From 88cf40877cbb7f1f90447974fed25b82101a1617 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 16 Jun 2024 16:00:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/38xxx/CVE-2024-38461.json | 72 +++++++++++++++++++++++++++++++ 2024/38xxx/CVE-2024-38462.json | 77 ++++++++++++++++++++++++++++++++++ 2024/38xxx/CVE-2024-38463.json | 18 ++++++++ 2024/38xxx/CVE-2024-38464.json | 18 ++++++++ 2024/38xxx/CVE-2024-38465.json | 62 +++++++++++++++++++++++++++ 2024/38xxx/CVE-2024-38466.json | 62 +++++++++++++++++++++++++++ 2024/38xxx/CVE-2024-38467.json | 62 +++++++++++++++++++++++++++ 2024/38xxx/CVE-2024-38468.json | 62 +++++++++++++++++++++++++++ 8 files changed, 433 insertions(+) create mode 100644 2024/38xxx/CVE-2024-38461.json create mode 100644 2024/38xxx/CVE-2024-38462.json create mode 100644 2024/38xxx/CVE-2024-38463.json create mode 100644 2024/38xxx/CVE-2024-38464.json create mode 100644 2024/38xxx/CVE-2024-38465.json create mode 100644 2024/38xxx/CVE-2024-38466.json create mode 100644 2024/38xxx/CVE-2024-38467.json create mode 100644 2024/38xxx/CVE-2024-38468.json diff --git a/2024/38xxx/CVE-2024-38461.json b/2024/38xxx/CVE-2024-38461.json new file mode 100644 index 00000000000..4ee6eed78fa --- /dev/null +++ b/2024/38xxx/CVE-2024-38461.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-38461", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "irodsServerMonPerf in iRODS before 4.3.2 attempts to proceed with use of a path even if it is not a directory." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/irods/irods/issues/7652", + "refsource": "MISC", + "name": "https://github.com/irods/irods/issues/7652" + }, + { + "url": "https://github.com/irods/irods/releases/tag/4.3.2", + "refsource": "MISC", + "name": "https://github.com/irods/irods/releases/tag/4.3.2" + }, + { + "url": "https://irods.org/2024/05/irods-4-3-2-is-released", + "refsource": "MISC", + "name": "https://irods.org/2024/05/irods-4-3-2-is-released" + } + ] + } +} \ No newline at end of file diff --git a/2024/38xxx/CVE-2024-38462.json b/2024/38xxx/CVE-2024-38462.json new file mode 100644 index 00000000000..7fd35642a00 --- /dev/null +++ b/2024/38xxx/CVE-2024-38462.json @@ -0,0 +1,77 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-38462", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "iRODS before 4.3.2 provides an msiSendMail function with a problematic dependency on the mail binary, such as in the mailMS.cpp#L94-L106 reference." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/irods/irods/issues/7651", + "refsource": "MISC", + "name": "https://github.com/irods/irods/issues/7651" + }, + { + "url": "https://github.com/irods/irods/issues/7562", + "refsource": "MISC", + "name": "https://github.com/irods/irods/issues/7562" + }, + { + "url": "https://irods.org/2024/05/irods-4-3-2-is-released/", + "refsource": "MISC", + "name": "https://irods.org/2024/05/irods-4-3-2-is-released/" + }, + { + "url": "https://github.com/irods/irods/blob/97eb33f130349db5e01a4b85e89dd1da81460345/server/re/src/mailMS.cpp#L94-L106", + "refsource": "MISC", + "name": "https://github.com/irods/irods/blob/97eb33f130349db5e01a4b85e89dd1da81460345/server/re/src/mailMS.cpp#L94-L106" + } + ] + } +} \ No newline at end of file diff --git a/2024/38xxx/CVE-2024-38463.json b/2024/38xxx/CVE-2024-38463.json new file mode 100644 index 00000000000..22c98c8ef32 --- /dev/null +++ b/2024/38xxx/CVE-2024-38463.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-38463", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/38xxx/CVE-2024-38464.json b/2024/38xxx/CVE-2024-38464.json new file mode 100644 index 00000000000..b3a86ead00c --- /dev/null +++ b/2024/38xxx/CVE-2024-38464.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-38464", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/38xxx/CVE-2024-38465.json b/2024/38xxx/CVE-2024-38465.json new file mode 100644 index 00000000000..8c324ee3001 --- /dev/null +++ b/2024/38xxx/CVE-2024-38465.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-38465", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Shenzhen Guoxin Synthesis image system before 8.3.0 allows username enumeration because of the response discrepancy of incorrect versus error." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Pumpkin-ito/Cve-Vuln/blob/main/Guosen%20synthetic%20imaging%20system%20vulnerability.pdf", + "refsource": "MISC", + "name": "https://github.com/Pumpkin-ito/Cve-Vuln/blob/main/Guosen%20synthetic%20imaging%20system%20vulnerability.pdf" + } + ] + } +} \ No newline at end of file diff --git a/2024/38xxx/CVE-2024-38466.json b/2024/38xxx/CVE-2024-38466.json new file mode 100644 index 00000000000..d1e7fab56ff --- /dev/null +++ b/2024/38xxx/CVE-2024-38466.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-38466", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Shenzhen Guoxin Synthesis image system before 8.3.0 has a 123456Qw default password." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Pumpkin-ito/Cve-Vuln/blob/main/Guosen%20synthetic%20imaging%20system%20vulnerability.pdf", + "refsource": "MISC", + "name": "https://github.com/Pumpkin-ito/Cve-Vuln/blob/main/Guosen%20synthetic%20imaging%20system%20vulnerability.pdf" + } + ] + } +} \ No newline at end of file diff --git a/2024/38xxx/CVE-2024-38467.json b/2024/38xxx/CVE-2024-38467.json new file mode 100644 index 00000000000..93c15acefe0 --- /dev/null +++ b/2024/38xxx/CVE-2024-38467.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-38467", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Shenzhen Guoxin Synthesis image system before 8.3.0 allows unauthorized user information retrieval via the queryUser API." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Pumpkin-ito/Cve-Vuln/blob/main/Guosen%20synthetic%20imaging%20system%20vulnerability.pdf", + "refsource": "MISC", + "name": "https://github.com/Pumpkin-ito/Cve-Vuln/blob/main/Guosen%20synthetic%20imaging%20system%20vulnerability.pdf" + } + ] + } +} \ No newline at end of file diff --git a/2024/38xxx/CVE-2024-38468.json b/2024/38xxx/CVE-2024-38468.json new file mode 100644 index 00000000000..a0dd919db8b --- /dev/null +++ b/2024/38xxx/CVE-2024-38468.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-38468", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Shenzhen Guoxin Synthesis image system before 8.3.0 allows unauthorized password resets via the resetPassword API." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Pumpkin-ito/Cve-Vuln/blob/main/Guosen%20synthetic%20imaging%20system%20vulnerability.pdf", + "refsource": "MISC", + "name": "https://github.com/Pumpkin-ito/Cve-Vuln/blob/main/Guosen%20synthetic%20imaging%20system%20vulnerability.pdf" + } + ] + } +} \ No newline at end of file