"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-07-22 19:00:35 +00:00
parent 4733efbc4c
commit 7092c9167f
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
9 changed files with 247 additions and 16 deletions

View File

@ -129,6 +129,11 @@
"url": "https://security.netapp.com/advisory/ntap-20240531-0002/", "url": "https://security.netapp.com/advisory/ntap-20240531-0002/",
"refsource": "MISC", "refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20240531-0002/" "name": "https://security.netapp.com/advisory/ntap-20240531-0002/"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/22/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2024/07/22/5"
} }
] ]
}, },

View File

@ -69,6 +69,11 @@
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html",
"refsource": "MISC", "refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html" "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/22/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2024/07/22/5"
} }
] ]
}, },

View File

@ -69,6 +69,11 @@
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html",
"refsource": "MISC", "refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html" "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/22/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2024/07/22/5"
} }
] ]
}, },

View File

@ -69,6 +69,11 @@
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html",
"refsource": "MISC", "refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html" "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/22/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2024/07/22/5"
} }
] ]
}, },

View File

@ -69,6 +69,11 @@
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html",
"refsource": "MISC", "refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html" "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/22/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2024/07/22/5"
} }
] ]
}, },

View File

@ -1,17 +1,73 @@
{ {
"data_version": "4.0",
"data_type": "CVE", "data_type": "CVE",
"data_format": "MITRE", "data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2024-37380", "ID": "CVE-2024-37380",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "support@hackerone.com",
"STATE": "RESERVED" "STATE": "PUBLIC"
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "A misconfiguration on UniFi U6+ Access Point could cause an incorrect VLAN traffic forwarding to APs meshed to UniFi U6+ Access Point.\n\n\nAffected Products:\nUniFi U6+ Access Point (Version 6.6.65 and earlier) \n\n \nMitigation:\nUpdate your UniFi U6+ Access Point to Version 6.6.74 or later.\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Ubiquiti",
"product": {
"product_data": [
{
"product_name": "UniFi U6+ Access Point",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.6.74",
"version_value": "6.6.74"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-041-041/df92860f-0379-4002-be47-6819a25a73a1",
"refsource": "MISC",
"name": "https://community.ui.com/releases/Security-Advisory-Bulletin-041-041/df92860f-0379-4002-be47-6819a25a73a1"
}
]
},
"impact": {
"cvss": [
{
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
} }
] ]
} }

View File

@ -1,17 +1,61 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2024-38944",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2024-38944",
"STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "An issue in Intelight X-1L Traffic controller Maxtime v.1.9.6 allows a remote attacker to execute arbitrary code via the /cgi-bin/generateForm.cgi?formID=142 component."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://gist.github.com/LemonSec/6aaea8320187a38e1a398fa321f12303",
"url": "https://gist.github.com/LemonSec/6aaea8320187a38e1a398fa321f12303"
} }
] ]
} }

View File

@ -1,17 +1,61 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2024-40075",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2024-40075",
"STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "Laravel v11.x was discovered to contain an XML External Entity (XXE) vulnerability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://gitee.com/Q16G/laravel_bug/blob/master/laravelBug.md",
"url": "https://gitee.com/Q16G/laravel_bug/blob/master/laravelBug.md"
} }
] ]
} }

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2024-41880",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In veilid-core in Veilid before 0.3.4, the protocol's ping function can be misused in a way that decreases the effectiveness of safety and private routes."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/veilid/veilid/-/issues/395",
"refsource": "MISC",
"name": "https://gitlab.com/veilid/veilid/-/issues/395"
}
]
}
}