From 8c94ee55f3c9f7d4ecfab20391e5bcb1efd8614e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 14 Dec 2023 06:00:33 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/44xxx/CVE-2023-44709.json | 61 +++++++++++++++++++++++--- 2023/50xxx/CVE-2023-50785.json | 18 ++++++++ 2023/50xxx/CVE-2023-50786.json | 18 ++++++++ 2023/50xxx/CVE-2023-50787.json | 18 ++++++++ 2023/50xxx/CVE-2023-50788.json | 18 ++++++++ 2023/50xxx/CVE-2023-50789.json | 18 ++++++++ 2023/50xxx/CVE-2023-50790.json | 18 ++++++++ 2023/50xxx/CVE-2023-50791.json | 18 ++++++++ 2023/50xxx/CVE-2023-50792.json | 18 ++++++++ 2023/50xxx/CVE-2023-50793.json | 18 ++++++++ 2023/50xxx/CVE-2023-50794.json | 18 ++++++++ 2023/50xxx/CVE-2023-50795.json | 18 ++++++++ 2023/50xxx/CVE-2023-50796.json | 18 ++++++++ 2023/50xxx/CVE-2023-50797.json | 18 ++++++++ 2023/50xxx/CVE-2023-50798.json | 18 ++++++++ 2023/50xxx/CVE-2023-50799.json | 18 ++++++++ 2023/50xxx/CVE-2023-50800.json | 18 ++++++++ 2023/50xxx/CVE-2023-50801.json | 18 ++++++++ 2023/50xxx/CVE-2023-50802.json | 18 ++++++++ 2023/50xxx/CVE-2023-50803.json | 18 ++++++++ 2023/50xxx/CVE-2023-50804.json | 18 ++++++++ 2023/50xxx/CVE-2023-50805.json | 18 ++++++++ 2023/50xxx/CVE-2023-50806.json | 18 ++++++++ 2023/50xxx/CVE-2023-50807.json | 18 ++++++++ 2023/50xxx/CVE-2023-50808.json | 18 ++++++++ 2023/50xxx/CVE-2023-50809.json | 18 ++++++++ 2023/50xxx/CVE-2023-50810.json | 18 ++++++++ 2023/5xxx/CVE-2023-5984.json | 2 +- 2023/6xxx/CVE-2023-6407.json | 78 ++++++++++++++++++++++++++++++++-- 2024/0xxx/CVE-2024-0154.json | 18 ++++++++ 2024/0xxx/CVE-2024-0155.json | 18 ++++++++ 2024/0xxx/CVE-2024-0156.json | 18 ++++++++ 2024/0xxx/CVE-2024-0157.json | 18 ++++++++ 2024/0xxx/CVE-2024-0158.json | 18 ++++++++ 2024/0xxx/CVE-2024-0159.json | 18 ++++++++ 2024/0xxx/CVE-2024-0160.json | 18 ++++++++ 2024/0xxx/CVE-2024-0161.json | 18 ++++++++ 2024/0xxx/CVE-2024-0162.json | 18 ++++++++ 2024/0xxx/CVE-2024-0163.json | 18 ++++++++ 2024/0xxx/CVE-2024-0164.json | 18 ++++++++ 2024/0xxx/CVE-2024-0165.json | 18 ++++++++ 2024/0xxx/CVE-2024-0166.json | 18 ++++++++ 2024/0xxx/CVE-2024-0167.json | 18 ++++++++ 2024/0xxx/CVE-2024-0168.json | 18 ++++++++ 2024/0xxx/CVE-2024-0169.json | 18 ++++++++ 2024/0xxx/CVE-2024-0170.json | 18 ++++++++ 2024/0xxx/CVE-2024-0171.json | 18 ++++++++ 2024/0xxx/CVE-2024-0172.json | 18 ++++++++ 2024/0xxx/CVE-2024-0173.json | 18 ++++++++ 49 files changed, 958 insertions(+), 11 deletions(-) create mode 100644 2023/50xxx/CVE-2023-50785.json create mode 100644 2023/50xxx/CVE-2023-50786.json create mode 100644 2023/50xxx/CVE-2023-50787.json create mode 100644 2023/50xxx/CVE-2023-50788.json create mode 100644 2023/50xxx/CVE-2023-50789.json create mode 100644 2023/50xxx/CVE-2023-50790.json create mode 100644 2023/50xxx/CVE-2023-50791.json create mode 100644 2023/50xxx/CVE-2023-50792.json create mode 100644 2023/50xxx/CVE-2023-50793.json create mode 100644 2023/50xxx/CVE-2023-50794.json create mode 100644 2023/50xxx/CVE-2023-50795.json create mode 100644 2023/50xxx/CVE-2023-50796.json create mode 100644 2023/50xxx/CVE-2023-50797.json create mode 100644 2023/50xxx/CVE-2023-50798.json create mode 100644 2023/50xxx/CVE-2023-50799.json create mode 100644 2023/50xxx/CVE-2023-50800.json create mode 100644 2023/50xxx/CVE-2023-50801.json create mode 100644 2023/50xxx/CVE-2023-50802.json create mode 100644 2023/50xxx/CVE-2023-50803.json create mode 100644 2023/50xxx/CVE-2023-50804.json create mode 100644 2023/50xxx/CVE-2023-50805.json create mode 100644 2023/50xxx/CVE-2023-50806.json create mode 100644 2023/50xxx/CVE-2023-50807.json create mode 100644 2023/50xxx/CVE-2023-50808.json create mode 100644 2023/50xxx/CVE-2023-50809.json create mode 100644 2023/50xxx/CVE-2023-50810.json create mode 100644 2024/0xxx/CVE-2024-0154.json create mode 100644 2024/0xxx/CVE-2024-0155.json create mode 100644 2024/0xxx/CVE-2024-0156.json create mode 100644 2024/0xxx/CVE-2024-0157.json create mode 100644 2024/0xxx/CVE-2024-0158.json create mode 100644 2024/0xxx/CVE-2024-0159.json create mode 100644 2024/0xxx/CVE-2024-0160.json create mode 100644 2024/0xxx/CVE-2024-0161.json create mode 100644 2024/0xxx/CVE-2024-0162.json create mode 100644 2024/0xxx/CVE-2024-0163.json create mode 100644 2024/0xxx/CVE-2024-0164.json create mode 100644 2024/0xxx/CVE-2024-0165.json create mode 100644 2024/0xxx/CVE-2024-0166.json create mode 100644 2024/0xxx/CVE-2024-0167.json create mode 100644 2024/0xxx/CVE-2024-0168.json create mode 100644 2024/0xxx/CVE-2024-0169.json create mode 100644 2024/0xxx/CVE-2024-0170.json create mode 100644 2024/0xxx/CVE-2024-0171.json create mode 100644 2024/0xxx/CVE-2024-0172.json create mode 100644 2024/0xxx/CVE-2024-0173.json diff --git a/2023/44xxx/CVE-2023-44709.json b/2023/44xxx/CVE-2023-44709.json index 7be60d4ad5b..590a8f8cf88 100644 --- a/2023/44xxx/CVE-2023-44709.json +++ b/2023/44xxx/CVE-2023-44709.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-44709", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-44709", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "PlutoSVG commit 336c02997277a1888e6ccbbbe674551a0582e5c4 and before was discovered to contain an integer overflow via the component plutosvg_load_from_memory." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/sammycage/plutosvg/issues/7", + "refsource": "MISC", + "name": "https://github.com/sammycage/plutosvg/issues/7" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/sunwithmoon/3f810c27d2e553f9d31bd7c50566f15b#file-cve-2023-44709", + "url": "https://gist.github.com/sunwithmoon/3f810c27d2e553f9d31bd7c50566f15b#file-cve-2023-44709" } ] } diff --git a/2023/50xxx/CVE-2023-50785.json b/2023/50xxx/CVE-2023-50785.json new file mode 100644 index 00000000000..6c98006d1ec --- /dev/null +++ b/2023/50xxx/CVE-2023-50785.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50785", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50786.json b/2023/50xxx/CVE-2023-50786.json new file mode 100644 index 00000000000..1bd5d8bb00d --- /dev/null +++ b/2023/50xxx/CVE-2023-50786.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50786", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50787.json b/2023/50xxx/CVE-2023-50787.json new file mode 100644 index 00000000000..e983c8bdd85 --- /dev/null +++ b/2023/50xxx/CVE-2023-50787.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50787", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50788.json b/2023/50xxx/CVE-2023-50788.json new file mode 100644 index 00000000000..8a612d069a3 --- /dev/null +++ b/2023/50xxx/CVE-2023-50788.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50788", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50789.json b/2023/50xxx/CVE-2023-50789.json new file mode 100644 index 00000000000..1352cdd53c9 --- /dev/null +++ b/2023/50xxx/CVE-2023-50789.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50789", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50790.json b/2023/50xxx/CVE-2023-50790.json new file mode 100644 index 00000000000..6e8d0dda9ae --- /dev/null +++ b/2023/50xxx/CVE-2023-50790.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50790", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50791.json b/2023/50xxx/CVE-2023-50791.json new file mode 100644 index 00000000000..4bb7777257b --- /dev/null +++ b/2023/50xxx/CVE-2023-50791.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50791", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50792.json b/2023/50xxx/CVE-2023-50792.json new file mode 100644 index 00000000000..16a95b2ac46 --- /dev/null +++ b/2023/50xxx/CVE-2023-50792.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50792", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50793.json b/2023/50xxx/CVE-2023-50793.json new file mode 100644 index 00000000000..6f99abdecc1 --- /dev/null +++ b/2023/50xxx/CVE-2023-50793.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50793", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50794.json b/2023/50xxx/CVE-2023-50794.json new file mode 100644 index 00000000000..68fbee43d88 --- /dev/null +++ b/2023/50xxx/CVE-2023-50794.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50794", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50795.json b/2023/50xxx/CVE-2023-50795.json new file mode 100644 index 00000000000..111f2ace97b --- /dev/null +++ b/2023/50xxx/CVE-2023-50795.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50795", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50796.json b/2023/50xxx/CVE-2023-50796.json new file mode 100644 index 00000000000..cbfd9dde444 --- /dev/null +++ b/2023/50xxx/CVE-2023-50796.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50796", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50797.json b/2023/50xxx/CVE-2023-50797.json new file mode 100644 index 00000000000..0fbd456cd1e --- /dev/null +++ b/2023/50xxx/CVE-2023-50797.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50797", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50798.json b/2023/50xxx/CVE-2023-50798.json new file mode 100644 index 00000000000..b0063bba8af --- /dev/null +++ b/2023/50xxx/CVE-2023-50798.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50798", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50799.json b/2023/50xxx/CVE-2023-50799.json new file mode 100644 index 00000000000..f5a5c8657d9 --- /dev/null +++ b/2023/50xxx/CVE-2023-50799.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50799", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50800.json b/2023/50xxx/CVE-2023-50800.json new file mode 100644 index 00000000000..a53810ca045 --- /dev/null +++ b/2023/50xxx/CVE-2023-50800.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50800", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50801.json b/2023/50xxx/CVE-2023-50801.json new file mode 100644 index 00000000000..5f59247d9e8 --- /dev/null +++ b/2023/50xxx/CVE-2023-50801.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50801", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50802.json b/2023/50xxx/CVE-2023-50802.json new file mode 100644 index 00000000000..9fdb4c66e02 --- /dev/null +++ b/2023/50xxx/CVE-2023-50802.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50802", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50803.json b/2023/50xxx/CVE-2023-50803.json new file mode 100644 index 00000000000..7aa70b2cb3a --- /dev/null +++ b/2023/50xxx/CVE-2023-50803.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50803", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50804.json b/2023/50xxx/CVE-2023-50804.json new file mode 100644 index 00000000000..78107485bd1 --- /dev/null +++ b/2023/50xxx/CVE-2023-50804.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50804", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50805.json b/2023/50xxx/CVE-2023-50805.json new file mode 100644 index 00000000000..be0b95d37e5 --- /dev/null +++ b/2023/50xxx/CVE-2023-50805.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50805", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50806.json b/2023/50xxx/CVE-2023-50806.json new file mode 100644 index 00000000000..d4018108cd5 --- /dev/null +++ b/2023/50xxx/CVE-2023-50806.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50806", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50807.json b/2023/50xxx/CVE-2023-50807.json new file mode 100644 index 00000000000..9e3534c6dcc --- /dev/null +++ b/2023/50xxx/CVE-2023-50807.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50807", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50808.json b/2023/50xxx/CVE-2023-50808.json new file mode 100644 index 00000000000..c6cc2153494 --- /dev/null +++ b/2023/50xxx/CVE-2023-50808.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50808", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50809.json b/2023/50xxx/CVE-2023-50809.json new file mode 100644 index 00000000000..061c9eb5c68 --- /dev/null +++ b/2023/50xxx/CVE-2023-50809.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50809", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/50xxx/CVE-2023-50810.json b/2023/50xxx/CVE-2023-50810.json new file mode 100644 index 00000000000..1a6e76265c3 --- /dev/null +++ b/2023/50xxx/CVE-2023-50810.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-50810", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/5xxx/CVE-2023-5984.json b/2023/5xxx/CVE-2023-5984.json index d2346137232..1ac267dd329 100644 --- a/2023/5xxx/CVE-2023-5984.json +++ b/2023/5xxx/CVE-2023-5984.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "\nA CWE-494 Download of Code Without Integrity Check vulnerability exists that could allow\nmodified firmware to be uploaded when an authorized admin user begins a firmware update\nprocedure.\n\n" + "value": "\nA CWE-494 Download of Code Without Integrity Check vulnerability exists that could allow\nmodified firmware to be uploaded when an authorized admin user begins a firmware update\nprocedure which could result in full control over the device.\n\n" } ] }, diff --git a/2023/6xxx/CVE-2023-6407.json b/2023/6xxx/CVE-2023-6407.json index 214f24b7008..6a1997693c9 100644 --- a/2023/6xxx/CVE-2023-6407.json +++ b/2023/6xxx/CVE-2023-6407.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-6407", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "\nA CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')\nvulnerability exists that could cause arbitrary file deletion upon service restart when accessed by\na local and low-privileged attacker.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", + "cweId": "CWE-22" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Schneider Electric", + "product": { + "product_data": [ + { + "product_name": "Easy UPS Online Monitoring Software", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.6-GA-01-23116 and prior (Windows 10, 11, Windows Server 2016, 2019, 2022)" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-346-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-346-03.pdf", + "refsource": "MISC", + "name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-346-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-346-03.pdf" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", + "version": "3.1" } ] } diff --git a/2024/0xxx/CVE-2024-0154.json b/2024/0xxx/CVE-2024-0154.json new file mode 100644 index 00000000000..bfe0da7d64a --- /dev/null +++ b/2024/0xxx/CVE-2024-0154.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0154", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0155.json b/2024/0xxx/CVE-2024-0155.json new file mode 100644 index 00000000000..be319b7243b --- /dev/null +++ b/2024/0xxx/CVE-2024-0155.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0155", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0156.json b/2024/0xxx/CVE-2024-0156.json new file mode 100644 index 00000000000..4b7c57b74eb --- /dev/null +++ b/2024/0xxx/CVE-2024-0156.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0156", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0157.json b/2024/0xxx/CVE-2024-0157.json new file mode 100644 index 00000000000..a2ca7abcb0c --- /dev/null +++ b/2024/0xxx/CVE-2024-0157.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0157", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0158.json b/2024/0xxx/CVE-2024-0158.json new file mode 100644 index 00000000000..645a5a21df4 --- /dev/null +++ b/2024/0xxx/CVE-2024-0158.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0158", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0159.json b/2024/0xxx/CVE-2024-0159.json new file mode 100644 index 00000000000..5cc89afa727 --- /dev/null +++ b/2024/0xxx/CVE-2024-0159.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0159", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0160.json b/2024/0xxx/CVE-2024-0160.json new file mode 100644 index 00000000000..7f8a59d152b --- /dev/null +++ b/2024/0xxx/CVE-2024-0160.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0160", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0161.json b/2024/0xxx/CVE-2024-0161.json new file mode 100644 index 00000000000..5571bc16111 --- /dev/null +++ b/2024/0xxx/CVE-2024-0161.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0161", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0162.json b/2024/0xxx/CVE-2024-0162.json new file mode 100644 index 00000000000..38906f2ade2 --- /dev/null +++ b/2024/0xxx/CVE-2024-0162.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0162", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0163.json b/2024/0xxx/CVE-2024-0163.json new file mode 100644 index 00000000000..5b096ee7432 --- /dev/null +++ b/2024/0xxx/CVE-2024-0163.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0163", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0164.json b/2024/0xxx/CVE-2024-0164.json new file mode 100644 index 00000000000..85b92089241 --- /dev/null +++ b/2024/0xxx/CVE-2024-0164.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0164", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0165.json b/2024/0xxx/CVE-2024-0165.json new file mode 100644 index 00000000000..a5aeae1186f --- /dev/null +++ b/2024/0xxx/CVE-2024-0165.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0165", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0166.json b/2024/0xxx/CVE-2024-0166.json new file mode 100644 index 00000000000..2ac2f06d99c --- /dev/null +++ b/2024/0xxx/CVE-2024-0166.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0166", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0167.json b/2024/0xxx/CVE-2024-0167.json new file mode 100644 index 00000000000..a9be6340eab --- /dev/null +++ b/2024/0xxx/CVE-2024-0167.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0167", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0168.json b/2024/0xxx/CVE-2024-0168.json new file mode 100644 index 00000000000..e47c148a609 --- /dev/null +++ b/2024/0xxx/CVE-2024-0168.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0168", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0169.json b/2024/0xxx/CVE-2024-0169.json new file mode 100644 index 00000000000..d4bd9783c95 --- /dev/null +++ b/2024/0xxx/CVE-2024-0169.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0169", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0170.json b/2024/0xxx/CVE-2024-0170.json new file mode 100644 index 00000000000..a699bb75ce8 --- /dev/null +++ b/2024/0xxx/CVE-2024-0170.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0170", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0171.json b/2024/0xxx/CVE-2024-0171.json new file mode 100644 index 00000000000..d38665200cb --- /dev/null +++ b/2024/0xxx/CVE-2024-0171.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0171", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0172.json b/2024/0xxx/CVE-2024-0172.json new file mode 100644 index 00000000000..d3f22ef24d6 --- /dev/null +++ b/2024/0xxx/CVE-2024-0172.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0172", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/0xxx/CVE-2024-0173.json b/2024/0xxx/CVE-2024-0173.json new file mode 100644 index 00000000000..7a9e7df645f --- /dev/null +++ b/2024/0xxx/CVE-2024-0173.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0173", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file