diff --git a/2023/23xxx/CVE-2023-23349.json b/2023/23xxx/CVE-2023-23349.json index 955916010f1..6dc493d0933 100644 --- a/2023/23xxx/CVE-2023-23349.json +++ b/2023/23xxx/CVE-2023-23349.json @@ -72,6 +72,14 @@ { "lang": "en", "value": "Efstratios Chatzoglou" + }, + { + "lang": "en", + "value": "Zisis Tsiatsikas" + }, + { + "lang": "en", + "value": "Vyron Kampourakis" } ], "impact": { diff --git a/2023/39xxx/CVE-2023-39804.json b/2023/39xxx/CVE-2023-39804.json index 5f629101823..83855873fa4 100644 --- a/2023/39xxx/CVE-2023-39804.json +++ b/2023/39xxx/CVE-2023-39804.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-39804", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-39804", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In GNU tar before 1.35, mishandled extension attributes in a PAX archive can lead to an application crash in xheader.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://git.savannah.gnu.org/cgit/tar.git/commit/?id=a339f05cd269013fa133d2f148d73f6f7d4247e4", + "refsource": "MISC", + "name": "https://git.savannah.gnu.org/cgit/tar.git/commit/?id=a339f05cd269013fa133d2f148d73f6f7d4247e4" + }, + { + "url": "https://git.savannah.gnu.org/cgit/tar.git/tree/src/xheader.c?h=release_1_34#n1723", + "refsource": "MISC", + "name": "https://git.savannah.gnu.org/cgit/tar.git/tree/src/xheader.c?h=release_1_34#n1723" + }, + { + "refsource": "MISC", + "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1058079", + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1058079" } ] } diff --git a/2023/40xxx/CVE-2023-40284.json b/2023/40xxx/CVE-2023-40284.json index d9a8a84871a..e54cce1ee4d 100644 --- a/2023/40xxx/CVE-2023-40284.json +++ b/2023/40xxx/CVE-2023-40284.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-40284", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-40284", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered on Supermicro X11SSM-F, X11SAE-F, and X11SSE-F 1.66 devices. An attacker could exploit an XSS issue." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.supermicro.com/en/support/security_center#!advisories", + "refsource": "MISC", + "name": "https://www.supermicro.com/en/support/security_center#!advisories" + }, + { + "refsource": "MISC", + "name": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023", + "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "availabilityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AC:H/A:H/C:H/I:H/PR:N/S:C/UI:R", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2023/40xxx/CVE-2023-40285.json b/2023/40xxx/CVE-2023-40285.json index ed470b5f858..824de7d57bf 100644 --- a/2023/40xxx/CVE-2023-40285.json +++ b/2023/40xxx/CVE-2023-40285.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-40285", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-40285", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered on Supermicro X11SSM-F, X11SAE-F, and X11SSE-F 1.66 devices. An attacker could exploit an XSS issue." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.supermicro.com/en/support/security_center#!advisories", + "refsource": "MISC", + "name": "https://www.supermicro.com/en/support/security_center#!advisories" + }, + { + "refsource": "MISC", + "name": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023", + "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "availabilityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AC:H/A:H/C:H/I:H/PR:N/S:C/UI:R", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2023/40xxx/CVE-2023-40286.json b/2023/40xxx/CVE-2023-40286.json index fb659509115..daa8cdd794a 100644 --- a/2023/40xxx/CVE-2023-40286.json +++ b/2023/40xxx/CVE-2023-40286.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-40286", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-40286", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered on Supermicro X11SSM-F, X11SAE-F, and X11SSE-F 1.66 devices. An attacker could exploit an XSS issue." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.supermicro.com/en/support/security_center#!advisories", + "refsource": "MISC", + "name": "https://www.supermicro.com/en/support/security_center#!advisories" + }, + { + "refsource": "MISC", + "name": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023", + "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "availabilityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AC:H/A:H/C:H/I:H/PR:N/S:C/UI:R", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2023/40xxx/CVE-2023-40287.json b/2023/40xxx/CVE-2023-40287.json index 50a2649c686..483fee89841 100644 --- a/2023/40xxx/CVE-2023-40287.json +++ b/2023/40xxx/CVE-2023-40287.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-40287", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-40287", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered on Supermicro X11SSM-F, X11SAE-F, and X11SSE-F 1.66 devices. An attacker could exploit an XSS issue." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.supermicro.com/en/support/security_center#!advisories", + "refsource": "MISC", + "name": "https://www.supermicro.com/en/support/security_center#!advisories" + }, + { + "refsource": "MISC", + "name": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023", + "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "availabilityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AC:H/A:H/C:H/I:H/PR:N/S:C/UI:R", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2023/40xxx/CVE-2023-40288.json b/2023/40xxx/CVE-2023-40288.json index 95c9a3a636d..ea92f61aa74 100644 --- a/2023/40xxx/CVE-2023-40288.json +++ b/2023/40xxx/CVE-2023-40288.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-40288", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-40288", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered on Supermicro X11SSM-F, X11SAE-F, and X11SSE-F 1.66 devices. An attacker could exploit an XSS issue." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.supermicro.com/en/support/security_center#!advisories", + "refsource": "MISC", + "name": "https://www.supermicro.com/en/support/security_center#!advisories" + }, + { + "refsource": "MISC", + "name": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023", + "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "availabilityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AC:H/A:H/C:H/I:H/PR:N/S:C/UI:R", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2023/40xxx/CVE-2023-40289.json b/2023/40xxx/CVE-2023-40289.json index 6203dcee82e..b30552b138a 100644 --- a/2023/40xxx/CVE-2023-40289.json +++ b/2023/40xxx/CVE-2023-40289.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-40289", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-40289", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A command injection issue was discovered on Supermicro X11SSM-F, X11SAE-F, and X11SSE-F 1.66 devices. An attacker can exploit this to elevate privileges from a user with BMC administrative privileges." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.supermicro.com/en/support/security_center#!advisories", + "refsource": "MISC", + "name": "https://www.supermicro.com/en/support/security_center#!advisories" + }, + { + "refsource": "MISC", + "name": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023", + "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "availabilityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:L/A:H/C:H/I:H/PR:H/S:U/UI:N", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2023/40xxx/CVE-2023-40290.json b/2023/40xxx/CVE-2023-40290.json index dd340d8e4ec..e29a4b17b45 100644 --- a/2023/40xxx/CVE-2023-40290.json +++ b/2023/40xxx/CVE-2023-40290.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-40290", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-40290", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered on Supermicro X11SSM-F, X11SAE-F, and X11SSE-F 1.66 devices. An attacker could exploit an XSS issue that affects Internet Explorer 11 on Windows." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.supermicro.com/en/support/security_center#!advisories", + "refsource": "MISC", + "name": "https://www.supermicro.com/en/support/security_center#!advisories" + }, + { + "refsource": "MISC", + "name": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023", + "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "availabilityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AC:H/A:H/C:H/I:H/PR:N/S:C/UI:R", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2023/45xxx/CVE-2023-45927.json b/2023/45xxx/CVE-2023-45927.json index 1df36481abf..cabf28b6769 100644 --- a/2023/45xxx/CVE-2023-45927.json +++ b/2023/45xxx/CVE-2023-45927.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-45927", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-45927", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "S-Lang 2.3.2 was discovered to contain an arithmetic exception via the function tt_sprintf()." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://lists.jedsoft.org/lists/slang-users/2023/0000003.html", + "refsource": "MISC", + "name": "http://lists.jedsoft.org/lists/slang-users/2023/0000003.html" + }, + { + "refsource": "MISC", + "name": "https://seclists.org/fulldisclosure/2024/Jan/55", + "url": "https://seclists.org/fulldisclosure/2024/Jan/55" } ] } diff --git a/2023/6xxx/CVE-2023-6153.json b/2023/6xxx/CVE-2023-6153.json index ed2ae635612..8f6b9bf8a9f 100644 --- a/2023/6xxx/CVE-2023-6153.json +++ b/2023/6xxx/CVE-2023-6153.json @@ -1,17 +1,98 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-6153", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@usom.gov.tr", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Authentication Bypass by Primary Weakness vulnerability in TeoSOFT Software TeoBASE allows Authentication Bypass.This issue affects TeoBASE: through 20240327.\u00a0NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-305 Authentication Bypass by Primary Weakness", + "cweId": "CWE-305" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "TeoSOFT Software", + "product": { + "product_data": [ + { + "product_name": "TeoBASE", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "0", + "version_value": "20240327" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-24-0238", + "refsource": "MISC", + "name": "https://www.usom.gov.tr/bildirim/tr-24-0238" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "TR-24-0238", + "defect": [ + "TR-24-0238" + ], + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": " Tunahan Tekeo\u011flu" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/6xxx/CVE-2023-6173.json b/2023/6xxx/CVE-2023-6173.json index e20b13a5242..d5856c0e8e4 100644 --- a/2023/6xxx/CVE-2023-6173.json +++ b/2023/6xxx/CVE-2023-6173.json @@ -1,17 +1,98 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-6173", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@usom.gov.tr", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TeoSOFT Software TeoBASE allows SQL Injection.This issue affects TeoBASE: through 27032024.\u00a0NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "TeoSOFT Software", + "product": { + "product_data": [ + { + "product_name": "TeoBASE", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "0", + "version_value": "20240327" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-24-0238", + "refsource": "MISC", + "name": "https://www.usom.gov.tr/bildirim/tr-24-0238" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "TR-24-0238", + "defect": [ + "TR-24-0238" + ], + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": " Tunahan Tekeo\u011flu" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/20xxx/CVE-2024-20265.json b/2024/20xxx/CVE-2024-20265.json index ea5256c980f..5ae265ee91f 100644 --- a/2024/20xxx/CVE-2024-20265.json +++ b/2024/20xxx/CVE-2024-20265.json @@ -1,17 +1,799 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-20265", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@cisco.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the boot process of Cisco Access Point (AP) Software could allow an unauthenticated, physical attacker to bypass the Cisco Secure Boot functionality and load a software image that has been tampered with on an affected device.\r\n\r This vulnerability exists because unnecessary commands are available during boot time at the physical console. An attacker could exploit this vulnerability by interrupting the boot process and executing specific commands to bypass the Cisco Secure Boot validation checks and load an image that has been tampered with. This image would have been previously downloaded onto the targeted device. A successful exploit could allow the attacker to load the image once. The Cisco Secure Boot functionality is not permanently compromised." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Trust Boundary Violation", + "cweId": "CWE-501" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cisco", + "product": { + "product_data": [ + { + "product_name": "Cisco IOS XE Software", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "N/A" + } + ] + } + }, + { + "product_name": "Cisco Aironet Access Point Software", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "8.2.100.0" + }, + { + "version_affected": "=", + "version_value": "8.2.130.0" + }, + { + "version_affected": "=", + "version_value": "8.2.111.0" + }, + { + "version_affected": "=", + "version_value": "8.2.110.0" + }, + { + "version_affected": "=", + "version_value": "8.2.121.0" + }, + { + "version_affected": "=", + "version_value": "8.2.141.0" + }, + { + "version_affected": "=", + "version_value": "8.2.151.0" + }, + { + "version_affected": "=", + "version_value": "8.2.160.0" + }, + { + "version_affected": "=", + "version_value": "8.2.161.0" + }, + { + "version_affected": "=", + "version_value": "8.2.164.0" + }, + { + "version_affected": "=", + "version_value": "8.2.166.0" + }, + { + "version_affected": "=", + "version_value": "8.2.170.0" + }, + { + "version_affected": "=", + "version_value": "8.2.163.0" + }, + { + "version_affected": "=", + "version_value": "8.3.102.0" + }, + { + "version_affected": "=", + "version_value": "8.3.111.0" + }, + { + "version_affected": "=", + "version_value": "8.3.112.0" + }, + { + "version_affected": "=", + "version_value": "8.3.121.0" + }, + { + "version_affected": "=", + "version_value": "8.3.122.0" + }, + { + "version_affected": "=", + "version_value": "8.3.130.0" + }, + { + "version_affected": "=", + "version_value": "8.3.131.0" + }, + { + "version_affected": "=", + "version_value": "8.3.132.0" + }, + { + "version_affected": "=", + "version_value": "8.3.133.0" + }, + { + "version_affected": "=", + "version_value": "8.3.140.0" + }, + { + "version_affected": "=", + "version_value": "8.3.141.0" + }, + { + "version_affected": "=", + "version_value": "8.3.143.0" + }, + { + "version_affected": "=", + "version_value": "8.3.150.0" + }, + { + "version_affected": "=", + "version_value": "8.3.108.0" + }, + { + "version_affected": "=", + "version_value": "8.3.90.53" + }, + { + "version_affected": "=", + "version_value": "8.3.104.46" + }, + { + "version_affected": "=", + "version_value": "8.3.200.200" + }, + { + "version_affected": "=", + "version_value": "8.3.104.64" + }, + { + "version_affected": "=", + "version_value": "8.3.15.165" + }, + { + "version_affected": "=", + "version_value": "8.3.90.11" + }, + { + "version_affected": "=", + "version_value": "8.3.135.0" + }, + { + "version_affected": "=", + "version_value": "8.3.104.14" + }, + { + "version_affected": "=", + "version_value": "8.3.90.36" + }, + { + "version_affected": "=", + "version_value": "8.3.15.142" + }, + { + "version_affected": "=", + "version_value": "8.3.104.37" + }, + { + "version_affected": "=", + "version_value": "8.3.15.117" + }, + { + "version_affected": "=", + "version_value": "8.3.15.120" + }, + { + "version_affected": "=", + "version_value": "8.3.15.25" + }, + { + "version_affected": "=", + "version_value": "8.3.15.158" + }, + { + "version_affected": "=", + "version_value": "8.3.15.118" + }, + { + "version_affected": "=", + "version_value": "8.3.90.25" + }, + { + "version_affected": "=", + "version_value": "8.3.15.169" + }, + { + "version_affected": "=", + "version_value": "8.3.90.58" + }, + { + "version_affected": "=", + "version_value": "8.4.100.0" + }, + { + "version_affected": "=", + "version_value": "8.4.1.199" + }, + { + "version_affected": "=", + "version_value": "8.4.1.91" + }, + { + "version_affected": "=", + "version_value": "8.4.1.142" + }, + { + "version_affected": "=", + "version_value": "8.4.1.175" + }, + { + "version_affected": "=", + "version_value": "8.4.1.218" + }, + { + "version_affected": "=", + "version_value": "8.4.1.92" + }, + { + "version_affected": "=", + "version_value": "8.5.103.0" + }, + { + "version_affected": "=", + "version_value": "8.5.105.0" + }, + { + "version_affected": "=", + "version_value": "8.5.110.0" + }, + { + "version_affected": "=", + "version_value": "8.5.120.0" + }, + { + "version_affected": "=", + "version_value": "8.5.131.0" + }, + { + "version_affected": "=", + "version_value": "8.5.140.0" + }, + { + "version_affected": "=", + "version_value": "8.5.135.0" + }, + { + "version_affected": "=", + "version_value": "8.5.151.0" + }, + { + "version_affected": "=", + "version_value": "8.5.101.0" + }, + { + "version_affected": "=", + "version_value": "8.5.102.0" + }, + { + "version_affected": "=", + "version_value": "8.5.161.0" + }, + { + "version_affected": "=", + "version_value": "8.5.160.0" + }, + { + "version_affected": "=", + "version_value": "8.5.100.0" + }, + { + "version_affected": "=", + "version_value": "8.5.171.0" + }, + { + "version_affected": "=", + "version_value": "8.5.164.0" + }, + { + "version_affected": "=", + "version_value": "8.5.182.0" + }, + { + "version_affected": "=", + "version_value": "8.5.182.11 ME" + }, + { + "version_affected": "=", + "version_value": "8.7.102.0" + }, + { + "version_affected": "=", + "version_value": "8.7.106.0" + }, + { + "version_affected": "=", + "version_value": "8.7.1.16" + }, + { + "version_affected": "=", + "version_value": "8.8.100.0" + }, + { + "version_affected": "=", + "version_value": "8.8.111.0" + }, + { + "version_affected": "=", + "version_value": "8.8.120.0" + }, + { + "version_affected": "=", + "version_value": "8.8.125.0" + }, + { + "version_affected": "=", + "version_value": "8.8.130.0" + }, + { + "version_affected": "=", + "version_value": "8.6.101.0" + }, + { + "version_affected": "=", + "version_value": "8.6.1.84" + }, + { + "version_affected": "=", + "version_value": "8.6.1.70" + }, + { + "version_affected": "=", + "version_value": "8.6.1.71" + }, + { + "version_affected": "=", + "version_value": "8.9.100.0" + }, + { + "version_affected": "=", + "version_value": "8.9.111.0" + }, + { + "version_affected": "=", + "version_value": "8.10.105.0" + }, + { + "version_affected": "=", + "version_value": "8.10.111.0" + }, + { + "version_affected": "=", + "version_value": "8.10.130.0" + }, + { + "version_affected": "=", + "version_value": "8.10.112.0" + }, + { + "version_affected": "=", + "version_value": "8.10.122.0" + }, + { + "version_affected": "=", + "version_value": "8.10.113.0" + }, + { + "version_affected": "=", + "version_value": "8.10.121.0" + }, + { + "version_affected": "=", + "version_value": "8.10.141.0" + }, + { + "version_affected": "=", + "version_value": "8.10.142.0" + }, + { + "version_affected": "=", + "version_value": "8.10.151.0" + }, + { + "version_affected": "=", + "version_value": "8.10.150.0" + }, + { + "version_affected": "=", + "version_value": "8.10.171.0" + }, + { + "version_affected": "=", + "version_value": "8.10.181.0" + }, + { + "version_affected": "=", + "version_value": "8.10.182.0" + }, + { + "version_affected": "=", + "version_value": "8.10.161.0" + }, + { + "version_affected": "=", + "version_value": "8.10.170.0" + }, + { + "version_affected": "=", + "version_value": "8.10.183.0" + }, + { + "version_affected": "=", + "version_value": "8.10.162.0" + }, + { + "version_affected": "=", + "version_value": "8.10.185.0" + } + ] + } + }, + { + "product_name": "Cisco Business Wireless Access Point Software", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "10.0.1.0" + }, + { + "version_affected": "=", + "version_value": "10.0.2.0" + }, + { + "version_affected": "=", + "version_value": "10.1.1.0" + }, + { + "version_affected": "=", + "version_value": "10.1.2.0" + }, + { + "version_affected": "=", + "version_value": "10.2.1.0" + }, + { + "version_affected": "=", + "version_value": "10.2.2.0" + }, + { + "version_affected": "=", + "version_value": "10.3.1.0" + }, + { + "version_affected": "=", + "version_value": "10.3.1.1" + }, + { + "version_affected": "=", + "version_value": "10.3.2.0" + }, + { + "version_affected": "=", + "version_value": "10.4.1.0" + }, + { + "version_affected": "=", + "version_value": "10.4.2.0" + }, + { + "version_affected": "=", + "version_value": "10.6.1.0" + }, + { + "version_affected": "=", + "version_value": "10.6.2.0" + }, + { + "version_affected": "=", + "version_value": "10.7.1.0" + }, + { + "version_affected": "=", + "version_value": "10.8.1.0" + }, + { + "version_affected": "=", + "version_value": "10.5.2.0" + } + ] + } + }, + { + "product_name": "Cisco Aironet Access Point Software (IOS XE Controller)", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "16.10.1e" + }, + { + "version_affected": "=", + "version_value": "16.10.1" + }, + { + "version_affected": "=", + "version_value": "17.1.1t" + }, + { + "version_affected": "=", + "version_value": "17.1.1s" + }, + { + "version_affected": "=", + "version_value": "17.1.1" + }, + { + "version_affected": "=", + "version_value": "16.11.1a" + }, + { + "version_affected": "=", + "version_value": "16.11.1" + }, + { + "version_affected": "=", + "version_value": "16.11.1c" + }, + { + "version_affected": "=", + "version_value": "16.11.1b" + }, + { + "version_affected": "=", + "version_value": "16.12.1s" + }, + { + "version_affected": "=", + "version_value": "16.12.4" + }, + { + "version_affected": "=", + "version_value": "16.12.1" + }, + { + "version_affected": "=", + "version_value": "16.12.2s" + }, + { + "version_affected": "=", + "version_value": "16.12.1t" + }, + { + "version_affected": "=", + "version_value": "16.12.4a" + }, + { + "version_affected": "=", + "version_value": "16.12.5" + }, + { + "version_affected": "=", + "version_value": "16.12.3" + }, + { + "version_affected": "=", + "version_value": "16.12.6" + }, + { + "version_affected": "=", + "version_value": "16.12.8" + }, + { + "version_affected": "=", + "version_value": "16.12.7" + }, + { + "version_affected": "=", + "version_value": "16.12.6a" + }, + { + "version_affected": "=", + "version_value": "17.3.1" + }, + { + "version_affected": "=", + "version_value": "17.3.2a" + }, + { + "version_affected": "=", + "version_value": "17.3.3" + }, + { + "version_affected": "=", + "version_value": "17.3.4" + }, + { + "version_affected": "=", + "version_value": "17.3.5" + }, + { + "version_affected": "=", + "version_value": "17.3.2" + }, + { + "version_affected": "=", + "version_value": "17.3.4c" + }, + { + "version_affected": "=", + "version_value": "17.3.5a" + }, + { + "version_affected": "=", + "version_value": "17.3.5b" + }, + { + "version_affected": "=", + "version_value": "17.3.6" + }, + { + "version_affected": "=", + "version_value": "17.2.1" + }, + { + "version_affected": "=", + "version_value": "17.2.1a" + }, + { + "version_affected": "=", + "version_value": "17.2.3" + }, + { + "version_affected": "=", + "version_value": "17.2.2" + }, + { + "version_affected": "=", + "version_value": "17.5.1" + }, + { + "version_affected": "=", + "version_value": "17.4.1" + }, + { + "version_affected": "=", + "version_value": "17.4.2" + }, + { + "version_affected": "=", + "version_value": "17.6.1" + }, + { + "version_affected": "=", + "version_value": "17.6.2" + }, + { + "version_affected": "=", + "version_value": "17.6.3" + }, + { + "version_affected": "=", + "version_value": "17.6.4" + }, + { + "version_affected": "=", + "version_value": "17.6.5" + }, + { + "version_affected": "=", + "version_value": "17.6.6a" + }, + { + "version_affected": "=", + "version_value": "17.6.5a" + }, + { + "version_affected": "=", + "version_value": "17.10.1" + }, + { + "version_affected": "=", + "version_value": "17.9.1" + }, + { + "version_affected": "=", + "version_value": "17.9.2" + }, + { + "version_affected": "=", + "version_value": "17.9.3" + }, + { + "version_affected": "=", + "version_value": "17.7.1" + }, + { + "version_affected": "=", + "version_value": "17.8.1" + }, + { + "version_affected": "=", + "version_value": "17.11.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-secureboot-bypass-zT5vJkSD", + "refsource": "MISC", + "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-secureboot-bypass-zT5vJkSD" + } + ] + }, + "source": { + "advisory": "cisco-sa-ap-secureboot-bypass-zT5vJkSD", + "discovery": "INTERNAL", + "defects": [ + "CSCwf62026" + ] + }, + "exploit": [ + { + "lang": "en", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" } ] } diff --git a/2024/20xxx/CVE-2024-20303.json b/2024/20xxx/CVE-2024-20303.json index 7c8bf0ca105..493ac566d12 100644 --- a/2024/20xxx/CVE-2024-20303.json +++ b/2024/20xxx/CVE-2024-20303.json @@ -1,17 +1,362 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-20303", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@cisco.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper management of mDNS client entries. An attacker could exploit this vulnerability by connecting to the wireless network and sending a continuous stream of specific mDNS packets. A successful exploit could allow the attacker to cause the wireless controller to have high CPU utilization, which could lead to access points (APs) losing their connection to the controller and result in a DoS condition." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Incomplete Cleanup", + "cweId": "CWE-459" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cisco", + "product": { + "product_data": [ + { + "product_name": "Cisco IOS XE Software", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "17.2.1" + }, + { + "version_affected": "=", + "version_value": "17.2.1r" + }, + { + "version_affected": "=", + "version_value": "17.2.1a" + }, + { + "version_affected": "=", + "version_value": "17.2.1v" + }, + { + "version_affected": "=", + "version_value": "17.2.2" + }, + { + "version_affected": "=", + "version_value": "17.2.3" + }, + { + "version_affected": "=", + "version_value": "17.3.1" + }, + { + "version_affected": "=", + "version_value": "17.3.2" + }, + { + "version_affected": "=", + "version_value": "17.3.3" + }, + { + "version_affected": "=", + "version_value": "17.3.1a" + }, + { + "version_affected": "=", + "version_value": "17.3.1w" + }, + { + "version_affected": "=", + "version_value": "17.3.2a" + }, + { + "version_affected": "=", + "version_value": "17.3.1x" + }, + { + "version_affected": "=", + "version_value": "17.3.1z" + }, + { + "version_affected": "=", + "version_value": "17.3.4" + }, + { + "version_affected": "=", + "version_value": "17.3.5" + }, + { + "version_affected": "=", + "version_value": "17.3.4a" + }, + { + "version_affected": "=", + "version_value": "17.3.6" + }, + { + "version_affected": "=", + "version_value": "17.3.4b" + }, + { + "version_affected": "=", + "version_value": "17.3.4c" + }, + { + "version_affected": "=", + "version_value": "17.3.5a" + }, + { + "version_affected": "=", + "version_value": "17.3.5b" + }, + { + "version_affected": "=", + "version_value": "17.3.7" + }, + { + "version_affected": "=", + "version_value": "17.3.8" + }, + { + "version_affected": "=", + "version_value": "17.3.8a" + }, + { + "version_affected": "=", + "version_value": "17.4.1" + }, + { + "version_affected": "=", + "version_value": "17.4.2" + }, + { + "version_affected": "=", + "version_value": "17.4.1a" + }, + { + "version_affected": "=", + "version_value": "17.4.1b" + }, + { + "version_affected": "=", + "version_value": "17.4.2a" + }, + { + "version_affected": "=", + "version_value": "17.5.1" + }, + { + "version_affected": "=", + "version_value": "17.5.1a" + }, + { + "version_affected": "=", + "version_value": "17.6.1" + }, + { + "version_affected": "=", + "version_value": "17.6.2" + }, + { + "version_affected": "=", + "version_value": "17.6.1w" + }, + { + "version_affected": "=", + "version_value": "17.6.1a" + }, + { + "version_affected": "=", + "version_value": "17.6.1x" + }, + { + "version_affected": "=", + "version_value": "17.6.3" + }, + { + "version_affected": "=", + "version_value": "17.6.1y" + }, + { + "version_affected": "=", + "version_value": "17.6.1z" + }, + { + "version_affected": "=", + "version_value": "17.6.3a" + }, + { + "version_affected": "=", + "version_value": "17.6.4" + }, + { + "version_affected": "=", + "version_value": "17.6.1z1" + }, + { + "version_affected": "=", + "version_value": "17.6.5" + }, + { + "version_affected": "=", + "version_value": "17.6.5a" + }, + { + "version_affected": "=", + "version_value": "17.7.1" + }, + { + "version_affected": "=", + "version_value": "17.7.1a" + }, + { + "version_affected": "=", + "version_value": "17.7.1b" + }, + { + "version_affected": "=", + "version_value": "17.7.2" + }, + { + "version_affected": "=", + "version_value": "17.10.1" + }, + { + "version_affected": "=", + "version_value": "17.10.1a" + }, + { + "version_affected": "=", + "version_value": "17.10.1b" + }, + { + "version_affected": "=", + "version_value": "17.8.1" + }, + { + "version_affected": "=", + "version_value": "17.8.1a" + }, + { + "version_affected": "=", + "version_value": "17.9.1" + }, + { + "version_affected": "=", + "version_value": "17.9.1w" + }, + { + "version_affected": "=", + "version_value": "17.9.2" + }, + { + "version_affected": "=", + "version_value": "17.9.1a" + }, + { + "version_affected": "=", + "version_value": "17.9.1x" + }, + { + "version_affected": "=", + "version_value": "17.9.1y" + }, + { + "version_affected": "=", + "version_value": "17.9.3" + }, + { + "version_affected": "=", + "version_value": "17.9.2a" + }, + { + "version_affected": "=", + "version_value": "17.9.1x1" + }, + { + "version_affected": "=", + "version_value": "17.9.3a" + }, + { + "version_affected": "=", + "version_value": "17.9.1y1" + }, + { + "version_affected": "=", + "version_value": "17.11.1" + }, + { + "version_affected": "=", + "version_value": "17.11.1a" + }, + { + "version_affected": "=", + "version_value": "17.11.99SW" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-mdns-dos-4hv6pBGf", + "refsource": "MISC", + "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-mdns-dos-4hv6pBGf" + } + ] + }, + "source": { + "advisory": "cisco-sa-wlc-mdns-dos-4hv6pBGf", + "discovery": "EXTERNAL", + "defects": [ + "CSCwf53124" + ] + }, + "exploit": [ + { + "lang": "en", + "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" } ] } diff --git a/2024/20xxx/CVE-2024-20309.json b/2024/20xxx/CVE-2024-20309.json index a9a74b90917..d0695397f7c 100644 --- a/2024/20xxx/CVE-2024-20309.json +++ b/2024/20xxx/CVE-2024-20309.json @@ -1,17 +1,1462 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-20309", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@cisco.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in auxiliary asynchronous port (AUX) functions of Cisco IOS XE Software could allow an authenticated, local attacker to cause an affected device to reload or stop responding.\r\n\r This vulnerability is due to the incorrect handling of specific ingress traffic when flow control hardware is enabled on the AUX port. An attacker could exploit this vulnerability by reverse telnetting to the AUX port and sending specific data after connecting. A successful exploit could allow the attacker to cause the device to reset or stop responding, resulting in a denial of service (DoS) condition." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Signal Handler with Functionality that is not Asynchronous-Safe", + "cweId": "CWE-828" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cisco", + "product": { + "product_data": [ + { + "product_name": "Cisco IOS XE Software", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.7.0S" + }, + { + "version_affected": "=", + "version_value": "3.7.1S" + }, + { + "version_affected": "=", + "version_value": "3.7.2S" + }, + { + "version_affected": "=", + "version_value": "3.7.3S" + }, + { + "version_affected": "=", + "version_value": "3.7.4S" + }, + { + "version_affected": "=", + "version_value": "3.7.5S" + }, + { + "version_affected": "=", + "version_value": "3.7.6S" + }, + { + "version_affected": "=", + "version_value": "3.7.7S" + }, + { + "version_affected": "=", + "version_value": "3.7.4aS" + }, + { + "version_affected": "=", + "version_value": "3.7.2tS" + }, + { + "version_affected": "=", + "version_value": "3.7.0bS" + }, + { + "version_affected": "=", + "version_value": "3.7.1aS" + }, + { + "version_affected": "=", + "version_value": "3.8.0S" + }, + { + "version_affected": "=", + "version_value": "3.8.1S" + }, + { + "version_affected": "=", + "version_value": "3.8.2S" + }, + { + "version_affected": "=", + "version_value": "3.9.1S" + }, + { + "version_affected": "=", + "version_value": "3.9.0S" + }, + { + "version_affected": "=", + "version_value": "3.9.2S" + }, + { + "version_affected": "=", + "version_value": "3.9.1aS" + }, + { + "version_affected": "=", + "version_value": "3.9.0aS" + }, + { + "version_affected": "=", + "version_value": "3.2.0SE" + }, + { + "version_affected": "=", + "version_value": "3.2.1SE" + }, + { + "version_affected": "=", + "version_value": "3.2.2SE" + }, + { + "version_affected": "=", + "version_value": "3.2.3SE" + }, + { + "version_affected": "=", + "version_value": "3.3.0SE" + }, + { + "version_affected": "=", + "version_value": "3.3.1SE" + }, + { + "version_affected": "=", + "version_value": "3.3.2SE" + }, + { + "version_affected": "=", + "version_value": "3.3.3SE" + }, + { + "version_affected": "=", + "version_value": "3.3.4SE" + }, + { + "version_affected": "=", + "version_value": "3.3.5SE" + }, + { + "version_affected": "=", + "version_value": "3.10.0S" + }, + { + "version_affected": "=", + "version_value": "3.10.1S" + }, + { + "version_affected": "=", + "version_value": "3.10.2S" + }, + { + "version_affected": "=", + "version_value": "3.10.3S" + }, + { + "version_affected": "=", + "version_value": "3.10.4S" + }, + { + "version_affected": "=", + "version_value": "3.10.5S" + }, + { + "version_affected": "=", + "version_value": "3.10.6S" + }, + { + "version_affected": "=", + "version_value": "3.10.2tS" + }, + { + "version_affected": "=", + "version_value": "3.10.7S" + }, + { + "version_affected": "=", + "version_value": "3.10.1xbS" + }, + { + "version_affected": "=", + "version_value": "3.10.8S" + }, + { + "version_affected": "=", + "version_value": "3.10.8aS" + }, + { + "version_affected": "=", + "version_value": "3.10.9S" + }, + { + "version_affected": "=", + "version_value": "3.10.10S" + }, + { + "version_affected": "=", + "version_value": "3.11.1S" + }, + { + "version_affected": "=", + "version_value": "3.11.2S" + }, + { + "version_affected": "=", + "version_value": "3.11.0S" + }, + { + "version_affected": "=", + "version_value": "3.11.3S" + }, + { + "version_affected": "=", + "version_value": "3.11.4S" + }, + { + "version_affected": "=", + "version_value": "3.12.0S" + }, + { + "version_affected": "=", + "version_value": "3.12.1S" + }, + { + "version_affected": "=", + "version_value": "3.12.2S" + }, + { + "version_affected": "=", + "version_value": "3.12.3S" + }, + { + "version_affected": "=", + "version_value": "3.12.0aS" + }, + { + "version_affected": "=", + "version_value": "3.12.4S" + }, + { + "version_affected": "=", + "version_value": "3.13.0S" + }, + { + "version_affected": "=", + "version_value": "3.13.1S" + }, + { + "version_affected": "=", + "version_value": "3.13.2S" + }, + { + "version_affected": "=", + "version_value": "3.13.3S" + }, + { + "version_affected": "=", + "version_value": "3.13.4S" + }, + { + "version_affected": "=", + "version_value": "3.13.5S" + }, + { + "version_affected": "=", + "version_value": "3.13.2aS" + }, + { + "version_affected": "=", + "version_value": "3.13.0aS" + }, + { + "version_affected": "=", + "version_value": "3.13.5aS" + }, + { + "version_affected": "=", + "version_value": "3.13.6S" + }, + { + "version_affected": "=", + "version_value": "3.13.7S" + }, + { + "version_affected": "=", + "version_value": "3.13.6aS" + }, + { + "version_affected": "=", + "version_value": "3.13.7aS" + }, + { + "version_affected": "=", + "version_value": "3.13.8S" + }, + { + "version_affected": "=", + "version_value": "3.13.9S" + }, + { + "version_affected": "=", + "version_value": "3.13.10S" + }, + { + "version_affected": "=", + "version_value": "3.6.2aE" + }, + { + "version_affected": "=", + "version_value": "3.6.2E" + }, + { + "version_affected": "=", + "version_value": "3.6.5bE" + }, + { + "version_affected": "=", + "version_value": "3.6.7bE" + }, + { + "version_affected": "=", + "version_value": "3.6.9E" + }, + { + "version_affected": "=", + "version_value": "3.6.10E" + }, + { + "version_affected": "=", + "version_value": "3.14.0S" + }, + { + "version_affected": "=", + "version_value": "3.14.1S" + }, + { + "version_affected": "=", + "version_value": "3.14.2S" + }, + { + "version_affected": "=", + "version_value": "3.14.3S" + }, + { + "version_affected": "=", + "version_value": "3.14.4S" + }, + { + "version_affected": "=", + "version_value": "3.15.0S" + }, + { + "version_affected": "=", + "version_value": "3.15.1S" + }, + { + "version_affected": "=", + "version_value": "3.15.2S" + }, + { + "version_affected": "=", + "version_value": "3.15.1cS" + }, + { + "version_affected": "=", + "version_value": "3.15.3S" + }, + { + "version_affected": "=", + "version_value": "3.15.4S" + }, + { + "version_affected": "=", + "version_value": "3.3.0SQ" + }, + { + "version_affected": "=", + "version_value": "3.3.1SQ" + }, + { + "version_affected": "=", + "version_value": "3.4.0SQ" + }, + { + "version_affected": "=", + "version_value": "3.4.1SQ" + }, + { + "version_affected": "=", + "version_value": "3.5.0SQ" + }, + { + "version_affected": "=", + "version_value": "3.5.1SQ" + }, + { + "version_affected": "=", + "version_value": "3.5.2SQ" + }, + { + "version_affected": "=", + "version_value": "3.5.3SQ" + }, + { + "version_affected": "=", + "version_value": "3.5.4SQ" + }, + { + "version_affected": "=", + "version_value": "3.5.5SQ" + }, + { + "version_affected": "=", + "version_value": "3.5.6SQ" + }, + { + "version_affected": "=", + "version_value": "3.5.7SQ" + }, + { + "version_affected": "=", + "version_value": "3.5.8SQ" + }, + { + "version_affected": "=", + "version_value": "3.16.0S" + }, + { + "version_affected": "=", + "version_value": "3.16.1S" + }, + { + "version_affected": "=", + "version_value": "3.16.1aS" + }, + { + "version_affected": "=", + "version_value": "3.16.2S" + }, + { + "version_affected": "=", + "version_value": "3.16.2aS" + }, + { + "version_affected": "=", + "version_value": "3.16.0cS" + }, + { + "version_affected": "=", + "version_value": "3.16.3S" + }, + { + "version_affected": "=", + "version_value": "3.16.2bS" + }, + { + "version_affected": "=", + "version_value": "3.16.3aS" + }, + { + "version_affected": "=", + "version_value": "3.16.4S" + }, + { + "version_affected": "=", + "version_value": "3.16.4aS" + }, + { + "version_affected": "=", + "version_value": "3.16.4bS" + }, + { + "version_affected": "=", + "version_value": "3.16.5S" + }, + { + "version_affected": "=", + "version_value": "3.16.4dS" + }, + { + "version_affected": "=", + "version_value": "3.16.6S" + }, + { + "version_affected": "=", + "version_value": "3.16.7S" + }, + { + "version_affected": "=", + "version_value": "3.16.6bS" + }, + { + "version_affected": "=", + "version_value": "3.16.7aS" + }, + { + "version_affected": "=", + "version_value": "3.16.7bS" + }, + { + "version_affected": "=", + "version_value": "3.16.8S" + }, + { + "version_affected": "=", + "version_value": "3.16.9S" + }, + { + "version_affected": "=", + "version_value": "3.16.10S" + }, + { + "version_affected": "=", + "version_value": "3.17.0S" + }, + { + "version_affected": "=", + "version_value": "3.17.1S" + }, + { + "version_affected": "=", + "version_value": "3.17.2S" + }, + { + "version_affected": "=", + "version_value": "3.17.1aS" + }, + { + "version_affected": "=", + "version_value": "3.17.3S" + }, + { + "version_affected": "=", + "version_value": "3.17.4S" + }, + { + "version_affected": "=", + "version_value": "16.1.1" + }, + { + "version_affected": "=", + "version_value": "16.1.2" + }, + { + "version_affected": "=", + "version_value": "16.1.3" + }, + { + "version_affected": "=", + "version_value": "16.2.1" + }, + { + "version_affected": "=", + "version_value": "16.2.2" + }, + { + "version_affected": "=", + "version_value": "16.3.1" + }, + { + "version_affected": "=", + "version_value": "16.3.2" + }, + { + "version_affected": "=", + "version_value": "16.3.3" + }, + { + "version_affected": "=", + "version_value": "16.3.1a" + }, + { + "version_affected": "=", + "version_value": "16.3.4" + }, + { + "version_affected": "=", + "version_value": "16.3.5" + }, + { + "version_affected": "=", + "version_value": "16.3.5b" + }, + { + "version_affected": "=", + "version_value": "16.3.6" + }, + { + "version_affected": "=", + "version_value": "16.3.7" + }, + { + "version_affected": "=", + "version_value": "16.3.8" + }, + { + "version_affected": "=", + "version_value": "16.3.9" + }, + { + "version_affected": "=", + "version_value": "16.3.10" + }, + { + "version_affected": "=", + "version_value": "16.3.11" + }, + { + "version_affected": "=", + "version_value": "16.4.1" + }, + { + "version_affected": "=", + "version_value": "16.4.2" + }, + { + "version_affected": "=", + "version_value": "16.4.3" + }, + { + "version_affected": "=", + "version_value": "16.5.1" + }, + { + "version_affected": "=", + "version_value": "16.5.1a" + }, + { + "version_affected": "=", + "version_value": "16.5.1b" + }, + { + "version_affected": "=", + "version_value": "16.5.2" + }, + { + "version_affected": "=", + "version_value": "16.5.3" + }, + { + "version_affected": "=", + "version_value": "3.18.0aS" + }, + { + "version_affected": "=", + "version_value": "3.18.0S" + }, + { + "version_affected": "=", + "version_value": "3.18.1S" + }, + { + "version_affected": "=", + "version_value": "3.18.2S" + }, + { + "version_affected": "=", + "version_value": "3.18.3S" + }, + { + "version_affected": "=", + "version_value": "3.18.4S" + }, + { + "version_affected": "=", + "version_value": "3.18.0SP" + }, + { + "version_affected": "=", + "version_value": "3.18.1SP" + }, + { + "version_affected": "=", + "version_value": "3.18.1aSP" + }, + { + "version_affected": "=", + "version_value": "3.18.1bSP" + }, + { + "version_affected": "=", + "version_value": "3.18.1cSP" + }, + { + "version_affected": "=", + "version_value": "3.18.2SP" + }, + { + "version_affected": "=", + "version_value": "3.18.2aSP" + }, + { + "version_affected": "=", + "version_value": "3.18.3SP" + }, + { + "version_affected": "=", + "version_value": "3.18.4SP" + }, + { + "version_affected": "=", + "version_value": "3.18.3aSP" + }, + { + "version_affected": "=", + "version_value": "3.18.3bSP" + }, + { + "version_affected": "=", + "version_value": "3.18.5SP" + }, + { + "version_affected": "=", + "version_value": "3.18.6SP" + }, + { + "version_affected": "=", + "version_value": "3.18.7SP" + }, + { + "version_affected": "=", + "version_value": "3.18.8aSP" + }, + { + "version_affected": "=", + "version_value": "3.18.9SP" + }, + { + "version_affected": "=", + "version_value": "16.6.1" + }, + { + "version_affected": "=", + "version_value": "16.6.2" + }, + { + "version_affected": "=", + "version_value": "16.6.3" + }, + { + "version_affected": "=", + "version_value": "16.6.4" + }, + { + "version_affected": "=", + "version_value": "16.6.5" + }, + { + "version_affected": "=", + "version_value": "16.6.4a" + }, + { + "version_affected": "=", + "version_value": "16.6.5a" + }, + { + "version_affected": "=", + "version_value": "16.6.6" + }, + { + "version_affected": "=", + "version_value": "16.6.7" + }, + { + "version_affected": "=", + "version_value": "16.6.8" + }, + { + "version_affected": "=", + "version_value": "16.6.9" + }, + { + "version_affected": "=", + "version_value": "16.6.10" + }, + { + "version_affected": "=", + "version_value": "16.7.1" + }, + { + "version_affected": "=", + "version_value": "16.7.1a" + }, + { + "version_affected": "=", + "version_value": "16.7.1b" + }, + { + "version_affected": "=", + "version_value": "16.7.2" + }, + { + "version_affected": "=", + "version_value": "16.7.3" + }, + { + "version_affected": "=", + "version_value": "16.7.4" + }, + { + "version_affected": "=", + "version_value": "16.8.1" + }, + { + "version_affected": "=", + "version_value": "16.8.1a" + }, + { + "version_affected": "=", + "version_value": "16.8.1b" + }, + { + "version_affected": "=", + "version_value": "16.8.1s" + }, + { + "version_affected": "=", + "version_value": "16.8.1c" + }, + { + "version_affected": "=", + "version_value": "16.8.1d" + }, + { + "version_affected": "=", + "version_value": "16.8.2" + }, + { + "version_affected": "=", + "version_value": "16.8.1e" + }, + { + "version_affected": "=", + "version_value": "16.8.3" + }, + { + "version_affected": "=", + "version_value": "16.9.1" + }, + { + "version_affected": "=", + "version_value": "16.9.2" + }, + { + "version_affected": "=", + "version_value": "16.9.1a" + }, + { + "version_affected": "=", + "version_value": "16.9.1b" + }, + { + "version_affected": "=", + "version_value": "16.9.1s" + }, + { + "version_affected": "=", + "version_value": "16.9.3" + }, + { + "version_affected": "=", + "version_value": "16.9.4" + }, + { + "version_affected": "=", + "version_value": "16.9.3a" + }, + { + "version_affected": "=", + "version_value": "16.9.5" + }, + { + "version_affected": "=", + "version_value": "16.9.5f" + }, + { + "version_affected": "=", + "version_value": "16.9.6" + }, + { + "version_affected": "=", + "version_value": "16.9.7" + }, + { + "version_affected": "=", + "version_value": "16.9.8" + }, + { + "version_affected": "=", + "version_value": "16.10.1" + }, + { + "version_affected": "=", + "version_value": "16.10.1a" + }, + { + "version_affected": "=", + "version_value": "16.10.1b" + }, + { + "version_affected": "=", + "version_value": "16.10.1s" + }, + { + "version_affected": "=", + "version_value": "16.10.1c" + }, + { + "version_affected": "=", + "version_value": "16.10.1e" + }, + { + "version_affected": "=", + "version_value": "16.10.1d" + }, + { + "version_affected": "=", + "version_value": "16.10.2" + }, + { + "version_affected": "=", + "version_value": "16.10.1f" + }, + { + "version_affected": "=", + "version_value": "16.10.1g" + }, + { + "version_affected": "=", + "version_value": "16.10.3" + }, + { + "version_affected": "=", + "version_value": "16.11.1" + }, + { + "version_affected": "=", + "version_value": "16.11.1a" + }, + { + "version_affected": "=", + "version_value": "16.11.1b" + }, + { + "version_affected": "=", + "version_value": "16.11.2" + }, + { + "version_affected": "=", + "version_value": "16.11.1s" + }, + { + "version_affected": "=", + "version_value": "16.12.1" + }, + { + "version_affected": "=", + "version_value": "16.12.1s" + }, + { + "version_affected": "=", + "version_value": "16.12.1a" + }, + { + "version_affected": "=", + "version_value": "16.12.1c" + }, + { + "version_affected": "=", + "version_value": "16.12.1w" + }, + { + "version_affected": "=", + "version_value": "16.12.2" + }, + { + "version_affected": "=", + "version_value": "16.12.1y" + }, + { + "version_affected": "=", + "version_value": "16.12.2a" + }, + { + "version_affected": "=", + "version_value": "16.12.3" + }, + { + "version_affected": "=", + "version_value": "16.12.8" + }, + { + "version_affected": "=", + "version_value": "16.12.2s" + }, + { + "version_affected": "=", + "version_value": "16.12.1x" + }, + { + "version_affected": "=", + "version_value": "16.12.1t" + }, + { + "version_affected": "=", + "version_value": "16.12.4" + }, + { + "version_affected": "=", + "version_value": "16.12.3s" + }, + { + "version_affected": "=", + "version_value": "16.12.3a" + }, + { + "version_affected": "=", + "version_value": "16.12.4a" + }, + { + "version_affected": "=", + "version_value": "16.12.5" + }, + { + "version_affected": "=", + "version_value": "16.12.6" + }, + { + "version_affected": "=", + "version_value": "16.12.1z1" + }, + { + "version_affected": "=", + "version_value": "16.12.5a" + }, + { + "version_affected": "=", + "version_value": "16.12.5b" + }, + { + "version_affected": "=", + "version_value": "16.12.1z2" + }, + { + "version_affected": "=", + "version_value": "16.12.6a" + }, + { + "version_affected": "=", + "version_value": "16.12.7" + }, + { + "version_affected": "=", + "version_value": "16.12.9" + }, + { + "version_affected": "=", + "version_value": "16.12.10" + }, + { + "version_affected": "=", + "version_value": "16.12.10a" + }, + { + "version_affected": "=", + "version_value": "17.1.1" + }, + { + "version_affected": "=", + "version_value": "17.1.1a" + }, + { + "version_affected": "=", + "version_value": "17.1.1s" + }, + { + "version_affected": "=", + "version_value": "17.1.1t" + }, + { + "version_affected": "=", + "version_value": "17.1.3" + }, + { + "version_affected": "=", + "version_value": "17.2.1" + }, + { + "version_affected": "=", + "version_value": "17.2.1r" + }, + { + "version_affected": "=", + "version_value": "17.2.1a" + }, + { + "version_affected": "=", + "version_value": "17.2.1v" + }, + { + "version_affected": "=", + "version_value": "17.2.2" + }, + { + "version_affected": "=", + "version_value": "17.2.3" + }, + { + "version_affected": "=", + "version_value": "17.3.1" + }, + { + "version_affected": "=", + "version_value": "17.3.2" + }, + { + "version_affected": "=", + "version_value": "17.3.3" + }, + { + "version_affected": "=", + "version_value": "17.3.1a" + }, + { + "version_affected": "=", + "version_value": "17.3.1w" + }, + { + "version_affected": "=", + "version_value": "17.3.2a" + }, + { + "version_affected": "=", + "version_value": "17.3.1x" + }, + { + "version_affected": "=", + "version_value": "17.3.1z" + }, + { + "version_affected": "=", + "version_value": "17.3.4" + }, + { + "version_affected": "=", + "version_value": "17.3.5" + }, + { + "version_affected": "=", + "version_value": "17.3.4a" + }, + { + "version_affected": "=", + "version_value": "17.3.6" + }, + { + "version_affected": "=", + "version_value": "17.3.4b" + }, + { + "version_affected": "=", + "version_value": "17.3.4c" + }, + { + "version_affected": "=", + "version_value": "17.3.5a" + }, + { + "version_affected": "=", + "version_value": "17.3.5b" + }, + { + "version_affected": "=", + "version_value": "17.3.7" + }, + { + "version_affected": "=", + "version_value": "17.3.8" + }, + { + "version_affected": "=", + "version_value": "17.3.8a" + }, + { + "version_affected": "=", + "version_value": "17.4.1" + }, + { + "version_affected": "=", + "version_value": "17.4.2" + }, + { + "version_affected": "=", + "version_value": "17.4.1a" + }, + { + "version_affected": "=", + "version_value": "17.4.1b" + }, + { + "version_affected": "=", + "version_value": "17.4.2a" + }, + { + "version_affected": "=", + "version_value": "17.5.1" + }, + { + "version_affected": "=", + "version_value": "17.5.1a" + }, + { + "version_affected": "=", + "version_value": "17.6.1" + }, + { + "version_affected": "=", + "version_value": "17.6.2" + }, + { + "version_affected": "=", + "version_value": "17.6.1w" + }, + { + "version_affected": "=", + "version_value": "17.6.1a" + }, + { + "version_affected": "=", + "version_value": "17.6.1x" + }, + { + "version_affected": "=", + "version_value": "17.6.3" + }, + { + "version_affected": "=", + "version_value": "17.6.1y" + }, + { + "version_affected": "=", + "version_value": "17.6.1z" + }, + { + "version_affected": "=", + "version_value": "17.6.3a" + }, + { + "version_affected": "=", + "version_value": "17.6.4" + }, + { + "version_affected": "=", + "version_value": "17.6.1z1" + }, + { + "version_affected": "=", + "version_value": "17.6.5" + }, + { + "version_affected": "=", + "version_value": "17.6.6" + }, + { + "version_affected": "=", + "version_value": "17.6.6a" + }, + { + "version_affected": "=", + "version_value": "17.6.5a" + }, + { + "version_affected": "=", + "version_value": "17.7.1" + }, + { + "version_affected": "=", + "version_value": "17.7.1a" + }, + { + "version_affected": "=", + "version_value": "17.7.1b" + }, + { + "version_affected": "=", + "version_value": "17.7.2" + }, + { + "version_affected": "=", + "version_value": "17.10.1" + }, + { + "version_affected": "=", + "version_value": "17.10.1a" + }, + { + "version_affected": "=", + "version_value": "17.10.1b" + }, + { + "version_affected": "=", + "version_value": "17.8.1" + }, + { + "version_affected": "=", + "version_value": "17.8.1a" + }, + { + "version_affected": "=", + "version_value": "17.9.1" + }, + { + "version_affected": "=", + "version_value": "17.9.1w" + }, + { + "version_affected": "=", + "version_value": "17.9.2" + }, + { + "version_affected": "=", + "version_value": "17.9.1a" + }, + { + "version_affected": "=", + "version_value": "17.9.1x" + }, + { + "version_affected": "=", + "version_value": "17.9.1y" + }, + { + "version_affected": "=", + "version_value": "17.9.3" + }, + { + "version_affected": "=", + "version_value": "17.9.2a" + }, + { + "version_affected": "=", + "version_value": "17.9.1x1" + }, + { + "version_affected": "=", + "version_value": "17.9.3a" + }, + { + "version_affected": "=", + "version_value": "17.9.4" + }, + { + "version_affected": "=", + "version_value": "17.9.1y1" + }, + { + "version_affected": "=", + "version_value": "17.9.4a" + }, + { + "version_affected": "=", + "version_value": "17.11.1" + }, + { + "version_affected": "=", + "version_value": "17.11.1a" + }, + { + "version_affected": "=", + "version_value": "17.12.1" + }, + { + "version_affected": "=", + "version_value": "17.12.1w" + }, + { + "version_affected": "=", + "version_value": "17.12.1a" + }, + { + "version_affected": "=", + "version_value": "17.12.2" + }, + { + "version_affected": "=", + "version_value": "17.12.2a" + }, + { + "version_affected": "=", + "version_value": "17.11.99SW" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aux-333WBz8f", + "refsource": "MISC", + "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aux-333WBz8f" + } + ] + }, + "source": { + "advisory": "cisco-sa-aux-333WBz8f", + "discovery": "EXTERNAL", + "defects": [ + "CSCwh47363" + ] + }, + "exploit": [ + { + "lang": "en", + "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 5.6, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" } ] } diff --git a/2024/21xxx/CVE-2024-21859.json b/2024/21xxx/CVE-2024-21859.json new file mode 100644 index 00000000000..242f5277c17 --- /dev/null +++ b/2024/21xxx/CVE-2024-21859.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-21859", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23195.json b/2024/23xxx/CVE-2024-23195.json new file mode 100644 index 00000000000..3d699a22677 --- /dev/null +++ b/2024/23xxx/CVE-2024-23195.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23195", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23312.json b/2024/23xxx/CVE-2024-23312.json new file mode 100644 index 00000000000..5b293c2a35f --- /dev/null +++ b/2024/23xxx/CVE-2024-23312.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23312", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23450.json b/2024/23xxx/CVE-2024-23450.json index 6fa5c0dc2a9..8e38245cdce 100644 --- a/2024/23xxx/CVE-2024-23450.json +++ b/2024/23xxx/CVE-2024-23450.json @@ -1,17 +1,98 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-23450", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@elastic.co", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was discovered in Elasticsearch, where processing a document in a deeply nested pipeline on an ingest node could cause the Elasticsearch node to crash." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-400 Uncontrolled Resource Consumption", + "cweId": "CWE-400" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Elastic", + "product": { + "product_data": [ + { + "product_name": "Elasticsearch", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "7.0.0", + "version_value": "7.17.19" + }, + { + "version_affected": "<", + "version_name": "8.0.0", + "version_value": "8.13.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://discuss.elastic.co/t/elasticsearch-8-13-0-7-17-19-security-update-esa-2024-06/356314", + "refsource": "MISC", + "name": "https://discuss.elastic.co/t/elasticsearch-8-13-0-7-17-19-security-update-esa-2024-06/356314" + }, + { + "url": "https://www.elastic.co/community/security", + "refsource": "MISC", + "name": "https://www.elastic.co/community/security" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/24xxx/CVE-2024-24582.json b/2024/24xxx/CVE-2024-24582.json new file mode 100644 index 00000000000..d168a2980e6 --- /dev/null +++ b/2024/24xxx/CVE-2024-24582.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24582", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/25xxx/CVE-2024-25391.json b/2024/25xxx/CVE-2024-25391.json index c829cb1bde9..dbc217864aa 100644 --- a/2024/25xxx/CVE-2024-25391.json +++ b/2024/25xxx/CVE-2024-25391.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-25391", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-25391", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A stack buffer overflow occurs in libc/posix/ipc/mqueue.c in RT-Thread through 5.0.2." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/RT-Thread/rt-thread/issues/8287", + "refsource": "MISC", + "name": "https://github.com/RT-Thread/rt-thread/issues/8287" + }, + { + "refsource": "MISC", + "name": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt", + "url": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt" + }, + { + "refsource": "MISC", + "name": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/", + "url": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/" + }, + { + "refsource": "MISC", + "name": "https://seclists.org/fulldisclosure/2024/Mar/28", + "url": "https://seclists.org/fulldisclosure/2024/Mar/28" } ] } diff --git a/2024/25xxx/CVE-2024-25392.json b/2024/25xxx/CVE-2024-25392.json index 884ad40f1dc..2f37cdf2016 100644 --- a/2024/25xxx/CVE-2024-25392.json +++ b/2024/25xxx/CVE-2024-25392.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-25392", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-25392", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An out-of-bounds access occurs in utilities/var_export/var_export.c in RT-Thread through 5.0.2." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/RT-Thread/rt-thread/issues/8290", + "refsource": "MISC", + "name": "https://github.com/RT-Thread/rt-thread/issues/8290" + }, + { + "refsource": "MISC", + "name": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt", + "url": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt" + }, + { + "refsource": "MISC", + "name": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/", + "url": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/" + }, + { + "refsource": "MISC", + "name": "https://seclists.org/fulldisclosure/2024/Mar/28", + "url": "https://seclists.org/fulldisclosure/2024/Mar/28" } ] } diff --git a/2024/25xxx/CVE-2024-25393.json b/2024/25xxx/CVE-2024-25393.json index da13dd4aa92..153f1daef58 100644 --- a/2024/25xxx/CVE-2024-25393.json +++ b/2024/25xxx/CVE-2024-25393.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-25393", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-25393", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A stack buffer overflow occurs in net/at/src/at_server.c in RT-Thread through 5.0.2." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/RT-Thread/rt-thread/issues/8288", + "refsource": "MISC", + "name": "https://github.com/RT-Thread/rt-thread/issues/8288" + }, + { + "refsource": "MISC", + "name": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt", + "url": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt" + }, + { + "refsource": "MISC", + "name": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/", + "url": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/" + }, + { + "refsource": "MISC", + "name": "https://seclists.org/fulldisclosure/2024/Mar/28", + "url": "https://seclists.org/fulldisclosure/2024/Mar/28" } ] } diff --git a/2024/25xxx/CVE-2024-25394.json b/2024/25xxx/CVE-2024-25394.json index 595bc65f838..5d317ac4305 100644 --- a/2024/25xxx/CVE-2024-25394.json +++ b/2024/25xxx/CVE-2024-25394.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-25394", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-25394", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A buffer overflow occurs in utilities/ymodem/ry_sy.c in RT-Thread through 5.0.2 because of an incorrect sprintf call or a missing '\\0' character." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/RT-Thread/rt-thread/issues/8291", + "refsource": "MISC", + "name": "https://github.com/RT-Thread/rt-thread/issues/8291" + }, + { + "refsource": "MISC", + "name": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt", + "url": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt" + }, + { + "refsource": "MISC", + "name": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/", + "url": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/" + }, + { + "refsource": "MISC", + "name": "https://seclists.org/fulldisclosure/2024/Mar/28", + "url": "https://seclists.org/fulldisclosure/2024/Mar/28" } ] } diff --git a/2024/25xxx/CVE-2024-25395.json b/2024/25xxx/CVE-2024-25395.json index 744bfefb0d2..760e082b095 100644 --- a/2024/25xxx/CVE-2024-25395.json +++ b/2024/25xxx/CVE-2024-25395.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-25395", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-25395", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A buffer overflow occurs in utilities/rt-link/src/rtlink.c in RT-Thread through 5.0.2." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/RT-Thread/rt-thread/issues/8289", + "refsource": "MISC", + "name": "https://github.com/RT-Thread/rt-thread/issues/8289" + }, + { + "refsource": "MISC", + "name": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt", + "url": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt" + }, + { + "refsource": "MISC", + "name": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/", + "url": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/" + }, + { + "refsource": "MISC", + "name": "https://seclists.org/fulldisclosure/2024/Mar/28", + "url": "https://seclists.org/fulldisclosure/2024/Mar/28" } ] } diff --git a/2024/25xxx/CVE-2024-25564.json b/2024/25xxx/CVE-2024-25564.json new file mode 100644 index 00000000000..a2cdbea176a --- /dev/null +++ b/2024/25xxx/CVE-2024-25564.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-25564", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/28xxx/CVE-2024-28047.json b/2024/28xxx/CVE-2024-28047.json new file mode 100644 index 00000000000..8b923985a60 --- /dev/null +++ b/2024/28xxx/CVE-2024-28047.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-28047", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/28xxx/CVE-2024-28050.json b/2024/28xxx/CVE-2024-28050.json new file mode 100644 index 00000000000..b2c355a46f4 --- /dev/null +++ b/2024/28xxx/CVE-2024-28050.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-28050", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/28xxx/CVE-2024-28127.json b/2024/28xxx/CVE-2024-28127.json new file mode 100644 index 00000000000..f2547c6c46b --- /dev/null +++ b/2024/28xxx/CVE-2024-28127.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-28127", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/28xxx/CVE-2024-28881.json b/2024/28xxx/CVE-2024-28881.json new file mode 100644 index 00000000000..6cd77b00e45 --- /dev/null +++ b/2024/28xxx/CVE-2024-28881.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-28881", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/29xxx/CVE-2024-29214.json b/2024/29xxx/CVE-2024-29214.json new file mode 100644 index 00000000000..0cf4b300c40 --- /dev/null +++ b/2024/29xxx/CVE-2024-29214.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-29214", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/29xxx/CVE-2024-29806.json b/2024/29xxx/CVE-2024-29806.json index 2cc43aacc59..75820503c88 100644 --- a/2024/29xxx/CVE-2024-29806.json +++ b/2024/29xxx/CVE-2024-29806.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29806", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Reservation Diary ReDi Restaurant Reservation allows Reflected XSS.This issue affects ReDi Restaurant Reservation: from n/a through 24.0128.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Reservation Diary", + "product": { + "product_data": [ + { + "product_name": "ReDi Restaurant Reservation", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "24.0303", + "status": "unaffected" + } + ], + "lessThanOrEqual": "24.0128", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/redi-restaurant-reservation/wordpress-redi-restaurant-reservation-plugin-24-0128-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/redi-restaurant-reservation/wordpress-redi-restaurant-reservation-plugin-24-0128-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 24.0303 or a higher version." + } + ], + "value": "Update to 24.0303 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "Le Ngoc Anh (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29807.json b/2024/29xxx/CVE-2024-29807.json index c4cc87d3402..56f944f9a18 100644 --- a/2024/29xxx/CVE-2024-29807.json +++ b/2024/29xxx/CVE-2024-29807.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29807", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DearHive DearFlip allows Stored XSS.This issue affects DearFlip: from n/a through 2.2.26.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "DearHive", + "product": { + "product_data": [ + { + "product_name": "DearFlip", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "2.2.27", + "status": "unaffected" + } + ], + "lessThanOrEqual": "2.2.26", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/3d-flipbook-dflip-lite/wordpress-dearflip-plugin-2-2-26-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/3d-flipbook-dflip-lite/wordpress-dearflip-plugin-2-2-26-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 2.2.27 or a higher version." + } + ], + "value": "Update to 2.2.27 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "emad (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29812.json b/2024/29xxx/CVE-2024-29812.json index 78a0b2be8d4..dd71c2f2e07 100644 --- a/2024/29xxx/CVE-2024-29812.json +++ b/2024/29xxx/CVE-2024-29812.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29812", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ReviewX allows Stored XSS.This issue affects ReviewX: from n/a through 1.6.22.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "ReviewX", + "product": { + "product_data": [ + { + "product_name": "ReviewX", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "1.6.23", + "status": "unaffected" + } + ], + "lessThanOrEqual": "1.6.22", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/reviewx/wordpress-reviewx-plugin-1-6-22-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/reviewx/wordpress-reviewx-plugin-1-6-22-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 1.6.23 or a higher version." + } + ], + "value": "Update to 1.6.23 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "LVT-tholv2k (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29813.json b/2024/29xxx/CVE-2024-29813.json index 69c9118a7c9..e17974285dc 100644 --- a/2024/29xxx/CVE-2024-29813.json +++ b/2024/29xxx/CVE-2024-29813.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29813", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CartFlows Inc. Funnel Builder by CartFlows allows Stored XSS.This issue affects Funnel Builder by CartFlows: from n/a through 2.0.1.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "CartFlows Inc.", + "product": { + "product_data": [ + { + "product_name": "Funnel Builder by CartFlows", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "2.0.2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "2.0.1", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/cartflows/wordpress-cartflows-plugin-2-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/cartflows/wordpress-cartflows-plugin-2-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 2.0.2 or a higher version." + } + ], + "value": "Update to 2.0.2 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "LVT-tholv2k (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29814.json b/2024/29xxx/CVE-2024-29814.json index 760b4d80046..f92d2ba3a4e 100644 --- a/2024/29xxx/CVE-2024-29814.json +++ b/2024/29xxx/CVE-2024-29814.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29814", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CurrencyRate.Today Exchange Rates Widget allows Stored XSS.This issue affects Exchange Rates Widget: from n/a through 1.4.0.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "CurrencyRate.today", + "product": { + "product_data": [ + { + "product_name": "Exchange Rates Widget", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "1.4.1", + "status": "unaffected" + } + ], + "lessThanOrEqual": "1.4.0", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/exchange-rates-widget/wordpress-exchange-rates-widget-plugin-1-4-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/exchange-rates-widget/wordpress-exchange-rates-widget-plugin-1-4-0-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 1.4.1 or a higher version." + } + ], + "value": "Update to 1.4.1 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "NG\u00d4 THI\u00caN AN / ancorn_ from VNPT-VCI (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29815.json b/2024/29xxx/CVE-2024-29815.json index cbd39201344..e29d5ed00f5 100644 --- a/2024/29xxx/CVE-2024-29815.json +++ b/2024/29xxx/CVE-2024-29815.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29815", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aminur Islam WP Change Email Sender allows Stored XSS.This issue affects WP Change Email Sender: from n/a before 1.3.0.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Aminur Islam", + "product": { + "product_data": [ + { + "product_name": "WP Change Email Sender", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "1.3.0", + "status": "unaffected" + } + ], + "lessThan": "1.3.0", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-change-email-sender/wordpress-wp-change-email-sender-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/wp-change-email-sender/wordpress-wp-change-email-sender-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 1.3.0 or a higher version." + } + ], + "value": "Update to 1.3.0 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "Dhabaleshwar Das (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29816.json b/2024/29xxx/CVE-2024-29816.json index 62542fc560f..91b0c59850c 100644 --- a/2024/29xxx/CVE-2024-29816.json +++ b/2024/29xxx/CVE-2024-29816.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29816", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in htdat Woo Viet allows Stored XSS.This issue affects Woo Viet: from n/a through 1.5.2.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "htdat", + "product": { + "product_data": [ + { + "product_name": "Woo Viet", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "1.5.3", + "status": "unaffected" + } + ], + "lessThanOrEqual": "1.5.2", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/woo-viet/wordpress-woo-viet-plugin-1-5-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/woo-viet/wordpress-woo-viet-plugin-1-5-2-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 1.5.3 or a higher version." + } + ], + "value": "Update to 1.5.3 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "Dhabaleshwar Das (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29817.json b/2024/29xxx/CVE-2024-29817.json index 24653f306ef..d890757d418 100644 --- a/2024/29xxx/CVE-2024-29817.json +++ b/2024/29xxx/CVE-2024-29817.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29817", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SERVIT Software Solutions affiliate-toolkit allows Stored XSS.This issue affects affiliate-toolkit: from n/a through 3.4.5.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SERVIT Software Solutions", + "product": { + "product_data": [ + { + "product_name": "affiliate-toolkit", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "3.4.6", + "status": "unaffected" + } + ], + "lessThanOrEqual": "3.4.5", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/affiliate-toolkit-starter/wordpress-affiliate-toolkit-wordpress-affiliate-plugin-plugin-3-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/affiliate-toolkit-starter/wordpress-affiliate-toolkit-wordpress-affiliate-plugin-plugin-3-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 3.4.6 or a higher version." + } + ], + "value": "Update to 3.4.6 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "NG\u00d4 THI\u00caN AN / ancorn_ from VNPT-VCI (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29818.json b/2024/29xxx/CVE-2024-29818.json index 474dfc00a54..872541ae2d3 100644 --- a/2024/29xxx/CVE-2024-29818.json +++ b/2024/29xxx/CVE-2024-29818.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29818", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Poll Maker & Voting Plugin Team (InfoTheme) WP Poll Maker allows Stored XSS.This issue affects WP Poll Maker: from n/a through 3.1.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Poll Maker & Voting Plugin Team (InfoTheme)", + "product": { + "product_data": [ + { + "product_name": "WP Poll Maker", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "3.4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "3.1", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/epoll-wp-voting/wordpress-wp-poll-maker-plugin-3-1-authenticated-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/epoll-wp-voting/wordpress-wp-poll-maker-plugin-3-1-authenticated-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 3.4 or a higher version." + } + ], + "value": "Update to 3.4 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "Dhabaleshwar Das (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/2xxx/CVE-2024-2945.json b/2024/2xxx/CVE-2024-2945.json index 927811e75d9..139c4bda184 100644 --- a/2024/2xxx/CVE-2024-2945.json +++ b/2024/2xxx/CVE-2024-2945.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-2945", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Campcodes Online Examination System 1.0. It has been classified as critical. Affected is an unknown function of the file /adminpanel/admin/facebox_modal/updateExaminee.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258036." + }, + { + "lang": "deu", + "value": "Es wurde eine kritische Schwachstelle in Campcodes Online Examination System 1.0 ausgemacht. Hiervon betroffen ist ein unbekannter Codeblock der Datei /adminpanel/admin/facebox_modal/updateExaminee.php. Durch das Beeinflussen des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Campcodes", + "product": { + "product_data": [ + { + "product_name": "Online Examination System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.258036", + "refsource": "MISC", + "name": "https://vuldb.com/?id.258036" + }, + { + "url": "https://vuldb.com/?ctiid.258036", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.258036" + }, + { + "url": "https://vuldb.com/?submit.304762", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.304762" + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%205.pdf", + "refsource": "MISC", + "name": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%205.pdf" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2024/30xxx/CVE-2024-30184.json b/2024/30xxx/CVE-2024-30184.json index f218aeb1e66..de2844e14b8 100644 --- a/2024/30xxx/CVE-2024-30184.json +++ b/2024/30xxx/CVE-2024-30184.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30184", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Looking Forward Software Incorporated. Popup Builder allows Stored XSS.This issue affects Popup Builder: from n/a through 4.2.6.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Looking Forward Software Incorporated.", + "product": { + "product_data": [ + { + "product_name": "Popup Builder", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "4.2.7", + "status": "unaffected" + } + ], + "lessThanOrEqual": "4.2.6", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/popup-builder/wordpress-popup-builder-plugin-4-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/popup-builder/wordpress-popup-builder-plugin-4-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 4.2.7 or a higher version." + } + ], + "value": "Update to 4.2.7 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "LVT-tholv2k (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30185.json b/2024/30xxx/CVE-2024-30185.json index fabcac609be..6e276defc78 100644 --- a/2024/30xxx/CVE-2024-30185.json +++ b/2024/30xxx/CVE-2024-30185.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30185", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BdThemes Element Pack Elementor Addons allows Stored XSS.This issue affects Element Pack Elementor Addons: from n/a through 5.5.3.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "BdThemes", + "product": { + "product_data": [ + { + "product_name": "Element Pack Elementor Addons", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "5.5.4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "5.5.3", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/bdthemes-element-pack-lite/wordpress-element-pack-elementor-addons-plugin-5-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/bdthemes-element-pack-lite/wordpress-element-pack-elementor-addons-plugin-5-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 5.5.4 or a higher version." + } + ], + "value": "Update to 5.5.4 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "Abu Hurayra (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30186.json b/2024/30xxx/CVE-2024-30186.json index ccab514d407..a181067d916 100644 --- a/2024/30xxx/CVE-2024-30186.json +++ b/2024/30xxx/CVE-2024-30186.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30186", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BdThemes Prime Slider \u2013 Addons For Elementor allows Stored XSS.This issue affects Prime Slider \u2013 Addons For Elementor: from n/a through 3.13.1.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "BdThemes", + "product": { + "product_data": [ + { + "product_name": "Prime Slider \u2013 Addons For Elementor", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "3.13.2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "3.13.1", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/bdthemes-prime-slider-lite/wordpress-prime-slider-plugin-3-13-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/bdthemes-prime-slider-lite/wordpress-prime-slider-plugin-3-13-1-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 3.13.2 or a higher version." + } + ], + "value": "Update to 3.13.2 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "Abu Hurayra (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30497.json b/2024/30xxx/CVE-2024-30497.json new file mode 100644 index 00000000000..92065863ca1 --- /dev/null +++ b/2024/30xxx/CVE-2024-30497.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30497", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30498.json b/2024/30xxx/CVE-2024-30498.json new file mode 100644 index 00000000000..b45b9074783 --- /dev/null +++ b/2024/30xxx/CVE-2024-30498.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30498", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30499.json b/2024/30xxx/CVE-2024-30499.json new file mode 100644 index 00000000000..0ec8af877a2 --- /dev/null +++ b/2024/30xxx/CVE-2024-30499.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30499", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30500.json b/2024/30xxx/CVE-2024-30500.json new file mode 100644 index 00000000000..655e4e87f19 --- /dev/null +++ b/2024/30xxx/CVE-2024-30500.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30500", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30501.json b/2024/30xxx/CVE-2024-30501.json new file mode 100644 index 00000000000..b7c26eb95cf --- /dev/null +++ b/2024/30xxx/CVE-2024-30501.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30501", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30502.json b/2024/30xxx/CVE-2024-30502.json new file mode 100644 index 00000000000..c10995f326e --- /dev/null +++ b/2024/30xxx/CVE-2024-30502.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30502", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30503.json b/2024/30xxx/CVE-2024-30503.json new file mode 100644 index 00000000000..142857950a2 --- /dev/null +++ b/2024/30xxx/CVE-2024-30503.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30503", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30504.json b/2024/30xxx/CVE-2024-30504.json new file mode 100644 index 00000000000..ebb297ad07a --- /dev/null +++ b/2024/30xxx/CVE-2024-30504.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30504", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30505.json b/2024/30xxx/CVE-2024-30505.json new file mode 100644 index 00000000000..403953601e2 --- /dev/null +++ b/2024/30xxx/CVE-2024-30505.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30505", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30506.json b/2024/30xxx/CVE-2024-30506.json new file mode 100644 index 00000000000..4c95e8fb604 --- /dev/null +++ b/2024/30xxx/CVE-2024-30506.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30506", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30642.json b/2024/30xxx/CVE-2024-30642.json new file mode 100644 index 00000000000..46e75eb5d90 --- /dev/null +++ b/2024/30xxx/CVE-2024-30642.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30642", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30643.json b/2024/30xxx/CVE-2024-30643.json new file mode 100644 index 00000000000..4cfa68ace23 --- /dev/null +++ b/2024/30xxx/CVE-2024-30643.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30643", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30644.json b/2024/30xxx/CVE-2024-30644.json new file mode 100644 index 00000000000..95d723968f3 --- /dev/null +++ b/2024/30xxx/CVE-2024-30644.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30644", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30645.json b/2024/30xxx/CVE-2024-30645.json new file mode 100644 index 00000000000..88acb09647b --- /dev/null +++ b/2024/30xxx/CVE-2024-30645.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30645", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30646.json b/2024/30xxx/CVE-2024-30646.json new file mode 100644 index 00000000000..4b9c5b43ccd --- /dev/null +++ b/2024/30xxx/CVE-2024-30646.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30646", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30647.json b/2024/30xxx/CVE-2024-30647.json new file mode 100644 index 00000000000..0b586e34e3d --- /dev/null +++ b/2024/30xxx/CVE-2024-30647.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30647", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30648.json b/2024/30xxx/CVE-2024-30648.json new file mode 100644 index 00000000000..b1a3d803a23 --- /dev/null +++ b/2024/30xxx/CVE-2024-30648.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30648", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30649.json b/2024/30xxx/CVE-2024-30649.json new file mode 100644 index 00000000000..dae6bc80436 --- /dev/null +++ b/2024/30xxx/CVE-2024-30649.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30649", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30650.json b/2024/30xxx/CVE-2024-30650.json new file mode 100644 index 00000000000..37b099d0069 --- /dev/null +++ b/2024/30xxx/CVE-2024-30650.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30650", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30651.json b/2024/30xxx/CVE-2024-30651.json new file mode 100644 index 00000000000..accf567a58b --- /dev/null +++ b/2024/30xxx/CVE-2024-30651.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30651", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30652.json b/2024/30xxx/CVE-2024-30652.json new file mode 100644 index 00000000000..d7456cce224 --- /dev/null +++ b/2024/30xxx/CVE-2024-30652.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30652", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30653.json b/2024/30xxx/CVE-2024-30653.json new file mode 100644 index 00000000000..9106280aa87 --- /dev/null +++ b/2024/30xxx/CVE-2024-30653.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30653", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30654.json b/2024/30xxx/CVE-2024-30654.json new file mode 100644 index 00000000000..580254bf906 --- /dev/null +++ b/2024/30xxx/CVE-2024-30654.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30654", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30655.json b/2024/30xxx/CVE-2024-30655.json new file mode 100644 index 00000000000..c9a083e0749 --- /dev/null +++ b/2024/30xxx/CVE-2024-30655.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30655", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30656.json b/2024/30xxx/CVE-2024-30656.json new file mode 100644 index 00000000000..fb658462baf --- /dev/null +++ b/2024/30xxx/CVE-2024-30656.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30656", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30657.json b/2024/30xxx/CVE-2024-30657.json new file mode 100644 index 00000000000..5e37972d609 --- /dev/null +++ b/2024/30xxx/CVE-2024-30657.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30657", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30658.json b/2024/30xxx/CVE-2024-30658.json new file mode 100644 index 00000000000..9b1bab41d80 --- /dev/null +++ b/2024/30xxx/CVE-2024-30658.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30658", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30659.json b/2024/30xxx/CVE-2024-30659.json new file mode 100644 index 00000000000..c74f647817e --- /dev/null +++ b/2024/30xxx/CVE-2024-30659.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30659", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30660.json b/2024/30xxx/CVE-2024-30660.json new file mode 100644 index 00000000000..85329222c50 --- /dev/null +++ b/2024/30xxx/CVE-2024-30660.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30660", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30661.json b/2024/30xxx/CVE-2024-30661.json new file mode 100644 index 00000000000..9ba5d76cbba --- /dev/null +++ b/2024/30xxx/CVE-2024-30661.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30661", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30662.json b/2024/30xxx/CVE-2024-30662.json new file mode 100644 index 00000000000..bb16ddf3aee --- /dev/null +++ b/2024/30xxx/CVE-2024-30662.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30662", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30888.json b/2024/30xxx/CVE-2024-30888.json new file mode 100644 index 00000000000..66b1df98846 --- /dev/null +++ b/2024/30xxx/CVE-2024-30888.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30888", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30889.json b/2024/30xxx/CVE-2024-30889.json new file mode 100644 index 00000000000..60d87a3b2d1 --- /dev/null +++ b/2024/30xxx/CVE-2024-30889.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30889", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30890.json b/2024/30xxx/CVE-2024-30890.json new file mode 100644 index 00000000000..01072f2c7f2 --- /dev/null +++ b/2024/30xxx/CVE-2024-30890.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30890", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30891.json b/2024/30xxx/CVE-2024-30891.json new file mode 100644 index 00000000000..8c7de4b51ae --- /dev/null +++ b/2024/30xxx/CVE-2024-30891.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30891", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30892.json b/2024/30xxx/CVE-2024-30892.json new file mode 100644 index 00000000000..4ccc988a968 --- /dev/null +++ b/2024/30xxx/CVE-2024-30892.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30892", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30893.json b/2024/30xxx/CVE-2024-30893.json new file mode 100644 index 00000000000..dda381d983b --- /dev/null +++ b/2024/30xxx/CVE-2024-30893.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30893", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30894.json b/2024/30xxx/CVE-2024-30894.json new file mode 100644 index 00000000000..0ecc2efd815 --- /dev/null +++ b/2024/30xxx/CVE-2024-30894.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30894", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30895.json b/2024/30xxx/CVE-2024-30895.json new file mode 100644 index 00000000000..786b2ddff93 --- /dev/null +++ b/2024/30xxx/CVE-2024-30895.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30895", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30896.json b/2024/30xxx/CVE-2024-30896.json new file mode 100644 index 00000000000..fcc2c8df032 --- /dev/null +++ b/2024/30xxx/CVE-2024-30896.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30896", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30897.json b/2024/30xxx/CVE-2024-30897.json new file mode 100644 index 00000000000..343e44808b8 --- /dev/null +++ b/2024/30xxx/CVE-2024-30897.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30897", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30898.json b/2024/30xxx/CVE-2024-30898.json new file mode 100644 index 00000000000..4bd77f35322 --- /dev/null +++ b/2024/30xxx/CVE-2024-30898.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30898", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30899.json b/2024/30xxx/CVE-2024-30899.json new file mode 100644 index 00000000000..0a2f271797f --- /dev/null +++ b/2024/30xxx/CVE-2024-30899.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30899", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30900.json b/2024/30xxx/CVE-2024-30900.json new file mode 100644 index 00000000000..5aaae1272d6 --- /dev/null +++ b/2024/30xxx/CVE-2024-30900.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30900", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30901.json b/2024/30xxx/CVE-2024-30901.json new file mode 100644 index 00000000000..83ee57e6272 --- /dev/null +++ b/2024/30xxx/CVE-2024-30901.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30901", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30902.json b/2024/30xxx/CVE-2024-30902.json new file mode 100644 index 00000000000..1a68c9ded1d --- /dev/null +++ b/2024/30xxx/CVE-2024-30902.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30902", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30903.json b/2024/30xxx/CVE-2024-30903.json new file mode 100644 index 00000000000..7c25296e493 --- /dev/null +++ b/2024/30xxx/CVE-2024-30903.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30903", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30904.json b/2024/30xxx/CVE-2024-30904.json new file mode 100644 index 00000000000..f7ac503d7d8 --- /dev/null +++ b/2024/30xxx/CVE-2024-30904.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30904", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30905.json b/2024/30xxx/CVE-2024-30905.json new file mode 100644 index 00000000000..c98f7c526e2 --- /dev/null +++ b/2024/30xxx/CVE-2024-30905.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30905", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30906.json b/2024/30xxx/CVE-2024-30906.json new file mode 100644 index 00000000000..4e876424fad --- /dev/null +++ b/2024/30xxx/CVE-2024-30906.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30906", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30907.json b/2024/30xxx/CVE-2024-30907.json new file mode 100644 index 00000000000..0c676ad9ad1 --- /dev/null +++ b/2024/30xxx/CVE-2024-30907.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30907", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30908.json b/2024/30xxx/CVE-2024-30908.json new file mode 100644 index 00000000000..eedf49ce1fb --- /dev/null +++ b/2024/30xxx/CVE-2024-30908.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30908", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30909.json b/2024/30xxx/CVE-2024-30909.json new file mode 100644 index 00000000000..2d7a5a70c07 --- /dev/null +++ b/2024/30xxx/CVE-2024-30909.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30909", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30910.json b/2024/30xxx/CVE-2024-30910.json new file mode 100644 index 00000000000..ab179ca85de --- /dev/null +++ b/2024/30xxx/CVE-2024-30910.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30910", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30911.json b/2024/30xxx/CVE-2024-30911.json new file mode 100644 index 00000000000..b40fa8d061c --- /dev/null +++ b/2024/30xxx/CVE-2024-30911.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30911", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30912.json b/2024/30xxx/CVE-2024-30912.json new file mode 100644 index 00000000000..2b93391e16f --- /dev/null +++ b/2024/30xxx/CVE-2024-30912.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30912", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file