From 965ec59d0e395007736d5cad674844a0616ce6c4 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 27 Jun 2024 18:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/42xxx/CVE-2023-42011.json | 83 +++++++++++++++++++++++++++++++-- 2024/24xxx/CVE-2024-24792.json | 72 +++++++++++++++++++++++++++-- 2024/31xxx/CVE-2024-31916.json | 84 ++++++++++++++++++++++++++++++++-- 2024/35xxx/CVE-2024-35153.json | 83 +++++++++++++++++++++++++++++++-- 2024/35xxx/CVE-2024-35260.json | 64 ++++++++++++++++++++++++-- 2024/5xxx/CVE-2024-5334.json | 82 +++++++++++++++++++++++++++++++-- 2024/5xxx/CVE-2024-5535.json | 5 ++ 2024/5xxx/CVE-2024-5547.json | 82 +++++++++++++++++++++++++++++++-- 2024/5xxx/CVE-2024-5548.json | 82 +++++++++++++++++++++++++++++++-- 2024/6xxx/CVE-2024-6393.json | 18 ++++++++ 2024/6xxx/CVE-2024-6394.json | 18 ++++++++ 2024/6xxx/CVE-2024-6395.json | 18 ++++++++ 12 files changed, 658 insertions(+), 33 deletions(-) create mode 100644 2024/6xxx/CVE-2024-6393.json create mode 100644 2024/6xxx/CVE-2024-6394.json create mode 100644 2024/6xxx/CVE-2024-6395.json diff --git a/2023/42xxx/CVE-2023-42011.json b/2023/42xxx/CVE-2023-42011.json index ddf2bf54e98..a220832e0eb 100644 --- a/2023/42xxx/CVE-2023-42011.json +++ b/2023/42xxx/CVE-2023-42011.json @@ -1,17 +1,92 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-42011", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling B2B Integrator Standard Edition 6.1 and 6.2 does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain, which can lead to user confusion about which interface the user is interacting with. IBM X-Force ID: 265508." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1021 Improper Restriction of Rendered UI Layers or Frames", + "cweId": "CWE-1021" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Sterling B2B Integrator Standard Edition", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "6.1, 6.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/7158657", + "refsource": "MISC", + "name": "https://www.ibm.com/support/pages/node/7158657" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/265508", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/265508" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/24xxx/CVE-2024-24792.json b/2024/24xxx/CVE-2024-24792.json index 0e3aaaa3ab8..6e5ef0d2af7 100644 --- a/2024/24xxx/CVE-2024-24792.json +++ b/2024/24xxx/CVE-2024-24792.json @@ -1,18 +1,80 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-24792", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@golang.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Parsing a corrupt or malicious image with invalid color indices can cause a panic." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-125: Out-of-bounds Read" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "golang.org/x/image", + "product": { + "product_data": [ + { + "product_name": "golang.org/x/image/tiff", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "0.18.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://go.dev/cl/588115", + "refsource": "MISC", + "name": "https://go.dev/cl/588115" + }, + { + "url": "https://go.dev/issue/67624", + "refsource": "MISC", + "name": "https://go.dev/issue/67624" + }, + { + "url": "https://pkg.go.dev/vuln/GO-2024-2937", + "refsource": "MISC", + "name": "https://pkg.go.dev/vuln/GO-2024-2937" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "John Wright " + } + ] } \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31916.json b/2024/31xxx/CVE-2024-31916.json index 36ade302334..af5c6eb2e2c 100644 --- a/2024/31xxx/CVE-2024-31916.json +++ b/2024/31xxx/CVE-2024-31916.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-31916", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM OpenBMC FW1050.00 through FW1050.10 BMCWeb HTTPS server component could disclose sensitive URI content to an unauthorized actor that bypasses authentication channels. IBM X-ForceID: 290026." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-288 Authentication Bypass Using an Alternate Path or Channel", + "cweId": "CWE-288" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "OpenBMC", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "FW1050.00", + "version_value": "FW1050.10" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/7158679", + "refsource": "MISC", + "name": "https://www.ibm.com/support/pages/node/7158679" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/290026", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/290026" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/35xxx/CVE-2024-35153.json b/2024/35xxx/CVE-2024-35153.json index 3d2b705c166..ede6eec21ba 100644 --- a/2024/35xxx/CVE-2024-35153.json +++ b/2024/35xxx/CVE-2024-35153.json @@ -1,17 +1,92 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-35153", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 292640." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "WebSphere Application Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "8.5, 9.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/7158662", + "refsource": "MISC", + "name": "https://www.ibm.com/support/pages/node/7158662" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/292640", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/292640" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/35xxx/CVE-2024-35260.json b/2024/35xxx/CVE-2024-35260.json index 40b3b10ca3f..d53baec4cec 100644 --- a/2024/35xxx/CVE-2024-35260.json +++ b/2024/35xxx/CVE-2024-35260.json @@ -1,17 +1,73 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-35260", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secure@microsoft.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Microsoft Dataverse Remote Code Execution Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-426: Untrusted Search Path", + "cweId": "CWE-426" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Microsoft Power Platform", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "N/A" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35260", + "refsource": "MISC", + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35260" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 8, + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C" } ] } diff --git a/2024/5xxx/CVE-2024-5334.json b/2024/5xxx/CVE-2024-5334.json index 18b97578ec3..445388f8044 100644 --- a/2024/5xxx/CVE-2024-5334.json +++ b/2024/5xxx/CVE-2024-5334.json @@ -1,17 +1,91 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-5334", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@huntr.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "External Control of File Name or Path in GitHub repository stitionai/devika prior to -." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-73 External Control of File Name or Path", + "cweId": "CWE-73" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "stitionai", + "product": { + "product_data": [ + { + "product_name": "stitionai/devika", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "-" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://huntr.com/bounties/7eec128b-1bf5-4922-a95c-551ad3695cf6", + "refsource": "MISC", + "name": "https://huntr.com/bounties/7eec128b-1bf5-4922-a95c-551ad3695cf6" + }, + { + "url": "https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2", + "refsource": "MISC", + "name": "https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2" + } + ] + }, + "source": { + "advisory": "7eec128b-1bf5-4922-a95c-551ad3695cf6", + "discovery": "EXTERNAL" + }, + "impact": { + "cvss": [ + { + "version": "3.0", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH" } ] } diff --git a/2024/5xxx/CVE-2024-5535.json b/2024/5xxx/CVE-2024-5535.json index ed35d850f90..b4a3bdfdacc 100644 --- a/2024/5xxx/CVE-2024-5535.json +++ b/2024/5xxx/CVE-2024-5535.json @@ -114,6 +114,11 @@ "url": "https://github.openssl.org/openssl/extended-releases/commit/9947251413065a05189a63c9b7a6c1d4e224c21c", "refsource": "MISC", "name": "https://github.openssl.org/openssl/extended-releases/commit/9947251413065a05189a63c9b7a6c1d4e224c21c" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/06/27/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/06/27/1" } ] }, diff --git a/2024/5xxx/CVE-2024-5547.json b/2024/5xxx/CVE-2024-5547.json index e56a904d9ee..159dfcb7e32 100644 --- a/2024/5xxx/CVE-2024-5547.json +++ b/2024/5xxx/CVE-2024-5547.json @@ -1,17 +1,91 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-5547", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@huntr.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Relative Path Traversal in GitHub repository stitionai/devika prior to -." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-23 Relative Path Traversal", + "cweId": "CWE-23" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "stitionai", + "product": { + "product_data": [ + { + "product_name": "stitionai/devika", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "-" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://huntr.com/bounties/7ea0eb5f-7643-4452-bc93-a225e2090283", + "refsource": "MISC", + "name": "https://huntr.com/bounties/7ea0eb5f-7643-4452-bc93-a225e2090283" + }, + { + "url": "https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2", + "refsource": "MISC", + "name": "https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2" + } + ] + }, + "source": { + "advisory": "7ea0eb5f-7643-4452-bc93-a225e2090283", + "discovery": "EXTERNAL" + }, + "impact": { + "cvss": [ + { + "version": "3.0", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH" } ] } diff --git a/2024/5xxx/CVE-2024-5548.json b/2024/5xxx/CVE-2024-5548.json index 5f6739901a8..7bcaff4cef2 100644 --- a/2024/5xxx/CVE-2024-5548.json +++ b/2024/5xxx/CVE-2024-5548.json @@ -1,17 +1,91 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-5548", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@huntr.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Path Traversal in GitHub repository stitionai/devika prior to -." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", + "cweId": "CWE-22" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "stitionai", + "product": { + "product_data": [ + { + "product_name": "stitionai/devika", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "-" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://huntr.com/bounties/ad7dd135-8839-4042-87c0-105af61d262c", + "refsource": "MISC", + "name": "https://huntr.com/bounties/ad7dd135-8839-4042-87c0-105af61d262c" + }, + { + "url": "https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2", + "refsource": "MISC", + "name": "https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2" + } + ] + }, + "source": { + "advisory": "ad7dd135-8839-4042-87c0-105af61d262c", + "discovery": "EXTERNAL" + }, + "impact": { + "cvss": [ + { + "version": "3.0", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH" } ] } diff --git a/2024/6xxx/CVE-2024-6393.json b/2024/6xxx/CVE-2024-6393.json new file mode 100644 index 00000000000..cebba86aff4 --- /dev/null +++ b/2024/6xxx/CVE-2024-6393.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6393", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6394.json b/2024/6xxx/CVE-2024-6394.json new file mode 100644 index 00000000000..9ac0c57765d --- /dev/null +++ b/2024/6xxx/CVE-2024-6394.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6394", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6395.json b/2024/6xxx/CVE-2024-6395.json new file mode 100644 index 00000000000..6aa08c87aca --- /dev/null +++ b/2024/6xxx/CVE-2024-6395.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6395", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file