From bbe65f0a76c9b5d795b6d937d05af0292b0913f7 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 18 Oct 2024 20:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/10xxx/CVE-2024-10122.json | 95 +++++++++++++++++++++++++++-- 2024/10xxx/CVE-2024-10123.json | 105 +++++++++++++++++++++++++++++++-- 2024/10xxx/CVE-2024-10151.json | 18 ++++++ 2024/10xxx/CVE-2024-10152.json | 18 ++++++ 2024/10xxx/CVE-2024-10153.json | 18 ++++++ 2024/10xxx/CVE-2024-10154.json | 18 ++++++ 2024/10xxx/CVE-2024-10155.json | 18 ++++++ 2024/10xxx/CVE-2024-10156.json | 18 ++++++ 2024/10xxx/CVE-2024-10157.json | 18 ++++++ 2024/10xxx/CVE-2024-10158.json | 18 ++++++ 2024/10xxx/CVE-2024-10159.json | 18 ++++++ 2024/10xxx/CVE-2024-10160.json | 18 ++++++ 2024/10xxx/CVE-2024-10161.json | 18 ++++++ 2024/10xxx/CVE-2024-10162.json | 18 ++++++ 2024/10xxx/CVE-2024-10163.json | 18 ++++++ 2024/10xxx/CVE-2024-10164.json | 18 ++++++ 2024/10xxx/CVE-2024-10165.json | 18 ++++++ 2024/10xxx/CVE-2024-10166.json | 18 ++++++ 2024/10xxx/CVE-2024-10167.json | 18 ++++++ 2024/10xxx/CVE-2024-10168.json | 18 ++++++ 2024/10xxx/CVE-2024-10169.json | 18 ++++++ 2024/10xxx/CVE-2024-10170.json | 18 ++++++ 2024/10xxx/CVE-2024-10171.json | 18 ++++++ 2024/10xxx/CVE-2024-10172.json | 18 ++++++ 2024/10xxx/CVE-2024-10173.json | 18 ++++++ 2024/9xxx/CVE-2024-9180.json | 6 +- 2024/9xxx/CVE-2024-9537.json | 5 ++ 27 files changed, 614 insertions(+), 11 deletions(-) create mode 100644 2024/10xxx/CVE-2024-10151.json create mode 100644 2024/10xxx/CVE-2024-10152.json create mode 100644 2024/10xxx/CVE-2024-10153.json create mode 100644 2024/10xxx/CVE-2024-10154.json create mode 100644 2024/10xxx/CVE-2024-10155.json create mode 100644 2024/10xxx/CVE-2024-10156.json create mode 100644 2024/10xxx/CVE-2024-10157.json create mode 100644 2024/10xxx/CVE-2024-10158.json create mode 100644 2024/10xxx/CVE-2024-10159.json create mode 100644 2024/10xxx/CVE-2024-10160.json create mode 100644 2024/10xxx/CVE-2024-10161.json create mode 100644 2024/10xxx/CVE-2024-10162.json create mode 100644 2024/10xxx/CVE-2024-10163.json create mode 100644 2024/10xxx/CVE-2024-10164.json create mode 100644 2024/10xxx/CVE-2024-10165.json create mode 100644 2024/10xxx/CVE-2024-10166.json create mode 100644 2024/10xxx/CVE-2024-10167.json create mode 100644 2024/10xxx/CVE-2024-10168.json create mode 100644 2024/10xxx/CVE-2024-10169.json create mode 100644 2024/10xxx/CVE-2024-10170.json create mode 100644 2024/10xxx/CVE-2024-10171.json create mode 100644 2024/10xxx/CVE-2024-10172.json create mode 100644 2024/10xxx/CVE-2024-10173.json diff --git a/2024/10xxx/CVE-2024-10122.json b/2024/10xxx/CVE-2024-10122.json index 661fbd019c2..d5ee1b49694 100644 --- a/2024/10xxx/CVE-2024-10122.json +++ b/2024/10xxx/CVE-2024-10122.json @@ -1,17 +1,104 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10122", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Topdata Inner Rep Plus WebServer 2.01. It has been classified as problematic. Affected is an unknown function of the file /InnerRepPlus.html of the component Operator Details Form. The manipulation leads to missing password field masking. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Es wurde eine problematische Schwachstelle in Topdata Inner Rep Plus WebServer 2.01 ausgemacht. Betroffen hiervon ist ein unbekannter Ablauf der Datei /InnerRepPlus.html der Komponente Operator Details Form. Durch das Manipulieren mit unbekannten Daten kann eine missing password field masking-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Missing Password Field Masking", + "cweId": "CWE-549" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Topdata", + "product": { + "product_data": [ + { + "product_name": "Inner Rep Plus WebServer", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.01" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.280914", + "refsource": "MISC", + "name": "https://vuldb.com/?id.280914" + }, + { + "url": "https://vuldb.com/?ctiid.280914", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.280914" + }, + { + "url": "https://vuldb.com/?submit.421292", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.421292" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "j369 (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 2.7, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 2.7, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 3.3, + "vectorString": "AV:N/AC:L/Au:M/C:P/I:N/A:N" } ] } diff --git a/2024/10xxx/CVE-2024-10123.json b/2024/10xxx/CVE-2024-10123.json index 562cf5d72d9..65c5ce65519 100644 --- a/2024/10xxx/CVE-2024-10123.json +++ b/2024/10xxx/CVE-2024-10123.json @@ -1,17 +1,114 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10123", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Tenda AC8 16.03.34.06. It has been declared as critical. Affected by this vulnerability is the function compare_parentcontrol_time of the file /goform/saveParentControlInfo. The manipulation of the argument time leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This is not the same issue like CVE-2023-33671. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "In Tenda AC8 16.03.34.06 wurde eine kritische Schwachstelle ausgemacht. Es geht um die Funktion compare_parentcontrol_time der Datei /goform/saveParentControlInfo. Durch Manipulieren des Arguments time mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Stack-based Buffer Overflow", + "cweId": "CWE-121" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Tenda", + "product": { + "product_data": [ + { + "product_name": "AC8", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "16.03.34.06" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.280915", + "refsource": "MISC", + "name": "https://vuldb.com/?id.280915" + }, + { + "url": "https://vuldb.com/?ctiid.280915", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.280915" + }, + { + "url": "https://vuldb.com/?submit.421340", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.421340" + }, + { + "url": "https://github.com/JohenanLi/router_vuls/blob/main/ac8v4/compare_parentcontrol_time_vul.md", + "refsource": "MISC", + "name": "https://github.com/JohenanLi/router_vuls/blob/main/ac8v4/compare_parentcontrol_time_vul.md" + }, + { + "url": "https://www.tenda.com.cn/", + "refsource": "MISC", + "name": "https://www.tenda.com.cn/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "minipython (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 8.8, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 8.8, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 9, + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C" } ] } diff --git a/2024/10xxx/CVE-2024-10151.json b/2024/10xxx/CVE-2024-10151.json new file mode 100644 index 00000000000..76087abbc08 --- /dev/null +++ b/2024/10xxx/CVE-2024-10151.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10151", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10152.json b/2024/10xxx/CVE-2024-10152.json new file mode 100644 index 00000000000..d38c6667a3c --- /dev/null +++ b/2024/10xxx/CVE-2024-10152.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10152", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10153.json b/2024/10xxx/CVE-2024-10153.json new file mode 100644 index 00000000000..0f739fbca9a --- /dev/null +++ b/2024/10xxx/CVE-2024-10153.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10153", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10154.json b/2024/10xxx/CVE-2024-10154.json new file mode 100644 index 00000000000..2d8eca2288f --- /dev/null +++ b/2024/10xxx/CVE-2024-10154.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10154", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10155.json b/2024/10xxx/CVE-2024-10155.json new file mode 100644 index 00000000000..db420f08e11 --- /dev/null +++ b/2024/10xxx/CVE-2024-10155.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10155", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10156.json b/2024/10xxx/CVE-2024-10156.json new file mode 100644 index 00000000000..e50992c704a --- /dev/null +++ b/2024/10xxx/CVE-2024-10156.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10156", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10157.json b/2024/10xxx/CVE-2024-10157.json new file mode 100644 index 00000000000..551c28b9890 --- /dev/null +++ b/2024/10xxx/CVE-2024-10157.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10157", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10158.json b/2024/10xxx/CVE-2024-10158.json new file mode 100644 index 00000000000..3446bb670fe --- /dev/null +++ b/2024/10xxx/CVE-2024-10158.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10158", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10159.json b/2024/10xxx/CVE-2024-10159.json new file mode 100644 index 00000000000..5acfde312e1 --- /dev/null +++ b/2024/10xxx/CVE-2024-10159.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10159", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10160.json b/2024/10xxx/CVE-2024-10160.json new file mode 100644 index 00000000000..16db697c3ad --- /dev/null +++ b/2024/10xxx/CVE-2024-10160.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10160", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10161.json b/2024/10xxx/CVE-2024-10161.json new file mode 100644 index 00000000000..ab5b83ed7f6 --- /dev/null +++ b/2024/10xxx/CVE-2024-10161.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10161", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10162.json b/2024/10xxx/CVE-2024-10162.json new file mode 100644 index 00000000000..ec9a85f6d87 --- /dev/null +++ b/2024/10xxx/CVE-2024-10162.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10162", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10163.json b/2024/10xxx/CVE-2024-10163.json new file mode 100644 index 00000000000..6efca40a30f --- /dev/null +++ b/2024/10xxx/CVE-2024-10163.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10163", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10164.json b/2024/10xxx/CVE-2024-10164.json new file mode 100644 index 00000000000..3f153aadeff --- /dev/null +++ b/2024/10xxx/CVE-2024-10164.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10164", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10165.json b/2024/10xxx/CVE-2024-10165.json new file mode 100644 index 00000000000..3b236430133 --- /dev/null +++ b/2024/10xxx/CVE-2024-10165.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10165", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10166.json b/2024/10xxx/CVE-2024-10166.json new file mode 100644 index 00000000000..4bcbea15565 --- /dev/null +++ b/2024/10xxx/CVE-2024-10166.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10166", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10167.json b/2024/10xxx/CVE-2024-10167.json new file mode 100644 index 00000000000..6858dc14166 --- /dev/null +++ b/2024/10xxx/CVE-2024-10167.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10167", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10168.json b/2024/10xxx/CVE-2024-10168.json new file mode 100644 index 00000000000..2ec232c75dd --- /dev/null +++ b/2024/10xxx/CVE-2024-10168.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10168", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10169.json b/2024/10xxx/CVE-2024-10169.json new file mode 100644 index 00000000000..04a159f8524 --- /dev/null +++ b/2024/10xxx/CVE-2024-10169.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10169", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10170.json b/2024/10xxx/CVE-2024-10170.json new file mode 100644 index 00000000000..fa42fd2900c --- /dev/null +++ b/2024/10xxx/CVE-2024-10170.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10170", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10171.json b/2024/10xxx/CVE-2024-10171.json new file mode 100644 index 00000000000..10b8a0e2c54 --- /dev/null +++ b/2024/10xxx/CVE-2024-10171.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10171", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10172.json b/2024/10xxx/CVE-2024-10172.json new file mode 100644 index 00000000000..23a79d2dff1 --- /dev/null +++ b/2024/10xxx/CVE-2024-10172.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10172", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10173.json b/2024/10xxx/CVE-2024-10173.json new file mode 100644 index 00000000000..c54ccda579e --- /dev/null +++ b/2024/10xxx/CVE-2024-10173.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10173", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/9xxx/CVE-2024-9180.json b/2024/9xxx/CVE-2024-9180.json index 718d294b171..8342bcadccf 100644 --- a/2024/9xxx/CVE-2024-9180.json +++ b/2024/9xxx/CVE-2024-9180.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A privileged Vault operator with write permissions to the root namespace\u2019s identity endpoint could escalate their privileges to Vault\u2019s root policy. Fixed in Vault Community Edition 1.18.0 and Vault Enterprise 1.18.0, 1.17.7, 1.16.11, and 1.15.16." + "value": "A privileged Vault operator with write permissions to the root namespace\u2019s identity endpoint could escalate their own or another user\u2019s privileges to Vault\u2019s root policy. Fixed in Vault Community Edition 1.18.0 and Vault Enterprise 1.18.0, 1.17.7, 1.16.11, and 1.15.16." } ] }, @@ -41,7 +41,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "1.7.7", + "version_name": "0.10.4", "version_value": "1.18.0" } ] @@ -72,7 +72,7 @@ ], "lessThan": "1.18.0", "status": "affected", - "version": "1.7.7", + "version": "0.10.4", "versionType": "semver" } ], diff --git a/2024/9xxx/CVE-2024-9537.json b/2024/9xxx/CVE-2024-9537.json index b547c0165b5..9939fc9677d 100644 --- a/2024/9xxx/CVE-2024-9537.json +++ b/2024/9xxx/CVE-2024-9537.json @@ -88,6 +88,11 @@ "url": "https://support.sciencelogic.com/s/article/15527", "refsource": "MISC", "name": "https://support.sciencelogic.com/s/article/15527" + }, + { + "url": "https://community.sciencelogic.com/blog/latest-kb-articles-and-known-issues-blog-board/week-of-september-30-2024---latest-kb-articles-and-known-issues-part-1-of-2/1690", + "refsource": "MISC", + "name": "https://community.sciencelogic.com/blog/latest-kb-articles-and-known-issues-blog-board/week-of-september-30-2024---latest-kb-articles-and-known-issues-part-1-of-2/1690" } ] },