diff --git a/2024/34xxx/CVE-2024-34391.json b/2024/34xxx/CVE-2024-34391.json index 1d08334be6b..6718195bfe1 100644 --- a/2024/34xxx/CVE-2024-34391.json +++ b/2024/34xxx/CVE-2024-34391.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "libxmljs is vulnerable to a type confusion vulnerability when parsing a specially crafted XML while invoking a function on the result of attrs() that was called on a parsed node. This vulnerability might lead to denial of service (on both 32-bit systems and 64-bit systems), data leak, infinite loop and remote code execution (on 32-bit systems with the XML_PARSE_HUGE flag enabled).\n\n" + "value": "libxmljs is vulnerable to a type confusion vulnerability when parsing a specially crafted XML while invoking a function on the result of attrs() that was called on a parsed node. This vulnerability might lead to denial of service (on both 32-bit systems and 64-bit systems), data leak, infinite loop and remote code execution (on 32-bit systems with the XML_PARSE_HUGE flag enabled)." } ] }, @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')", + "cweId": "CWE-843" } ] } @@ -64,6 +65,9 @@ } ] }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, "source": { "discovery": "EXTERNAL" }, diff --git a/2024/34xxx/CVE-2024-34392.json b/2024/34xxx/CVE-2024-34392.json index 2485b33828c..71001696f91 100644 --- a/2024/34xxx/CVE-2024-34392.json +++ b/2024/34xxx/CVE-2024-34392.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')", + "cweId": "CWE-843" } ] } @@ -64,6 +65,9 @@ } ] }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, "source": { "discovery": "EXTERNAL" }, diff --git a/2024/34xxx/CVE-2024-34393.json b/2024/34xxx/CVE-2024-34393.json index aa8ccbf5fa8..391566cf776 100644 --- a/2024/34xxx/CVE-2024-34393.json +++ b/2024/34xxx/CVE-2024-34393.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')", + "cweId": "CWE-843" } ] } @@ -64,6 +65,9 @@ } ] }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, "source": { "discovery": "EXTERNAL" }, diff --git a/2024/34xxx/CVE-2024-34394.json b/2024/34xxx/CVE-2024-34394.json index 0b941baca91..49fb0b68dbc 100644 --- a/2024/34xxx/CVE-2024-34394.json +++ b/2024/34xxx/CVE-2024-34394.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')", + "cweId": "CWE-843" } ] } @@ -64,6 +65,9 @@ } ] }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, "source": { "discovery": "EXTERNAL" }, diff --git a/2024/45xxx/CVE-2024-45187.json b/2024/45xxx/CVE-2024-45187.json index a5bccb422c5..3d072af57e8 100644 --- a/2024/45xxx/CVE-2024-45187.json +++ b/2024/45xxx/CVE-2024-45187.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-613 Insufficient Session Expiration", + "cweId": "CWE-613" } ] } @@ -59,6 +60,9 @@ } ] }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, "source": { "discovery": "EXTERNAL" }, diff --git a/2024/45xxx/CVE-2024-45188.json b/2024/45xxx/CVE-2024-45188.json index ef2062bf344..ae0eef178c5 100644 --- a/2024/45xxx/CVE-2024-45188.json +++ b/2024/45xxx/CVE-2024-45188.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", + "cweId": "CWE-22" } ] } @@ -59,6 +60,9 @@ } ] }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, "source": { "discovery": "EXTERNAL" }, diff --git a/2024/45xxx/CVE-2024-45189.json b/2024/45xxx/CVE-2024-45189.json index 75cbc5b6cb3..12cf974ccf7 100644 --- a/2024/45xxx/CVE-2024-45189.json +++ b/2024/45xxx/CVE-2024-45189.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", + "cweId": "CWE-22" } ] } @@ -59,6 +60,9 @@ } ] }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, "source": { "discovery": "EXTERNAL" }, diff --git a/2024/45xxx/CVE-2024-45190.json b/2024/45xxx/CVE-2024-45190.json index 699430aac44..492d9116312 100644 --- a/2024/45xxx/CVE-2024-45190.json +++ b/2024/45xxx/CVE-2024-45190.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-35 Path Traversal: '.../...//'", + "cweId": "CWE-35" } ] } @@ -59,6 +60,9 @@ } ] }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, "source": { "discovery": "EXTERNAL" }, diff --git a/2024/5xxx/CVE-2024-5565.json b/2024/5xxx/CVE-2024-5565.json index 60e5846a007..c1f34cf1ca8 100644 --- a/2024/5xxx/CVE-2024-5565.json +++ b/2024/5xxx/CVE-2024-5565.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-94 Improper Control of Generation of Code ('Code Injection')", + "cweId": "CWE-94" } ] } @@ -59,6 +60,9 @@ } ] }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, "source": { "discovery": "EXTERNAL" }, diff --git a/2024/6xxx/CVE-2024-6507.json b/2024/6xxx/CVE-2024-6507.json index d3fab2ad44a..d2642180395 100644 --- a/2024/6xxx/CVE-2024-6507.json +++ b/2024/6xxx/CVE-2024-6507.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", + "cweId": "CWE-78" } ] } @@ -64,6 +65,9 @@ } ] }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, "source": { "discovery": "EXTERNAL" }, diff --git a/2024/6xxx/CVE-2024-6960.json b/2024/6xxx/CVE-2024-6960.json index 829481cc203..7c0b4d240cf 100644 --- a/2024/6xxx/CVE-2024-6960.json +++ b/2024/6xxx/CVE-2024-6960.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-502 Deserialization of Untrusted Data", + "cweId": "CWE-502" } ] } @@ -59,6 +60,9 @@ } ] }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, "source": { "discovery": "EXTERNAL" }, diff --git a/2024/6xxx/CVE-2024-6961.json b/2024/6xxx/CVE-2024-6961.json index a550f902693..957827a50da 100644 --- a/2024/6xxx/CVE-2024-6961.json +++ b/2024/6xxx/CVE-2024-6961.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-611 Improper Restriction of XML External Entity Reference", + "cweId": "CWE-611" } ] } @@ -59,6 +60,9 @@ } ] }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, "source": { "discovery": "EXTERNAL" }, diff --git a/2024/7xxx/CVE-2024-7340.json b/2024/7xxx/CVE-2024-7340.json index 310003209d4..1c47be5604b 100644 --- a/2024/7xxx/CVE-2024-7340.json +++ b/2024/7xxx/CVE-2024-7340.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", + "cweId": "CWE-22" } ] } @@ -64,6 +65,9 @@ } ] }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, "source": { "discovery": "EXTERNAL" }, diff --git a/2024/8xxx/CVE-2024-8072.json b/2024/8xxx/CVE-2024-8072.json index aee6e22a580..4b2153abee4 100644 --- a/2024/8xxx/CVE-2024-8072.json +++ b/2024/8xxx/CVE-2024-8072.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", + "cweId": "CWE-200" } ] } @@ -59,6 +60,9 @@ } ] }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, "source": { "discovery": "EXTERNAL" },