From cb4a09878e60c0e457f8410fbf50cdf5b12d4d03 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 17 Apr 2024 17:00:33 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/5xxx/CVE-2023-5395.json | 218 ++++++++++++++++++++++++++++++++- 2023/5xxx/CVE-2023-5396.json | 218 ++++++++++++++++++++++++++++++++- 2023/5xxx/CVE-2023-5397.json | 218 ++++++++++++++++++++++++++++++++- 2023/5xxx/CVE-2023-5398.json | 218 ++++++++++++++++++++++++++++++++- 2023/5xxx/CVE-2023-5400.json | 218 ++++++++++++++++++++++++++++++++- 2023/5xxx/CVE-2023-5401.json | 218 ++++++++++++++++++++++++++++++++- 2023/5xxx/CVE-2023-5403.json | 218 ++++++++++++++++++++++++++++++++- 2023/5xxx/CVE-2023-5404.json | 218 ++++++++++++++++++++++++++++++++- 2023/5xxx/CVE-2023-5405.json | 218 ++++++++++++++++++++++++++++++++- 2023/5xxx/CVE-2023-5406.json | 218 ++++++++++++++++++++++++++++++++- 2023/5xxx/CVE-2023-5407.json | 218 ++++++++++++++++++++++++++++++++- 2024/28xxx/CVE-2024-28073.json | 84 ++++++++++++- 2024/30xxx/CVE-2024-30980.json | 56 ++++++++- 2024/30xxx/CVE-2024-30981.json | 56 ++++++++- 2024/32xxx/CVE-2024-32314.json | 56 ++++++++- 2024/32xxx/CVE-2024-32317.json | 56 ++++++++- 2024/32xxx/CVE-2024-32746.json | 18 +++ 2024/32xxx/CVE-2024-32747.json | 18 +++ 2024/32xxx/CVE-2024-32748.json | 18 +++ 2024/32xxx/CVE-2024-32749.json | 18 +++ 2024/3xxx/CVE-2024-3923.json | 18 +++ 2024/3xxx/CVE-2024-3924.json | 18 +++ 2024/3xxx/CVE-2024-3925.json | 18 +++ 2024/3xxx/CVE-2024-3926.json | 18 +++ 2024/3xxx/CVE-2024-3927.json | 18 +++ 2024/3xxx/CVE-2024-3928.json | 18 +++ 2024/3xxx/CVE-2024-3929.json | 18 +++ 2024/3xxx/CVE-2024-3930.json | 18 +++ 2024/3xxx/CVE-2024-3931.json | 18 +++ 2024/3xxx/CVE-2024-3932.json | 18 +++ 30 files changed, 2886 insertions(+), 72 deletions(-) create mode 100644 2024/32xxx/CVE-2024-32746.json create mode 100644 2024/32xxx/CVE-2024-32747.json create mode 100644 2024/32xxx/CVE-2024-32748.json create mode 100644 2024/32xxx/CVE-2024-32749.json create mode 100644 2024/3xxx/CVE-2024-3923.json create mode 100644 2024/3xxx/CVE-2024-3924.json create mode 100644 2024/3xxx/CVE-2024-3925.json create mode 100644 2024/3xxx/CVE-2024-3926.json create mode 100644 2024/3xxx/CVE-2024-3927.json create mode 100644 2024/3xxx/CVE-2024-3928.json create mode 100644 2024/3xxx/CVE-2024-3929.json create mode 100644 2024/3xxx/CVE-2024-3930.json create mode 100644 2024/3xxx/CVE-2024-3931.json create mode 100644 2024/3xxx/CVE-2024-3932.json diff --git a/2023/5xxx/CVE-2023-5395.json b/2023/5xxx/CVE-2023-5395.json index f2afb24da35..50c003927cc 100644 --- a/2023/5xxx/CVE-2023-5395.json +++ b/2023/5xxx/CVE-2023-5395.json @@ -1,17 +1,227 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-5395", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@honeywell.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Server receiving a malformed message that uses the hostname in an internal table may cause a stack overflow resulting in possible remote code execution.\u00a0See Honeywell Security Notification for recommendations on upgrading and versioning.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-121", + "cweId": "CWE-121" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Honeywell", + "product": { + "product_data": [ + { + "product_name": "Experion Server", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF1", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "510.2 HF14", + "status": "unaffected" + } + ], + "lessThanOrEqual": "510.2 HF13", + "status": "unaffected", + "version": "510.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "520.2 TCU4 HFR2", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://process.honeywell.com", + "refsource": "MISC", + "name": "https://process.honeywell.com" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/5xxx/CVE-2023-5396.json b/2023/5xxx/CVE-2023-5396.json index 87988270e29..640f8c38bc4 100644 --- a/2023/5xxx/CVE-2023-5396.json +++ b/2023/5xxx/CVE-2023-5396.json @@ -1,17 +1,227 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-5396", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@honeywell.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Server receiving a malformed message creates connection for a hostname that may cause a stack overflow resulting in possible remote code execution.\u00a0See Honeywell Security Notification for recommendations on upgrading and versioning.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-805", + "cweId": "CWE-805" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Honeywell", + "product": { + "product_data": [ + { + "product_name": "Experion Server", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF1", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "510.2 HF14", + "status": "unaffected" + } + ], + "lessThanOrEqual": "510.2 HF13", + "status": "unaffected", + "version": "510.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "520.2 TCU4 HFR2", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://process.honeywell.com", + "refsource": "MISC", + "name": "https://process.honeywell.com" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/5xxx/CVE-2023-5397.json b/2023/5xxx/CVE-2023-5397.json index b310617f77f..245d61188b3 100644 --- a/2023/5xxx/CVE-2023-5397.json +++ b/2023/5xxx/CVE-2023-5397.json @@ -1,17 +1,227 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-5397", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@honeywell.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Server receiving a malformed message to create a new connection could lead to an attacker performing remote code execution or causing a failure.\u00a0See Honeywell Security Notification for recommendations on upgrading and versioning.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Honeywell", + "product": { + "product_data": [ + { + "product_name": "Experion Server", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF1", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "510.2 HF14", + "status": "unaffected" + } + ], + "lessThanOrEqual": "510.2 HF13", + "status": "unaffected", + "version": "510.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "520.2 TCU4 HFR2", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://process.honeywell.com", + "refsource": "MISC", + "name": "https://process.honeywell.com" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/5xxx/CVE-2023-5398.json b/2023/5xxx/CVE-2023-5398.json index fdfea00b6a7..80ca08513bb 100644 --- a/2023/5xxx/CVE-2023-5398.json +++ b/2023/5xxx/CVE-2023-5398.json @@ -1,17 +1,227 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-5398", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@honeywell.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Server receiving a malformed message based on a list of IPs resulting in heap corruption causing a denial of service.\u00a0See Honeywell Security Notification for recommendations on upgrading and versioning.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1327", + "cweId": "CWE-1327" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Honeywell", + "product": { + "product_data": [ + { + "product_name": "Experion Server", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF1", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "510.2 HF14", + "status": "unaffected" + } + ], + "lessThanOrEqual": "510.2 HF13", + "status": "unaffected", + "version": "510.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "520.2 TCU4 HFR2", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://process.honeywell.com", + "refsource": "MISC", + "name": "https://process.honeywell.com" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2023/5xxx/CVE-2023-5400.json b/2023/5xxx/CVE-2023-5400.json index 6ecb62d26ba..12cbe37954d 100644 --- a/2023/5xxx/CVE-2023-5400.json +++ b/2023/5xxx/CVE-2023-5400.json @@ -1,17 +1,227 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-5400", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@honeywell.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Server receiving a malformed message based on a using the specified key values can cause a heap overflow vulnerability which could lead to an attacker performing remote code execution or causing a failure.\u00a0\nSee Honeywell Security Notification for recommendations on upgrading and versioning.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-122", + "cweId": "CWE-122" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Honeywell", + "product": { + "product_data": [ + { + "product_name": "Experion Server", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF1", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "510.2 HF14", + "status": "unaffected" + } + ], + "lessThanOrEqual": "510.2 HF13", + "status": "unaffected", + "version": "510.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "520.2 TCU4 HFR2", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://process.honeywell.com", + "refsource": "MISC", + "name": "https://process.honeywell.com" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/5xxx/CVE-2023-5401.json b/2023/5xxx/CVE-2023-5401.json index 94efc485cbc..8be91c7c988 100644 --- a/2023/5xxx/CVE-2023-5401.json +++ b/2023/5xxx/CVE-2023-5401.json @@ -1,17 +1,227 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-5401", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@honeywell.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Server receiving a malformed message based on a using the specified key values can cause a stack overflow vulnerability which could lead to an attacker performing remote code execution or causing a failure.\u00a0See Honeywell Security Notification for recommendations on upgrading and versioning.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-121", + "cweId": "CWE-121" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Honeywell", + "product": { + "product_data": [ + { + "product_name": "Experion Server", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF1", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "510.2 HF14", + "status": "unaffected" + } + ], + "lessThanOrEqual": "510.2 HF13", + "status": "unaffected", + "version": "510.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "520.2 TCU4 HFR2", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://process.honeywell.com", + "refsource": "MISC", + "name": "https://process.honeywell.com" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/5xxx/CVE-2023-5403.json b/2023/5xxx/CVE-2023-5403.json index b3df5db22dc..6f0e67d598d 100644 --- a/2023/5xxx/CVE-2023-5403.json +++ b/2023/5xxx/CVE-2023-5403.json @@ -1,17 +1,227 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-5403", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@honeywell.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Server hostname translation to IP address manipulation which could lead to an attacker performing remote code execution or causing a failure.\n\nSee Honeywell Security Notification for recommendations on upgrading and versioning.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-121", + "cweId": "CWE-121" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Honeywell", + "product": { + "product_data": [ + { + "product_name": "Experion Server", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF1", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "510.2 HF14", + "status": "unaffected" + } + ], + "lessThanOrEqual": "510.2 HF13", + "status": "unaffected", + "version": "510.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "520.2 TCU4 HFR2", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://process.honeywell.com", + "refsource": "MISC", + "name": "https://process.honeywell.com" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/5xxx/CVE-2023-5404.json b/2023/5xxx/CVE-2023-5404.json index 26059c7294a..dded7bb9b05 100644 --- a/2023/5xxx/CVE-2023-5404.json +++ b/2023/5xxx/CVE-2023-5404.json @@ -1,17 +1,227 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-5404", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@honeywell.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Server receiving a malformed message can cause a pointer to be overwritten which can result in a remote code execution or failure.\u00a0See Honeywell Security Notification for recommendations on upgrading and versioning.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-122", + "cweId": "CWE-122" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Honeywell", + "product": { + "product_data": [ + { + "product_name": "Experion Server", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF1", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "510.2 HF14", + "status": "unaffected" + } + ], + "lessThanOrEqual": "510.2 HF13", + "status": "unaffected", + "version": "510.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "520.2 TCU4 HFR2", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://process.honeywell.com", + "refsource": "MISC", + "name": "https://process.honeywell.com" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/5xxx/CVE-2023-5405.json b/2023/5xxx/CVE-2023-5405.json index cf00f874f8e..276ad269704 100644 --- a/2023/5xxx/CVE-2023-5405.json +++ b/2023/5xxx/CVE-2023-5405.json @@ -1,17 +1,227 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-5405", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@honeywell.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Server information leak for the CDA Server process memory can occur when an error is generated in response to a specially crafted message.\u00a0See Honeywell Security Notification for recommendations on upgrading and versioning.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-787", + "cweId": "CWE-787" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Honeywell", + "product": { + "product_data": [ + { + "product_name": "Experion Server", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF1", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "510.2 HF14", + "status": "unaffected" + } + ], + "lessThanOrEqual": "510.2 HF13", + "status": "unaffected", + "version": "510.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "520.2 TCU4 HFR2", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://process.honeywell.com", + "refsource": "MISC", + "name": "https://process.honeywell.com" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2023/5xxx/CVE-2023-5406.json b/2023/5xxx/CVE-2023-5406.json index a29b337fa18..a7d9b9db7f2 100644 --- a/2023/5xxx/CVE-2023-5406.json +++ b/2023/5xxx/CVE-2023-5406.json @@ -1,17 +1,227 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-5406", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@honeywell.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Server communication with a controller can lead to remote code execution using a specially crafted message from the controller.\u00a0See Honeywell Security Notification for recommendations on upgrading and versioning.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-787", + "cweId": "CWE-787" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Honeywell", + "product": { + "product_data": [ + { + "product_name": "Experion Server", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF1", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "510.2 HF14", + "status": "unaffected" + } + ], + "lessThanOrEqual": "510.2 HF13", + "status": "unaffected", + "version": "510.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "520.2 TCU4 HFR2", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://process.honeywell.com", + "refsource": "MISC", + "name": "https://process.honeywell.com" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2023/5xxx/CVE-2023-5407.json b/2023/5xxx/CVE-2023-5407.json index 71addd19d94..dbe3db21fa9 100644 --- a/2023/5xxx/CVE-2023-5407.json +++ b/2023/5xxx/CVE-2023-5407.json @@ -1,17 +1,227 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-5407", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@honeywell.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Controller denial of service due to improper handling of a specially crafted message received by the controller.\n\nSee Honeywell Security Notification for recommendations on upgrading and versioning.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-121", + "cweId": "CWE-121" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Honeywell", + "product": { + "product_data": [ + { + "product_name": "C300", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF1", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "510.2 HF14", + "status": "unaffected" + } + ], + "lessThanOrEqual": "510.2 HF13", + "status": "unaffected", + "version": "510.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "511.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "520.2 TCU4 HF2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.2 TCU4", + "status": "unaffected", + "version": "520.2", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "520.1 TCU5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "520.1 TCU4", + "status": "unaffected", + "version": "520.1", + "versionType": "semver" + }, + { + "changes": [ + { + "at": "511.5 TCU4 HF4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "511.5 TCU4 HF3", + "status": "unaffected", + "version": "520.2 TCU4 HFR2", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://process.honeywell.com", + "refsource": "MISC", + "name": "https://process.honeywell.com" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/28xxx/CVE-2024-28073.json b/2024/28xxx/CVE-2024-28073.json index 3306081a2a7..6618a653cd3 100644 --- a/2024/28xxx/CVE-2024-28073.json +++ b/2024/28xxx/CVE-2024-28073.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-28073", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@solarwinds.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SolarWinds Serv-U was found to be susceptible to a Directory Traversal Remote Code Vulnerability. This vulnerability requires a highly privileged account to be exploited.\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", + "cweId": "CWE-22" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SolarWinds", + "product": { + "product_data": [ + { + "product_name": "ServU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "15.4.1 and previous versions " + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28073", + "refsource": "MISC", + "name": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28073" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Alexander Skovsende at the Institut For Cyber Risk" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30980.json b/2024/30xxx/CVE-2024-30980.json index 6f773412e0a..2babb7c2513 100644 --- a/2024/30xxx/CVE-2024-30980.json +++ b/2024/30xxx/CVE-2024-30980.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-30980", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-30980", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL Injection vulnerability in phpgurukul Cyber Cafe Management System Using PHP & MySQL 1.0 allows attackers to run arbitrary SQL commands via the Computer Location parameter in manage-computer.php page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://medium.com/@shanunirwan/cve-2024-30980-sql-injection-vulnerability-in-cyber-cafe-management-system-using-php-mysql-v1-0-30bffd26dab7", + "url": "https://medium.com/@shanunirwan/cve-2024-30980-sql-injection-vulnerability-in-cyber-cafe-management-system-using-php-mysql-v1-0-30bffd26dab7" } ] } diff --git a/2024/30xxx/CVE-2024-30981.json b/2024/30xxx/CVE-2024-30981.json index e70b1e2c30c..b0700a14a45 100644 --- a/2024/30xxx/CVE-2024-30981.json +++ b/2024/30xxx/CVE-2024-30981.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-30981", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-30981", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL Injection vulnerability in /edit-computer-detail.php in phpgurukul Cyber Cafe Management System Using PHP & MySQL v1.0 allows attackers to run arbitrary SQL commands via editid in the application URL." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://medium.com/@shanunirwan/cve-2024-30981-sql-injection-vulnerability-in-cyber-cafe-management-system-using-php-mysql-v1-0-534676f9bdeb", + "url": "https://medium.com/@shanunirwan/cve-2024-30981-sql-injection-vulnerability-in-cyber-cafe-management-system-using-php-mysql-v1-0-534676f9bdeb" } ] } diff --git a/2024/32xxx/CVE-2024-32314.json b/2024/32xxx/CVE-2024-32314.json index 47a9c0ea6a1..c44fbbfa5c7 100644 --- a/2024/32xxx/CVE-2024-32314.json +++ b/2024/32xxx/CVE-2024-32314.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-32314", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-32314", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Tenda AC500 V2.0.1.9(1307) firmware contains a command injection vulnerablility in the formexeCommand function via the cmdinput parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formexecommand_cmdi.md", + "refsource": "MISC", + "name": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formexecommand_cmdi.md" } ] } diff --git a/2024/32xxx/CVE-2024-32317.json b/2024/32xxx/CVE-2024-32317.json index c15139cc60b..227de288209 100644 --- a/2024/32xxx/CVE-2024-32317.json +++ b/2024/32xxx/CVE-2024-32317.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-32317", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-32317", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Tenda AC10 v4.0 V16.03.10.13 and V16.03.10.20 firmware has a stack overflow vulnerability via the adslPwd parameter in the formWanParameterSetting function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/formWanParameterSetting.md", + "refsource": "MISC", + "name": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/formWanParameterSetting.md" } ] } diff --git a/2024/32xxx/CVE-2024-32746.json b/2024/32xxx/CVE-2024-32746.json new file mode 100644 index 00000000000..fc3de22f2c6 --- /dev/null +++ b/2024/32xxx/CVE-2024-32746.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32746", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32747.json b/2024/32xxx/CVE-2024-32747.json new file mode 100644 index 00000000000..9e24f098d76 --- /dev/null +++ b/2024/32xxx/CVE-2024-32747.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32747", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32748.json b/2024/32xxx/CVE-2024-32748.json new file mode 100644 index 00000000000..9ede6b93631 --- /dev/null +++ b/2024/32xxx/CVE-2024-32748.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32748", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32749.json b/2024/32xxx/CVE-2024-32749.json new file mode 100644 index 00000000000..65282d95446 --- /dev/null +++ b/2024/32xxx/CVE-2024-32749.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32749", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3923.json b/2024/3xxx/CVE-2024-3923.json new file mode 100644 index 00000000000..c0468728ba4 --- /dev/null +++ b/2024/3xxx/CVE-2024-3923.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3923", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3924.json b/2024/3xxx/CVE-2024-3924.json new file mode 100644 index 00000000000..51dab77458d --- /dev/null +++ b/2024/3xxx/CVE-2024-3924.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3924", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3925.json b/2024/3xxx/CVE-2024-3925.json new file mode 100644 index 00000000000..a0104c057ed --- /dev/null +++ b/2024/3xxx/CVE-2024-3925.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3925", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3926.json b/2024/3xxx/CVE-2024-3926.json new file mode 100644 index 00000000000..23b4cd816e3 --- /dev/null +++ b/2024/3xxx/CVE-2024-3926.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3926", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3927.json b/2024/3xxx/CVE-2024-3927.json new file mode 100644 index 00000000000..5f63e92057f --- /dev/null +++ b/2024/3xxx/CVE-2024-3927.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3927", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3928.json b/2024/3xxx/CVE-2024-3928.json new file mode 100644 index 00000000000..3601048c0a1 --- /dev/null +++ b/2024/3xxx/CVE-2024-3928.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3928", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3929.json b/2024/3xxx/CVE-2024-3929.json new file mode 100644 index 00000000000..bc7f03f63fb --- /dev/null +++ b/2024/3xxx/CVE-2024-3929.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3929", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3930.json b/2024/3xxx/CVE-2024-3930.json new file mode 100644 index 00000000000..fce09384c04 --- /dev/null +++ b/2024/3xxx/CVE-2024-3930.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3930", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3931.json b/2024/3xxx/CVE-2024-3931.json new file mode 100644 index 00000000000..2ec9025a4b9 --- /dev/null +++ b/2024/3xxx/CVE-2024-3931.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3931", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3932.json b/2024/3xxx/CVE-2024-3932.json new file mode 100644 index 00000000000..8e659cb9273 --- /dev/null +++ b/2024/3xxx/CVE-2024-3932.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3932", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file