From a12a126973a59bec1199838da247b1307b4b1197 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 29 Jan 2024 21:00:33 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/31xxx/CVE-2023-31445.json | 4 +- 2023/35xxx/CVE-2023-35793.json | 5 ++ 2023/35xxx/CVE-2023-35794.json | 5 ++ 2023/49xxx/CVE-2023-49038.json | 56 +++++++++++++++-- 2023/4xxx/CVE-2023-4550.json | 107 +++++++++++++++++++++++++++++++-- 2023/4xxx/CVE-2023-4551.json | 98 ++++++++++++++++++++++++++++-- 2023/4xxx/CVE-2023-4552.json | 98 ++++++++++++++++++++++++++++-- 2023/4xxx/CVE-2023-4553.json | 98 ++++++++++++++++++++++++++++-- 2023/4xxx/CVE-2023-4554.json | 98 ++++++++++++++++++++++++++++-- 2024/1xxx/CVE-2024-1018.json | 95 +++++++++++++++++++++++++++-- 2024/1xxx/CVE-2024-1051.json | 18 ++++++ 2024/1xxx/CVE-2024-1052.json | 18 ++++++ 2024/1xxx/CVE-2024-1053.json | 18 ++++++ 2024/1xxx/CVE-2024-1054.json | 18 ++++++ 2024/24xxx/CVE-2024-24747.json | 18 ++++++ 2024/24xxx/CVE-2024-24748.json | 18 ++++++ 2024/24xxx/CVE-2024-24749.json | 18 ++++++ 2024/24xxx/CVE-2024-24750.json | 18 ++++++ 2024/24xxx/CVE-2024-24751.json | 18 ++++++ 2024/24xxx/CVE-2024-24752.json | 18 ++++++ 2024/24xxx/CVE-2024-24753.json | 18 ++++++ 2024/24xxx/CVE-2024-24754.json | 18 ++++++ 2024/24xxx/CVE-2024-24755.json | 18 ++++++ 2024/24xxx/CVE-2024-24756.json | 18 ++++++ 2024/24xxx/CVE-2024-24757.json | 18 ++++++ 2024/24xxx/CVE-2024-24758.json | 18 ++++++ 2024/24xxx/CVE-2024-24759.json | 18 ++++++ 2024/24xxx/CVE-2024-24760.json | 18 ++++++ 2024/24xxx/CVE-2024-24761.json | 18 ++++++ 2024/24xxx/CVE-2024-24762.json | 18 ++++++ 2024/24xxx/CVE-2024-24763.json | 18 ++++++ 2024/24xxx/CVE-2024-24764.json | 18 ++++++ 2024/24xxx/CVE-2024-24765.json | 18 ++++++ 2024/24xxx/CVE-2024-24766.json | 18 ++++++ 2024/24xxx/CVE-2024-24767.json | 18 ++++++ 2024/24xxx/CVE-2024-24768.json | 18 ++++++ 2024/24xxx/CVE-2024-24769.json | 18 ++++++ 2024/24xxx/CVE-2024-24770.json | 18 ++++++ 2024/24xxx/CVE-2024-24771.json | 18 ++++++ 39 files changed, 1154 insertions(+), 32 deletions(-) create mode 100644 2024/1xxx/CVE-2024-1051.json create mode 100644 2024/1xxx/CVE-2024-1052.json create mode 100644 2024/1xxx/CVE-2024-1053.json create mode 100644 2024/1xxx/CVE-2024-1054.json create mode 100644 2024/24xxx/CVE-2024-24747.json create mode 100644 2024/24xxx/CVE-2024-24748.json create mode 100644 2024/24xxx/CVE-2024-24749.json create mode 100644 2024/24xxx/CVE-2024-24750.json create mode 100644 2024/24xxx/CVE-2024-24751.json create mode 100644 2024/24xxx/CVE-2024-24752.json create mode 100644 2024/24xxx/CVE-2024-24753.json create mode 100644 2024/24xxx/CVE-2024-24754.json create mode 100644 2024/24xxx/CVE-2024-24755.json create mode 100644 2024/24xxx/CVE-2024-24756.json create mode 100644 2024/24xxx/CVE-2024-24757.json create mode 100644 2024/24xxx/CVE-2024-24758.json create mode 100644 2024/24xxx/CVE-2024-24759.json create mode 100644 2024/24xxx/CVE-2024-24760.json create mode 100644 2024/24xxx/CVE-2024-24761.json create mode 100644 2024/24xxx/CVE-2024-24762.json create mode 100644 2024/24xxx/CVE-2024-24763.json create mode 100644 2024/24xxx/CVE-2024-24764.json create mode 100644 2024/24xxx/CVE-2024-24765.json create mode 100644 2024/24xxx/CVE-2024-24766.json create mode 100644 2024/24xxx/CVE-2024-24767.json create mode 100644 2024/24xxx/CVE-2024-24768.json create mode 100644 2024/24xxx/CVE-2024-24769.json create mode 100644 2024/24xxx/CVE-2024-24770.json create mode 100644 2024/24xxx/CVE-2024-24771.json diff --git a/2023/31xxx/CVE-2023-31445.json b/2023/31xxx/CVE-2023-31445.json index 66ae3a5daee..d12b3aa8445 100644 --- a/2023/31xxx/CVE-2023-31445.json +++ b/2023/31xxx/CVE-2023-31445.json @@ -64,8 +64,8 @@ }, { "refsource": "MISC", - "name": "https://www.swiruhack.online/cves/202331445/md.html", - "url": "https://www.swiruhack.online/cves/202331445/md.html" + "name": "https://blog.kscsc.online/cves/202331445/md.html", + "url": "https://blog.kscsc.online/cves/202331445/md.html" } ] } diff --git a/2023/35xxx/CVE-2023-35793.json b/2023/35xxx/CVE-2023-35793.json index 9595e04cd99..97ce9c88cbc 100644 --- a/2023/35xxx/CVE-2023-35793.json +++ b/2023/35xxx/CVE-2023-35793.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://github.com/Dodge-MPTC/CVE-2023-35793-CSRF-On-Web-SSH", "url": "https://github.com/Dodge-MPTC/CVE-2023-35793-CSRF-On-Web-SSH" + }, + { + "refsource": "MISC", + "name": "https://blog.kscsc.online/cves/202335793/md.html", + "url": "https://blog.kscsc.online/cves/202335793/md.html" } ] } diff --git a/2023/35xxx/CVE-2023-35794.json b/2023/35xxx/CVE-2023-35794.json index 68cc54d46f3..70a92bcf7da 100644 --- a/2023/35xxx/CVE-2023-35794.json +++ b/2023/35xxx/CVE-2023-35794.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://github.com/Dodge-MPTC/CVE-2023-35794-WebSSH-Hijacking", "url": "https://github.com/Dodge-MPTC/CVE-2023-35794-WebSSH-Hijacking" + }, + { + "refsource": "MISC", + "name": "https://blog.kscsc.online/cves/202335794/md.html", + "url": "https://blog.kscsc.online/cves/202335794/md.html" } ] } diff --git a/2023/49xxx/CVE-2023-49038.json b/2023/49xxx/CVE-2023-49038.json index b5ec61b68a3..f37d6f369b2 100644 --- a/2023/49xxx/CVE-2023-49038.json +++ b/2023/49xxx/CVE-2023-49038.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-49038", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-49038", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Command injection in the ping utility on Buffalo LS210D 1.78-0.03 allows a remote authenticated attacker to inject arbitrary commands onto the NAS as root." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/christopher-pace/CVE-2023-49038", + "url": "https://github.com/christopher-pace/CVE-2023-49038" } ] } diff --git a/2023/4xxx/CVE-2023-4550.json b/2023/4xxx/CVE-2023-4550.json index 21e260204aa..cb5ee1576bb 100644 --- a/2023/4xxx/CVE-2023-4550.json +++ b/2023/4xxx/CVE-2023-4550.json @@ -1,17 +1,116 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-4550", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@opentext.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Input Validation, Files or Directories Accessible to External Parties vulnerability in OpenText AppBuilder on Windows, Linux allows Probe System Files.\n\nAn unauthenticated or authenticated user can abuse a page of AppBuilder to read arbitrary files on the server on which it is hosted. \n\n\nThis issue affects AppBuilder: from 21.2 before 23.2.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-552 Files or Directories Accessible to External Parties", + "cweId": "CWE-552" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "OpenText", + "product": { + "product_data": [ + { + "product_name": "AppBuilder", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "23.2" + }, + { + "lessThan": "23.2", + "status": "affected", + "version": "21.2", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.opentext.com/csm?id=ot_kb_search&kb_category=61648712db61781068cfd6c4e296197b", + "refsource": "MISC", + "name": "https://support.opentext.com/csm?id=ot_kb_search&kb_category=61648712db61781068cfd6c4e296197b" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "George Mathias" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2023/4xxx/CVE-2023-4551.json b/2023/4xxx/CVE-2023-4551.json index 6c99b785507..d4f1205af6c 100644 --- a/2023/4xxx/CVE-2023-4551.json +++ b/2023/4xxx/CVE-2023-4551.json @@ -1,17 +1,107 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-4551", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@opentext.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Input Validation vulnerability in OpenText AppBuilder on Windows, Linux allows OS Command Injection.\n\nThe AppBuilder's Scheduler functionality that facilitates creation of scheduled tasks is vulnerable to command injection. This allows authenticated users to inject arbitrary operating system commands into the executing process.\n\n\nThis issue affects AppBuilder: from 21.2 before 23.2.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "OpenText", + "product": { + "product_data": [ + { + "product_name": "AppBuilder", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "23.2" + }, + { + "lessThan": "23.2", + "status": "affected", + "version": "21.2", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.opentext.com/csm?id=ot_kb_search&kb_category=61648712db61781068cfd6c4e296197b", + "refsource": "MISC", + "name": "https://support.opentext.com/csm?id=ot_kb_search&kb_category=61648712db61781068cfd6c4e296197b" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "George Mathias" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/4xxx/CVE-2023-4552.json b/2023/4xxx/CVE-2023-4552.json index 6c00a49dff5..9edad9924ad 100644 --- a/2023/4xxx/CVE-2023-4552.json +++ b/2023/4xxx/CVE-2023-4552.json @@ -1,17 +1,107 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-4552", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@opentext.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Input Validation vulnerability in OpenText AppBuilder on Windows, Linux allows Probe System Files.\n\nAn authenticated AppBuilder user with the ability to create or manage existing databases can leverage them to exploit the AppBuilder server - including access to its local file system.\n\n\nThis issue affects AppBuilder: from 21.2 before 23.2.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "OpenText", + "product": { + "product_data": [ + { + "product_name": "AppBuilder", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "23.2" + }, + { + "lessThan": "23.2", + "status": "affected", + "version": "21.2", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.opentext.com/csm?id=ot_kb_search&kb_category=61648712db61781068cfd6c4e296197b", + "refsource": "MISC", + "name": "https://support.opentext.com/csm?id=ot_kb_search&kb_category=61648712db61781068cfd6c4e296197b" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "George Mathias" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N", + "version": "3.1" } ] } diff --git a/2023/4xxx/CVE-2023-4553.json b/2023/4xxx/CVE-2023-4553.json index 016e21cd53c..145cf0fda06 100644 --- a/2023/4xxx/CVE-2023-4553.json +++ b/2023/4xxx/CVE-2023-4553.json @@ -1,17 +1,107 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-4553", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@opentext.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Input Validation vulnerability in OpenText AppBuilder on Windows, Linux allows Probe System Files.\n\n\nAppBuilder configuration files are viewable by unauthenticated users.\n\n\nThis issue affects AppBuilder: from 21.2 before 23.2.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "OpenText", + "product": { + "product_data": [ + { + "product_name": "AppBuilder", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "23.2" + }, + { + "lessThan": "23.2", + "status": "affected", + "version": "21.2", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.opentext.com/csm?id=ot_kb_search&kb_category=61648712db61781068cfd6c4e296197b", + "refsource": "MISC", + "name": "https://support.opentext.com/csm?id=ot_kb_search&kb_category=61648712db61781068cfd6c4e296197b" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "George Mathias" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" } ] } diff --git a/2023/4xxx/CVE-2023-4554.json b/2023/4xxx/CVE-2023-4554.json index 82025a7611e..0315b4b98b3 100644 --- a/2023/4xxx/CVE-2023-4554.json +++ b/2023/4xxx/CVE-2023-4554.json @@ -1,17 +1,107 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-4554", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@opentext.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Restriction of XML External Entity Reference vulnerability in OpenText AppBuilder on Windows, Linux allows Server Side Request Forgery, Probe System Files.\n\nAppBuilder's XML processor is vulnerable to XML External Entity Processing (XXE), allowing an authenticated user to upload specially crafted XML files to induce server-side request forgery, disclose files local to the server that processes them.\n\n\nThis issue affects AppBuilder: from 21.2 before 23.2.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-611 Improper Restriction of XML External Entity Reference", + "cweId": "CWE-611" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "OpenText", + "product": { + "product_data": [ + { + "product_name": "AppBuilder", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "23.2" + }, + { + "lessThan": "23.2", + "status": "affected", + "version": "21.2", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.opentext.com/csm?id=ot_kb_search&kb_category=61648712db61781068cfd6c4e296197b", + "refsource": "MISC", + "name": "https://support.opentext.com/csm?id=ot_kb_search&kb_category=61648712db61781068cfd6c4e296197b" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "George Mathias" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/1xxx/CVE-2024-1018.json b/2024/1xxx/CVE-2024-1018.json index 45ba0e49afb..98dac1e6d58 100644 --- a/2024/1xxx/CVE-2024-1018.json +++ b/2024/1xxx/CVE-2024-1018.json @@ -1,17 +1,104 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-1018", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as problematic has been found in PbootCMS 3.2.5-20230421. Affected is an unknown function of the file /admin.php?p=/Area/index#tab=t2. The manipulation of the argument name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252288." + }, + { + "lang": "deu", + "value": "Es wurde eine problematische Schwachstelle in PbootCMS 3.2.5-20230421 entdeckt. Dabei betrifft es einen unbekannter Codeteil der Datei /admin.php?p=/Area/index#tab=t2. Durch die Manipulation des Arguments name mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross Site Scripting", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "PbootCMS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.2.5-20230421" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.252288", + "refsource": "MISC", + "name": "https://vuldb.com/?id.252288" + }, + { + "url": "https://vuldb.com/?ctiid.252288", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.252288" + }, + { + "url": "https://github.com/1MurasaKi/PboostCMS_XSS/blob/main/README.md", + "refsource": "MISC", + "name": "https://github.com/1MurasaKi/PboostCMS_XSS/blob/main/README.md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Murasaki (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 2.4, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 2.4, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 3.3, + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N" } ] } diff --git a/2024/1xxx/CVE-2024-1051.json b/2024/1xxx/CVE-2024-1051.json new file mode 100644 index 00000000000..6864f9436c8 --- /dev/null +++ b/2024/1xxx/CVE-2024-1051.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1051", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1052.json b/2024/1xxx/CVE-2024-1052.json new file mode 100644 index 00000000000..7824fe7aceb --- /dev/null +++ b/2024/1xxx/CVE-2024-1052.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1052", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1053.json b/2024/1xxx/CVE-2024-1053.json new file mode 100644 index 00000000000..2e01cd5e3e1 --- /dev/null +++ b/2024/1xxx/CVE-2024-1053.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1053", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1054.json b/2024/1xxx/CVE-2024-1054.json new file mode 100644 index 00000000000..497f2a1ebc7 --- /dev/null +++ b/2024/1xxx/CVE-2024-1054.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1054", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24747.json b/2024/24xxx/CVE-2024-24747.json new file mode 100644 index 00000000000..01350114bf5 --- /dev/null +++ b/2024/24xxx/CVE-2024-24747.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24747", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24748.json b/2024/24xxx/CVE-2024-24748.json new file mode 100644 index 00000000000..722aeb70116 --- /dev/null +++ b/2024/24xxx/CVE-2024-24748.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24748", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24749.json b/2024/24xxx/CVE-2024-24749.json new file mode 100644 index 00000000000..b50d14ddc03 --- /dev/null +++ b/2024/24xxx/CVE-2024-24749.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24749", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24750.json b/2024/24xxx/CVE-2024-24750.json new file mode 100644 index 00000000000..e462c860492 --- /dev/null +++ b/2024/24xxx/CVE-2024-24750.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24750", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24751.json b/2024/24xxx/CVE-2024-24751.json new file mode 100644 index 00000000000..056aea9766f --- /dev/null +++ b/2024/24xxx/CVE-2024-24751.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24751", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24752.json b/2024/24xxx/CVE-2024-24752.json new file mode 100644 index 00000000000..ee5e424c4a2 --- /dev/null +++ b/2024/24xxx/CVE-2024-24752.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24752", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24753.json b/2024/24xxx/CVE-2024-24753.json new file mode 100644 index 00000000000..0abb85bb660 --- /dev/null +++ b/2024/24xxx/CVE-2024-24753.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24753", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24754.json b/2024/24xxx/CVE-2024-24754.json new file mode 100644 index 00000000000..70ab1a962fe --- /dev/null +++ b/2024/24xxx/CVE-2024-24754.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24754", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24755.json b/2024/24xxx/CVE-2024-24755.json new file mode 100644 index 00000000000..ff6602bb61b --- /dev/null +++ b/2024/24xxx/CVE-2024-24755.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24755", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24756.json b/2024/24xxx/CVE-2024-24756.json new file mode 100644 index 00000000000..d23f45c7ad1 --- /dev/null +++ b/2024/24xxx/CVE-2024-24756.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24756", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24757.json b/2024/24xxx/CVE-2024-24757.json new file mode 100644 index 00000000000..6159b26a9b5 --- /dev/null +++ b/2024/24xxx/CVE-2024-24757.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24757", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24758.json b/2024/24xxx/CVE-2024-24758.json new file mode 100644 index 00000000000..c6140cad213 --- /dev/null +++ b/2024/24xxx/CVE-2024-24758.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24758", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24759.json b/2024/24xxx/CVE-2024-24759.json new file mode 100644 index 00000000000..33345d7144e --- /dev/null +++ b/2024/24xxx/CVE-2024-24759.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24759", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24760.json b/2024/24xxx/CVE-2024-24760.json new file mode 100644 index 00000000000..a94077dba02 --- /dev/null +++ b/2024/24xxx/CVE-2024-24760.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24760", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24761.json b/2024/24xxx/CVE-2024-24761.json new file mode 100644 index 00000000000..5d2667e9ea3 --- /dev/null +++ b/2024/24xxx/CVE-2024-24761.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24761", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24762.json b/2024/24xxx/CVE-2024-24762.json new file mode 100644 index 00000000000..4eee6d14b00 --- /dev/null +++ b/2024/24xxx/CVE-2024-24762.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24762", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24763.json b/2024/24xxx/CVE-2024-24763.json new file mode 100644 index 00000000000..d9355a223f9 --- /dev/null +++ b/2024/24xxx/CVE-2024-24763.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24763", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24764.json b/2024/24xxx/CVE-2024-24764.json new file mode 100644 index 00000000000..7d6076285af --- /dev/null +++ b/2024/24xxx/CVE-2024-24764.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24764", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24765.json b/2024/24xxx/CVE-2024-24765.json new file mode 100644 index 00000000000..ed18d58cae5 --- /dev/null +++ b/2024/24xxx/CVE-2024-24765.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24765", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24766.json b/2024/24xxx/CVE-2024-24766.json new file mode 100644 index 00000000000..2fa84735f43 --- /dev/null +++ b/2024/24xxx/CVE-2024-24766.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24766", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24767.json b/2024/24xxx/CVE-2024-24767.json new file mode 100644 index 00000000000..ec09f19512c --- /dev/null +++ b/2024/24xxx/CVE-2024-24767.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24767", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24768.json b/2024/24xxx/CVE-2024-24768.json new file mode 100644 index 00000000000..def6439e040 --- /dev/null +++ b/2024/24xxx/CVE-2024-24768.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24768", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24769.json b/2024/24xxx/CVE-2024-24769.json new file mode 100644 index 00000000000..0bd2c1e09f3 --- /dev/null +++ b/2024/24xxx/CVE-2024-24769.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24769", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24770.json b/2024/24xxx/CVE-2024-24770.json new file mode 100644 index 00000000000..9837b7b1749 --- /dev/null +++ b/2024/24xxx/CVE-2024-24770.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24770", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24771.json b/2024/24xxx/CVE-2024-24771.json new file mode 100644 index 00000000000..e48b2ef3819 --- /dev/null +++ b/2024/24xxx/CVE-2024-24771.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24771", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file