diff --git a/2020/24xxx/CVE-2020-24198.json b/2020/24xxx/CVE-2020-24198.json index 05fb0530ef0..e9d7a7d1b93 100644 --- a/2020/24xxx/CVE-2020-24198.json +++ b/2020/24xxx/CVE-2020-24198.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "A persistent cross-site scripting vulnerability in Sourcecodester Stock Management System v1.0 allows remote attackers to inject arbitrary web script or HTML via the 'Brand Name.' NOTE: The vendor states that the RTSP library is used for DEMO only, using it in product is a customer's behavior. Ambarella has emphasized that RTSP is DEMO only library, should NOT be used in product in our document. Because Ambarella's SDK is proprietary, we didn't publish our SDK source code in public network." + "value": "A persistent cross-site scripting vulnerability in Sourcecodester Stock Management System v1.0 allows remote attackers to inject arbitrary web script or HTML via the 'Brand Name.'" } ] }, @@ -61,11 +61,6 @@ "refsource": "MISC", "name": "https://cxsecurity.com/issue/WLB-2020090024", "url": "https://cxsecurity.com/issue/WLB-2020090024" - }, - { - "refsource": "MISC", - "name": "https://github.com/Ambarella-Inc/amba-cve-info/tree/main/cve-2020-24918", - "url": "https://github.com/Ambarella-Inc/amba-cve-info/tree/main/cve-2020-24918" } ] } diff --git a/2020/24xxx/CVE-2020-24918.json b/2020/24xxx/CVE-2020-24918.json index 5cd7e3e1048..71404db3292 100644 --- a/2020/24xxx/CVE-2020-24918.json +++ b/2020/24xxx/CVE-2020-24918.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "A buffer overflow in the RTSP service of the Ambarella Oryx RTSP Server 2020-01-07 allows an unauthenticated attacker to send a crafted RTSP request, with a long digest authentication header, to execute arbitrary code in parse_authentication_header() in libamprotocol-rtsp.so.1 in rtsp_svc (or cause a crash). This allows remote takeover of a Furbo Dog Camera, for example." + "value": "A buffer overflow in the RTSP service of the Ambarella Oryx RTSP Server 2020-01-07 allows an unauthenticated attacker to send a crafted RTSP request, with a long digest authentication header, to execute arbitrary code in parse_authentication_header() in libamprotocol-rtsp.so.1 in rtsp_svc (or cause a crash). This allows remote takeover of a Furbo Dog Camera, for example. NOTE: The vendor states that the RTSP library is used for DEMO only, using it in product is a customer's behavior. Ambarella has emphasized that RTSP is DEMO only library, should NOT be used in product in our document. Because Ambarella's SDK is proprietary, we didn't publish our SDK source code in public network." } ] }, @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://somersetrecon.squarespace.com/blog/2021/hacking-the-furbo-part-1", "url": "https://somersetrecon.squarespace.com/blog/2021/hacking-the-furbo-part-1" + }, + { + "refsource": "MISC", + "name": "https://github.com/Ambarella-Inc/amba-cve-info/tree/main/cve-2020-24918", + "url": "https://github.com/Ambarella-Inc/amba-cve-info/tree/main/cve-2020-24918" } ] } diff --git a/2023/5xxx/CVE-2023-5528.json b/2023/5xxx/CVE-2023-5528.json index 75cbe98854f..f09cb51a702 100644 --- a/2023/5xxx/CVE-2023-5528.json +++ b/2023/5xxx/CVE-2023-5528.json @@ -84,7 +84,7 @@ "version": "v1.25.16" } ], - "defaultStatus": "unaffected" + "defaultStatus": "affected" } } ] @@ -107,26 +107,6 @@ "url": "https://groups.google.com/g/kubernetes-security-announce/c/SL_d4NR8pzA", "refsource": "MISC", "name": "https://groups.google.com/g/kubernetes-security-announce/c/SL_d4NR8pzA" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4XZIX727JIKF5RQW7RVVBLWXBCDIBJA7/", - "refsource": "MISC", - "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4XZIX727JIKF5RQW7RVVBLWXBCDIBJA7/" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MPGMITSZXUCAVO7Q75675SOLXC2XXU4/", - "refsource": "MISC", - "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MPGMITSZXUCAVO7Q75675SOLXC2XXU4/" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JH444PWZBINXLLFV7XLIJIZJHSK6UEZ/", - "refsource": "MISC", - "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JH444PWZBINXLLFV7XLIJIZJHSK6UEZ/" - }, - { - "url": "https://security.netapp.com/advisory/ntap-20240119-0009/", - "refsource": "MISC", - "name": "https://security.netapp.com/advisory/ntap-20240119-0009/" } ] }, diff --git a/2024/44xxx/CVE-2024-44082.json b/2024/44xxx/CVE-2024-44082.json index 34db6bdf388..9f19134e06b 100644 --- a/2024/44xxx/CVE-2024-44082.json +++ b/2024/44xxx/CVE-2024-44082.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://www.openwall.com/lists/oss-security/2024/09/04/4", "url": "https://www.openwall.com/lists/oss-security/2024/09/04/4" + }, + { + "refsource": "MISC", + "name": "https://security.openstack.org/ossa/OSSA-2024-003.html", + "url": "https://security.openstack.org/ossa/OSSA-2024-003.html" } ] } diff --git a/2024/45xxx/CVE-2024-45769.json b/2024/45xxx/CVE-2024-45769.json new file mode 100644 index 00000000000..9eb60534340 --- /dev/null +++ b/2024/45xxx/CVE-2024-45769.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-45769", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/45xxx/CVE-2024-45770.json b/2024/45xxx/CVE-2024-45770.json new file mode 100644 index 00000000000..b55960560e5 --- /dev/null +++ b/2024/45xxx/CVE-2024-45770.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-45770", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/5xxx/CVE-2024-5321.json b/2024/5xxx/CVE-2024-5321.json index 038e6a9af44..85eb33470a2 100644 --- a/2024/5xxx/CVE-2024-5321.json +++ b/2024/5xxx/CVE-2024-5321.json @@ -84,7 +84,7 @@ "version": "1.30.3" } ], - "defaultStatus": "unaffected" + "defaultStatus": "affected" } } ] diff --git a/2024/8xxx/CVE-2024-8514.json b/2024/8xxx/CVE-2024-8514.json new file mode 100644 index 00000000000..780ef0ed55a --- /dev/null +++ b/2024/8xxx/CVE-2024-8514.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8514", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8515.json b/2024/8xxx/CVE-2024-8515.json new file mode 100644 index 00000000000..40cf4304c03 --- /dev/null +++ b/2024/8xxx/CVE-2024-8515.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8515", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8516.json b/2024/8xxx/CVE-2024-8516.json new file mode 100644 index 00000000000..d8fa45b5ac5 --- /dev/null +++ b/2024/8xxx/CVE-2024-8516.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8516", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8517.json b/2024/8xxx/CVE-2024-8517.json new file mode 100644 index 00000000000..d03a6805331 --- /dev/null +++ b/2024/8xxx/CVE-2024-8517.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8517", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8518.json b/2024/8xxx/CVE-2024-8518.json new file mode 100644 index 00000000000..4a8b526466f --- /dev/null +++ b/2024/8xxx/CVE-2024-8518.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8518", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8519.json b/2024/8xxx/CVE-2024-8519.json new file mode 100644 index 00000000000..8f534008dca --- /dev/null +++ b/2024/8xxx/CVE-2024-8519.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8519", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8520.json b/2024/8xxx/CVE-2024-8520.json new file mode 100644 index 00000000000..0c33d6b2fd0 --- /dev/null +++ b/2024/8xxx/CVE-2024-8520.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8520", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file