From ba12c6f9324f46cf3f9ca8ad6665ba1429511e82 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Jul 2024 19:00:33 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/39xxx/CVE-2024-39036.json | 56 +++++++++++++++++++++++++++---- 2024/40xxx/CVE-2024-40129.json | 61 ++++++++++++++++++++++++++++++---- 2024/40xxx/CVE-2024-40130.json | 61 ++++++++++++++++++++++++++++++---- 2024/40xxx/CVE-2024-40392.json | 56 +++++++++++++++++++++++++++---- 2024/40xxx/CVE-2024-40393.json | 56 +++++++++++++++++++++++++++---- 2024/40xxx/CVE-2024-40394.json | 56 +++++++++++++++++++++++++++---- 2024/6xxx/CVE-2024-6492.json | 60 ++++++++++++++++++++++++++++++--- 2024/6xxx/CVE-2024-6797.json | 18 ++++++++++ 2024/6xxx/CVE-2024-6798.json | 18 ++++++++++ 2024/6xxx/CVE-2024-6799.json | 18 ++++++++++ 10 files changed, 420 insertions(+), 40 deletions(-) create mode 100644 2024/6xxx/CVE-2024-6797.json create mode 100644 2024/6xxx/CVE-2024-6798.json create mode 100644 2024/6xxx/CVE-2024-6799.json diff --git a/2024/39xxx/CVE-2024-39036.json b/2024/39xxx/CVE-2024-39036.json index 7603ceee498..d7c31d11ece 100644 --- a/2024/39xxx/CVE-2024-39036.json +++ b/2024/39xxx/CVE-2024-39036.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-39036", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-39036", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SeaCMS v12.9 is vulnerable to Arbitrary File Read via admin_safe.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://github.com/seacms-net/CMS/issues/18", + "url": "https://github.com/seacms-net/CMS/issues/18" } ] } diff --git a/2024/40xxx/CVE-2024-40129.json b/2024/40xxx/CVE-2024-40129.json index e806bb2ba62..a853cccfab3 100644 --- a/2024/40xxx/CVE-2024-40129.json +++ b/2024/40xxx/CVE-2024-40129.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-40129", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-40129", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Open5GS v2.6.4 is vulnerable to Buffer Overflow. via /lib/pfcp/context.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/open5gs/open5gs/issues/2585", + "refsource": "MISC", + "name": "https://github.com/open5gs/open5gs/issues/2585" + }, + { + "url": "https://github.com/open5gs/open5gs/commit/2fbc445d32aa7749166396a9c055a199f90a1b01", + "refsource": "MISC", + "name": "https://github.com/open5gs/open5gs/commit/2fbc445d32aa7749166396a9c055a199f90a1b01" } ] } diff --git a/2024/40xxx/CVE-2024-40130.json b/2024/40xxx/CVE-2024-40130.json index 9a73e502914..35dcc87a60b 100644 --- a/2024/40xxx/CVE-2024-40130.json +++ b/2024/40xxx/CVE-2024-40130.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-40130", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-40130", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "open5gs v2.6.4 is vulnerable to Buffer Overflow. via /lib/core/abts.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/open5gs/open5gs/issues/2577", + "refsource": "MISC", + "name": "https://github.com/open5gs/open5gs/issues/2577" + }, + { + "url": "https://github.com/open5gs/open5gs/commit/2f8ae91b0b9467f94f128090c88cae91bd73e008", + "refsource": "MISC", + "name": "https://github.com/open5gs/open5gs/commit/2f8ae91b0b9467f94f128090c88cae91bd73e008" } ] } diff --git a/2024/40xxx/CVE-2024-40392.json b/2024/40xxx/CVE-2024-40392.json index 58651b7edcb..6b2b60b38be 100644 --- a/2024/40xxx/CVE-2024-40392.json +++ b/2024/40xxx/CVE-2024-40392.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-40392", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-40392", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SourceCodester Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code 1.0 was discovered to contain a SQL injection vulnerability via the name parameter under addnew.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/CveSecLook/cve/issues/46", + "refsource": "MISC", + "name": "https://github.com/CveSecLook/cve/issues/46" } ] } diff --git a/2024/40xxx/CVE-2024-40393.json b/2024/40xxx/CVE-2024-40393.json index 73372200b3d..a96d26c4688 100644 --- a/2024/40xxx/CVE-2024-40393.json +++ b/2024/40xxx/CVE-2024-40393.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-40393", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-40393", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Online Clinic Management System In PHP With Free Source code v1.0 was discovered to contain a SQL injection vulnerability via the user parameter at login.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/CveSecLook/cve/issues/47", + "refsource": "MISC", + "name": "https://github.com/CveSecLook/cve/issues/47" } ] } diff --git a/2024/40xxx/CVE-2024-40394.json b/2024/40xxx/CVE-2024-40394.json index 72ee3d31213..5fa5962287a 100644 --- a/2024/40xxx/CVE-2024-40394.json +++ b/2024/40xxx/CVE-2024-40394.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-40394", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-40394", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Simple Library Management System Project Using PHP/MySQL v1.0 was discovered to contain an arbitrary file upload vulnerability via the component ajax.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/CveSecLook/cve/issues/48", + "refsource": "MISC", + "name": "https://github.com/CveSecLook/cve/issues/48" } ] } diff --git a/2024/6xxx/CVE-2024-6492.json b/2024/6xxx/CVE-2024-6492.json index a9c9b1bfa89..7a7d0959179 100644 --- a/2024/6xxx/CVE-2024-6492.json +++ b/2024/6xxx/CVE-2024-6492.json @@ -1,18 +1,70 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-6492", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@devolutions.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Exposure of Sensitive Information in edge browser session proxy feature in Devolutions Remote Desktop Manager 2024.2.14.0 and earlier on Windows allows an attacker to intercept proxy credentials via a specially crafted website." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Devolutions", + "product": { + "product_data": [ + { + "product_name": "Remote Desktop Manager", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "0", + "version_value": "2024.2.14.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://devolutions.net/security/advisories/DEVO-2024-0012", + "refsource": "MISC", + "name": "https://devolutions.net/security/advisories/DEVO-2024-0012" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6797.json b/2024/6xxx/CVE-2024-6797.json new file mode 100644 index 00000000000..8a1e9123f8e --- /dev/null +++ b/2024/6xxx/CVE-2024-6797.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6797", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6798.json b/2024/6xxx/CVE-2024-6798.json new file mode 100644 index 00000000000..8f9b930a96f --- /dev/null +++ b/2024/6xxx/CVE-2024-6798.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6798", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6799.json b/2024/6xxx/CVE-2024-6799.json new file mode 100644 index 00000000000..c1036951124 --- /dev/null +++ b/2024/6xxx/CVE-2024-6799.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6799", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file