diff --git a/2022/1xxx/CVE-2022-1443.json b/2022/1xxx/CVE-2022-1443.json index ba144465da9..6e5aa42dff6 100644 --- a/2022/1xxx/CVE-2022-1443.json +++ b/2022/1xxx/CVE-2022-1443.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-1443", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-1789. Reason: This candidate is a reservation duplicate of CVE-2024-1789. Notes: All CVE users should reference CVE-2024-1789 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ] } diff --git a/2022/4xxx/CVE-2022-4404.json b/2022/4xxx/CVE-2022-4404.json index 66009e099ed..2e595970755 100644 --- a/2022/4xxx/CVE-2022-4404.json +++ b/2022/4xxx/CVE-2022-4404.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4404", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage." } ] } diff --git a/2022/4xxx/CVE-2022-4411.json b/2022/4xxx/CVE-2022-4411.json index 2a5b47518dd..b586af4af72 100644 --- a/2022/4xxx/CVE-2022-4411.json +++ b/2022/4xxx/CVE-2022-4411.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4411", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage." } ] } diff --git a/2022/4xxx/CVE-2022-4425.json b/2022/4xxx/CVE-2022-4425.json index 92f57d63acd..e7845eb67e4 100644 --- a/2022/4xxx/CVE-2022-4425.json +++ b/2022/4xxx/CVE-2022-4425.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4425", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage." } ] } diff --git a/2024/3xxx/CVE-2024-3154.json b/2024/3xxx/CVE-2024-3154.json index c2f693f866e..f9ade3567b5 100644 --- a/2024/3xxx/CVE-2024-3154.json +++ b/2024/3xxx/CVE-2024-3154.json @@ -86,7 +86,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.27.6-2.rhaos4.14.gitb3bd0bf.el8", + "version": "0:1.27.6-2.rhaos4.14.gitb3bd0bf.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -107,7 +107,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.28.6-2.rhaos4.15.git77bbb1c.el9", + "version": "0:1.28.6-2.rhaos4.15.git77bbb1c.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" diff --git a/2024/42xxx/CVE-2024-42633.json b/2024/42xxx/CVE-2024-42633.json index 4f7462caa8a..c8479da6581 100644 --- a/2024/42xxx/CVE-2024-42633.json +++ b/2024/42xxx/CVE-2024-42633.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-42633", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-42633", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Command Injection vulnerability exists in the do_upgrade_post function of the httpd binary in Linksys E1500 v1.0.06.001. As a result, an authenticated attacker can execute OS commands with root privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/goldds96/Report/blob/main/Linksys/E1500/CI.md", + "refsource": "MISC", + "name": "https://github.com/goldds96/Report/blob/main/Linksys/E1500/CI.md" } ] } diff --git a/2024/44xxx/CVE-2024-44076.json b/2024/44xxx/CVE-2024-44076.json index 574b508f046..0b3202e36f5 100644 --- a/2024/44xxx/CVE-2024-44076.json +++ b/2024/44xxx/CVE-2024-44076.json @@ -61,6 +61,11 @@ "url": "https://github.com/microcks/microcks/compare/1.9.1-fix-1...1.10.0", "refsource": "MISC", "name": "https://github.com/microcks/microcks/compare/1.9.1-fix-1...1.10.0" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/microcks/microcks/releases/tag/1.10.0", + "url": "https://github.com/microcks/microcks/releases/tag/1.10.0" } ] } diff --git a/2024/6xxx/CVE-2024-6348.json b/2024/6xxx/CVE-2024-6348.json index 27f9f452df7..85cb9ff85c8 100644 --- a/2024/6xxx/CVE-2024-6348.json +++ b/2024/6xxx/CVE-2024-6348.json @@ -1,18 +1,84 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-6348", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@asrg.io", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Predictable seed generation in the security access mechanism of UDS in the Blind Spot Protection Sensor ECU in Nissan Altima (2022) allows attackers to predict the requested seeds and bypass security controls via repeated ECU resets and seed requests." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-330: Use of Insufficiently Random Values", + "cweId": "CWE-330" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Nissan", + "product": { + "product_data": [ + { + "product_name": "Altima", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unknown", + "version": "Altima 2022" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://asrg.io/security-advisories/", + "refsource": "MISC", + "name": "https://asrg.io/security-advisories/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Thomas Sermpinis" + } + ] } \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7942.json b/2024/7xxx/CVE-2024-7942.json new file mode 100644 index 00000000000..6480c4def05 --- /dev/null +++ b/2024/7xxx/CVE-2024-7942.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7942", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7943.json b/2024/7xxx/CVE-2024-7943.json new file mode 100644 index 00000000000..1faad023f61 --- /dev/null +++ b/2024/7xxx/CVE-2024-7943.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7943", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7944.json b/2024/7xxx/CVE-2024-7944.json new file mode 100644 index 00000000000..8366f056f51 --- /dev/null +++ b/2024/7xxx/CVE-2024-7944.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7944", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7945.json b/2024/7xxx/CVE-2024-7945.json new file mode 100644 index 00000000000..c26bc8cbf7b --- /dev/null +++ b/2024/7xxx/CVE-2024-7945.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7945", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7946.json b/2024/7xxx/CVE-2024-7946.json new file mode 100644 index 00000000000..ceac9db9875 --- /dev/null +++ b/2024/7xxx/CVE-2024-7946.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7946", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7947.json b/2024/7xxx/CVE-2024-7947.json new file mode 100644 index 00000000000..26aa78b8b11 --- /dev/null +++ b/2024/7xxx/CVE-2024-7947.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7947", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7948.json b/2024/7xxx/CVE-2024-7948.json new file mode 100644 index 00000000000..76ce50a2e54 --- /dev/null +++ b/2024/7xxx/CVE-2024-7948.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7948", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7949.json b/2024/7xxx/CVE-2024-7949.json new file mode 100644 index 00000000000..887d849ee73 --- /dev/null +++ b/2024/7xxx/CVE-2024-7949.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7949", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file