diff --git a/2024/11xxx/CVE-2024-11026.json b/2024/11xxx/CVE-2024-11026.json index 0e5df004ddb..e946ed9fb69 100644 --- a/2024/11xxx/CVE-2024-11026.json +++ b/2024/11xxx/CVE-2024-11026.json @@ -1,17 +1,118 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-11026", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Intelligent Apps Freenow App 12.10.0 on Android. It has been rated as problematic. Affected by this issue is some unknown functionality of the file ch/qos/logback/core/net/ssl/SSL.java of the component Keystore Handler. The manipulation of the argument DEFAULT_KEYSTORE_PASSWORD with the input changeit leads to use of hard-coded password. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Eine problematische Schwachstelle wurde in Intelligent Apps Freenow App 12.10.0 f\u00fcr Android ausgemacht. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei ch/qos/logback/core/net/ssl/SSL.java der Komponente Keystore Handler. Durch Manipulieren des Arguments DEFAULT_KEYSTORE_PASSWORD mit der Eingabe changeit mit unbekannten Daten kann eine use of hard-coded password-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie ist schwierig ausnutzbar. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use of Hard-coded Password", + "cweId": "CWE-259" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Credentials Management", + "cweId": "CWE-255" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Intelligent Apps", + "product": { + "product_data": [ + { + "product_name": "Freenow App", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "12.10.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.283544", + "refsource": "MISC", + "name": "https://vuldb.com/?id.283544" + }, + { + "url": "https://vuldb.com/?ctiid.283544", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.283544" + }, + { + "url": "https://vuldb.com/?submit.434538", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.434538" + }, + { + "url": "https://github.com/secuserx/CVE/blob/main/%5BHardcoded%20Keystore%20Password%5D%20found%20in%20FREENOW%20(ex%20Beat%20app)%2012.10.0%20-%20(SSL.java).md", + "refsource": "MISC", + "name": "https://github.com/secuserx/CVE/blob/main/%5BHardcoded%20Keystore%20Password%5D%20found%20in%20FREENOW%20(ex%20Beat%20app)%2012.10.0%20-%20(SSL.java).md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "secuserx (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 3.7, + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 3.7, + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 2.6, + "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N" } ] } diff --git a/2024/11xxx/CVE-2024-11029.json b/2024/11xxx/CVE-2024-11029.json new file mode 100644 index 00000000000..6519f831c84 --- /dev/null +++ b/2024/11xxx/CVE-2024-11029.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-11029", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/11xxx/CVE-2024-11030.json b/2024/11xxx/CVE-2024-11030.json new file mode 100644 index 00000000000..65718d641ff --- /dev/null +++ b/2024/11xxx/CVE-2024-11030.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-11030", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/11xxx/CVE-2024-11031.json b/2024/11xxx/CVE-2024-11031.json new file mode 100644 index 00000000000..815d29dc8db --- /dev/null +++ b/2024/11xxx/CVE-2024-11031.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-11031", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/11xxx/CVE-2024-11032.json b/2024/11xxx/CVE-2024-11032.json new file mode 100644 index 00000000000..9b7b056a4ce --- /dev/null +++ b/2024/11xxx/CVE-2024-11032.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-11032", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/11xxx/CVE-2024-11033.json b/2024/11xxx/CVE-2024-11033.json new file mode 100644 index 00000000000..ca9fd5f8ab3 --- /dev/null +++ b/2024/11xxx/CVE-2024-11033.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-11033", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/21xxx/CVE-2024-21994.json b/2024/21xxx/CVE-2024-21994.json index 8db283e9d69..b53306d7df9 100644 --- a/2024/21xxx/CVE-2024-21994.json +++ b/2024/21xxx/CVE-2024-21994.json @@ -1,17 +1,88 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-21994", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@netapp.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "StorageGRID (formerly StorageGRID Webscale) versions prior to 11.9 are susceptible to a Denial of Service (DoS) vulnerability. Successful exploit by an authenticated attacker could lead to a service crash." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "789" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NetApp", + "product": { + "product_data": [ + { + "product_name": "StorageGRID", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "11.9.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://security.netapp.com/advisory/ntap-20241108-0001/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20241108-0001/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "advisory": "NTAP-20241108-0001", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" } ] } diff --git a/2024/27xxx/CVE-2024-27527.json b/2024/27xxx/CVE-2024-27527.json index f02ed72305d..2be73ac0dd7 100644 --- a/2024/27xxx/CVE-2024-27527.json +++ b/2024/27xxx/CVE-2024-27527.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-27527", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-27527", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "wasm3 139076a is vulnerable to Denial of Service (DoS)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/wasm3/wasm3/issues/464", + "refsource": "MISC", + "name": "https://github.com/wasm3/wasm3/issues/464" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/haruki3hhh/5d2f3a216457aeef9f40331aca33be6e", + "url": "https://gist.github.com/haruki3hhh/5d2f3a216457aeef9f40331aca33be6e" } ] } diff --git a/2024/27xxx/CVE-2024-27528.json b/2024/27xxx/CVE-2024-27528.json index 797b1fad7eb..ca8a60e1636 100644 --- a/2024/27xxx/CVE-2024-27528.json +++ b/2024/27xxx/CVE-2024-27528.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-27528", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-27528", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "wasm3 139076a suffers from Invalid Memory Read, leading to DoS and potential Code Execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/wasm3/wasm3/issues/463", + "refsource": "MISC", + "name": "https://github.com/wasm3/wasm3/issues/463" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/haruki3hhh/baa757c4af4fefb410d9c74d7a68152e", + "url": "https://gist.github.com/haruki3hhh/baa757c4af4fefb410d9c74d7a68152e" } ] } diff --git a/2024/27xxx/CVE-2024-27529.json b/2024/27xxx/CVE-2024-27529.json index 0ae2a6ae5fb..9f8fd9be52f 100644 --- a/2024/27xxx/CVE-2024-27529.json +++ b/2024/27xxx/CVE-2024-27529.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-27529", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-27529", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "wasm3 139076a contains memory leaks in Read_utf8." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/wasm3/wasm3/issues/462", + "refsource": "MISC", + "name": "https://github.com/wasm3/wasm3/issues/462" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/haruki3hhh/ac70bd83b9c0ed1de6289d818488da78", + "url": "https://gist.github.com/haruki3hhh/ac70bd83b9c0ed1de6289d818488da78" } ] } diff --git a/2024/27xxx/CVE-2024-27530.json b/2024/27xxx/CVE-2024-27530.json index 8adb6457377..994eb2952c3 100644 --- a/2024/27xxx/CVE-2024-27530.json +++ b/2024/27xxx/CVE-2024-27530.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-27530", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-27530", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "wasm3 139076a contains a Use-After-Free in ForEachModule." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/wasm3/wasm3/issues/458", + "refsource": "MISC", + "name": "https://github.com/wasm3/wasm3/issues/458" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/haruki3hhh/94dd274487b58e037bcc8839dc88b203", + "url": "https://gist.github.com/haruki3hhh/94dd274487b58e037bcc8839dc88b203" } ] } diff --git a/2024/27xxx/CVE-2024-27532.json b/2024/27xxx/CVE-2024-27532.json index 81356025740..7584ba7c223 100644 --- a/2024/27xxx/CVE-2024-27532.json +++ b/2024/27xxx/CVE-2024-27532.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-27532", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-27532", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "wasm-micro-runtime (aka WebAssembly Micro Runtime or WAMR) 06df58f is vulnerable to NULL Pointer Dereference in function `block_type_get_result_types." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/bytecodealliance/wasm-micro-runtime/issues/3130", + "refsource": "MISC", + "name": "https://github.com/bytecodealliance/wasm-micro-runtime/issues/3130" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/haruki3hhh/e468ac3b3234f9bc42a9cc367457119a", + "url": "https://gist.github.com/haruki3hhh/e468ac3b3234f9bc42a9cc367457119a" } ] } diff --git a/2024/35xxx/CVE-2024-35410.json b/2024/35xxx/CVE-2024-35410.json index 3713facd6cc..bb672545b0f 100644 --- a/2024/35xxx/CVE-2024-35410.json +++ b/2024/35xxx/CVE-2024-35410.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-35410", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-35410", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "wac commit 385e1 was discovered to contain a heap overflow via the interpret function at /wac-asan/wa.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted wasm file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/kanaka/wac/issues/17", + "refsource": "MISC", + "name": "https://github.com/kanaka/wac/issues/17" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/haruki3hhh/f686e1d517e8f5d1281b02e633129522", + "url": "https://gist.github.com/haruki3hhh/f686e1d517e8f5d1281b02e633129522" } ] } diff --git a/2024/35xxx/CVE-2024-35418.json b/2024/35xxx/CVE-2024-35418.json index 145ae2aa4ea..975e2ff233a 100644 --- a/2024/35xxx/CVE-2024-35418.json +++ b/2024/35xxx/CVE-2024-35418.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-35418", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-35418", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "wac commit 385e1 was discovered to contain a heap overflow via the setup_call function at /wac-asan/wa.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted wasm file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/kanaka/wac/issues/19", + "refsource": "MISC", + "name": "https://github.com/kanaka/wac/issues/19" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/haruki3hhh/29237c52bd0cc30e3cc906f0af221b09", + "url": "https://gist.github.com/haruki3hhh/29237c52bd0cc30e3cc906f0af221b09" } ] } diff --git a/2024/35xxx/CVE-2024-35419.json b/2024/35xxx/CVE-2024-35419.json index 644226bcfa3..f19d1aaa157 100644 --- a/2024/35xxx/CVE-2024-35419.json +++ b/2024/35xxx/CVE-2024-35419.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-35419", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-35419", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "wac commit 385e1 was discovered to contain a heap overflow via the load_module function at /wac-asan/wa.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted wasm file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/kanaka/wac/issues/18", + "refsource": "MISC", + "name": "https://github.com/kanaka/wac/issues/18" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/haruki3hhh/8b9e1922083abef33a9024017eb2b9fe", + "url": "https://gist.github.com/haruki3hhh/8b9e1922083abef33a9024017eb2b9fe" } ] } diff --git a/2024/35xxx/CVE-2024-35420.json b/2024/35xxx/CVE-2024-35420.json index 18072521157..2de1eac9615 100644 --- a/2024/35xxx/CVE-2024-35420.json +++ b/2024/35xxx/CVE-2024-35420.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-35420", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-35420", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "wac commit 385e1 was discovered to contain a heap overflow." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/kanaka/wac/issues/20", + "refsource": "MISC", + "name": "https://github.com/kanaka/wac/issues/20" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/haruki3hhh/ebabc705fb04aff38c600f2b63601aae", + "url": "https://gist.github.com/haruki3hhh/ebabc705fb04aff38c600f2b63601aae" } ] } diff --git a/2024/35xxx/CVE-2024-35423.json b/2024/35xxx/CVE-2024-35423.json index a4836cc20ce..0605f3a1a69 100644 --- a/2024/35xxx/CVE-2024-35423.json +++ b/2024/35xxx/CVE-2024-35423.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-35423", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-35423", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "vmir e8117 was discovered to contain a heap buffer overflow via the wasm_parse_section_functions function at /src/vmir_wasm_parser.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/andoma/vmir/issues/18", + "refsource": "MISC", + "name": "https://github.com/andoma/vmir/issues/18" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/haruki3hhh/32fd20583f2008e6b68caaaaf4ecf237", + "url": "https://gist.github.com/haruki3hhh/32fd20583f2008e6b68caaaaf4ecf237" } ] } diff --git a/2024/35xxx/CVE-2024-35424.json b/2024/35xxx/CVE-2024-35424.json index 049b13a39c3..72fff851aa9 100644 --- a/2024/35xxx/CVE-2024-35424.json +++ b/2024/35xxx/CVE-2024-35424.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-35424", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-35424", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "vmir e8117 was discovered to contain a segmentation violation via the import_function function at /src/vmir_wasm_parser.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/andoma/vmir/issues/21", + "refsource": "MISC", + "name": "https://github.com/andoma/vmir/issues/21" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/haruki3hhh/58fa3df36ca7d0c972c7481cf80ffd80", + "url": "https://gist.github.com/haruki3hhh/58fa3df36ca7d0c972c7481cf80ffd80" } ] } diff --git a/2024/38xxx/CVE-2024-38204.json b/2024/38xxx/CVE-2024-38204.json index cfd9c15dc99..b864b8b6a20 100644 --- a/2024/38xxx/CVE-2024-38204.json +++ b/2024/38xxx/CVE-2024-38204.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Improper Access Control in Imagine Cup allows an authorized attacker to elevate privileges over a network." + "value": "Improper access control in Imagine Cup allows an authorized attacker to elevate privileges over a network." } ] }, diff --git a/2024/48xxx/CVE-2024-48073.json b/2024/48xxx/CVE-2024-48073.json index 03b5839d3e4..fb96df5d2f9 100644 --- a/2024/48xxx/CVE-2024-48073.json +++ b/2024/48xxx/CVE-2024-48073.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-48073", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-48073", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "sunniwell HT3300 before 1.0.0.B022.2 is vulnerable to Insecure Permissions. The /usr/local/bin/update program, which is responsible for updating the software in the HT3300 device, is given the execution mode of sudo NOPASSWD. This program is vulnerable to a command injection vulnerability, which could allow an attacker to pass commands to this program via command line arguments to gain elevated root privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Giles-one/sunniwellHT3300PrivilegeEscalation", + "refsource": "MISC", + "name": "https://github.com/Giles-one/sunniwellHT3300PrivilegeEscalation" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Giles-one/56f677b96aab5a67fbe31dd41fd1303d", + "url": "https://gist.github.com/Giles-one/56f677b96aab5a67fbe31dd41fd1303d" } ] } diff --git a/2024/48xxx/CVE-2024-48074.json b/2024/48xxx/CVE-2024-48074.json index e4333778ccf..ff56107619b 100644 --- a/2024/48xxx/CVE-2024-48074.json +++ b/2024/48xxx/CVE-2024-48074.json @@ -56,6 +56,11 @@ "url": "https://github.com/Giles-one/Vigor2960Crack", "refsource": "MISC", "name": "https://github.com/Giles-one/Vigor2960Crack" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Giles-one/6425e97dcd1ec97a722a1e20da25fad7", + "url": "https://gist.github.com/Giles-one/6425e97dcd1ec97a722a1e20da25fad7" } ] } diff --git a/2024/51xxx/CVE-2024-51157.json b/2024/51xxx/CVE-2024-51157.json index ba9c6d84d6c..efd1f994eda 100644 --- a/2024/51xxx/CVE-2024-51157.json +++ b/2024/51xxx/CVE-2024-51157.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-51157", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-51157", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "07FLYCMS V1.3.9 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component http://erp.07fly.net:80/oa/OaSchedule/add.html." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/xiaoyunzhui/cms/blob/main/2/readme.md", + "url": "https://github.com/xiaoyunzhui/cms/blob/main/2/readme.md" } ] } diff --git a/2024/7xxx/CVE-2024-7059.json b/2024/7xxx/CVE-2024-7059.json index 4873dfe9765..9e6ccb1c2b2 100644 --- a/2024/7xxx/CVE-2024-7059.json +++ b/2024/7xxx/CVE-2024-7059.json @@ -119,9 +119,14 @@ "references": { "reference_data": [ { - "url": "https://resources.genetec.com/security-advisories/", + "url": "https://resources.genetec.com/security-advisories/high-severity-vulnerability-affecting-security-center-web-sdk-role", "refsource": "MISC", - "name": "https://resources.genetec.com/security-advisories/" + "name": "https://resources.genetec.com/security-advisories/high-severity-vulnerability-affecting-security-center-web-sdk-role" + }, + { + "url": "https://ressources.genetec.com/bulletins-de-securite/vulnerabilite-de-haute-severite-affectant-le-role-sdk-web-de-security-center", + "refsource": "MISC", + "name": "https://ressources.genetec.com/bulletins-de-securite/vulnerabilite-de-haute-severite-affectant-le-role-sdk-web-de-security-center" } ] },