From cb37dbe99f1bdac648c4dbe4bf94ecfe4ca3ff3d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 4 Feb 2024 21:00:33 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/46xxx/CVE-2021-46902.json | 62 ++++++++++++++++++++++++++++++++++ 2021/46xxx/CVE-2021-46903.json | 62 ++++++++++++++++++++++++++++++++++ 2024/25xxx/CVE-2024-25075.json | 18 ++++++++++ 2024/25xxx/CVE-2024-25076.json | 18 ++++++++++ 2024/25xxx/CVE-2024-25077.json | 18 ++++++++++ 2024/25xxx/CVE-2024-25078.json | 18 ++++++++++ 2024/25xxx/CVE-2024-25079.json | 18 ++++++++++ 2024/25xxx/CVE-2024-25080.json | 18 ++++++++++ 2024/25xxx/CVE-2024-25081.json | 18 ++++++++++ 2024/25xxx/CVE-2024-25082.json | 18 ++++++++++ 10 files changed, 268 insertions(+) create mode 100644 2021/46xxx/CVE-2021-46902.json create mode 100644 2021/46xxx/CVE-2021-46903.json create mode 100644 2024/25xxx/CVE-2024-25075.json create mode 100644 2024/25xxx/CVE-2024-25076.json create mode 100644 2024/25xxx/CVE-2024-25077.json create mode 100644 2024/25xxx/CVE-2024-25078.json create mode 100644 2024/25xxx/CVE-2024-25079.json create mode 100644 2024/25xxx/CVE-2024-25080.json create mode 100644 2024/25xxx/CVE-2024-25081.json create mode 100644 2024/25xxx/CVE-2024-25082.json diff --git a/2021/46xxx/CVE-2021-46902.json b/2021/46xxx/CVE-2021-46902.json new file mode 100644 index 00000000000..62163268fee --- /dev/null +++ b/2021/46xxx/CVE-2021-46902.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-46902", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in LTOS-Web-Interface in Meinberg LANTIME-Firmware before 6.24.029 MBGID-9343 and 7 before 7.04.008 MBGID-6303. Path validation is mishandled, and thus an admin can read or delete files in violation of expected access controls." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2021-03-meinberg-lantime-firmware-v7-04-008-und-v6-24-029.htm", + "refsource": "MISC", + "name": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2021-03-meinberg-lantime-firmware-v7-04-008-und-v6-24-029.htm" + } + ] + } +} \ No newline at end of file diff --git a/2021/46xxx/CVE-2021-46903.json b/2021/46xxx/CVE-2021-46903.json new file mode 100644 index 00000000000..be3f415b822 --- /dev/null +++ b/2021/46xxx/CVE-2021-46903.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-46903", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in LTOS-Web-Interface in Meinberg LANTIME-Firmware before 6.24.029 MBGID-9343 and 7 before 7.04.008 MBGID-6303. An admin can delete required user accounts (in violation of expected access control)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2021-03-meinberg-lantime-firmware-v7-04-008-und-v6-24-029.htm", + "refsource": "MISC", + "name": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2021-03-meinberg-lantime-firmware-v7-04-008-und-v6-24-029.htm" + } + ] + } +} \ No newline at end of file diff --git a/2024/25xxx/CVE-2024-25075.json b/2024/25xxx/CVE-2024-25075.json new file mode 100644 index 00000000000..56e8edc90ff --- /dev/null +++ b/2024/25xxx/CVE-2024-25075.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-25075", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/25xxx/CVE-2024-25076.json b/2024/25xxx/CVE-2024-25076.json new file mode 100644 index 00000000000..3412fb61a21 --- /dev/null +++ b/2024/25xxx/CVE-2024-25076.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-25076", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/25xxx/CVE-2024-25077.json b/2024/25xxx/CVE-2024-25077.json new file mode 100644 index 00000000000..ac6e2546507 --- /dev/null +++ b/2024/25xxx/CVE-2024-25077.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-25077", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/25xxx/CVE-2024-25078.json b/2024/25xxx/CVE-2024-25078.json new file mode 100644 index 00000000000..799162cfbb7 --- /dev/null +++ b/2024/25xxx/CVE-2024-25078.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-25078", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/25xxx/CVE-2024-25079.json b/2024/25xxx/CVE-2024-25079.json new file mode 100644 index 00000000000..9bd6545a126 --- /dev/null +++ b/2024/25xxx/CVE-2024-25079.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-25079", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/25xxx/CVE-2024-25080.json b/2024/25xxx/CVE-2024-25080.json new file mode 100644 index 00000000000..e2616203e6a --- /dev/null +++ b/2024/25xxx/CVE-2024-25080.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-25080", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/25xxx/CVE-2024-25081.json b/2024/25xxx/CVE-2024-25081.json new file mode 100644 index 00000000000..59958808d27 --- /dev/null +++ b/2024/25xxx/CVE-2024-25081.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-25081", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/25xxx/CVE-2024-25082.json b/2024/25xxx/CVE-2024-25082.json new file mode 100644 index 00000000000..971660da283 --- /dev/null +++ b/2024/25xxx/CVE-2024-25082.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-25082", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file