From 93521359fb653b4ad4be281ed4a2e500003fbc07 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 17 Jun 2024 16:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/45xxx/CVE-2022-45063.json | 5 ++ 2024/0xxx/CVE-2024-0397.json | 115 +++++++++++++++++++++++++++++++-- 2024/30xxx/CVE-2024-30063.json | 4 +- 2024/30xxx/CVE-2024-30065.json | 4 +- 2024/30xxx/CVE-2024-30066.json | 4 +- 2024/30xxx/CVE-2024-30067.json | 4 +- 2024/30xxx/CVE-2024-30068.json | 4 +- 2024/30xxx/CVE-2024-30069.json | 4 +- 2024/30xxx/CVE-2024-30076.json | 4 +- 2024/30xxx/CVE-2024-30077.json | 4 +- 2024/30xxx/CVE-2024-30078.json | 4 +- 2024/30xxx/CVE-2024-30080.json | 4 +- 2024/30xxx/CVE-2024-30082.json | 4 +- 2024/30xxx/CVE-2024-30084.json | 4 +- 2024/30xxx/CVE-2024-30085.json | 4 +- 2024/30xxx/CVE-2024-30086.json | 4 +- 2024/30xxx/CVE-2024-30087.json | 4 +- 2024/30xxx/CVE-2024-30088.json | 4 +- 2024/30xxx/CVE-2024-30089.json | 4 +- 2024/30xxx/CVE-2024-30090.json | 4 +- 2024/30xxx/CVE-2024-30091.json | 4 +- 2024/30xxx/CVE-2024-30093.json | 4 +- 2024/30xxx/CVE-2024-30094.json | 4 +- 2024/30xxx/CVE-2024-30095.json | 4 +- 2024/30xxx/CVE-2024-30096.json | 4 +- 2024/30xxx/CVE-2024-30097.json | 4 +- 2024/30xxx/CVE-2024-30099.json | 4 +- 2024/35xxx/CVE-2024-35250.json | 4 +- 2024/35xxx/CVE-2024-35265.json | 4 +- 2024/36xxx/CVE-2024-36573.json | 56 ++++++++++++++-- 2024/36xxx/CVE-2024-36574.json | 56 ++++++++++++++-- 2024/36xxx/CVE-2024-36575.json | 56 ++++++++++++++-- 2024/36xxx/CVE-2024-36577.json | 56 ++++++++++++++-- 2024/36xxx/CVE-2024-36578.json | 56 ++++++++++++++-- 2024/36xxx/CVE-2024-36581.json | 56 ++++++++++++++-- 2024/37xxx/CVE-2024-37383.json | 71 ++++++++++++++++++-- 2024/37xxx/CVE-2024-37384.json | 71 ++++++++++++++++++-- 2024/38xxx/CVE-2024-38395.json | 5 ++ 2024/38xxx/CVE-2024-38396.json | 5 ++ 2024/4xxx/CVE-2024-4032.json | 115 +++++++++++++++++++++++++++++++-- 2024/6xxx/CVE-2024-6071.json | 18 ++++++ 2024/6xxx/CVE-2024-6072.json | 18 ++++++ 2024/6xxx/CVE-2024-6073.json | 18 ++++++ 2024/6xxx/CVE-2024-6074.json | 18 ++++++ 2024/6xxx/CVE-2024-6075.json | 18 ++++++ 45 files changed, 811 insertions(+), 110 deletions(-) create mode 100644 2024/6xxx/CVE-2024-6071.json create mode 100644 2024/6xxx/CVE-2024-6072.json create mode 100644 2024/6xxx/CVE-2024-6073.json create mode 100644 2024/6xxx/CVE-2024-6074.json create mode 100644 2024/6xxx/CVE-2024-6075.json diff --git a/2022/45xxx/CVE-2022-45063.json b/2022/45xxx/CVE-2022-45063.json index 03fcdce9619..4b133ddb2f9 100644 --- a/2022/45xxx/CVE-2022-45063.json +++ b/2022/45xxx/CVE-2022-45063.json @@ -101,6 +101,11 @@ "refsource": "MLIST", "name": "[oss-security] 20240615 iTerm2 3.5.x title reporting bug", "url": "http://www.openwall.com/lists/oss-security/2024/06/15/1" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20240617 Re: iTerm2 3.5.x title reporting bug", + "url": "http://www.openwall.com/lists/oss-security/2024/06/17/1" } ] } diff --git a/2024/0xxx/CVE-2024-0397.json b/2024/0xxx/CVE-2024-0397.json index 454c7c1cbd1..b5f825e15b4 100644 --- a/2024/0xxx/CVE-2024-0397.json +++ b/2024/0xxx/CVE-2024-0397.json @@ -1,18 +1,125 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-0397", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@python.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A defect was discovered in the Python \u201cssl\u201d module where there is a memory\nrace condition with the ssl.SSLContext methods \u201ccert_store_stats()\u201d and\n\u201cget_ca_certs()\u201d. The race condition can be triggered if the methods are\ncalled at the same time as certificates are loaded into the SSLContext,\nsuch as during the TLS handshake with a certificate directory configured.\nThis issue is fixed in CPython 3.10.14, 3.11.9, 3.12.3, and 3.13.0a5." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Python Software Foundation", + "product": { + "product_data": [ + { + "product_name": "CPython", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "3.13.0a1", + "version_value": "3.13.0a5" + }, + { + "version_affected": "<", + "version_name": "3.12.0", + "version_value": "3.12.3" + }, + { + "version_affected": "<", + "version_name": "3.11.0", + "version_value": "3.11.9" + }, + { + "version_affected": "<", + "version_name": "0", + "version_value": "3.10.14" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/python/cpython/issues/114572", + "refsource": "MISC", + "name": "https://github.com/python/cpython/issues/114572" + }, + { + "url": "https://github.com/python/cpython/pull/114573", + "refsource": "MISC", + "name": "https://github.com/python/cpython/pull/114573" + }, + { + "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/BMAK5BCGKYWNJOACVUSLUF6SFGBIM4VP/", + "refsource": "MISC", + "name": "https://mail.python.org/archives/list/security-announce@python.org/thread/BMAK5BCGKYWNJOACVUSLUF6SFGBIM4VP/" + }, + { + "url": "https://github.com/python/cpython/commit/01c37f1d0714f5822d34063ca7180b595abf589d", + "refsource": "MISC", + "name": "https://github.com/python/cpython/commit/01c37f1d0714f5822d34063ca7180b595abf589d" + }, + { + "url": "https://github.com/python/cpython/commit/29c97287d205bf2f410f4895ebce3f43b5160524", + "refsource": "MISC", + "name": "https://github.com/python/cpython/commit/29c97287d205bf2f410f4895ebce3f43b5160524" + }, + { + "url": "https://github.com/python/cpython/commit/37324b421b72b7bc9934e27aba85d48d4773002e", + "refsource": "MISC", + "name": "https://github.com/python/cpython/commit/37324b421b72b7bc9934e27aba85d48d4773002e" + }, + { + "url": "https://github.com/python/cpython/commit/542f3272f56f31ed04e74c40635a913fbc12d286", + "refsource": "MISC", + "name": "https://github.com/python/cpython/commit/542f3272f56f31ed04e74c40635a913fbc12d286" + }, + { + "url": "https://github.com/python/cpython/commit/b228655c227b2ca298a8ffac44d14ce3d22f6faa", + "refsource": "MISC", + "name": "https://github.com/python/cpython/commit/b228655c227b2ca298a8ffac44d14ce3d22f6faa" + }, + { + "url": "https://github.com/python/cpython/commit/bce693111bff906ccf9281c22371331aaff766ab", + "refsource": "MISC", + "name": "https://github.com/python/cpython/commit/bce693111bff906ccf9281c22371331aaff766ab" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30063.json b/2024/30xxx/CVE-2024-30063.json index c108e63edc6..4676b3a3361 100644 --- a/2024/30xxx/CVE-2024-30063.json +++ b/2024/30xxx/CVE-2024-30063.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30065.json b/2024/30xxx/CVE-2024-30065.json index 8563b78032f..0ee175fba96 100644 --- a/2024/30xxx/CVE-2024-30065.json +++ b/2024/30xxx/CVE-2024-30065.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30066.json b/2024/30xxx/CVE-2024-30066.json index b750aaf30ee..15824e375ad 100644 --- a/2024/30xxx/CVE-2024-30066.json +++ b/2024/30xxx/CVE-2024-30066.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30067.json b/2024/30xxx/CVE-2024-30067.json index 375f57ddc8c..d007a3d90d1 100644 --- a/2024/30xxx/CVE-2024-30067.json +++ b/2024/30xxx/CVE-2024-30067.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30068.json b/2024/30xxx/CVE-2024-30068.json index e27d67da503..e55a35b043f 100644 --- a/2024/30xxx/CVE-2024-30068.json +++ b/2024/30xxx/CVE-2024-30068.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30069.json b/2024/30xxx/CVE-2024-30069.json index 6179c8ede1a..1d57da93569 100644 --- a/2024/30xxx/CVE-2024-30069.json +++ b/2024/30xxx/CVE-2024-30069.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30076.json b/2024/30xxx/CVE-2024-30076.json index ef4b0b381d9..3acee472902 100644 --- a/2024/30xxx/CVE-2024-30076.json +++ b/2024/30xxx/CVE-2024-30076.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30077.json b/2024/30xxx/CVE-2024-30077.json index 879fc0854c0..3fb8eedc831 100644 --- a/2024/30xxx/CVE-2024-30077.json +++ b/2024/30xxx/CVE-2024-30077.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30078.json b/2024/30xxx/CVE-2024-30078.json index 282d96acbba..a242abd0892 100644 --- a/2024/30xxx/CVE-2024-30078.json +++ b/2024/30xxx/CVE-2024-30078.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30080.json b/2024/30xxx/CVE-2024-30080.json index 6382f4187a7..f4a6b034596 100644 --- a/2024/30xxx/CVE-2024-30080.json +++ b/2024/30xxx/CVE-2024-30080.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30082.json b/2024/30xxx/CVE-2024-30082.json index 4a8a400a249..48208024f9f 100644 --- a/2024/30xxx/CVE-2024-30082.json +++ b/2024/30xxx/CVE-2024-30082.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30084.json b/2024/30xxx/CVE-2024-30084.json index f73b1782071..2e25abc2772 100644 --- a/2024/30xxx/CVE-2024-30084.json +++ b/2024/30xxx/CVE-2024-30084.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30085.json b/2024/30xxx/CVE-2024-30085.json index c32165f4f54..04700766397 100644 --- a/2024/30xxx/CVE-2024-30085.json +++ b/2024/30xxx/CVE-2024-30085.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -138,7 +138,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30086.json b/2024/30xxx/CVE-2024-30086.json index cd18cb6a6be..ac7bf8a005a 100644 --- a/2024/30xxx/CVE-2024-30086.json +++ b/2024/30xxx/CVE-2024-30086.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30087.json b/2024/30xxx/CVE-2024-30087.json index dcec4d9564b..7c88b68f173 100644 --- a/2024/30xxx/CVE-2024-30087.json +++ b/2024/30xxx/CVE-2024-30087.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30088.json b/2024/30xxx/CVE-2024-30088.json index b47a400b071..d78f658f2a2 100644 --- a/2024/30xxx/CVE-2024-30088.json +++ b/2024/30xxx/CVE-2024-30088.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30089.json b/2024/30xxx/CVE-2024-30089.json index f748579fb1f..fe438ba56b0 100644 --- a/2024/30xxx/CVE-2024-30089.json +++ b/2024/30xxx/CVE-2024-30089.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30090.json b/2024/30xxx/CVE-2024-30090.json index 4fb766fd556..7a9907764e3 100644 --- a/2024/30xxx/CVE-2024-30090.json +++ b/2024/30xxx/CVE-2024-30090.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30091.json b/2024/30xxx/CVE-2024-30091.json index 8acc0313959..ad0faf9194b 100644 --- a/2024/30xxx/CVE-2024-30091.json +++ b/2024/30xxx/CVE-2024-30091.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30093.json b/2024/30xxx/CVE-2024-30093.json index 3b1d883cd9a..5f56a700d1f 100644 --- a/2024/30xxx/CVE-2024-30093.json +++ b/2024/30xxx/CVE-2024-30093.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30094.json b/2024/30xxx/CVE-2024-30094.json index 5b2bf0031a2..8c124dcd1ac 100644 --- a/2024/30xxx/CVE-2024-30094.json +++ b/2024/30xxx/CVE-2024-30094.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30095.json b/2024/30xxx/CVE-2024-30095.json index 9d1cf253ec7..08474ce7e8f 100644 --- a/2024/30xxx/CVE-2024-30095.json +++ b/2024/30xxx/CVE-2024-30095.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30096.json b/2024/30xxx/CVE-2024-30096.json index 6fba61a2fde..1dd479eb174 100644 --- a/2024/30xxx/CVE-2024-30096.json +++ b/2024/30xxx/CVE-2024-30096.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30097.json b/2024/30xxx/CVE-2024-30097.json index dec4b5b462e..4a321021c39 100644 --- a/2024/30xxx/CVE-2024-30097.json +++ b/2024/30xxx/CVE-2024-30097.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/30xxx/CVE-2024-30099.json b/2024/30xxx/CVE-2024-30099.json index a8988030a44..5494cb61838 100644 --- a/2024/30xxx/CVE-2024-30099.json +++ b/2024/30xxx/CVE-2024-30099.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/35xxx/CVE-2024-35250.json b/2024/35xxx/CVE-2024-35250.json index 3b1aa7ca4b3..9d0628d2da1 100644 --- a/2024/35xxx/CVE-2024-35250.json +++ b/2024/35xxx/CVE-2024-35250.json @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/35xxx/CVE-2024-35265.json b/2024/35xxx/CVE-2024-35265.json index 83505eecb30..c8e927186c5 100644 --- a/2024/35xxx/CVE-2024-35265.json +++ b/2024/35xxx/CVE-2024-35265.json @@ -90,7 +90,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19044.4529" } ] } @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19043.4529" + "version_value": "10.0.19045.4529" } ] } diff --git a/2024/36xxx/CVE-2024-36573.json b/2024/36xxx/CVE-2024-36573.json index 88595931e45..55b6aca4014 100644 --- a/2024/36xxx/CVE-2024-36573.json +++ b/2024/36xxx/CVE-2024-36573.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-36573", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-36573", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "almela obx before v.0.0.4 has a Prototype Pollution issue which allows arbitrary code execution via the obx/build/index.js:656), reduce (@almela/obx/build/index.js:470), Object.set (obx/build/index.js:269) component." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://gist.github.com/mestrtee/fd8181bbc180d775f8367a2b9e0ffcd1", + "url": "https://gist.github.com/mestrtee/fd8181bbc180d775f8367a2b9e0ffcd1" } ] } diff --git a/2024/36xxx/CVE-2024-36574.json b/2024/36xxx/CVE-2024-36574.json index 54c5fe99dac..b077d4a7304 100644 --- a/2024/36xxx/CVE-2024-36574.json +++ b/2024/36xxx/CVE-2024-36574.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-36574", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-36574", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Prototype Pollution issue in flatten-json 1.0.1 allows an attacker to execute arbitrary code via module.exports.unflattenJSON (flatten-json/index.js:42)" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://gist.github.com/mestrtee/d5a0c93459599f77557b5bbe78b57325", + "url": "https://gist.github.com/mestrtee/d5a0c93459599f77557b5bbe78b57325" } ] } diff --git a/2024/36xxx/CVE-2024-36575.json b/2024/36xxx/CVE-2024-36575.json index 3b771d8cc7e..20445f0eff0 100644 --- a/2024/36xxx/CVE-2024-36575.json +++ b/2024/36xxx/CVE-2024-36575.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-36575", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-36575", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Prototype Pollution issue in getsetprop 1.1.0 allows an attacker to execute arbitrary code via global.accessor." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://gist.github.com/mestrtee/0d830798f20839d634278d7af0155f9e", + "url": "https://gist.github.com/mestrtee/0d830798f20839d634278d7af0155f9e" } ] } diff --git a/2024/36xxx/CVE-2024-36577.json b/2024/36xxx/CVE-2024-36577.json index 8709c35dd2b..b7e0a36bd6b 100644 --- a/2024/36xxx/CVE-2024-36577.json +++ b/2024/36xxx/CVE-2024-36577.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-36577", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-36577", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "apphp js-object-resolver < 3.1.1 is vulnerable to Prototype Pollution via Module.setNestedProperty." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://gist.github.com/mestrtee/c90189f3d8480a5f267395ec40701373", + "url": "https://gist.github.com/mestrtee/c90189f3d8480a5f267395ec40701373" } ] } diff --git a/2024/36xxx/CVE-2024-36578.json b/2024/36xxx/CVE-2024-36578.json index 42e5a63fb26..94ce8b3aa95 100644 --- a/2024/36xxx/CVE-2024-36578.json +++ b/2024/36xxx/CVE-2024-36578.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-36578", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-36578", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "akbr update 1.0.0 is vulnerable to Prototype Pollution via update/index.js." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://gist.github.com/mestrtee/8bc749ec2b5453d887b2f4a362a65897", + "url": "https://gist.github.com/mestrtee/8bc749ec2b5453d887b2f4a362a65897" } ] } diff --git a/2024/36xxx/CVE-2024-36581.json b/2024/36xxx/CVE-2024-36581.json index 4aca441a625..f75cf0ea1e1 100644 --- a/2024/36xxx/CVE-2024-36581.json +++ b/2024/36xxx/CVE-2024-36581.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-36581", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-36581", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Prototype Pollution issue in abw badger-database 1.2.1 allows an attacker to execute arbitrary code via dist/badger-database.esm." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://gist.github.com/mestrtee/f6b2ed1b3b4bc0df994c7455fc6110bd", + "url": "https://gist.github.com/mestrtee/f6b2ed1b3b4bc0df994c7455fc6110bd" } ] } diff --git a/2024/37xxx/CVE-2024-37383.json b/2024/37xxx/CVE-2024-37383.json index bfd9dccbcfa..b89a9dbe9ce 100644 --- a/2024/37xxx/CVE-2024-37383.json +++ b/2024/37xxx/CVE-2024-37383.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-37383", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-37383", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/roundcube/roundcubemail/commit/43aaaa528646877789ec028d87924ba1accf5242", + "refsource": "MISC", + "name": "https://github.com/roundcube/roundcubemail/commit/43aaaa528646877789ec028d87924ba1accf5242" + }, + { + "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.6.7", + "refsource": "MISC", + "name": "https://github.com/roundcube/roundcubemail/releases/tag/1.6.7" + }, + { + "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.5.7", + "refsource": "MISC", + "name": "https://github.com/roundcube/roundcubemail/releases/tag/1.5.7" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20240617 [SECURITY] [DLA 3835-1] roundcube security update", + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00008.html" } ] } diff --git a/2024/37xxx/CVE-2024-37384.json b/2024/37xxx/CVE-2024-37384.json index 20fdea2819d..91f63ad0cc9 100644 --- a/2024/37xxx/CVE-2024-37384.json +++ b/2024/37xxx/CVE-2024-37384.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-37384", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-37384", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via list columns from user preferences." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.6.7", + "refsource": "MISC", + "name": "https://github.com/roundcube/roundcubemail/releases/tag/1.6.7" + }, + { + "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.5.7", + "refsource": "MISC", + "name": "https://github.com/roundcube/roundcubemail/releases/tag/1.5.7" + }, + { + "url": "https://github.com/roundcube/roundcubemail/commit/cde4522c5c95f13c6aeeb1600ab17e5067a536f7", + "refsource": "MISC", + "name": "https://github.com/roundcube/roundcubemail/commit/cde4522c5c95f13c6aeeb1600ab17e5067a536f7" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20240617 [SECURITY] [DLA 3835-1] roundcube security update", + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00008.html" } ] } diff --git a/2024/38xxx/CVE-2024-38395.json b/2024/38xxx/CVE-2024-38395.json index 49e422afda7..cbb2fb7569a 100644 --- a/2024/38xxx/CVE-2024-38395.json +++ b/2024/38xxx/CVE-2024-38395.json @@ -71,6 +71,11 @@ "url": "https://gitlab.com/gnachman/iterm2/-/tags/v3.5.2", "refsource": "MISC", "name": "https://gitlab.com/gnachman/iterm2/-/tags/v3.5.2" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20240617 Re: iTerm2 3.5.x title reporting bug", + "url": "http://www.openwall.com/lists/oss-security/2024/06/17/1" } ] } diff --git a/2024/38xxx/CVE-2024-38396.json b/2024/38xxx/CVE-2024-38396.json index bd81f3393d3..78fb7e580a3 100644 --- a/2024/38xxx/CVE-2024-38396.json +++ b/2024/38xxx/CVE-2024-38396.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://gitlab.com/gnachman/iterm2/-/commit/fc60236a914d63fb70a5c632e211203a4f1bd4dd", "url": "https://gitlab.com/gnachman/iterm2/-/commit/fc60236a914d63fb70a5c632e211203a4f1bd4dd" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20240617 Re: iTerm2 3.5.x title reporting bug", + "url": "http://www.openwall.com/lists/oss-security/2024/06/17/1" } ] } diff --git a/2024/4xxx/CVE-2024-4032.json b/2024/4xxx/CVE-2024-4032.json index fc457a08ec9..5543d69dfdd 100644 --- a/2024/4xxx/CVE-2024-4032.json +++ b/2024/4xxx/CVE-2024-4032.json @@ -1,18 +1,125 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-4032", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@python.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The \u201cipaddress\u201d module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as \u201cglobally reachable\u201d or \u201cprivate\u201d. This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn\u2019t be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.\n\nCPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Python Software Foundation", + "product": { + "product_data": [ + { + "product_name": "CPython", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "3.12.4" + }, + { + "version_affected": "<", + "version_name": "3.13.0a1", + "version_value": "3.13.0a6" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/python/cpython/issues/113171", + "refsource": "MISC", + "name": "https://github.com/python/cpython/issues/113171" + }, + { + "url": "https://github.com/python/cpython/pull/113179", + "refsource": "MISC", + "name": "https://github.com/python/cpython/pull/113179" + }, + { + "url": "https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml", + "refsource": "MISC", + "name": "https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml" + }, + { + "url": "https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml", + "refsource": "MISC", + "name": "https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml" + }, + { + "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/NRUHDUS2IV2USIZM2CVMSFL6SCKU3RZA/", + "refsource": "MISC", + "name": "https://mail.python.org/archives/list/security-announce@python.org/thread/NRUHDUS2IV2USIZM2CVMSFL6SCKU3RZA/" + }, + { + "url": "https://github.com/python/cpython/commit/22adf29da8d99933ffed8647d3e0726edd16f7f8", + "refsource": "MISC", + "name": "https://github.com/python/cpython/commit/22adf29da8d99933ffed8647d3e0726edd16f7f8" + }, + { + "url": "https://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7f69f", + "refsource": "MISC", + "name": "https://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7f69f" + }, + { + "url": "https://github.com/python/cpython/commit/895f7e2ac23eff4743143beef0f0c5ac71ea27d3", + "refsource": "MISC", + "name": "https://github.com/python/cpython/commit/895f7e2ac23eff4743143beef0f0c5ac71ea27d3" + }, + { + "url": "https://github.com/python/cpython/commit/ba431579efdcbaed7a96f2ac4ea0775879a332fb", + "refsource": "MISC", + "name": "https://github.com/python/cpython/commit/ba431579efdcbaed7a96f2ac4ea0775879a332fb" + }, + { + "url": "https://github.com/python/cpython/commit/c62c9e518b784fe44432a3f4fc265fb95b651906", + "refsource": "MISC", + "name": "https://github.com/python/cpython/commit/c62c9e518b784fe44432a3f4fc265fb95b651906" + }, + { + "url": "https://github.com/python/cpython/commit/f86b17ac511e68192ba71f27e752321a3252cee3", + "refsource": "MISC", + "name": "https://github.com/python/cpython/commit/f86b17ac511e68192ba71f27e752321a3252cee3" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6071.json b/2024/6xxx/CVE-2024-6071.json new file mode 100644 index 00000000000..66c8366b428 --- /dev/null +++ b/2024/6xxx/CVE-2024-6071.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6071", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6072.json b/2024/6xxx/CVE-2024-6072.json new file mode 100644 index 00000000000..b619bebb7ee --- /dev/null +++ b/2024/6xxx/CVE-2024-6072.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6072", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6073.json b/2024/6xxx/CVE-2024-6073.json new file mode 100644 index 00000000000..bfac3d7c419 --- /dev/null +++ b/2024/6xxx/CVE-2024-6073.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6073", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6074.json b/2024/6xxx/CVE-2024-6074.json new file mode 100644 index 00000000000..45e49e3b7ac --- /dev/null +++ b/2024/6xxx/CVE-2024-6074.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6074", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6075.json b/2024/6xxx/CVE-2024-6075.json new file mode 100644 index 00000000000..268a9df304f --- /dev/null +++ b/2024/6xxx/CVE-2024-6075.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6075", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file