diff --git a/2023/0xxx/CVE-2023-0651.json b/2023/0xxx/CVE-2023-0651.json index f64ad9dcbdb..09b50508c0b 100644 --- a/2023/0xxx/CVE-2023-0651.json +++ b/2023/0xxx/CVE-2023-0651.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in FastCMS 0.1.0. It has been classified as critical. Affected is an unknown function of the component Template Management. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-220038 is the identifier assigned to this vulnerability." + "value": "A vulnerability was found in FastCMS 0.1.0. It has been classified as critical. Affected is an unknown function of the component Template Management. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "deu", @@ -25,7 +25,7 @@ "description": [ { "lang": "eng", - "value": "CWE-434 Unrestricted Upload", + "value": "Unrestricted Upload", "cweId": "CWE-434" } ] @@ -68,6 +68,11 @@ "refsource": "MISC", "name": "https://vuldb.com/?ctiid.220038" }, + { + "url": "https://vuldb.com/?submit.82316", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.82316" + }, { "url": "https://github.com/linmoren/fastcms_bug/blob/main/template_files_upload.md", "refsource": "MISC", diff --git a/2024/20xxx/CVE-2024-20430.json b/2024/20xxx/CVE-2024-20430.json index abeb1b8c8a5..9543d8314f6 100644 --- a/2024/20xxx/CVE-2024-20430.json +++ b/2024/20xxx/CVE-2024-20430.json @@ -1,17 +1,171 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-20430", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@cisco.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in Cisco Meraki Systems Manager (SM) Agent for Windows could allow an authenticated, local attacker to execute arbitrary code with elevated privileges. \r\n\r\nThis vulnerability is due to incorrect handling of directory search paths at runtime. A low-privileged attacker could exploit this vulnerability by placing both malicious configuration files and malicious DLL files on an affected system, which would read and execute the files when Cisco Meraki SM launches on startup. A successful exploit could allow the attacker to execute arbitrary code on the affected system with SYSTEM privileges. " + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncontrolled Search Path Element", + "cweId": "CWE-427" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cisco", + "product": { + "product_data": [ + { + "product_name": "Cisco Meraki Systems Manager Agent", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.1.5" + }, + { + "version_affected": "=", + "version_value": "4.1.4" + }, + { + "version_affected": "=", + "version_value": "4.1.1" + }, + { + "version_affected": "=", + "version_value": "4.0" + }, + { + "version_affected": "=", + "version_value": "3.8.2" + }, + { + "version_affected": "=", + "version_value": "3.7.2" + }, + { + "version_affected": "=", + "version_value": "3.7.1" + }, + { + "version_affected": "=", + "version_value": "3.7.0" + }, + { + "version_affected": "=", + "version_value": "3.6.0" + }, + { + "version_affected": "=", + "version_value": "3.5.2" + }, + { + "version_affected": "=", + "version_value": "3.1.4" + }, + { + "version_affected": "=", + "version_value": "3.1.3" + }, + { + "version_affected": "=", + "version_value": "3.1.2" + }, + { + "version_affected": "=", + "version_value": "3.1.1" + }, + { + "version_affected": "=", + "version_value": "3.0.3" + }, + { + "version_affected": "=", + "version_value": "3.0.2" + }, + { + "version_affected": "=", + "version_value": "3.0.1" + }, + { + "version_affected": "=", + "version_value": "3.0.0" + }, + { + "version_affected": "=", + "version_value": "2.0.0" + }, + { + "version_affected": "=", + "version_value": "1.0.99" + }, + { + "version_affected": "=", + "version_value": "1.0.98" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-agent-dll-hj-Ptn7PtKe", + "refsource": "MISC", + "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-agent-dll-hj-Ptn7PtKe" + } + ] + }, + "source": { + "advisory": "cisco-sa-meraki-agent-dll-hj-Ptn7PtKe", + "discovery": "INTERNAL" + }, + "exploit": [ + { + "lang": "en", + "value": "As of the publication of this advisory, the Cisco Meraki Product Security Incident Response Team (PSIRT) was not aware of any public announcement or malicious use of the vulnerability that is described in this advisory." + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" } ] } diff --git a/2024/28xxx/CVE-2024-28834.json b/2024/28xxx/CVE-2024-28834.json index 1bfde4de93e..c1ca6ff2d31 100644 --- a/2024/28xxx/CVE-2024-28834.json +++ b/2024/28xxx/CVE-2024-28834.json @@ -230,16 +230,6 @@ }, "references": { "reference_data": [ - { - "url": "http://www.openwall.com/lists/oss-security/2024/03/22/1", - "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2024/03/22/1" - }, - { - "url": "http://www.openwall.com/lists/oss-security/2024/03/22/2", - "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2024/03/22/2" - }, { "url": "https://access.redhat.com/errata/RHSA-2024:1784", "refsource": "MISC", @@ -289,16 +279,6 @@ "url": "https://minerva.crocs.fi.muni.cz/", "refsource": "MISC", "name": "https://minerva.crocs.fi.muni.cz/" - }, - { - "url": "https://people.redhat.com/~hkario/marvin/", - "refsource": "MISC", - "name": "https://people.redhat.com/~hkario/marvin/" - }, - { - "url": "https://security.netapp.com/advisory/ntap-20240524-0004/", - "refsource": "MISC", - "name": "https://security.netapp.com/advisory/ntap-20240524-0004/" } ] }, diff --git a/2024/45xxx/CVE-2024-45607.json b/2024/45xxx/CVE-2024-45607.json index 38434c837a6..3f3d9903443 100644 --- a/2024/45xxx/CVE-2024-45607.json +++ b/2024/45xxx/CVE-2024-45607.json @@ -1,17 +1,95 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-45607", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "whatsapp-api-js is a TypeScript server agnostic Whatsapp's Official API framework. It's possible to check the payload validation using the WhatsAppAPI.verifyRequestSignature and expect false when the signature is valid. Incorrect Access Control, anyone using the post or verifyRequestSignature methods to handle messages is impacted. This vulnerability is fixed in 4.0.3." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-347: Improper Verification of Cryptographic Signature", + "cweId": "CWE-347" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Secreto31126", + "product": { + "product_data": [ + { + "product_name": "whatsapp-api-js", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": ">= 4.0.0, < 4.0.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Secreto31126/whatsapp-api-js/security/advisories/GHSA-mwhf-vhr5-7j23", + "refsource": "MISC", + "name": "https://github.com/Secreto31126/whatsapp-api-js/security/advisories/GHSA-mwhf-vhr5-7j23" + }, + { + "url": "https://github.com/Secreto31126/whatsapp-api-js/pull/371", + "refsource": "MISC", + "name": "https://github.com/Secreto31126/whatsapp-api-js/pull/371" + }, + { + "url": "https://github.com/Secreto31126/whatsapp-api-js/commit/56620c65126427496a94d176082fbd8393a95b6d", + "refsource": "MISC", + "name": "https://github.com/Secreto31126/whatsapp-api-js/commit/56620c65126427496a94d176082fbd8393a95b6d" + } + ] + }, + "source": { + "advisory": "GHSA-mwhf-vhr5-7j23", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/46xxx/CVE-2024-46900.json b/2024/46xxx/CVE-2024-46900.json new file mode 100644 index 00000000000..03ccea00692 --- /dev/null +++ b/2024/46xxx/CVE-2024-46900.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-46900", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6077.json b/2024/6xxx/CVE-2024-6077.json index 299525a168f..372368d5507 100644 --- a/2024/6xxx/CVE-2024-6077.json +++ b/2024/6xxx/CVE-2024-6077.json @@ -1,18 +1,172 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-6077", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "PSIRT@rockwellautomation.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Rockwell Automation", + "product": { + "product_data": [ + { + "product_name": "CompactLogix 5380", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "v.32 .011" + } + ] + } + }, + { + "product_name": "CompactLogix 5380 Process", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "v.33.011" + } + ] + } + }, + { + "product_name": "Compact GuardLogix 5380 SIL 2", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "v.32.013" + } + ] + } + }, + { + "product_name": "Compact GuardLogix 5380 SIL 3", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "v.32.011" + } + ] + } + }, + { + "product_name": "CompactLogix 5480", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "v.32.011" + } + ] + } + }, + { + "product_name": "ControlLogix\u00ae 5580", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "v.32.011" + } + ] + } + }, + { + "product_name": "ControlLogix\u00ae 5580 Process", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "v.33.011" + } + ] + } + }, + { + "product_name": "GuardLogix 5580", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "v.32.011" + } + ] + } + }, + { + "product_name": "1756-EN4", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "v2.001" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1963.html", + "refsource": "MISC", + "name": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1963.html" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "advisory": "SD1963", + "discovery": "INTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

Affected Family

 

 

 

 

First Known in Software/Firmware Version

 

 

 

 

Corrected in Software/Firmware Version

 

 

 

 

CompactLogix 5380

 

 

 

 

 

 

 

v.32 .011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

CompactLogix 5380 Process

 

 

 

 

v.33.011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

Compact GuardLogix 5380 SIL 2

 

 

 

 

v.32.013

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

Compact GuardLogix 5380 SIL 3

 

 

 

 

v.32.011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

CompactLogix 5480

 

 

 

 

v.32.011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

ControlLogix\u00ae 5580

 

 

 

 

v.32.011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

ControlLogix\u00ae 5580 Process

 

 

 

 

v.33.011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

GuardLogix 5580

 

 

 

 

v.32.011

 

 

 

 

v33.017, v34.014, v35.013, v36.011 and later

 

 

 

 

1756-EN4

 

 

 

 

v2.001

 

 

 

 

v6.001 and later

 

 

 

\n\n
" + } + ], + "value": "Affected Family \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nFirst Known in Software/Firmware Version\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCorrected in Software/Firmware Version\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompactLogix 5380\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32 .011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompactLogix 5380 Process \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.33.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompact GuardLogix 5380 SIL 2 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.013\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompact GuardLogix 5380 SIL 3 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompactLogix 5480 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nControlLogix\u00ae 5580 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nControlLogix\u00ae 5580 Process \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.33.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nGuardLogix 5580 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n1756-EN4\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv2.001\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv6.001 and later" + } + ] } \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6409.json b/2024/6xxx/CVE-2024-6409.json index 0e0d05ba612..97506c85757 100644 --- a/2024/6xxx/CVE-2024-6409.json +++ b/2024/6xxx/CVE-2024-6409.json @@ -243,31 +243,6 @@ }, "references": { "reference_data": [ - { - "url": "http://www.openwall.com/lists/oss-security/2024/07/08/2", - "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2024/07/08/2" - }, - { - "url": "http://www.openwall.com/lists/oss-security/2024/07/09/2", - "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2024/07/09/2" - }, - { - "url": "http://www.openwall.com/lists/oss-security/2024/07/09/5", - "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2024/07/09/5" - }, - { - "url": "http://www.openwall.com/lists/oss-security/2024/07/10/1", - "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2024/07/10/1" - }, - { - "url": "http://www.openwall.com/lists/oss-security/2024/07/10/2", - "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2024/07/10/2" - }, { "url": "https://access.redhat.com/errata/RHSA-2024:4457", "refsource": "MISC", @@ -308,55 +283,10 @@ "refsource": "MISC", "name": "https://access.redhat.com/security/cve/CVE-2024-6409" }, - { - "url": "https://almalinux.org/blog/2024-07-09-cve-2024-6409/", - "refsource": "MISC", - "name": "https://almalinux.org/blog/2024-07-09-cve-2024-6409/" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295085", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2295085" - }, - { - "url": "https://bugzilla.suse.com/show_bug.cgi?id=1227217", - "refsource": "MISC", - "name": "https://bugzilla.suse.com/show_bug.cgi?id=1227217" - }, - { - "url": "https://explore.alas.aws.amazon.com/CVE-2024-6409.html", - "refsource": "MISC", - "name": "https://explore.alas.aws.amazon.com/CVE-2024-6409.html" - }, - { - "url": "https://github.com/openela-main/openssh/commit/c00da7741d42029e49047dd89e266d91dcfbffa0", - "refsource": "MISC", - "name": "https://github.com/openela-main/openssh/commit/c00da7741d42029e49047dd89e266d91dcfbffa0" - }, - { - "url": "https://security-tracker.debian.org/tracker/CVE-2024-6409", - "refsource": "MISC", - "name": "https://security-tracker.debian.org/tracker/CVE-2024-6409" - }, - { - "url": "https://security.netapp.com/advisory/ntap-20240712-0003/", - "refsource": "MISC", - "name": "https://security.netapp.com/advisory/ntap-20240712-0003/" - }, - { - "url": "https://sig-security.rocky.page/issues/CVE-2024-6409/", - "refsource": "MISC", - "name": "https://sig-security.rocky.page/issues/CVE-2024-6409/" - }, - { - "url": "https://ubuntu.com/security/CVE-2024-6409", - "refsource": "MISC", - "name": "https://ubuntu.com/security/CVE-2024-6409" - }, - { - "url": "https://www.suse.com/security/cve/CVE-2024-6409.html", - "refsource": "MISC", - "name": "https://www.suse.com/security/cve/CVE-2024-6409.html" } ] }, diff --git a/2024/8xxx/CVE-2024-8760.json b/2024/8xxx/CVE-2024-8760.json new file mode 100644 index 00000000000..3be7f932dd6 --- /dev/null +++ b/2024/8xxx/CVE-2024-8760.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8760", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8761.json b/2024/8xxx/CVE-2024-8761.json new file mode 100644 index 00000000000..22da4277ae5 --- /dev/null +++ b/2024/8xxx/CVE-2024-8761.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8761", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8762.json b/2024/8xxx/CVE-2024-8762.json new file mode 100644 index 00000000000..a1182df9691 --- /dev/null +++ b/2024/8xxx/CVE-2024-8762.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8762", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file