www.openwall.com/lists/oss-security/2024/04/23/3" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", - "url": "http://www.openwall.com/lists/oss-security/2024/04/23/5" } ] } diff --git a/2024/29xxx/CVE-2024-29454.json b/2024/29xxx/CVE-2024-29454.json index 859a6271993..6a623717bad 100644 --- a/2024/29xxx/CVE-2024-29454.json +++ b/2024/29xxx/CVE-2024-29454.json @@ -71,11 +71,6 @@ "refsource": "MLIST", "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", "url": "http://www.openwall.com/lists/oss-security/2024/04/23/3" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", - "url": "http://www.openwall.com/lists/oss-security/2024/04/23/5" } ] } diff --git a/2024/29xxx/CVE-2024-29733.json b/2024/29xxx/CVE-2024-29733.json index f21919cbca1..c3493d538a6 100644 --- a/2024/29xxx/CVE-2024-29733.json +++ b/2024/29xxx/CVE-2024-29733.json @@ -74,6 +74,11 @@ "url": "https://lists.apache.org/thread/265t5zbmtjs6h9fkw52wtp03nsbplky2", "refsource": "MISC", "name": "https://lists.apache.org/thread/265t5zbmtjs6h9fkw52wtp03nsbplky2" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/19/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/19/3" } ] }, diff --git a/2024/29xxx/CVE-2024-29943.json b/2024/29xxx/CVE-2024-29943.json index 0aa37f17c93..9b254f23051 100644 --- a/2024/29xxx/CVE-2024-29943.json +++ b/2024/29xxx/CVE-2024-29943.json @@ -63,6 +63,11 @@ "url": "https://www.mozilla.org/security/advisories/mfsa2024-15/", "refsource": "MISC", "name": "https://www.mozilla.org/security/advisories/mfsa2024-15/" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/23/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/23/1" } ] }, diff --git a/2024/29xxx/CVE-2024-29944.json b/2024/29xxx/CVE-2024-29944.json index 3201c56206c..7cb19b86505 100644 --- a/2024/29xxx/CVE-2024-29944.json +++ b/2024/29xxx/CVE-2024-29944.json @@ -85,6 +85,11 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html", "refsource": "MISC", "name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/23/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/23/1" } ] }, diff --git a/2024/2xxx/CVE-2024-2182.json b/2024/2xxx/CVE-2024-2182.json index 797f90bf4dd..7b57b122876 100644 --- a/2024/2xxx/CVE-2024-2182.json +++ b/2024/2xxx/CVE-2024-2182.json @@ -398,6 +398,11 @@ "url": "https://www.openwall.com/lists/oss-security/2024/03/12/5", "refsource": "MISC", "name": "https://www.openwall.com/lists/oss-security/2024/03/12/5" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/12/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/12/5" } ] }, diff --git a/2024/2xxx/CVE-2024-2398.json b/2024/2xxx/CVE-2024-2398.json index 985ecf3db72..17de84008d3 100644 --- a/2024/2xxx/CVE-2024-2398.json +++ b/2024/2xxx/CVE-2024-2398.json @@ -458,6 +458,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/27/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/27/3" } ] }, diff --git a/2024/2xxx/CVE-2024-2848.json b/2024/2xxx/CVE-2024-2848.json index bf11c5c44b3..7c744833b3e 100644 --- a/2024/2xxx/CVE-2024-2848.json +++ b/2024/2xxx/CVE-2024-2848.json @@ -63,6 +63,11 @@ "url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=222494%40responsive&new=222494%40responsive&sfp_email=&sfph_mail=", "refsource": "MISC", "name": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=222494%40responsive&new=222494%40responsive&sfp_email=&sfph_mail=" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/22/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/22/1" } ] }, diff --git a/2024/2xxx/CVE-2024-2961.json b/2024/2xxx/CVE-2024-2961.json index 355d6491082..cec83f157dd 100644 --- a/2024/2xxx/CVE-2024-2961.json +++ b/2024/2xxx/CVE-2024-2961.json @@ -79,6 +79,16 @@ "url": "http://www.openwall.com/lists/oss-security/2024/04/24/2", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2024/04/24/2" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/17/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/17/9" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/18/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/18/4" } ] }, diff --git a/2024/30xxx/CVE-2024-30202.json b/2024/30xxx/CVE-2024-30202.json index b3d44f96b71..e68522bc3e8 100644 --- a/2024/30xxx/CVE-2024-30202.json +++ b/2024/30xxx/CVE-2024-30202.json @@ -71,6 +71,11 @@ "refsource": "MLIST", "name": "[oss-security] 20240325 Re: GNU emacs 29.3 released to fix security issues", "url": "http://www.openwall.com/lists/oss-security/2024/03/25/2" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20240408 Re: Is CVE-2024-30203 bogus? (Emacs)", + "url": "http://www.openwall.com/lists/oss-security/2024/04/08/6" } ] } diff --git a/2024/30xxx/CVE-2024-30203.json b/2024/30xxx/CVE-2024-30203.json index a3da22a309a..1e946071320 100644 --- a/2024/30xxx/CVE-2024-30203.json +++ b/2024/30xxx/CVE-2024-30203.json @@ -126,11 +126,6 @@ "refsource": "MLIST", "name": "[oss-security] 20240408 Is CVE-2024-30203 bogus? (Emacs)", "url": "http://www.openwall.com/lists/oss-security/2024/04/08/3" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20240410 Re: Is CVE-2024-30203 bogus? (Emacs)", - "url": "http://www.openwall.com/lists/oss-security/2024/04/10/6" } ] } diff --git a/2024/30xxx/CVE-2024-30204.json b/2024/30xxx/CVE-2024-30204.json index 7c795bd2745..a4c4570d30f 100644 --- a/2024/30xxx/CVE-2024-30204.json +++ b/2024/30xxx/CVE-2024-30204.json @@ -116,11 +116,6 @@ "refsource": "MLIST", "name": "[oss-security] 20240408 Is CVE-2024-30203 bogus? (Emacs)", "url": "http://www.openwall.com/lists/oss-security/2024/04/08/3" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20240410 Re: Is CVE-2024-30203 bogus? (Emacs)", - "url": "http://www.openwall.com/lists/oss-security/2024/04/10/6" } ] } diff --git a/2024/30xxx/CVE-2024-30255.json b/2024/30xxx/CVE-2024-30255.json index 71cd9fb9e31..3ab010e5e15 100644 --- a/2024/30xxx/CVE-2024-30255.json +++ b/2024/30xxx/CVE-2024-30255.json @@ -75,11 +75,6 @@ "url": "http://www.openwall.com/lists/oss-security/2024/04/05/3", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2024/04/05/3" - }, - { - "url": "http://www.openwall.com/lists/oss-security/2024/04/03/16", - "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2024/04/03/16" } ] }, diff --git a/2024/30xxx/CVE-2024-30674.json b/2024/30xxx/CVE-2024-30674.json index fad51df8a19..b9d33eed796 100644 --- a/2024/30xxx/CVE-2024-30674.json +++ b/2024/30xxx/CVE-2024-30674.json @@ -71,11 +71,6 @@ "refsource": "MLIST", "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", "url": "http://www.openwall.com/lists/oss-security/2024/04/23/3" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", - "url": "http://www.openwall.com/lists/oss-security/2024/04/23/5" } ] } diff --git a/2024/30xxx/CVE-2024-30691.json b/2024/30xxx/CVE-2024-30691.json index 8fb4908b2c0..65d7a92ee47 100644 --- a/2024/30xxx/CVE-2024-30691.json +++ b/2024/30xxx/CVE-2024-30691.json @@ -71,11 +71,6 @@ "refsource": "MLIST", "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", "url": "http://www.openwall.com/lists/oss-security/2024/04/23/3" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", - "url": "http://www.openwall.com/lists/oss-security/2024/04/23/5" } ] } diff --git a/2024/30xxx/CVE-2024-30703.json b/2024/30xxx/CVE-2024-30703.json index 4c534300046..f7c7cc86df0 100644 --- a/2024/30xxx/CVE-2024-30703.json +++ b/2024/30xxx/CVE-2024-30703.json @@ -71,11 +71,6 @@ "refsource": "MLIST", "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", "url": "http://www.openwall.com/lists/oss-security/2024/04/23/3" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", - "url": "http://www.openwall.com/lists/oss-security/2024/04/23/5" } ] } diff --git a/2024/30xxx/CVE-2024-30704.json b/2024/30xxx/CVE-2024-30704.json index 89581694d15..be7ccf5ef77 100644 --- a/2024/30xxx/CVE-2024-30704.json +++ b/2024/30xxx/CVE-2024-30704.json @@ -71,11 +71,6 @@ "refsource": "MLIST", "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", "url": "http://www.openwall.com/lists/oss-security/2024/04/23/3" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", - "url": "http://www.openwall.com/lists/oss-security/2024/04/23/5" } ] } diff --git a/2024/30xxx/CVE-2024-30712.json b/2024/30xxx/CVE-2024-30712.json index cc8388aebe1..2746d5f2c16 100644 --- a/2024/30xxx/CVE-2024-30712.json +++ b/2024/30xxx/CVE-2024-30712.json @@ -71,11 +71,6 @@ "refsource": "MLIST", "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", "url": "http://www.openwall.com/lists/oss-security/2024/04/23/3" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", - "url": "http://www.openwall.com/lists/oss-security/2024/04/23/5" } ] } diff --git a/2024/30xxx/CVE-2024-30722.json b/2024/30xxx/CVE-2024-30722.json index ce8fb3ef53a..fe6f20da38d 100644 --- a/2024/30xxx/CVE-2024-30722.json +++ b/2024/30xxx/CVE-2024-30722.json @@ -71,11 +71,6 @@ "refsource": "MLIST", "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", "url": "http://www.openwall.com/lists/oss-security/2024/04/23/3" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", - "url": "http://www.openwall.com/lists/oss-security/2024/04/23/5" } ] } diff --git a/2024/30xxx/CVE-2024-30727.json b/2024/30xxx/CVE-2024-30727.json index b16dfa0a9d1..52b208c9705 100644 --- a/2024/30xxx/CVE-2024-30727.json +++ b/2024/30xxx/CVE-2024-30727.json @@ -71,11 +71,6 @@ "refsource": "MLIST", "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", "url": "http://www.openwall.com/lists/oss-security/2024/04/23/3" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20240423 Re: 83 bogus CVEs assigned to Robot Operating System (ROS)", - "url": "http://www.openwall.com/lists/oss-security/2024/04/23/5" } ] } diff --git a/2024/31xxx/CVE-2024-31497.json b/2024/31xxx/CVE-2024-31497.json index 5db78f124f9..eb5f590d987 100644 --- a/2024/31xxx/CVE-2024-31497.json +++ b/2024/31xxx/CVE-2024-31497.json @@ -176,6 +176,11 @@ "refsource": "FEDORA", "name": "FEDORA-2024-cba85cc558", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PUOTQVGC4DISVHQGSPUYGXO6TLDK65LA/" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20240415 CVE-2024-31497: Secret Key Recovery of NIST P-521 Private Keys Through Biased ECDSA Nonces in PuTTY Client", + "url": "http://www.openwall.com/lists/oss-security/2024/04/15/6" } ] } diff --git a/2024/31xxx/CVE-2024-31860.json b/2024/31xxx/CVE-2024-31860.json index c223c0c0087..308ce8d082f 100644 --- a/2024/31xxx/CVE-2024-31860.json +++ b/2024/31xxx/CVE-2024-31860.json @@ -64,6 +64,11 @@ "url": "https://lists.apache.org/thread/c0zfjnow3oc3dzc8w5rbkzj8lqj5jm5x", "refsource": "MISC", "name": "https://lists.apache.org/thread/c0zfjnow3oc3dzc8w5rbkzj8lqj5jm5x" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/09/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/09/2" } ] }, diff --git a/2024/31xxx/CVE-2024-31861.json b/2024/31xxx/CVE-2024-31861.json index a1332624d46..da3a956f84f 100644 --- a/2024/31xxx/CVE-2024-31861.json +++ b/2024/31xxx/CVE-2024-31861.json @@ -64,6 +64,11 @@ "url": "https://lists.apache.org/thread/99clvqrht5l5r6kzjzwg2kj94boc9sfh", "refsource": "MISC", "name": "https://lists.apache.org/thread/99clvqrht5l5r6kzjzwg2kj94boc9sfh" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/10/8", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/10/8" } ] }, diff --git a/2024/31xxx/CVE-2024-31866.json b/2024/31xxx/CVE-2024-31866.json index 47ddad78240..0fcd44d02d8 100644 --- a/2024/31xxx/CVE-2024-31866.json +++ b/2024/31xxx/CVE-2024-31866.json @@ -64,6 +64,11 @@ "url": "https://lists.apache.org/thread/jpkbq3oktopt34x2n5wnhzc2r1410ddd", "refsource": "MISC", "name": "https://lists.apache.org/thread/jpkbq3oktopt34x2n5wnhzc2r1410ddd" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/09/10", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/09/10" } ] }, diff --git a/2024/31xxx/CVE-2024-31867.json b/2024/31xxx/CVE-2024-31867.json index 74c1d5bd659..ff48c12ef8e 100644 --- a/2024/31xxx/CVE-2024-31867.json +++ b/2024/31xxx/CVE-2024-31867.json @@ -64,6 +64,11 @@ "url": "https://lists.apache.org/thread/s4scw8bxdhrjs0kg0lhb68xqd8y9lrtf", "refsource": "MISC", "name": "https://lists.apache.org/thread/s4scw8bxdhrjs0kg0lhb68xqd8y9lrtf" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/09/12", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/09/12" } ] }, diff --git a/2024/31xxx/CVE-2024-31869.json b/2024/31xxx/CVE-2024-31869.json index d24041212ee..9203db69f2c 100644 --- a/2024/31xxx/CVE-2024-31869.json +++ b/2024/31xxx/CVE-2024-31869.json @@ -64,6 +64,11 @@ "url": "https://lists.apache.org/thread/pz6vg7wcjk901rmsgt86h76g6kfcgtk3", "refsource": "MISC", "name": "https://lists.apache.org/thread/pz6vg7wcjk901rmsgt86h76g6kfcgtk3" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/17/10", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/17/10" } ] }, diff --git a/2024/32xxx/CVE-2024-32212.json b/2024/32xxx/CVE-2024-32212.json index ecba3ea1143..b180ea67b34 100644 --- a/2024/32xxx/CVE-2024-32212.json +++ b/2024/32xxx/CVE-2024-32212.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-32212", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-32212", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL Injection vulnerability in LOGINT LoMag Inventory Management v1.0.20.120 and before allows an attacker to execute arbitrary code via the ArticleGetGroups, DocAddDocument, ClassClickShop and frmSettings components." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://gainsec.com/2024/04/28/cve-2024-32210-cve-2024-32211-cve-2024-32212-cve-2024-32213-lomag-integrator-ce-warehouse-management/", + "url": "https://gainsec.com/2024/04/28/cve-2024-32210-cve-2024-32211-cve-2024-32212-cve-2024-32213-lomag-integrator-ce-warehouse-management/" } ] } diff --git a/2024/32xxx/CVE-2024-32213.json b/2024/32xxx/CVE-2024-32213.json index b6e07a4c509..f8bccfa81df 100644 --- a/2024/32xxx/CVE-2024-32213.json +++ b/2024/32xxx/CVE-2024-32213.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-32213", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-32213", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The LoMag WareHouse Management application version 1.0.20.120 and older were found to allow weak passwords. By default, hard-coded passwords of 10 characters with little or no complexity are allowed." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://gainsec.com/2024/04/28/cve-2024-32210-cve-2024-32211-cve-2024-32212-cve-2024-32213-lomag-integrator-ce-warehouse-management/", + "url": "https://gainsec.com/2024/04/28/cve-2024-32210-cve-2024-32211-cve-2024-32212-cve-2024-32213-lomag-integrator-ce-warehouse-management/" } ] } diff --git a/2024/32xxx/CVE-2024-32462.json b/2024/32xxx/CVE-2024-32462.json index 4cca94856e2..b6c99bb96c7 100644 --- a/2024/32xxx/CVE-2024-32462.json +++ b/2024/32xxx/CVE-2024-32462.json @@ -100,6 +100,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IB6VQAF5S2YOBULDHPUKPOEIKONOP5KO/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IB6VQAF5S2YOBULDHPUKPOEIKONOP5KO/" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/18/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/04/18/5" } ] }, diff --git a/2024/33xxx/CVE-2024-33300.json b/2024/33xxx/CVE-2024-33300.json index 482a1f47b8e..417960c639b 100644 --- a/2024/33xxx/CVE-2024-33300.json +++ b/2024/33xxx/CVE-2024-33300.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-33300", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-33300", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Typora v1.0.0 through v1.7 version (below) Markdown editor has a cross-site scripting (XSS) vulnerability, which allows attackers to execute arbitrary code by uploading Markdown files." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://github.com/whoisoo6/Stored-xss-vulnerability-exists-in-Typra", + "url": "https://github.com/whoisoo6/Stored-xss-vulnerability-exists-in-Typra" } ] } diff --git a/2024/33xxx/CVE-2024-33304.json b/2024/33xxx/CVE-2024-33304.json index 1f4ba3809f0..8df9cc7e165 100644 --- a/2024/33xxx/CVE-2024-33304.json +++ b/2024/33xxx/CVE-2024-33304.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-33304", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-33304", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SourceCodester Product Show Room 1.0 is vulnerable to Cross Site Scripting (XSS) via \"Last Name\" under Add Users." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33304.md", + "url": "https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33304.md" } ] } diff --git a/2024/33xxx/CVE-2024-33393.json b/2024/33xxx/CVE-2024-33393.json index 1fe83e86192..14c59b86a1a 100644 --- a/2024/33xxx/CVE-2024-33393.json +++ b/2024/33xxx/CVE-2024-33393.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-33393", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-33393", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in spidernet-io spiderpool v.0.9.3 and before allows a local attacker to execute arbitrary code via a crafted command to get the token component." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://gist.github.com/HouqiyuA/fdb09caea44c80a5681ca1d30bcd6777", + "url": "https://gist.github.com/HouqiyuA/fdb09caea44c80a5681ca1d30bcd6777" } ] } diff --git a/2024/33xxx/CVE-2024-33428.json b/2024/33xxx/CVE-2024-33428.json index d551a6d6f4f..3b71fb608b9 100644 --- a/2024/33xxx/CVE-2024-33428.json +++ b/2024/33xxx/CVE-2024-33428.json @@ -1,17 +1,81 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-33428", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-33428", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Buffer-Overflow vulnerability at conv.c:68 of stsaz phiola v2.0-rc22 allows a remote attacker to execute arbitrary code via the a crafted .wav file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/stsaz/phiola/issues/29", + "refsource": "MISC", + "name": "https://github.com/stsaz/phiola/issues/29" + }, + { + "url": "https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/heap-buffer-overflow-1", + "refsource": "MISC", + "name": "https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/heap-buffer-overflow-1" + }, + { + "url": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/heap-buffer-overflow-1.md", + "refsource": "MISC", + "name": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/heap-buffer-overflow-1.md" + }, + { + "url": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/poc", + "refsource": "MISC", + "name": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/poc" + }, + { + "url": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/heap-buffer-overflow-1.assets/image-20240420005017430.png", + "refsource": "MISC", + "name": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/heap-buffer-overflow-1.assets/image-20240420005017430.png" } ] } diff --git a/2024/33xxx/CVE-2024-33429.json b/2024/33xxx/CVE-2024-33429.json index 01411f159e7..7a13b520153 100644 --- a/2024/33xxx/CVE-2024-33429.json +++ b/2024/33xxx/CVE-2024-33429.json @@ -1,17 +1,86 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-33429", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-33429", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Buffer-Overflow vulnerability at pcm_convert.h:513 of phiola v2.0-rc22 allows a remote attacker to execute arbitrary code via a crafted .wav file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/stsaz/phiola/", + "refsource": "MISC", + "name": "https://github.com/stsaz/phiola/" + }, + { + "url": "https://github.com/stsaz/phiola/issues/30", + "refsource": "MISC", + "name": "https://github.com/stsaz/phiola/issues/30" + }, + { + "url": "https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/heap-buffer-overflow-2", + "refsource": "MISC", + "name": "https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/heap-buffer-overflow-2" + }, + { + "url": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/heap-buffer-overflow-2.md", + "refsource": "MISC", + "name": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/heap-buffer-overflow-2.md" + }, + { + "url": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/poc/", + "refsource": "MISC", + "name": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/poc/" + }, + { + "url": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/heap-buffer-overflow-2.assets/image-20240420011116818.png", + "refsource": "MISC", + "name": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/heap-buffer-overflow-2.assets/image-20240420011116818.png" } ] } diff --git a/2024/33xxx/CVE-2024-33430.json b/2024/33xxx/CVE-2024-33430.json index 8b2eb8ffc13..bbdad47e199 100644 --- a/2024/33xxx/CVE-2024-33430.json +++ b/2024/33xxx/CVE-2024-33430.json @@ -1,17 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-33430", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-33430", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in phiola/src/afilter/pcm_convert.h:513 of phiola v2.0-rc22 allows a remote attacker to execute arbitrary code via the a crafted .wav file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/stsaz/phiola/", + "refsource": "MISC", + "name": "https://github.com/stsaz/phiola/" + }, + { + "url": "https://github.com/stsaz/phiola/issues/28", + "refsource": "MISC", + "name": "https://github.com/stsaz/phiola/issues/28" + }, + { + "url": "https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/segmentFault-1", + "refsource": "MISC", + "name": "https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/segmentFault-1" + }, + { + "url": "https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/segmentFault-1/poc", + "refsource": "MISC", + "name": "https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/segmentFault-1/poc" + }, + { + "url": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/poc/I2ZFI3~5", + "refsource": "MISC", + "name": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/poc/I2ZFI3~5" + }, + { + "url": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/segmentFault-1.md", + "refsource": "MISC", + "name": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/segmentFault-1.md" + }, + { + "url": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/segmentFault-1.assets/image-20240420011601263.png", + "refsource": "MISC", + "name": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/segmentFault-1.assets/image-20240420011601263.png" } ] } diff --git a/2024/33xxx/CVE-2024-33431.json b/2024/33xxx/CVE-2024-33431.json index 43c5459ae07..fd926b61ccb 100644 --- a/2024/33xxx/CVE-2024-33431.json +++ b/2024/33xxx/CVE-2024-33431.json @@ -1,17 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-33431", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-33431", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in phiola/src/afilter/conv.c:115 of phiola v2.0-rc22 allows a remote attacker to cause a denial of service via a crafted .wav file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/stsaz/phiola/", + "refsource": "MISC", + "name": "https://github.com/stsaz/phiola/" + }, + { + "url": "https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/flowPointException-1", + "refsource": "MISC", + "name": "https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/flowPointException-1" + }, + { + "url": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/flowPointException-1.md", + "refsource": "MISC", + "name": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/flowPointException-1.md" + }, + { + "url": "https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/flowPointException-1/poc", + "refsource": "MISC", + "name": "https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/flowPointException-1/poc" + }, + { + "url": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/poc/I0I72U~G", + "refsource": "MISC", + "name": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/poc/I0I72U~G" + }, + { + "url": "https://github.com/stsaz/phiola/issues/27", + "refsource": "MISC", + "name": "https://github.com/stsaz/phiola/issues/27" + }, + { + "url": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/flowPointException-1.assets/image-20240420004701828.png", + "refsource": "MISC", + "name": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/flowPointException-1.assets/image-20240420004701828.png" } ] } diff --git a/2024/34xxx/CVE-2024-34154.json b/2024/34xxx/CVE-2024-34154.json new file mode 100644 index 00000000000..38f787db68a --- /dev/null +++ b/2024/34xxx/CVE-2024-34154.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34154", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34155.json b/2024/34xxx/CVE-2024-34155.json new file mode 100644 index 00000000000..90a3b169f6d --- /dev/null +++ b/2024/34xxx/CVE-2024-34155.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34155", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34156.json b/2024/34xxx/CVE-2024-34156.json new file mode 100644 index 00000000000..3b09b702473 --- /dev/null +++ b/2024/34xxx/CVE-2024-34156.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34156", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34157.json b/2024/34xxx/CVE-2024-34157.json new file mode 100644 index 00000000000..86d33f57ac5 --- /dev/null +++ b/2024/34xxx/CVE-2024-34157.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34157", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34158.json b/2024/34xxx/CVE-2024-34158.json new file mode 100644 index 00000000000..3f7c5bac4db --- /dev/null +++ b/2024/34xxx/CVE-2024-34158.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34158", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3094.json b/2024/3xxx/CVE-2024-3094.json index c4b08b35122..e3552dfdbdd 100644 --- a/2024/3xxx/CVE-2024-3094.json +++ b/2024/3xxx/CVE-2024-3094.json @@ -338,10 +338,25 @@ "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2024/03/30/27" }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/29/10", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/29/10" + }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/29/8", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2024/03/29/8" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/30/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/30/5" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/29/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/03/29/4" } ] },