From c58fc93fec574f42a441276b58c0cd0c74809e33 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 23 May 2024 20:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/31xxx/CVE-2024-31843.json | 56 ++++++++++++++++-- 2024/36xxx/CVE-2024-36302.json | 18 ++++++ 2024/36xxx/CVE-2024-36303.json | 18 ++++++ 2024/36xxx/CVE-2024-36304.json | 18 ++++++ 2024/36xxx/CVE-2024-36305.json | 18 ++++++ 2024/36xxx/CVE-2024-36306.json | 18 ++++++ 2024/36xxx/CVE-2024-36307.json | 18 ++++++ 2024/36xxx/CVE-2024-36308.json | 18 ++++++ 2024/36xxx/CVE-2024-36309.json | 18 ++++++ 2024/36xxx/CVE-2024-36310.json | 18 ++++++ 2024/36xxx/CVE-2024-36311.json | 18 ++++++ 2024/36xxx/CVE-2024-36312.json | 18 ++++++ 2024/36xxx/CVE-2024-36313.json | 18 ++++++ 2024/36xxx/CVE-2024-36314.json | 18 ++++++ 2024/36xxx/CVE-2024-36315.json | 18 ++++++ 2024/36xxx/CVE-2024-36316.json | 18 ++++++ 2024/36xxx/CVE-2024-36317.json | 18 ++++++ 2024/36xxx/CVE-2024-36318.json | 18 ++++++ 2024/36xxx/CVE-2024-36319.json | 18 ++++++ 2024/36xxx/CVE-2024-36320.json | 18 ++++++ 2024/36xxx/CVE-2024-36321.json | 18 ++++++ 2024/36xxx/CVE-2024-36322.json | 18 ++++++ 2024/36xxx/CVE-2024-36323.json | 18 ++++++ 2024/36xxx/CVE-2024-36324.json | 18 ++++++ 2024/36xxx/CVE-2024-36325.json | 18 ++++++ 2024/36xxx/CVE-2024-36326.json | 18 ++++++ 2024/36xxx/CVE-2024-36327.json | 18 ++++++ 2024/36xxx/CVE-2024-36328.json | 18 ++++++ 2024/36xxx/CVE-2024-36329.json | 18 ++++++ 2024/36xxx/CVE-2024-36330.json | 18 ++++++ 2024/36xxx/CVE-2024-36331.json | 18 ++++++ 2024/36xxx/CVE-2024-36332.json | 18 ++++++ 2024/36xxx/CVE-2024-36333.json | 18 ++++++ 2024/36xxx/CVE-2024-36334.json | 18 ++++++ 2024/36xxx/CVE-2024-36335.json | 18 ++++++ 2024/36xxx/CVE-2024-36336.json | 18 ++++++ 2024/36xxx/CVE-2024-36337.json | 18 ++++++ 2024/36xxx/CVE-2024-36338.json | 18 ++++++ 2024/36xxx/CVE-2024-36339.json | 18 ++++++ 2024/36xxx/CVE-2024-36340.json | 18 ++++++ 2024/36xxx/CVE-2024-36341.json | 18 ++++++ 2024/36xxx/CVE-2024-36342.json | 18 ++++++ 2024/36xxx/CVE-2024-36343.json | 18 ++++++ 2024/36xxx/CVE-2024-36344.json | 18 ++++++ 2024/36xxx/CVE-2024-36345.json | 18 ++++++ 2024/36xxx/CVE-2024-36346.json | 18 ++++++ 2024/36xxx/CVE-2024-36347.json | 18 ++++++ 2024/36xxx/CVE-2024-36348.json | 18 ++++++ 2024/36xxx/CVE-2024-36349.json | 18 ++++++ 2024/36xxx/CVE-2024-36350.json | 18 ++++++ 2024/36xxx/CVE-2024-36351.json | 18 ++++++ 2024/36xxx/CVE-2024-36352.json | 18 ++++++ 2024/36xxx/CVE-2024-36353.json | 18 ++++++ 2024/36xxx/CVE-2024-36354.json | 18 ++++++ 2024/36xxx/CVE-2024-36355.json | 18 ++++++ 2024/36xxx/CVE-2024-36356.json | 18 ++++++ 2024/36xxx/CVE-2024-36357.json | 18 ++++++ 2024/4xxx/CVE-2024-4436.json | 6 ++ 2024/4xxx/CVE-2024-4437.json | 6 ++ 2024/4xxx/CVE-2024-4438.json | 6 ++ 2024/5xxx/CVE-2024-5201.json | 103 +++++++++++++++++++++++++++++++-- 2024/5xxx/CVE-2024-5202.json | 103 +++++++++++++++++++++++++++++++-- 2024/5xxx/CVE-2024-5280.json | 18 ++++++ 2024/5xxx/CVE-2024-5281.json | 18 ++++++ 2024/5xxx/CVE-2024-5282.json | 18 ++++++ 2024/5xxx/CVE-2024-5283.json | 18 ++++++ 2024/5xxx/CVE-2024-5284.json | 18 ++++++ 2024/5xxx/CVE-2024-5285.json | 18 ++++++ 2024/5xxx/CVE-2024-5286.json | 18 ++++++ 2024/5xxx/CVE-2024-5287.json | 18 ++++++ 70 files changed, 1418 insertions(+), 14 deletions(-) create mode 100644 2024/36xxx/CVE-2024-36302.json create mode 100644 2024/36xxx/CVE-2024-36303.json create mode 100644 2024/36xxx/CVE-2024-36304.json create mode 100644 2024/36xxx/CVE-2024-36305.json create mode 100644 2024/36xxx/CVE-2024-36306.json create mode 100644 2024/36xxx/CVE-2024-36307.json create mode 100644 2024/36xxx/CVE-2024-36308.json create mode 100644 2024/36xxx/CVE-2024-36309.json create mode 100644 2024/36xxx/CVE-2024-36310.json create mode 100644 2024/36xxx/CVE-2024-36311.json create mode 100644 2024/36xxx/CVE-2024-36312.json create mode 100644 2024/36xxx/CVE-2024-36313.json create mode 100644 2024/36xxx/CVE-2024-36314.json create mode 100644 2024/36xxx/CVE-2024-36315.json create mode 100644 2024/36xxx/CVE-2024-36316.json create mode 100644 2024/36xxx/CVE-2024-36317.json create mode 100644 2024/36xxx/CVE-2024-36318.json create mode 100644 2024/36xxx/CVE-2024-36319.json create mode 100644 2024/36xxx/CVE-2024-36320.json create mode 100644 2024/36xxx/CVE-2024-36321.json create mode 100644 2024/36xxx/CVE-2024-36322.json create mode 100644 2024/36xxx/CVE-2024-36323.json create mode 100644 2024/36xxx/CVE-2024-36324.json create mode 100644 2024/36xxx/CVE-2024-36325.json create mode 100644 2024/36xxx/CVE-2024-36326.json create mode 100644 2024/36xxx/CVE-2024-36327.json create mode 100644 2024/36xxx/CVE-2024-36328.json create mode 100644 2024/36xxx/CVE-2024-36329.json create mode 100644 2024/36xxx/CVE-2024-36330.json create mode 100644 2024/36xxx/CVE-2024-36331.json create mode 100644 2024/36xxx/CVE-2024-36332.json create mode 100644 2024/36xxx/CVE-2024-36333.json create mode 100644 2024/36xxx/CVE-2024-36334.json create mode 100644 2024/36xxx/CVE-2024-36335.json create mode 100644 2024/36xxx/CVE-2024-36336.json create mode 100644 2024/36xxx/CVE-2024-36337.json create mode 100644 2024/36xxx/CVE-2024-36338.json create mode 100644 2024/36xxx/CVE-2024-36339.json create mode 100644 2024/36xxx/CVE-2024-36340.json create mode 100644 2024/36xxx/CVE-2024-36341.json create mode 100644 2024/36xxx/CVE-2024-36342.json create mode 100644 2024/36xxx/CVE-2024-36343.json create mode 100644 2024/36xxx/CVE-2024-36344.json create mode 100644 2024/36xxx/CVE-2024-36345.json create mode 100644 2024/36xxx/CVE-2024-36346.json create mode 100644 2024/36xxx/CVE-2024-36347.json create mode 100644 2024/36xxx/CVE-2024-36348.json create mode 100644 2024/36xxx/CVE-2024-36349.json create mode 100644 2024/36xxx/CVE-2024-36350.json create mode 100644 2024/36xxx/CVE-2024-36351.json create mode 100644 2024/36xxx/CVE-2024-36352.json create mode 100644 2024/36xxx/CVE-2024-36353.json create mode 100644 2024/36xxx/CVE-2024-36354.json create mode 100644 2024/36xxx/CVE-2024-36355.json create mode 100644 2024/36xxx/CVE-2024-36356.json create mode 100644 2024/36xxx/CVE-2024-36357.json create mode 100644 2024/5xxx/CVE-2024-5280.json create mode 100644 2024/5xxx/CVE-2024-5281.json create mode 100644 2024/5xxx/CVE-2024-5282.json create mode 100644 2024/5xxx/CVE-2024-5283.json create mode 100644 2024/5xxx/CVE-2024-5284.json create mode 100644 2024/5xxx/CVE-2024-5285.json create mode 100644 2024/5xxx/CVE-2024-5286.json create mode 100644 2024/5xxx/CVE-2024-5287.json diff --git a/2024/31xxx/CVE-2024-31843.json b/2024/31xxx/CVE-2024-31843.json index d73f3642859..3bfa5b04f6b 100644 --- a/2024/31xxx/CVE-2024-31843.json +++ b/2024/31xxx/CVE-2024-31843.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-31843", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-31843", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Italtel Embrace 1.6.4. The Web application does not properly check the parameters sent as input before they are processed on the server side. This allows authenticated users to execute commands on the Operating System." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.gruppotim.it/it/footer/red-team.html", + "url": "https://www.gruppotim.it/it/footer/red-team.html" } ] } diff --git a/2024/36xxx/CVE-2024-36302.json b/2024/36xxx/CVE-2024-36302.json new file mode 100644 index 00000000000..bf043b67e17 --- /dev/null +++ b/2024/36xxx/CVE-2024-36302.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36302", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36303.json b/2024/36xxx/CVE-2024-36303.json new file mode 100644 index 00000000000..2ba95625871 --- /dev/null +++ b/2024/36xxx/CVE-2024-36303.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36303", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36304.json b/2024/36xxx/CVE-2024-36304.json new file mode 100644 index 00000000000..045eb7da5f1 --- /dev/null +++ b/2024/36xxx/CVE-2024-36304.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36304", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36305.json b/2024/36xxx/CVE-2024-36305.json new file mode 100644 index 00000000000..9b337ef4647 --- /dev/null +++ b/2024/36xxx/CVE-2024-36305.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36305", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36306.json b/2024/36xxx/CVE-2024-36306.json new file mode 100644 index 00000000000..f083fe4a690 --- /dev/null +++ b/2024/36xxx/CVE-2024-36306.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36306", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36307.json b/2024/36xxx/CVE-2024-36307.json new file mode 100644 index 00000000000..6cb5d77bdc5 --- /dev/null +++ b/2024/36xxx/CVE-2024-36307.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36307", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36308.json b/2024/36xxx/CVE-2024-36308.json new file mode 100644 index 00000000000..5c4ba9052bb --- /dev/null +++ b/2024/36xxx/CVE-2024-36308.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36308", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36309.json b/2024/36xxx/CVE-2024-36309.json new file mode 100644 index 00000000000..2123052debe --- /dev/null +++ b/2024/36xxx/CVE-2024-36309.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36309", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36310.json b/2024/36xxx/CVE-2024-36310.json new file mode 100644 index 00000000000..29c75e28b31 --- /dev/null +++ b/2024/36xxx/CVE-2024-36310.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36310", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36311.json b/2024/36xxx/CVE-2024-36311.json new file mode 100644 index 00000000000..f238cce147a --- /dev/null +++ b/2024/36xxx/CVE-2024-36311.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36311", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36312.json b/2024/36xxx/CVE-2024-36312.json new file mode 100644 index 00000000000..5d5edce1ba9 --- /dev/null +++ b/2024/36xxx/CVE-2024-36312.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36312", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36313.json b/2024/36xxx/CVE-2024-36313.json new file mode 100644 index 00000000000..7e224602f5c --- /dev/null +++ b/2024/36xxx/CVE-2024-36313.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36313", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36314.json b/2024/36xxx/CVE-2024-36314.json new file mode 100644 index 00000000000..c7a462dc016 --- /dev/null +++ b/2024/36xxx/CVE-2024-36314.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36314", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36315.json b/2024/36xxx/CVE-2024-36315.json new file mode 100644 index 00000000000..18440884f5e --- /dev/null +++ b/2024/36xxx/CVE-2024-36315.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36315", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36316.json b/2024/36xxx/CVE-2024-36316.json new file mode 100644 index 00000000000..11e4ed801ef --- /dev/null +++ b/2024/36xxx/CVE-2024-36316.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36316", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36317.json b/2024/36xxx/CVE-2024-36317.json new file mode 100644 index 00000000000..c24605b0ab5 --- /dev/null +++ b/2024/36xxx/CVE-2024-36317.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36317", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36318.json b/2024/36xxx/CVE-2024-36318.json new file mode 100644 index 00000000000..305043d2e5e --- /dev/null +++ b/2024/36xxx/CVE-2024-36318.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36318", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36319.json b/2024/36xxx/CVE-2024-36319.json new file mode 100644 index 00000000000..87f24fe3093 --- /dev/null +++ b/2024/36xxx/CVE-2024-36319.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36319", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36320.json b/2024/36xxx/CVE-2024-36320.json new file mode 100644 index 00000000000..42ab168751f --- /dev/null +++ b/2024/36xxx/CVE-2024-36320.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36320", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36321.json b/2024/36xxx/CVE-2024-36321.json new file mode 100644 index 00000000000..2bfc99669df --- /dev/null +++ b/2024/36xxx/CVE-2024-36321.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36321", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36322.json b/2024/36xxx/CVE-2024-36322.json new file mode 100644 index 00000000000..2eb6563ebf0 --- /dev/null +++ b/2024/36xxx/CVE-2024-36322.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36322", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36323.json b/2024/36xxx/CVE-2024-36323.json new file mode 100644 index 00000000000..155d0aa84d7 --- /dev/null +++ b/2024/36xxx/CVE-2024-36323.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36323", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36324.json b/2024/36xxx/CVE-2024-36324.json new file mode 100644 index 00000000000..2ebd45cdb6b --- /dev/null +++ b/2024/36xxx/CVE-2024-36324.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36324", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36325.json b/2024/36xxx/CVE-2024-36325.json new file mode 100644 index 00000000000..0485daf2acd --- /dev/null +++ b/2024/36xxx/CVE-2024-36325.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36325", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36326.json b/2024/36xxx/CVE-2024-36326.json new file mode 100644 index 00000000000..1e8c0e786e4 --- /dev/null +++ b/2024/36xxx/CVE-2024-36326.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36326", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36327.json b/2024/36xxx/CVE-2024-36327.json new file mode 100644 index 00000000000..0c5ddd5d6a2 --- /dev/null +++ b/2024/36xxx/CVE-2024-36327.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36327", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36328.json b/2024/36xxx/CVE-2024-36328.json new file mode 100644 index 00000000000..9b7ffbc07f6 --- /dev/null +++ b/2024/36xxx/CVE-2024-36328.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36328", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36329.json b/2024/36xxx/CVE-2024-36329.json new file mode 100644 index 00000000000..122bc09e70e --- /dev/null +++ b/2024/36xxx/CVE-2024-36329.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36329", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36330.json b/2024/36xxx/CVE-2024-36330.json new file mode 100644 index 00000000000..77e1bdd8813 --- /dev/null +++ b/2024/36xxx/CVE-2024-36330.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36330", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36331.json b/2024/36xxx/CVE-2024-36331.json new file mode 100644 index 00000000000..44648729432 --- /dev/null +++ b/2024/36xxx/CVE-2024-36331.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36331", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36332.json b/2024/36xxx/CVE-2024-36332.json new file mode 100644 index 00000000000..8b8855a86b5 --- /dev/null +++ b/2024/36xxx/CVE-2024-36332.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36332", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36333.json b/2024/36xxx/CVE-2024-36333.json new file mode 100644 index 00000000000..e2b9d9c50a0 --- /dev/null +++ b/2024/36xxx/CVE-2024-36333.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36333", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36334.json b/2024/36xxx/CVE-2024-36334.json new file mode 100644 index 00000000000..b0513eeb7e6 --- /dev/null +++ b/2024/36xxx/CVE-2024-36334.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36334", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36335.json b/2024/36xxx/CVE-2024-36335.json new file mode 100644 index 00000000000..b3ad752ab89 --- /dev/null +++ b/2024/36xxx/CVE-2024-36335.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36335", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36336.json b/2024/36xxx/CVE-2024-36336.json new file mode 100644 index 00000000000..c868a32084f --- /dev/null +++ b/2024/36xxx/CVE-2024-36336.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36336", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36337.json b/2024/36xxx/CVE-2024-36337.json new file mode 100644 index 00000000000..79feefa02bc --- /dev/null +++ b/2024/36xxx/CVE-2024-36337.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36337", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36338.json b/2024/36xxx/CVE-2024-36338.json new file mode 100644 index 00000000000..7fe5a446e77 --- /dev/null +++ b/2024/36xxx/CVE-2024-36338.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36338", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36339.json b/2024/36xxx/CVE-2024-36339.json new file mode 100644 index 00000000000..de540dd3cdc --- /dev/null +++ b/2024/36xxx/CVE-2024-36339.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36339", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36340.json b/2024/36xxx/CVE-2024-36340.json new file mode 100644 index 00000000000..5d2aa961c19 --- /dev/null +++ b/2024/36xxx/CVE-2024-36340.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36340", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36341.json b/2024/36xxx/CVE-2024-36341.json new file mode 100644 index 00000000000..52b98ddb369 --- /dev/null +++ b/2024/36xxx/CVE-2024-36341.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36341", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36342.json b/2024/36xxx/CVE-2024-36342.json new file mode 100644 index 00000000000..8d921fccd4f --- /dev/null +++ b/2024/36xxx/CVE-2024-36342.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36342", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36343.json b/2024/36xxx/CVE-2024-36343.json new file mode 100644 index 00000000000..836203f92f4 --- /dev/null +++ b/2024/36xxx/CVE-2024-36343.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36343", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36344.json b/2024/36xxx/CVE-2024-36344.json new file mode 100644 index 00000000000..4bdb9d579cd --- /dev/null +++ b/2024/36xxx/CVE-2024-36344.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36344", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36345.json b/2024/36xxx/CVE-2024-36345.json new file mode 100644 index 00000000000..232d249bd63 --- /dev/null +++ b/2024/36xxx/CVE-2024-36345.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36345", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36346.json b/2024/36xxx/CVE-2024-36346.json new file mode 100644 index 00000000000..89cfd5bd614 --- /dev/null +++ b/2024/36xxx/CVE-2024-36346.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36346", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36347.json b/2024/36xxx/CVE-2024-36347.json new file mode 100644 index 00000000000..dbc788d798c --- /dev/null +++ b/2024/36xxx/CVE-2024-36347.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36347", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36348.json b/2024/36xxx/CVE-2024-36348.json new file mode 100644 index 00000000000..9f1776d4b68 --- /dev/null +++ b/2024/36xxx/CVE-2024-36348.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36348", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36349.json b/2024/36xxx/CVE-2024-36349.json new file mode 100644 index 00000000000..f97a4e905e2 --- /dev/null +++ b/2024/36xxx/CVE-2024-36349.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36349", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36350.json b/2024/36xxx/CVE-2024-36350.json new file mode 100644 index 00000000000..64e9a189a30 --- /dev/null +++ b/2024/36xxx/CVE-2024-36350.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36350", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36351.json b/2024/36xxx/CVE-2024-36351.json new file mode 100644 index 00000000000..a2dfc01731b --- /dev/null +++ b/2024/36xxx/CVE-2024-36351.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36351", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36352.json b/2024/36xxx/CVE-2024-36352.json new file mode 100644 index 00000000000..21277d3a39a --- /dev/null +++ b/2024/36xxx/CVE-2024-36352.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36352", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36353.json b/2024/36xxx/CVE-2024-36353.json new file mode 100644 index 00000000000..e826a983cbf --- /dev/null +++ b/2024/36xxx/CVE-2024-36353.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36353", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36354.json b/2024/36xxx/CVE-2024-36354.json new file mode 100644 index 00000000000..fe601dff0d4 --- /dev/null +++ b/2024/36xxx/CVE-2024-36354.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36354", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36355.json b/2024/36xxx/CVE-2024-36355.json new file mode 100644 index 00000000000..517818c289e --- /dev/null +++ b/2024/36xxx/CVE-2024-36355.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36355", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36356.json b/2024/36xxx/CVE-2024-36356.json new file mode 100644 index 00000000000..8e0e408f9ca --- /dev/null +++ b/2024/36xxx/CVE-2024-36356.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36356", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36357.json b/2024/36xxx/CVE-2024-36357.json new file mode 100644 index 00000000000..7950882fa0c --- /dev/null +++ b/2024/36xxx/CVE-2024-36357.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36357", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4436.json b/2024/4xxx/CVE-2024-4436.json index e1a9d35cd22..82657c91bdb 100644 --- a/2024/4xxx/CVE-2024-4436.json +++ b/2024/4xxx/CVE-2024-4436.json @@ -94,6 +94,12 @@ } ] }, + "work_around": [ + { + "lang": "en", + "value": "null" + } + ], "impact": { "cvss": [ { diff --git a/2024/4xxx/CVE-2024-4437.json b/2024/4xxx/CVE-2024-4437.json index f918fff0b4a..dbbb7dae980 100644 --- a/2024/4xxx/CVE-2024-4437.json +++ b/2024/4xxx/CVE-2024-4437.json @@ -94,6 +94,12 @@ } ] }, + "work_around": [ + { + "lang": "en", + "value": "null" + } + ], "impact": { "cvss": [ { diff --git a/2024/4xxx/CVE-2024-4438.json b/2024/4xxx/CVE-2024-4438.json index 6474534bb2e..73378a664d5 100644 --- a/2024/4xxx/CVE-2024-4438.json +++ b/2024/4xxx/CVE-2024-4438.json @@ -107,6 +107,12 @@ } ] }, + "work_around": [ + { + "lang": "en", + "value": "null" + } + ], "impact": { "cvss": [ { diff --git a/2024/5xxx/CVE-2024-5201.json b/2024/5xxx/CVE-2024-5201.json index 7709a6fdeaa..d2d19a66441 100644 --- a/2024/5xxx/CVE-2024-5201.json +++ b/2024/5xxx/CVE-2024-5201.json @@ -1,17 +1,112 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-5201", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@opentext.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Privilege Escalation\u00a0in OpenText Dimensions RM allows an authenticated user to escalate there privilege to the privilege of another user\u00a0via HTTP Request" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287 Improper Authentication", + "cweId": "CWE-287" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "OpenText", + "product": { + "product_data": [ + { + "product_name": "Dimensions RM", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "12.11.1.1", + "version_value": "12.11.1.3" + }, + { + "version_affected": "<", + "version_name": "12.11.2", + "version_value": "12.11.2.6" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://portal.microfocus.com/s/article/KM000029985", + "refsource": "MISC", + "name": "https://portal.microfocus.com/s/article/KM000029985" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "https://portal.microfocus.com/s/article/KM000029985
" + } + ], + "value": "https://portal.microfocus.com/s/article/KM000029985" + } + ], + "credits": [ + { + "lang": "en", + "value": "Telekom MMS GmbH (Researcher: P. Graf, M. Seidel, O. Vogel)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/5xxx/CVE-2024-5202.json b/2024/5xxx/CVE-2024-5202.json index 804252d23c6..80424463299 100644 --- a/2024/5xxx/CVE-2024-5202.json +++ b/2024/5xxx/CVE-2024-5202.json @@ -1,17 +1,112 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-5202", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@opentext.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Arbitrary File Read\u00a0in OpenText Dimensions RM allows\u00a0authenticated users\u00a0to read files stored on the server via webservices" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", + "cweId": "CWE-200" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "OpenText", + "product": { + "product_data": [ + { + "product_name": "Dimensions RM", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "12.11.1.3" + }, + { + "version_affected": "<", + "version_name": "12.11.2", + "version_value": "12.11.2.6" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://portal.microfocus.com/s/article/KM000029988", + "refsource": "MISC", + "name": "https://portal.microfocus.com/s/article/KM000029988" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "https://portal.microfocus.com/s/article/KM000029988
" + } + ], + "value": "https://portal.microfocus.com/s/article/KM000029988" + } + ], + "credits": [ + { + "lang": "en", + "value": "Telekom MMS GmbH (Researcher: P. Graf, M. Seidel, O. Vogel)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/5xxx/CVE-2024-5280.json b/2024/5xxx/CVE-2024-5280.json new file mode 100644 index 00000000000..6399869d603 --- /dev/null +++ b/2024/5xxx/CVE-2024-5280.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-5280", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/5xxx/CVE-2024-5281.json b/2024/5xxx/CVE-2024-5281.json new file mode 100644 index 00000000000..d8d94988a78 --- /dev/null +++ b/2024/5xxx/CVE-2024-5281.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-5281", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/5xxx/CVE-2024-5282.json b/2024/5xxx/CVE-2024-5282.json new file mode 100644 index 00000000000..03f7def9597 --- /dev/null +++ b/2024/5xxx/CVE-2024-5282.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-5282", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/5xxx/CVE-2024-5283.json b/2024/5xxx/CVE-2024-5283.json new file mode 100644 index 00000000000..2810160a8fd --- /dev/null +++ b/2024/5xxx/CVE-2024-5283.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-5283", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/5xxx/CVE-2024-5284.json b/2024/5xxx/CVE-2024-5284.json new file mode 100644 index 00000000000..5af6ab5ba84 --- /dev/null +++ b/2024/5xxx/CVE-2024-5284.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-5284", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/5xxx/CVE-2024-5285.json b/2024/5xxx/CVE-2024-5285.json new file mode 100644 index 00000000000..5837e707f3f --- /dev/null +++ b/2024/5xxx/CVE-2024-5285.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-5285", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/5xxx/CVE-2024-5286.json b/2024/5xxx/CVE-2024-5286.json new file mode 100644 index 00000000000..742dd6fc72c --- /dev/null +++ b/2024/5xxx/CVE-2024-5286.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-5286", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/5xxx/CVE-2024-5287.json b/2024/5xxx/CVE-2024-5287.json new file mode 100644 index 00000000000..5c21055171d --- /dev/null +++ b/2024/5xxx/CVE-2024-5287.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-5287", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file