From d85cd9f962ccaca1c4a7a7d032fc796997d5813a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Apr 2024 22:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/52xxx/CVE-2023-52043.json | 56 ++++++++++++++++++--- 2024/27xxx/CVE-2024-27705.json | 56 ++++++++++++++++++--- 2024/27xxx/CVE-2024-27706.json | 56 ++++++++++++++++++--- 2024/28xxx/CVE-2024-28870.json | 80 ++++++++++++++++++++++++++++-- 2024/29xxx/CVE-2024-29413.json | 56 ++++++++++++++++++--- 2024/2xxx/CVE-2024-2689.json | 89 ++++++++++++++++++++++++++++++++-- 2024/31xxx/CVE-2024-31466.json | 18 +++++++ 2024/31xxx/CVE-2024-31467.json | 18 +++++++ 2024/31xxx/CVE-2024-31468.json | 18 +++++++ 2024/31xxx/CVE-2024-31469.json | 18 +++++++ 2024/31xxx/CVE-2024-31470.json | 18 +++++++ 2024/31xxx/CVE-2024-31471.json | 18 +++++++ 2024/31xxx/CVE-2024-31472.json | 18 +++++++ 2024/31xxx/CVE-2024-31473.json | 18 +++++++ 2024/31xxx/CVE-2024-31474.json | 18 +++++++ 2024/31xxx/CVE-2024-31475.json | 18 +++++++ 2024/31xxx/CVE-2024-31476.json | 18 +++++++ 2024/31xxx/CVE-2024-31477.json | 18 +++++++ 2024/31xxx/CVE-2024-31478.json | 18 +++++++ 2024/31xxx/CVE-2024-31479.json | 18 +++++++ 2024/31xxx/CVE-2024-31480.json | 18 +++++++ 2024/31xxx/CVE-2024-31481.json | 18 +++++++ 2024/31xxx/CVE-2024-31482.json | 18 +++++++ 2024/31xxx/CVE-2024-31483.json | 18 +++++++ 2024/3xxx/CVE-2024-3289.json | 18 +++++++ 2024/3xxx/CVE-2024-3290.json | 18 +++++++ 2024/3xxx/CVE-2024-3291.json | 18 +++++++ 2024/3xxx/CVE-2024-3292.json | 18 +++++++ 2024/3xxx/CVE-2024-3293.json | 18 +++++++ 29 files changed, 775 insertions(+), 32 deletions(-) create mode 100644 2024/31xxx/CVE-2024-31466.json create mode 100644 2024/31xxx/CVE-2024-31467.json create mode 100644 2024/31xxx/CVE-2024-31468.json create mode 100644 2024/31xxx/CVE-2024-31469.json create mode 100644 2024/31xxx/CVE-2024-31470.json create mode 100644 2024/31xxx/CVE-2024-31471.json create mode 100644 2024/31xxx/CVE-2024-31472.json create mode 100644 2024/31xxx/CVE-2024-31473.json create mode 100644 2024/31xxx/CVE-2024-31474.json create mode 100644 2024/31xxx/CVE-2024-31475.json create mode 100644 2024/31xxx/CVE-2024-31476.json create mode 100644 2024/31xxx/CVE-2024-31477.json create mode 100644 2024/31xxx/CVE-2024-31478.json create mode 100644 2024/31xxx/CVE-2024-31479.json create mode 100644 2024/31xxx/CVE-2024-31480.json create mode 100644 2024/31xxx/CVE-2024-31481.json create mode 100644 2024/31xxx/CVE-2024-31482.json create mode 100644 2024/31xxx/CVE-2024-31483.json create mode 100644 2024/3xxx/CVE-2024-3289.json create mode 100644 2024/3xxx/CVE-2024-3290.json create mode 100644 2024/3xxx/CVE-2024-3291.json create mode 100644 2024/3xxx/CVE-2024-3292.json create mode 100644 2024/3xxx/CVE-2024-3293.json diff --git a/2023/52xxx/CVE-2023-52043.json b/2023/52xxx/CVE-2023-52043.json index 668465fb02e..a8acca9ba8f 100644 --- a/2023/52xxx/CVE-2023-52043.json +++ b/2023/52xxx/CVE-2023-52043.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-52043", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-52043", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in D-Link COVR 1100, 1102, 1103 AC1200 Dual-Band Whole-Home Mesh Wi-Fi System (Hardware Rev B1) truncates Wireless Access Point Passwords (WPA-PSK) allowing an attacker to gain unauthorized network access via weak authentication controls." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exploots.github.io/posts/2024/01/18/d-link-covr-1102-vulnerability.html", + "url": "https://exploots.github.io/posts/2024/01/18/d-link-covr-1102-vulnerability.html" } ] } diff --git a/2024/27xxx/CVE-2024-27705.json b/2024/27xxx/CVE-2024-27705.json index 198b6dbe605..82c5fea3131 100644 --- a/2024/27xxx/CVE-2024-27705.json +++ b/2024/27xxx/CVE-2024-27705.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-27705", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-27705", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting vulnerability in Leantime v3.0.6 allows attackers to execute arbitrary code via upload of crafted PDF file to the files/browse endpoint." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-27705", + "url": "https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-27705" } ] } diff --git a/2024/27xxx/CVE-2024-27706.json b/2024/27xxx/CVE-2024-27706.json index aba8e2eaeda..878a8b0dba2 100644 --- a/2024/27xxx/CVE-2024-27706.json +++ b/2024/27xxx/CVE-2024-27706.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-27706", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-27706", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting vulnerability in Huly Platform v.0.6.202 allows attackers to execute arbitrary code via upload of crafted SVG file to issues." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/b-hermes/vulnerability-research/blob/main/CVE-2024-27706/README.md", + "url": "https://github.com/b-hermes/vulnerability-research/blob/main/CVE-2024-27706/README.md" } ] } diff --git a/2024/28xxx/CVE-2024-28870.json b/2024/28xxx/CVE-2024-28870.json index b7ce5055712..f1b3632e625 100644 --- a/2024/28xxx/CVE-2024-28870.json +++ b/2024/28xxx/CVE-2024-28870.json @@ -1,17 +1,89 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-28870", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community. When parsing an overly long SSH banner, Suricata can use excessive CPU resources, as well as cause excessive logging volume in alert records. This issue has been patched in versions 6.0.17 and 7.0.4.\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-770: Allocation of Resources Without Limits or Throttling", + "cweId": "CWE-770" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "OISF", + "product": { + "product_data": [ + { + "product_name": "suricata", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "<= 6.0.16" + }, + { + "version_affected": "=", + "version_value": ">= 7.0.0, <= 7.0.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/OISF/suricata/security/advisories/GHSA-mhhx-xw7r-r5c8", + "refsource": "MISC", + "name": "https://github.com/OISF/suricata/security/advisories/GHSA-mhhx-xw7r-r5c8" + } + ] + }, + "source": { + "advisory": "GHSA-mhhx-xw7r-r5c8", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29413.json b/2024/29xxx/CVE-2024-29413.json index 939493d306a..ed5a7296788 100644 --- a/2024/29xxx/CVE-2024-29413.json +++ b/2024/29xxx/CVE-2024-29413.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-29413", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-29413", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting vulnerability in Webasyst v.2.9.9 allows a remote attacker to run arbitrary code via the Instant messenger field in the Contact info function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/RealestName/Vulnerability-Research/tree/main/CVE-2024-29413", + "url": "https://github.com/RealestName/Vulnerability-Research/tree/main/CVE-2024-29413" } ] } diff --git a/2024/2xxx/CVE-2024-2689.json b/2024/2xxx/CVE-2024-2689.json index 5f5f185f75d..213ca6a5994 100644 --- a/2024/2xxx/CVE-2024-2689.json +++ b/2024/2xxx/CVE-2024-2689.json @@ -1,17 +1,98 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-2689", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@temporal.io", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Denial of Service in Temporal Server prior to version 1.20.5, 1.21.6, and 1.22.7 allows an authenticated user who has permissions to interact with workflows and has crafted an invalid UTF-8 string for submission to potentially cause a crashloop. If left unchecked, the task containing the invalid UTF-8 will become stuck in the queue, causing an increase in queue lag. Eventually, all processes handling these queues will become stuck and the system will run out of resources. The workflow ID of the failing task will be visible in the logs, and can be used to remove that workflow as a mitigation. Version 1.23 is not impacted.\u00a0In this context, a user is an operator of Temporal Server.\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Temporal Technologies, Inc.", + "product": { + "product_data": [ + { + "product_name": "Temporal Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "1.20.5" + }, + { + "version_affected": "<", + "version_name": "1.21.0", + "version_value": "1.21.6" + }, + { + "version_affected": "<", + "version_name": "1.22.0", + "version_value": "1.22.7" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/temporalio/temporal/releases", + "refsource": "MISC", + "name": "https://github.com/temporalio/temporal/releases" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "INTERNAL" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/31xxx/CVE-2024-31466.json b/2024/31xxx/CVE-2024-31466.json new file mode 100644 index 00000000000..d3aa0163b7e --- /dev/null +++ b/2024/31xxx/CVE-2024-31466.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31466", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31467.json b/2024/31xxx/CVE-2024-31467.json new file mode 100644 index 00000000000..396bd6a93ef --- /dev/null +++ b/2024/31xxx/CVE-2024-31467.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31467", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31468.json b/2024/31xxx/CVE-2024-31468.json new file mode 100644 index 00000000000..7748cdd88b0 --- /dev/null +++ b/2024/31xxx/CVE-2024-31468.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31468", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31469.json b/2024/31xxx/CVE-2024-31469.json new file mode 100644 index 00000000000..4d53ed15106 --- /dev/null +++ b/2024/31xxx/CVE-2024-31469.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31469", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31470.json b/2024/31xxx/CVE-2024-31470.json new file mode 100644 index 00000000000..feff8dbdeec --- /dev/null +++ b/2024/31xxx/CVE-2024-31470.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31470", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31471.json b/2024/31xxx/CVE-2024-31471.json new file mode 100644 index 00000000000..1e15105dbc2 --- /dev/null +++ b/2024/31xxx/CVE-2024-31471.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31471", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31472.json b/2024/31xxx/CVE-2024-31472.json new file mode 100644 index 00000000000..058364f23fa --- /dev/null +++ b/2024/31xxx/CVE-2024-31472.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31472", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31473.json b/2024/31xxx/CVE-2024-31473.json new file mode 100644 index 00000000000..c96bcd625b5 --- /dev/null +++ b/2024/31xxx/CVE-2024-31473.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31473", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31474.json b/2024/31xxx/CVE-2024-31474.json new file mode 100644 index 00000000000..7282b351ea5 --- /dev/null +++ b/2024/31xxx/CVE-2024-31474.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31474", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31475.json b/2024/31xxx/CVE-2024-31475.json new file mode 100644 index 00000000000..64a60f715dc --- /dev/null +++ b/2024/31xxx/CVE-2024-31475.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31475", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31476.json b/2024/31xxx/CVE-2024-31476.json new file mode 100644 index 00000000000..647aeef128c --- /dev/null +++ b/2024/31xxx/CVE-2024-31476.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31476", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31477.json b/2024/31xxx/CVE-2024-31477.json new file mode 100644 index 00000000000..ef93f80109c --- /dev/null +++ b/2024/31xxx/CVE-2024-31477.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31477", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31478.json b/2024/31xxx/CVE-2024-31478.json new file mode 100644 index 00000000000..a6bcde4508b --- /dev/null +++ b/2024/31xxx/CVE-2024-31478.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31478", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31479.json b/2024/31xxx/CVE-2024-31479.json new file mode 100644 index 00000000000..e83550f7458 --- /dev/null +++ b/2024/31xxx/CVE-2024-31479.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31479", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31480.json b/2024/31xxx/CVE-2024-31480.json new file mode 100644 index 00000000000..c675987d468 --- /dev/null +++ b/2024/31xxx/CVE-2024-31480.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31480", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31481.json b/2024/31xxx/CVE-2024-31481.json new file mode 100644 index 00000000000..8e89e9c66c9 --- /dev/null +++ b/2024/31xxx/CVE-2024-31481.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31481", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31482.json b/2024/31xxx/CVE-2024-31482.json new file mode 100644 index 00000000000..03abe09e51d --- /dev/null +++ b/2024/31xxx/CVE-2024-31482.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31482", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31483.json b/2024/31xxx/CVE-2024-31483.json new file mode 100644 index 00000000000..479897d90ea --- /dev/null +++ b/2024/31xxx/CVE-2024-31483.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31483", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3289.json b/2024/3xxx/CVE-2024-3289.json new file mode 100644 index 00000000000..d373d36f49b --- /dev/null +++ b/2024/3xxx/CVE-2024-3289.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3289", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3290.json b/2024/3xxx/CVE-2024-3290.json new file mode 100644 index 00000000000..ed3bfc423a5 --- /dev/null +++ b/2024/3xxx/CVE-2024-3290.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3290", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3291.json b/2024/3xxx/CVE-2024-3291.json new file mode 100644 index 00000000000..daf4a682b44 --- /dev/null +++ b/2024/3xxx/CVE-2024-3291.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3291", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3292.json b/2024/3xxx/CVE-2024-3292.json new file mode 100644 index 00000000000..7c902cd8e25 --- /dev/null +++ b/2024/3xxx/CVE-2024-3292.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3292", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3293.json b/2024/3xxx/CVE-2024-3293.json new file mode 100644 index 00000000000..1d1fad43a75 --- /dev/null +++ b/2024/3xxx/CVE-2024-3293.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3293", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file