From bd5da7f6fdfb8a268aa029447a2b19663021fc84 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Apr 2024 09:00:33 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/28xxx/CVE-2023-28547.json | 3 ++- 2023/33xxx/CVE-2023-33023.json | 3 ++- 2023/33xxx/CVE-2023-33099.json | 3 ++- 2023/33xxx/CVE-2023-33100.json | 3 ++- 2023/33xxx/CVE-2023-33101.json | 3 ++- 2023/33xxx/CVE-2023-33111.json | 3 ++- 2023/33xxx/CVE-2023-33115.json | 3 ++- 2023/43xxx/CVE-2023-43515.json | 3 ++- 2023/5xxx/CVE-2023-5685.json | 2 +- 2024/21xxx/CVE-2024-21452.json | 3 ++- 2024/21xxx/CVE-2024-21453.json | 3 ++- 2024/21xxx/CVE-2024-21454.json | 3 ++- 2024/21xxx/CVE-2024-21463.json | 3 ++- 2024/21xxx/CVE-2024-21468.json | 3 ++- 2024/21xxx/CVE-2024-21470.json | 3 ++- 2024/21xxx/CVE-2024-21472.json | 3 ++- 2024/21xxx/CVE-2024-21473.json | 3 ++- 2024/3xxx/CVE-2024-3692.json | 18 ++++++++++++++++++ 2024/3xxx/CVE-2024-3693.json | 18 ++++++++++++++++++ 2024/3xxx/CVE-2024-3694.json | 18 ++++++++++++++++++ 2024/3xxx/CVE-2024-3695.json | 18 ++++++++++++++++++ 2024/3xxx/CVE-2024-3696.json | 18 ++++++++++++++++++ 2024/3xxx/CVE-2024-3697.json | 18 ++++++++++++++++++ 2024/3xxx/CVE-2024-3698.json | 18 ++++++++++++++++++ 2024/3xxx/CVE-2024-3699.json | 18 ++++++++++++++++++ 2024/3xxx/CVE-2024-3700.json | 18 ++++++++++++++++++ 2024/3xxx/CVE-2024-3701.json | 18 ++++++++++++++++++ 27 files changed, 213 insertions(+), 17 deletions(-) create mode 100644 2024/3xxx/CVE-2024-3692.json create mode 100644 2024/3xxx/CVE-2024-3693.json create mode 100644 2024/3xxx/CVE-2024-3694.json create mode 100644 2024/3xxx/CVE-2024-3695.json create mode 100644 2024/3xxx/CVE-2024-3696.json create mode 100644 2024/3xxx/CVE-2024-3697.json create mode 100644 2024/3xxx/CVE-2024-3698.json create mode 100644 2024/3xxx/CVE-2024-3699.json create mode 100644 2024/3xxx/CVE-2024-3700.json create mode 100644 2024/3xxx/CVE-2024-3701.json diff --git a/2023/28xxx/CVE-2023-28547.json b/2023/28xxx/CVE-2023-28547.json index 3cda37d6605..ce1595cba1a 100644 --- a/2023/28xxx/CVE-2023-28547.json +++ b/2023/28xxx/CVE-2023-28547.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" } ] } diff --git a/2023/33xxx/CVE-2023-33023.json b/2023/33xxx/CVE-2023-33023.json index c548f5ff4f0..eff99296cd8 100644 --- a/2023/33xxx/CVE-2023-33023.json +++ b/2023/33xxx/CVE-2023-33023.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" } ] } diff --git a/2023/33xxx/CVE-2023-33099.json b/2023/33xxx/CVE-2023-33099.json index 3f08409f8d8..798ee320b36 100644 --- a/2023/33xxx/CVE-2023-33099.json +++ b/2023/33xxx/CVE-2023-33099.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" } ] } diff --git a/2023/33xxx/CVE-2023-33100.json b/2023/33xxx/CVE-2023-33100.json index a628105bf75..ed69b5d0155 100644 --- a/2023/33xxx/CVE-2023-33100.json +++ b/2023/33xxx/CVE-2023-33100.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" } ] } diff --git a/2023/33xxx/CVE-2023-33101.json b/2023/33xxx/CVE-2023-33101.json index 9a0f958c598..30c716eb9de 100644 --- a/2023/33xxx/CVE-2023-33101.json +++ b/2023/33xxx/CVE-2023-33101.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-704 Incorrect Type Conversion or Cast", + "cweId": "CWE-704" } ] } diff --git a/2023/33xxx/CVE-2023-33111.json b/2023/33xxx/CVE-2023-33111.json index 7a3b57b92fd..98568d8dd30 100644 --- a/2023/33xxx/CVE-2023-33111.json +++ b/2023/33xxx/CVE-2023-33111.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-129 Improper Validation of Array Index", + "cweId": "CWE-129" } ] } diff --git a/2023/33xxx/CVE-2023-33115.json b/2023/33xxx/CVE-2023-33115.json index ec57e993525..cbdb1629518 100644 --- a/2023/33xxx/CVE-2023-33115.json +++ b/2023/33xxx/CVE-2023-33115.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2023/43xxx/CVE-2023-43515.json b/2023/43xxx/CVE-2023-43515.json index d58539aafd8..b31c5fb62ef 100644 --- a/2023/43xxx/CVE-2023-43515.json +++ b/2023/43xxx/CVE-2023-43515.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" } ] } diff --git a/2023/5xxx/CVE-2023-5685.json b/2023/5xxx/CVE-2023-5685.json index a56bfc36152..cb51d1499f8 100644 --- a/2023/5xxx/CVE-2023-5685.json +++ b/2023/5xxx/CVE-2023-5685.json @@ -88,7 +88,7 @@ { "version_value": "not down converted", "x_cve_json_5_version_data": { - "defaultStatus": "affected" + "defaultStatus": "unaffected" } } ] diff --git a/2024/21xxx/CVE-2024-21452.json b/2024/21xxx/CVE-2024-21452.json index d9e620f33be..147b0f53a16 100644 --- a/2024/21xxx/CVE-2024-21452.json +++ b/2024/21xxx/CVE-2024-21452.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" } ] } diff --git a/2024/21xxx/CVE-2024-21453.json b/2024/21xxx/CVE-2024-21453.json index 5353143b105..623b0ec3dcd 100644 --- a/2024/21xxx/CVE-2024-21453.json +++ b/2024/21xxx/CVE-2024-21453.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" } ] } diff --git a/2024/21xxx/CVE-2024-21454.json b/2024/21xxx/CVE-2024-21454.json index 9b19844d875..2dc1583f061 100644 --- a/2024/21xxx/CVE-2024-21454.json +++ b/2024/21xxx/CVE-2024-21454.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-680 Integer Overflow to Buffer Overflow", + "cweId": "CWE-680" } ] } diff --git a/2024/21xxx/CVE-2024-21463.json b/2024/21xxx/CVE-2024-21463.json index 001758fc236..5734f6f1717 100644 --- a/2024/21xxx/CVE-2024-21463.json +++ b/2024/21xxx/CVE-2024-21463.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" } ] } diff --git a/2024/21xxx/CVE-2024-21468.json b/2024/21xxx/CVE-2024-21468.json index 18cc9e2dc40..b7d5855e79d 100644 --- a/2024/21xxx/CVE-2024-21468.json +++ b/2024/21xxx/CVE-2024-21468.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-416 Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2024/21xxx/CVE-2024-21470.json b/2024/21xxx/CVE-2024-21470.json index ee237e54e99..bf798dffad0 100644 --- a/2024/21xxx/CVE-2024-21470.json +++ b/2024/21xxx/CVE-2024-21470.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-680 Integer Overflow to Buffer Overflow", + "cweId": "CWE-680" } ] } diff --git a/2024/21xxx/CVE-2024-21472.json b/2024/21xxx/CVE-2024-21472.json index 2a1fe4002a8..d983a33e9e6 100644 --- a/2024/21xxx/CVE-2024-21472.json +++ b/2024/21xxx/CVE-2024-21472.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-416 Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2024/21xxx/CVE-2024-21473.json b/2024/21xxx/CVE-2024-21473.json index 0d3aa1d7985..5e3075cae4c 100644 --- a/2024/21xxx/CVE-2024-21473.json +++ b/2024/21xxx/CVE-2024-21473.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" } ] } diff --git a/2024/3xxx/CVE-2024-3692.json b/2024/3xxx/CVE-2024-3692.json new file mode 100644 index 00000000000..dbd3bd82bf5 --- /dev/null +++ b/2024/3xxx/CVE-2024-3692.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3692", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3693.json b/2024/3xxx/CVE-2024-3693.json new file mode 100644 index 00000000000..00c3ad314b4 --- /dev/null +++ b/2024/3xxx/CVE-2024-3693.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3693", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3694.json b/2024/3xxx/CVE-2024-3694.json new file mode 100644 index 00000000000..cc3e950377a --- /dev/null +++ b/2024/3xxx/CVE-2024-3694.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3694", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3695.json b/2024/3xxx/CVE-2024-3695.json new file mode 100644 index 00000000000..920e121636f --- /dev/null +++ b/2024/3xxx/CVE-2024-3695.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3695", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3696.json b/2024/3xxx/CVE-2024-3696.json new file mode 100644 index 00000000000..f012a347e2f --- /dev/null +++ b/2024/3xxx/CVE-2024-3696.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3696", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3697.json b/2024/3xxx/CVE-2024-3697.json new file mode 100644 index 00000000000..4193fb51986 --- /dev/null +++ b/2024/3xxx/CVE-2024-3697.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3697", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3698.json b/2024/3xxx/CVE-2024-3698.json new file mode 100644 index 00000000000..9ca7ca26bad --- /dev/null +++ b/2024/3xxx/CVE-2024-3698.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3698", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3699.json b/2024/3xxx/CVE-2024-3699.json new file mode 100644 index 00000000000..8a21dd9cf1a --- /dev/null +++ b/2024/3xxx/CVE-2024-3699.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3699", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3700.json b/2024/3xxx/CVE-2024-3700.json new file mode 100644 index 00000000000..6cdf666d6d8 --- /dev/null +++ b/2024/3xxx/CVE-2024-3700.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3700", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3701.json b/2024/3xxx/CVE-2024-3701.json new file mode 100644 index 00000000000..2fff0bf7282 --- /dev/null +++ b/2024/3xxx/CVE-2024-3701.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3701", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file