From 805e9bd7367e28b0735004f4dddf38cb14257348 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 30 Apr 2024 07:00:33 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2017/7xxx/CVE-2017-7938.json | 5 ++ 2022/25xxx/CVE-2022-25517.json | 7 ++- 2024/28xxx/CVE-2024-28815.json | 10 ++++ 2024/31xxx/CVE-2024-31837.json | 56 +++++++++++++++++++--- 2024/34xxx/CVE-2024-34060.json | 18 +++++++ 2024/34xxx/CVE-2024-34061.json | 18 +++++++ 2024/34xxx/CVE-2024-34062.json | 18 +++++++ 2024/34xxx/CVE-2024-34063.json | 18 +++++++ 2024/34xxx/CVE-2024-34064.json | 18 +++++++ 2024/34xxx/CVE-2024-34065.json | 18 +++++++ 2024/34xxx/CVE-2024-34066.json | 18 +++++++ 2024/34xxx/CVE-2024-34067.json | 18 +++++++ 2024/34xxx/CVE-2024-34068.json | 18 +++++++ 2024/34xxx/CVE-2024-34069.json | 18 +++++++ 2024/34xxx/CVE-2024-34070.json | 18 +++++++ 2024/34xxx/CVE-2024-34071.json | 18 +++++++ 2024/34xxx/CVE-2024-34072.json | 18 +++++++ 2024/34xxx/CVE-2024-34073.json | 18 +++++++ 2024/34xxx/CVE-2024-34074.json | 18 +++++++ 2024/34xxx/CVE-2024-34075.json | 18 +++++++ 2024/34xxx/CVE-2024-34076.json | 18 +++++++ 2024/34xxx/CVE-2024-34077.json | 18 +++++++ 2024/34xxx/CVE-2024-34078.json | 18 +++++++ 2024/34xxx/CVE-2024-34079.json | 18 +++++++ 2024/34xxx/CVE-2024-34080.json | 18 +++++++ 2024/34xxx/CVE-2024-34081.json | 18 +++++++ 2024/34xxx/CVE-2024-34082.json | 18 +++++++ 2024/34xxx/CVE-2024-34083.json | 18 +++++++ 2024/34xxx/CVE-2024-34084.json | 18 +++++++ 2024/4xxx/CVE-2024-4163.json | 10 ++++ 2024/4xxx/CVE-2024-4225.json | 88 ++++++++++++++++++++++++++++++++-- 31 files changed, 615 insertions(+), 11 deletions(-) create mode 100644 2024/34xxx/CVE-2024-34060.json create mode 100644 2024/34xxx/CVE-2024-34061.json create mode 100644 2024/34xxx/CVE-2024-34062.json create mode 100644 2024/34xxx/CVE-2024-34063.json create mode 100644 2024/34xxx/CVE-2024-34064.json create mode 100644 2024/34xxx/CVE-2024-34065.json create mode 100644 2024/34xxx/CVE-2024-34066.json create mode 100644 2024/34xxx/CVE-2024-34067.json create mode 100644 2024/34xxx/CVE-2024-34068.json create mode 100644 2024/34xxx/CVE-2024-34069.json create mode 100644 2024/34xxx/CVE-2024-34070.json create mode 100644 2024/34xxx/CVE-2024-34071.json create mode 100644 2024/34xxx/CVE-2024-34072.json create mode 100644 2024/34xxx/CVE-2024-34073.json create mode 100644 2024/34xxx/CVE-2024-34074.json create mode 100644 2024/34xxx/CVE-2024-34075.json create mode 100644 2024/34xxx/CVE-2024-34076.json create mode 100644 2024/34xxx/CVE-2024-34077.json create mode 100644 2024/34xxx/CVE-2024-34078.json create mode 100644 2024/34xxx/CVE-2024-34079.json create mode 100644 2024/34xxx/CVE-2024-34080.json create mode 100644 2024/34xxx/CVE-2024-34081.json create mode 100644 2024/34xxx/CVE-2024-34082.json create mode 100644 2024/34xxx/CVE-2024-34083.json create mode 100644 2024/34xxx/CVE-2024-34084.json diff --git a/2017/7xxx/CVE-2017-7938.json b/2017/7xxx/CVE-2017-7938.json index 966cf10d979..271b9b34db6 100644 --- a/2017/7xxx/CVE-2017-7938.json +++ b/2017/7xxx/CVE-2017-7938.json @@ -66,6 +66,11 @@ "name": "41898", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41898/" + }, + { + "refsource": "MISC", + "name": "https://github.com/jaygreig86/dmitry/pull/12", + "url": "https://github.com/jaygreig86/dmitry/pull/12" } ] } diff --git a/2022/25xxx/CVE-2022-25517.json b/2022/25xxx/CVE-2022-25517.json index e5da59ef130..616c7735769 100644 --- a/2022/25xxx/CVE-2022-25517.json +++ b/2022/25xxx/CVE-2022-25517.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "MyBatis plus v3.4.3 was discovered to contain a SQL injection vulnerability via the Column parameter in /core/conditions/AbstractWrapper.java." + "value": "** DISPUTED ** MyBatis plus v3.4.3 was discovered to contain a SQL injection vulnerability via the Column parameter in /core/conditions/AbstractWrapper.java. NOTE: the vendor's position is that the reported execution of a SQL statement was intended behavior." } ] }, @@ -56,6 +56,11 @@ "url": "https://github.com/HaHarden/mybatis-plus-sql-Injection", "refsource": "MISC", "name": "https://github.com/HaHarden/mybatis-plus-sql-Injection" + }, + { + "refsource": "MISC", + "name": "https://github.com/baomidou/mybatis-plus/issues/4407", + "url": "https://github.com/baomidou/mybatis-plus/issues/4407" } ] } diff --git a/2024/28xxx/CVE-2024-28815.json b/2024/28xxx/CVE-2024-28815.json index 61382a179c7..5b4a015e870 100644 --- a/2024/28xxx/CVE-2024-28815.json +++ b/2024/28xxx/CVE-2024-28815.json @@ -61,6 +61,16 @@ "refsource": "MISC", "name": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0003", "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0003" + }, + { + "refsource": "CONFIRM", + "name": "https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin_24-0003-001-v1.pdf", + "url": "https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin_24-0003-001-v1.pdf" + }, + { + "refsource": "MISC", + "name": "https://cwe.mitre.org/data/definitions/1188.html", + "url": "https://cwe.mitre.org/data/definitions/1188.html" } ] } diff --git a/2024/31xxx/CVE-2024-31837.json b/2024/31xxx/CVE-2024-31837.json index 9a10eca88f6..e64230c6da0 100644 --- a/2024/31xxx/CVE-2024-31837.json +++ b/2024/31xxx/CVE-2024-31837.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-31837", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-31837", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "DMitry (Deepmagic Information Gathering Tool) 1.3a has a format-string vulnerability, with a threat model similar to CVE-2017-7938." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/jaygreig86/dmitry/pull/12", + "url": "https://github.com/jaygreig86/dmitry/pull/12" } ] } diff --git a/2024/34xxx/CVE-2024-34060.json b/2024/34xxx/CVE-2024-34060.json new file mode 100644 index 00000000000..2663391bab9 --- /dev/null +++ b/2024/34xxx/CVE-2024-34060.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34060", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34061.json b/2024/34xxx/CVE-2024-34061.json new file mode 100644 index 00000000000..17451311272 --- /dev/null +++ b/2024/34xxx/CVE-2024-34061.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34061", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34062.json b/2024/34xxx/CVE-2024-34062.json new file mode 100644 index 00000000000..b48ed233fe2 --- /dev/null +++ b/2024/34xxx/CVE-2024-34062.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34062", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34063.json b/2024/34xxx/CVE-2024-34063.json new file mode 100644 index 00000000000..019fffa6894 --- /dev/null +++ b/2024/34xxx/CVE-2024-34063.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34063", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34064.json b/2024/34xxx/CVE-2024-34064.json new file mode 100644 index 00000000000..f7c8462f725 --- /dev/null +++ b/2024/34xxx/CVE-2024-34064.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34064", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34065.json b/2024/34xxx/CVE-2024-34065.json new file mode 100644 index 00000000000..585035ddf1b --- /dev/null +++ b/2024/34xxx/CVE-2024-34065.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34065", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34066.json b/2024/34xxx/CVE-2024-34066.json new file mode 100644 index 00000000000..bf4559060f1 --- /dev/null +++ b/2024/34xxx/CVE-2024-34066.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34066", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34067.json b/2024/34xxx/CVE-2024-34067.json new file mode 100644 index 00000000000..6cca6844a38 --- /dev/null +++ b/2024/34xxx/CVE-2024-34067.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34067", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34068.json b/2024/34xxx/CVE-2024-34068.json new file mode 100644 index 00000000000..aeeecd6d548 --- /dev/null +++ b/2024/34xxx/CVE-2024-34068.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34068", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34069.json b/2024/34xxx/CVE-2024-34069.json new file mode 100644 index 00000000000..cb3f5d918ff --- /dev/null +++ b/2024/34xxx/CVE-2024-34069.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34069", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34070.json b/2024/34xxx/CVE-2024-34070.json new file mode 100644 index 00000000000..06f87491dfb --- /dev/null +++ b/2024/34xxx/CVE-2024-34070.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34070", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34071.json b/2024/34xxx/CVE-2024-34071.json new file mode 100644 index 00000000000..2fed229cc9c --- /dev/null +++ b/2024/34xxx/CVE-2024-34071.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34071", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34072.json b/2024/34xxx/CVE-2024-34072.json new file mode 100644 index 00000000000..5cc0a8cf3ba --- /dev/null +++ b/2024/34xxx/CVE-2024-34072.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34072", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34073.json b/2024/34xxx/CVE-2024-34073.json new file mode 100644 index 00000000000..60a37be7910 --- /dev/null +++ b/2024/34xxx/CVE-2024-34073.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34073", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34074.json b/2024/34xxx/CVE-2024-34074.json new file mode 100644 index 00000000000..9b5d620f98b --- /dev/null +++ b/2024/34xxx/CVE-2024-34074.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34074", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34075.json b/2024/34xxx/CVE-2024-34075.json new file mode 100644 index 00000000000..d3a86adce50 --- /dev/null +++ b/2024/34xxx/CVE-2024-34075.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34075", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34076.json b/2024/34xxx/CVE-2024-34076.json new file mode 100644 index 00000000000..9493e4c73b4 --- /dev/null +++ b/2024/34xxx/CVE-2024-34076.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34076", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34077.json b/2024/34xxx/CVE-2024-34077.json new file mode 100644 index 00000000000..f0bdfb8d0d9 --- /dev/null +++ b/2024/34xxx/CVE-2024-34077.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34077", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34078.json b/2024/34xxx/CVE-2024-34078.json new file mode 100644 index 00000000000..9408a677516 --- /dev/null +++ b/2024/34xxx/CVE-2024-34078.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34078", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34079.json b/2024/34xxx/CVE-2024-34079.json new file mode 100644 index 00000000000..eafd2243646 --- /dev/null +++ b/2024/34xxx/CVE-2024-34079.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34079", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34080.json b/2024/34xxx/CVE-2024-34080.json new file mode 100644 index 00000000000..0a65afbeb53 --- /dev/null +++ b/2024/34xxx/CVE-2024-34080.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34080", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34081.json b/2024/34xxx/CVE-2024-34081.json new file mode 100644 index 00000000000..5a3c13d1b82 --- /dev/null +++ b/2024/34xxx/CVE-2024-34081.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34081", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34082.json b/2024/34xxx/CVE-2024-34082.json new file mode 100644 index 00000000000..c72cdc4a079 --- /dev/null +++ b/2024/34xxx/CVE-2024-34082.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34082", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34083.json b/2024/34xxx/CVE-2024-34083.json new file mode 100644 index 00000000000..efe86240ce1 --- /dev/null +++ b/2024/34xxx/CVE-2024-34083.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34083", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/34xxx/CVE-2024-34084.json b/2024/34xxx/CVE-2024-34084.json new file mode 100644 index 00000000000..7e939237e50 --- /dev/null +++ b/2024/34xxx/CVE-2024-34084.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-34084", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4163.json b/2024/4xxx/CVE-2024-4163.json index bae25fb5d6f..5d71276db4f 100644 --- a/2024/4xxx/CVE-2024-4163.json +++ b/2024/4xxx/CVE-2024-4163.json @@ -66,6 +66,16 @@ "source": { "discovery": "UNKNOWN" }, + "credits": [ + { + "lang": "en", + "value": "Tan Inn Fung" + }, + { + "lang": "en", + "value": "Mah Chia Hui" + } + ], "impact": { "cvss": [ { diff --git a/2024/4xxx/CVE-2024-4225.json b/2024/4xxx/CVE-2024-4225.json index 012757106a1..e2da48792f0 100644 --- a/2024/4xxx/CVE-2024-4225.json +++ b/2024/4xxx/CVE-2024-4225.json @@ -1,17 +1,97 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-4225", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve_disclosure@tech.gov.sg", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple security vulnerabilities has been discovered in web interface of NetGuardian DIN Remote Telemetry Unit (RTU), by DPS Telecom. Attackers can exploit those security vulnerabilities to perform critical actions such as escalate user's privilege, steal user's credential, Cross Site Scripting (XSS) and Cross-Site Request Forgery (CSRF)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-284 Improper Access Control, CWE-522 Insufficiently Protected Credentials, CWE-79 Improper Neutralization of Input During Web Page Generation", + "cweId": "CWE-284" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "DPS Telecom", + "product": { + "product_data": [ + { + "product_name": "NetGuardian DIN Remote Telemetry Unit (RTU)", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "NGDIN_ST App v2.0D.0062" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://govtech-csg.github.io/security-advisories/2024/04/29/CVE-2024-4225.html", + "refsource": "MISC", + "name": "https://govtech-csg.github.io/security-advisories/2024/04/29/CVE-2024-4225.html" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Tan Inn Fung" + }, + { + "lang": "en", + "value": "Goh Jing Loon" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "version": "3.1" } ] }