From 9658796a3dda267b80ae8da3c3e9460f079c5c6f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 7 Jun 2024 17:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/1xxx/CVE-2024-1665.json | 78 +--------------------------------- 2024/23xxx/CVE-2024-23692.json | 5 +++ 2024/30xxx/CVE-2024-30163.json | 61 +++++++++++++++++++++++--- 2024/31xxx/CVE-2024-31958.json | 70 +++++++++++++++++++++++++++--- 2024/31xxx/CVE-2024-31959.json | 70 +++++++++++++++++++++++++++--- 2024/37xxx/CVE-2024-37163.json | 76 +++++++++++++++++++++++++++++++-- 2024/3xxx/CVE-2024-3380.json | 8 ++-- 2024/4xxx/CVE-2024-4152.json | 8 ++-- 2024/4xxx/CVE-2024-4153.json | 73 +------------------------------ 2024/5xxx/CVE-2024-5132.json | 73 +------------------------------ 2024/5xxx/CVE-2024-5750.json | 18 ++++++++ 2024/5xxx/CVE-2024-5751.json | 18 ++++++++ 2024/5xxx/CVE-2024-5752.json | 18 ++++++++ 2024/5xxx/CVE-2024-5753.json | 18 ++++++++ 2024/5xxx/CVE-2024-5754.json | 18 ++++++++ 15 files changed, 364 insertions(+), 248 deletions(-) create mode 100644 2024/5xxx/CVE-2024-5750.json create mode 100644 2024/5xxx/CVE-2024-5751.json create mode 100644 2024/5xxx/CVE-2024-5752.json create mode 100644 2024/5xxx/CVE-2024-5753.json create mode 100644 2024/5xxx/CVE-2024-5754.json diff --git a/2024/1xxx/CVE-2024-1665.json b/2024/1xxx/CVE-2024-1665.json index 818ec92c67e..abb88f80a8c 100644 --- a/2024/1xxx/CVE-2024-1665.json +++ b/2024/1xxx/CVE-2024-1665.json @@ -5,87 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2024-1665", "ASSIGNER": "security@huntr.com", - "STATE": "PUBLIC" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "lunary-ai/lunary version 1.0.0 is vulnerable to unauthorized evaluation creation due to missing server-side checks for user account status during evaluation creation. While the web UI restricts evaluation creation to paid accounts, the server-side API endpoint '/v1/evaluations' does not verify if the user has a paid account, allowing users with free or self-hosted accounts to create unlimited evaluations without upgrading their account. This vulnerability is due to the lack of account status validation in the evaluation creation process." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-770 Allocation of Resources Without Limits or Throttling", - "cweId": "CWE-770" - } - ] - } - ] - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "lunary-ai", - "product": { - "product_data": [ - { - "product_name": "lunary-ai/lunary", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "unspecified", - "version_value": "1.2.7" - } - ] - } - } - ] - } - } - ] - } - }, - "references": { - "reference_data": [ - { - "url": "https://huntr.com/bounties/c0e6299e-ea45-435c-b849-53d50ffc0e83", - "refsource": "MISC", - "name": "https://huntr.com/bounties/c0e6299e-ea45-435c-b849-53d50ffc0e83" - }, - { - "url": "https://github.com/lunary-ai/lunary/commit/c57cd50fa0477fd2a2efe60810c0099eebd66f54", - "refsource": "MISC", - "name": "https://github.com/lunary-ai/lunary/commit/c57cd50fa0477fd2a2efe60810c0099eebd66f54" - } - ] - }, - "source": { - "advisory": "c0e6299e-ea45-435c-b849-53d50ffc0e83", - "discovery": "EXTERNAL" - }, - "impact": { - "cvss": [ - { - "version": "3.0", - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "NONE", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", - "baseScore": 5.3, - "baseSeverity": "MEDIUM" + "value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] } diff --git a/2024/23xxx/CVE-2024-23692.json b/2024/23xxx/CVE-2024-23692.json index e530719941e..6fe290cdd42 100644 --- a/2024/23xxx/CVE-2024-23692.json +++ b/2024/23xxx/CVE-2024-23692.json @@ -64,6 +64,11 @@ "url": "https://mohemiv.com/all/rejetto-http-file-server-2-3m-unauthenticated-rce/", "refsource": "MISC", "name": "https://mohemiv.com/all/rejetto-http-file-server-2-3m-unauthenticated-rce/" + }, + { + "url": "https://github.com/rapid7/metasploit-framework/pull/19240", + "refsource": "MISC", + "name": "https://github.com/rapid7/metasploit-framework/pull/19240" } ] }, diff --git a/2024/30xxx/CVE-2024-30163.json b/2024/30xxx/CVE-2024-30163.json index f2a706e362e..998ff3f2d51 100644 --- a/2024/30xxx/CVE-2024-30163.json +++ b/2024/30xxx/CVE-2024-30163.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-30163", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-30163", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Invision Community before 4.7.16 allow SQL injection via the applications/nexus/modules/front/store/store.php IPS\\nexus\\modules\\front\\store\\_store::_categoryView() method, where user input passed through the filter request parameter is not properly sanitized before being used to execute SQL queries. This can be exploited by unauthenticated attackers to carry out Blind SQL Injection attacks." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://invisioncommunity.com/release-notes/4716-r128/", + "refsource": "MISC", + "name": "https://invisioncommunity.com/release-notes/4716-r128/" + }, + { + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2024/Apr/20", + "url": "http://seclists.org/fulldisclosure/2024/Apr/20" } ] } diff --git a/2024/31xxx/CVE-2024-31958.json b/2024/31xxx/CVE-2024-31958.json index 90c8f746b18..70e1cf9aa2f 100644 --- a/2024/31xxx/CVE-2024-31958.json +++ b/2024/31xxx/CVE-2024-31958.json @@ -1,18 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-31958", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-31958", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Samsung Mobile Processor EExynos 2200, Exynos 1480, Exynos 2400. It lacks a check for the validation of native handles, which can result in an Out-of-Bounds Write." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:L/AV:L/A:H/C:N/I:L/PR:N/S:U/UI:N", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31959.json b/2024/31xxx/CVE-2024-31959.json index 08541d2895a..7e8c896c88b 100644 --- a/2024/31xxx/CVE-2024-31959.json +++ b/2024/31xxx/CVE-2024-31959.json @@ -1,18 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-31959", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-31959", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Samsung Mobile Processor Exynos 2200, Exynos 1480, Exynos 2400. It lacks a check for the validation of native handles, which can result in code execution." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:L/AV:L/A:H/C:H/I:H/PR:N/S:U/UI:N", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2024/37xxx/CVE-2024-37163.json b/2024/37xxx/CVE-2024-37163.json index 07df57d3c4b..976afba11ca 100644 --- a/2024/37xxx/CVE-2024-37163.json +++ b/2024/37xxx/CVE-2024-37163.json @@ -1,17 +1,85 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-37163", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SkyScrape is a GUI Dashboard for AWS Infrastructure and Managing Resources and Usage Costs. SkyScrape's API requests are currently unsecured HTTP requests, leading to potential vulnerabilities for the user's temporary credentials and data. This affects version 1.0.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-319: Cleartext Transmission of Sensitive Information", + "cweId": "CWE-319" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "oslabs-beta", + "product": { + "product_data": [ + { + "product_name": "SkyScraper", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "= 1.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/oslabs-beta/SkyScraper/security/advisories/GHSA-vfqg-qhm5-5m3j", + "refsource": "MISC", + "name": "https://github.com/oslabs-beta/SkyScraper/security/advisories/GHSA-vfqg-qhm5-5m3j" + } + ] + }, + "source": { + "advisory": "GHSA-vfqg-qhm5-5m3j", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", + "version": "3.1" } ] } diff --git a/2024/3xxx/CVE-2024-3380.json b/2024/3xxx/CVE-2024-3380.json index e7c58ee7919..830b49976c5 100644 --- a/2024/3xxx/CVE-2024-3380.json +++ b/2024/3xxx/CVE-2024-3380.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-3380", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@huntr.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] } diff --git a/2024/4xxx/CVE-2024-4152.json b/2024/4xxx/CVE-2024-4152.json index ca78dcecb7e..2579b51c8ec 100644 --- a/2024/4xxx/CVE-2024-4152.json +++ b/2024/4xxx/CVE-2024-4152.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-4152", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@huntr.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] } diff --git a/2024/4xxx/CVE-2024-4153.json b/2024/4xxx/CVE-2024-4153.json index 9c77ff66209..f86dd1f7f04 100644 --- a/2024/4xxx/CVE-2024-4153.json +++ b/2024/4xxx/CVE-2024-4153.json @@ -5,82 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2024-4153", "ASSIGNER": "security@huntr.com", - "STATE": "PUBLIC" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "A vulnerability in lunary-ai/lunary version 1.2.2 allows attackers to bypass user creation limits and potentially evade payment requirements. The issue arises from an undefined behavior when handling input to the API, specifically through a POST request to the /v1/users endpoint. By crafting a request with a new user's email and assigning them an 'admin' role, attackers can invite additional users beyond the set limit. This vulnerability could be exploited to add an unlimited number of users without adhering to the intended restrictions." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-475 Undefined Behavior for Input to API", - "cweId": "CWE-475" - } - ] - } - ] - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "lunary-ai", - "product": { - "product_data": [ - { - "product_name": "lunary-ai/lunary", - "version": { - "version_data": [ - { - "version_affected": "<=", - "version_name": "unspecified", - "version_value": "latest" - } - ] - } - } - ] - } - } - ] - } - }, - "references": { - "reference_data": [ - { - "url": "https://huntr.com/bounties/336db0ae-fe33-44b9-ba9d-bf117e0d90c4", - "refsource": "MISC", - "name": "https://huntr.com/bounties/336db0ae-fe33-44b9-ba9d-bf117e0d90c4" - } - ] - }, - "source": { - "advisory": "336db0ae-fe33-44b9-ba9d-bf117e0d90c4", - "discovery": "EXTERNAL" - }, - "impact": { - "cvss": [ - { - "version": "3.0", - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "NONE", - "confidentialityImpact": "LOW", - "integrityImpact": "NONE", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", - "baseScore": 4.3, - "baseSeverity": "MEDIUM" + "value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] } diff --git a/2024/5xxx/CVE-2024-5132.json b/2024/5xxx/CVE-2024-5132.json index 735493d52a3..817551e2c88 100644 --- a/2024/5xxx/CVE-2024-5132.json +++ b/2024/5xxx/CVE-2024-5132.json @@ -5,82 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2024-5132", "ASSIGNER": "security@huntr.com", - "STATE": "PUBLIC" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "In lunary-ai/lunary version 1.2.2, a business logic error allows users to bypass the intended limitations on team member invitations and additions, regardless of their subscription plan. The vulnerability arises due to the lack of validation against the predefined member limits in the SEAT_ALLOWANCE constants during the invitation and joining processes. This issue enables users on any plan, including the free plan, to invite and add more members to a team than allowed, effectively circumventing the system's subscription model. The flaw is located in the backend's handling of user invitations and additions, specifically in the /api/v1/auth/index.ts and /api/v1/users.ts endpoints, where the system fails to check the current number of team members against the allowed limits before proceeding with the invitation and addition operations." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-840 Business Logic Errors", - "cweId": "CWE-840" - } - ] - } - ] - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "lunary-ai", - "product": { - "product_data": [ - { - "product_name": "lunary-ai/lunary", - "version": { - "version_data": [ - { - "version_affected": "<=", - "version_name": "unspecified", - "version_value": "latest" - } - ] - } - } - ] - } - } - ] - } - }, - "references": { - "reference_data": [ - { - "url": "https://huntr.com/bounties/1a2d462f-ce25-410c-80f1-10546f963d7c", - "refsource": "MISC", - "name": "https://huntr.com/bounties/1a2d462f-ce25-410c-80f1-10546f963d7c" - } - ] - }, - "source": { - "advisory": "1a2d462f-ce25-410c-80f1-10546f963d7c", - "discovery": "EXTERNAL" - }, - "impact": { - "cvss": [ - { - "version": "3.0", - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "NONE", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", - "baseScore": 9.1, - "baseSeverity": "CRITICAL" + "value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] } diff --git a/2024/5xxx/CVE-2024-5750.json b/2024/5xxx/CVE-2024-5750.json new file mode 100644 index 00000000000..2b30d554f28 --- /dev/null +++ b/2024/5xxx/CVE-2024-5750.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-5750", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/5xxx/CVE-2024-5751.json b/2024/5xxx/CVE-2024-5751.json new file mode 100644 index 00000000000..bbb61cbe414 --- /dev/null +++ b/2024/5xxx/CVE-2024-5751.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-5751", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/5xxx/CVE-2024-5752.json b/2024/5xxx/CVE-2024-5752.json new file mode 100644 index 00000000000..0c0239d8ad2 --- /dev/null +++ b/2024/5xxx/CVE-2024-5752.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-5752", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/5xxx/CVE-2024-5753.json b/2024/5xxx/CVE-2024-5753.json new file mode 100644 index 00000000000..a57b8486ba7 --- /dev/null +++ b/2024/5xxx/CVE-2024-5753.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-5753", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/5xxx/CVE-2024-5754.json b/2024/5xxx/CVE-2024-5754.json new file mode 100644 index 00000000000..be6ce7eeb2c --- /dev/null +++ b/2024/5xxx/CVE-2024-5754.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-5754", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file