From ad16e5d1d1d9769be949e8929ff525825867f42b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Jan 2024 03:00:38 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2016/20xxx/CVE-2016-20021.json | 18 +++++++ 2021/42xxx/CVE-2021-42260.json | 5 ++ 2022/48xxx/CVE-2022-48619.json | 67 ++++++++++++++++++++++++ 2022/4xxx/CVE-2022-4960.json | 95 ++++++++++++++++++++++++++++++++-- 2023/34xxx/CVE-2023-34194.json | 5 ++ 2023/51xxx/CVE-2023-51766.json | 10 ++++ 2024/0xxx/CVE-2024-0455.json | 18 +++++++ 2024/23xxx/CVE-2024-23162.json | 18 +++++++ 2024/23xxx/CVE-2024-23163.json | 18 +++++++ 2024/23xxx/CVE-2024-23164.json | 18 +++++++ 2024/23xxx/CVE-2024-23165.json | 18 +++++++ 2024/23xxx/CVE-2024-23166.json | 18 +++++++ 2024/23xxx/CVE-2024-23167.json | 18 +++++++ 13 files changed, 322 insertions(+), 4 deletions(-) create mode 100644 2016/20xxx/CVE-2016-20021.json create mode 100644 2022/48xxx/CVE-2022-48619.json create mode 100644 2024/0xxx/CVE-2024-0455.json create mode 100644 2024/23xxx/CVE-2024-23162.json create mode 100644 2024/23xxx/CVE-2024-23163.json create mode 100644 2024/23xxx/CVE-2024-23164.json create mode 100644 2024/23xxx/CVE-2024-23165.json create mode 100644 2024/23xxx/CVE-2024-23166.json create mode 100644 2024/23xxx/CVE-2024-23167.json diff --git a/2016/20xxx/CVE-2016-20021.json b/2016/20xxx/CVE-2016-20021.json new file mode 100644 index 00000000000..eff54fdc16a --- /dev/null +++ b/2016/20xxx/CVE-2016-20021.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-20021", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42260.json b/2021/42xxx/CVE-2021-42260.json index a18062e44e5..8637031bfb5 100644 --- a/2021/42xxx/CVE-2021-42260.json +++ b/2021/42xxx/CVE-2021-42260.json @@ -71,6 +71,11 @@ "refsource": "FEDORA", "name": "FEDORA-2024-80e6578a01", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QCR5PIOBGDIDS6SYRESTMDJSEDFSCOE/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2024-c9dc0ac419", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOMBSHRIW5Q34SQSXYURYAOYDZD2NQF6/" } ] } diff --git a/2022/48xxx/CVE-2022-48619.json b/2022/48xxx/CVE-2022-48619.json new file mode 100644 index 00000000000..add789f2942 --- /dev/null +++ b/2022/48xxx/CVE-2022-48619.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2022-48619", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in drivers/input/input.c in the Linux kernel before 5.17.10. An attacker can cause a denial of service (panic) because input_set_capability mishandles the situation in which an event code falls outside of a bitmap." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/torvalds/linux/commit/409353cbe9fe48f6bc196114c442b1cff05a39bc", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/409353cbe9fe48f6bc196114c442b1cff05a39bc" + }, + { + "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.10", + "refsource": "MISC", + "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.10" + } + ] + } +} \ No newline at end of file diff --git a/2022/4xxx/CVE-2022-4960.json b/2022/4xxx/CVE-2022-4960.json index a0f957ee759..2aeda33b004 100644 --- a/2022/4xxx/CVE-2022-4960.json +++ b/2022/4xxx/CVE-2022-4960.json @@ -1,17 +1,104 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4960", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability, which was classified as problematic, has been found in cloudfavorites favorites-web 1.3.0. Affected by this issue is some unknown functionality of the component Nickname Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250238 is the identifier assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "Eine problematische Schwachstelle wurde in cloudfavorites favorites-web 1.3.0 entdeckt. Betroffen davon ist ein unbekannter Prozess der Komponente Nickname Handler. Durch Beeinflussen mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross Site Scripting", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "cloudfavorites", + "product": { + "product_data": [ + { + "product_name": "favorites-web", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.3.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.250238", + "refsource": "MISC", + "name": "https://vuldb.com/?id.250238" + }, + { + "url": "https://vuldb.com/?ctiid.250238", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.250238" + }, + { + "url": "https://github.com/cloudfavorites/favorites-web/issues/127", + "refsource": "MISC", + "name": "https://github.com/cloudfavorites/favorites-web/issues/127" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "puppy (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 3.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 3.5, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N" } ] } diff --git a/2023/34xxx/CVE-2023-34194.json b/2023/34xxx/CVE-2023-34194.json index b1d0fb3db77..5c36cb38cf9 100644 --- a/2023/34xxx/CVE-2023-34194.json +++ b/2023/34xxx/CVE-2023-34194.json @@ -71,6 +71,11 @@ "refsource": "FEDORA", "name": "FEDORA-2024-80e6578a01", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QCR5PIOBGDIDS6SYRESTMDJSEDFSCOE/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2024-c9dc0ac419", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOMBSHRIW5Q34SQSXYURYAOYDZD2NQF6/" } ] } diff --git a/2023/51xxx/CVE-2023-51766.json b/2023/51xxx/CVE-2023-51766.json index 121ec220ba6..2eb70c56d5a 100644 --- a/2023/51xxx/CVE-2023-51766.json +++ b/2023/51xxx/CVE-2023-51766.json @@ -136,6 +136,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20240105 [SECURITY] [DLA 3708-1] exim4 security update", "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2024-1ef6197a49", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2024-e0841c83bb", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/" } ] } diff --git a/2024/0xxx/CVE-2024-0455.json b/2024/0xxx/CVE-2024-0455.json new file mode 100644 index 00000000000..9406dc5bc93 --- /dev/null +++ b/2024/0xxx/CVE-2024-0455.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0455", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23162.json b/2024/23xxx/CVE-2024-23162.json new file mode 100644 index 00000000000..81c20064c09 --- /dev/null +++ b/2024/23xxx/CVE-2024-23162.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23162", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23163.json b/2024/23xxx/CVE-2024-23163.json new file mode 100644 index 00000000000..5df3b0246a3 --- /dev/null +++ b/2024/23xxx/CVE-2024-23163.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23163", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23164.json b/2024/23xxx/CVE-2024-23164.json new file mode 100644 index 00000000000..2298cae1d47 --- /dev/null +++ b/2024/23xxx/CVE-2024-23164.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23164", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23165.json b/2024/23xxx/CVE-2024-23165.json new file mode 100644 index 00000000000..aed55302e61 --- /dev/null +++ b/2024/23xxx/CVE-2024-23165.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23165", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23166.json b/2024/23xxx/CVE-2024-23166.json new file mode 100644 index 00000000000..771b05b7b74 --- /dev/null +++ b/2024/23xxx/CVE-2024-23166.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23166", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23167.json b/2024/23xxx/CVE-2024-23167.json new file mode 100644 index 00000000000..4fb9b88ae97 --- /dev/null +++ b/2024/23xxx/CVE-2024-23167.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23167", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file