From 7f451543b009ebbd975ab2446452d355a3097142 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 29 Aug 2024 20:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/34xxx/CVE-2024-34017.json | 65 +++++++++++++++++++++++++++++-- 2024/34xxx/CVE-2024-34018.json | 71 ++++++++++++++++++++++++++++++++-- 2024/34xxx/CVE-2024-34019.json | 71 ++++++++++++++++++++++++++++++++-- 2024/41xxx/CVE-2024-41345.json | 56 ++++++++++++++++++++++++--- 2024/41xxx/CVE-2024-41350.json | 61 ++++++++++++++++++++++++++--- 2024/41xxx/CVE-2024-41351.json | 61 ++++++++++++++++++++++++++--- 2024/41xxx/CVE-2024-41358.json | 56 ++++++++++++++++++++++++--- 2024/41xxx/CVE-2024-41361.json | 56 ++++++++++++++++++++++++--- 2024/41xxx/CVE-2024-41364.json | 56 ++++++++++++++++++++++++--- 2024/41xxx/CVE-2024-41366.json | 56 ++++++++++++++++++++++++--- 2024/41xxx/CVE-2024-41367.json | 56 ++++++++++++++++++++++++--- 2024/41xxx/CVE-2024-41368.json | 56 ++++++++++++++++++++++++--- 2024/41xxx/CVE-2024-41369.json | 56 ++++++++++++++++++++++++--- 2024/41xxx/CVE-2024-41371.json | 61 ++++++++++++++++++++++++++--- 2024/8xxx/CVE-2024-8319.json | 18 +++++++++ 2024/8xxx/CVE-2024-8320.json | 18 +++++++++ 2024/8xxx/CVE-2024-8321.json | 18 +++++++++ 2024/8xxx/CVE-2024-8322.json | 18 +++++++++ 18 files changed, 832 insertions(+), 78 deletions(-) create mode 100644 2024/8xxx/CVE-2024-8319.json create mode 100644 2024/8xxx/CVE-2024-8320.json create mode 100644 2024/8xxx/CVE-2024-8321.json create mode 100644 2024/8xxx/CVE-2024-8322.json diff --git a/2024/34xxx/CVE-2024-34017.json b/2024/34xxx/CVE-2024-34017.json index d279cbcad01..60cdb1e6c4a 100644 --- a/2024/34xxx/CVE-2024-34017.json +++ b/2024/34xxx/CVE-2024-34017.json @@ -1,17 +1,74 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-34017", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@acronis.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 4569." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-427", + "cweId": "CWE-427" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Acronis", + "product": { + "product_data": [ + { + "product_name": "Acronis Snap Deploy", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "4569" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://security-advisory.acronis.com/advisories/SEC-4505", + "refsource": "MISC", + "name": "https://security-advisory.acronis.com/advisories/SEC-4505" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.0", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" } ] } diff --git a/2024/34xxx/CVE-2024-34018.json b/2024/34xxx/CVE-2024-34018.json index 2c396890d9c..4d084038dc9 100644 --- a/2024/34xxx/CVE-2024-34018.json +++ b/2024/34xxx/CVE-2024-34018.json @@ -1,17 +1,80 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-34018", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@acronis.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Snap Deploy (Windows) before build 4569." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-276", + "cweId": "CWE-276" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Acronis", + "product": { + "product_data": [ + { + "product_name": "Acronis Snap Deploy", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "4569" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://security-advisory.acronis.com/advisories/SEC-4196", + "refsource": "MISC", + "name": "https://security-advisory.acronis.com/advisories/SEC-4196" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "@mmg (https://hackerone.com/mmg)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.0", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ] } diff --git a/2024/34xxx/CVE-2024-34019.json b/2024/34xxx/CVE-2024-34019.json index d15aabb7e11..c887a0c687d 100644 --- a/2024/34xxx/CVE-2024-34019.json +++ b/2024/34xxx/CVE-2024-34019.json @@ -1,17 +1,80 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-34019", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@acronis.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 4569." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-427", + "cweId": "CWE-427" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Acronis", + "product": { + "product_data": [ + { + "product_name": "Acronis Snap Deploy", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "4569" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://security-advisory.acronis.com/advisories/SEC-3079", + "refsource": "MISC", + "name": "https://security-advisory.acronis.com/advisories/SEC-3079" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "@mmg (https://hackerone.com/mmg)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.0", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" } ] } diff --git a/2024/41xxx/CVE-2024-41345.json b/2024/41xxx/CVE-2024-41345.json index 3d9d3056ec0..001367d64cf 100644 --- a/2024/41xxx/CVE-2024-41345.json +++ b/2024/41xxx/CVE-2024-41345.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-41345", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-41345", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/trip.php" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/jpatokal/openflights/issues/1480", + "refsource": "MISC", + "name": "https://github.com/jpatokal/openflights/issues/1480" } ] } diff --git a/2024/41xxx/CVE-2024-41350.json b/2024/41xxx/CVE-2024-41350.json index 8a90b46b0b6..799fe73425c 100644 --- a/2024/41xxx/CVE-2024-41350.json +++ b/2024/41xxx/CVE-2024-41350.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-41350", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-41350", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** UNSUPPORTED WHEN ASSIGNED ** bjyadmin commit a560fd5 is vulnerable to Cross Site Scripting (XSS) via Public/statics/umeditor1_2_3/php/imageUp.php" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/baijunyao/thinkphp-bjyadmin", + "refsource": "MISC", + "name": "https://github.com/baijunyao/thinkphp-bjyadmin" + }, + { + "url": "https://github.com/xjzzzxx/vulFound/blob/main/bjyadmin/xss2.md", + "refsource": "MISC", + "name": "https://github.com/xjzzzxx/vulFound/blob/main/bjyadmin/xss2.md" } ] } diff --git a/2024/41xxx/CVE-2024-41351.json b/2024/41xxx/CVE-2024-41351.json index e46dfb621bf..8fe3d9c0f1e 100644 --- a/2024/41xxx/CVE-2024-41351.json +++ b/2024/41xxx/CVE-2024-41351.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-41351", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-41351", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** UNSUPPORTED WHEN ASSIGNED ** bjyadmin commit a560fd5 is vulnerable to Cross Site Scripting (XSS) via Public/statics/umeditor1_2_3/php/getContent.php" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/baijunyao/thinkphp-bjyadmin", + "refsource": "MISC", + "name": "https://github.com/baijunyao/thinkphp-bjyadmin" + }, + { + "url": "https://github.com/xjzzzxx/vulFound/blob/main/bjyadmin/xss1.md", + "refsource": "MISC", + "name": "https://github.com/xjzzzxx/vulFound/blob/main/bjyadmin/xss1.md" } ] } diff --git a/2024/41xxx/CVE-2024-41358.json b/2024/41xxx/CVE-2024-41358.json index a2421fc54ee..dc807b99ece 100644 --- a/2024/41xxx/CVE-2024-41358.json +++ b/2024/41xxx/CVE-2024-41358.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-41358", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-41358", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via app\\admin\\import-export\\import-load-data.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/phpipam/phpipam/issues/4148", + "refsource": "MISC", + "name": "https://github.com/phpipam/phpipam/issues/4148" } ] } diff --git a/2024/41xxx/CVE-2024-41361.json b/2024/41xxx/CVE-2024-41361.json index a8d32ef5bcb..18790580eaa 100644 --- a/2024/41xxx/CVE-2024-41361.json +++ b/2024/41xxx/CVE-2024-41361.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-41361", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-41361", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\\manageFilesFolders.php" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398", + "refsource": "MISC", + "name": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398" } ] } diff --git a/2024/41xxx/CVE-2024-41364.json b/2024/41xxx/CVE-2024-41364.json index ee2a00989b2..01020ef4c9c 100644 --- a/2024/41xxx/CVE-2024-41364.json +++ b/2024/41xxx/CVE-2024-41364.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-41364", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-41364", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\\trackEdit.php" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2400", + "refsource": "MISC", + "name": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2400" } ] } diff --git a/2024/41xxx/CVE-2024-41366.json b/2024/41xxx/CVE-2024-41366.json index b5fc94701d0..12d0577a33e 100644 --- a/2024/41xxx/CVE-2024-41366.json +++ b/2024/41xxx/CVE-2024-41366.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-41366", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-41366", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\\userScripts.php" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2399", + "refsource": "MISC", + "name": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2399" } ] } diff --git a/2024/41xxx/CVE-2024-41367.json b/2024/41xxx/CVE-2024-41367.json index 1d7808317d3..2e8c15acffd 100644 --- a/2024/41xxx/CVE-2024-41367.json +++ b/2024/41xxx/CVE-2024-41367.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-41367", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-41367", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\\api\\playlist\\appendFileToPlaylist.php" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2397", + "refsource": "MISC", + "name": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2397" } ] } diff --git a/2024/41xxx/CVE-2024-41368.json b/2024/41xxx/CVE-2024-41368.json index 13906778358..e9e46bd34e4 100644 --- a/2024/41xxx/CVE-2024-41368.json +++ b/2024/41xxx/CVE-2024-41368.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-41368", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-41368", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\\inc.setWlanIpMail.php" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396", + "refsource": "MISC", + "name": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396" } ] } diff --git a/2024/41xxx/CVE-2024-41369.json b/2024/41xxx/CVE-2024-41369.json index 38f0fd25701..c924665c4f9 100644 --- a/2024/41xxx/CVE-2024-41369.json +++ b/2024/41xxx/CVE-2024-41369.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-41369", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-41369", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\\inc.setWifi.php" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2401", + "refsource": "MISC", + "name": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2401" } ] } diff --git a/2024/41xxx/CVE-2024-41371.json b/2024/41xxx/CVE-2024-41371.json index 31e9488f83b..48cf26463f6 100644 --- a/2024/41xxx/CVE-2024-41371.json +++ b/2024/41xxx/CVE-2024-41371.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-41371", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-41371", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** UNSUPPORTED WHEN ASSIGNED ** Organizr v1.90 is vulnerable to Cross Site Scripting (XSS) via api.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/causefx/Organizr", + "refsource": "MISC", + "name": "https://github.com/causefx/Organizr" + }, + { + "url": "https://github.com/causefx/Organizr/issues/1997", + "refsource": "MISC", + "name": "https://github.com/causefx/Organizr/issues/1997" } ] } diff --git a/2024/8xxx/CVE-2024-8319.json b/2024/8xxx/CVE-2024-8319.json new file mode 100644 index 00000000000..86df72ace27 --- /dev/null +++ b/2024/8xxx/CVE-2024-8319.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8319", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8320.json b/2024/8xxx/CVE-2024-8320.json new file mode 100644 index 00000000000..5efe4705eb1 --- /dev/null +++ b/2024/8xxx/CVE-2024-8320.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8320", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8321.json b/2024/8xxx/CVE-2024-8321.json new file mode 100644 index 00000000000..343ab3a261b --- /dev/null +++ b/2024/8xxx/CVE-2024-8321.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8321", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8322.json b/2024/8xxx/CVE-2024-8322.json new file mode 100644 index 00000000000..16340090af4 --- /dev/null +++ b/2024/8xxx/CVE-2024-8322.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8322", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file