From e86a2f19372685331eae5f63a9878b2c96906e85 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 19 Apr 2024 16:00:33 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/41xxx/CVE-2021-41526.json | 5 ++ 2023/22xxx/CVE-2023-22869.json | 84 ++++++++++++++++++++++++++++-- 2024/0xxx/CVE-2024-0690.json | 85 ------------------------------ 2024/27xxx/CVE-2024-27752.json | 56 +++++++++++++++++--- 2024/29xxx/CVE-2024-29028.json | 81 +++++++++++++++++++++++++++-- 2024/29xxx/CVE-2024-29029.json | 95 ++++++++++++++++++++++++++++++++-- 2024/29xxx/CVE-2024-29030.json | 86 ++++++++++++++++++++++++++++-- 2024/29xxx/CVE-2024-29183.json | 81 +++++++++++++++++++++++++++-- 2024/31xxx/CVE-2024-31587.json | 56 +++++++++++++++++--- 2024/31xxx/CVE-2024-31846.json | 56 +++++++++++++++++--- 2024/32xxx/CVE-2024-32206.json | 66 ++++++++++++++++++++--- 2024/32xxx/CVE-2024-32409.json | 66 ++++++++++++++++++++--- 2024/32xxx/CVE-2024-32901.json | 18 +++++++ 2024/32xxx/CVE-2024-32902.json | 18 +++++++ 2024/32xxx/CVE-2024-32903.json | 18 +++++++ 2024/32xxx/CVE-2024-32904.json | 18 +++++++ 2024/32xxx/CVE-2024-32905.json | 18 +++++++ 2024/32xxx/CVE-2024-32906.json | 18 +++++++ 2024/32xxx/CVE-2024-32907.json | 18 +++++++ 2024/32xxx/CVE-2024-32908.json | 18 +++++++ 2024/32xxx/CVE-2024-32909.json | 18 +++++++ 2024/32xxx/CVE-2024-32910.json | 18 +++++++ 2024/32xxx/CVE-2024-32911.json | 18 +++++++ 2024/32xxx/CVE-2024-32912.json | 18 +++++++ 2024/32xxx/CVE-2024-32913.json | 18 +++++++ 2024/32xxx/CVE-2024-32914.json | 18 +++++++ 2024/32xxx/CVE-2024-32915.json | 18 +++++++ 2024/32xxx/CVE-2024-32916.json | 18 +++++++ 2024/32xxx/CVE-2024-32917.json | 18 +++++++ 2024/32xxx/CVE-2024-32918.json | 18 +++++++ 2024/32xxx/CVE-2024-32919.json | 18 +++++++ 2024/32xxx/CVE-2024-32920.json | 18 +++++++ 2024/32xxx/CVE-2024-32921.json | 18 +++++++ 2024/32xxx/CVE-2024-32922.json | 18 +++++++ 2024/32xxx/CVE-2024-32923.json | 18 +++++++ 2024/32xxx/CVE-2024-32924.json | 18 +++++++ 2024/32xxx/CVE-2024-32925.json | 18 +++++++ 2024/32xxx/CVE-2024-32926.json | 18 +++++++ 2024/32xxx/CVE-2024-32927.json | 18 +++++++ 2024/32xxx/CVE-2024-32928.json | 18 +++++++ 2024/32xxx/CVE-2024-32929.json | 18 +++++++ 2024/32xxx/CVE-2024-32930.json | 18 +++++++ 2024/3xxx/CVE-2024-3999.json | 18 +++++++ 2024/4xxx/CVE-2024-4000.json | 18 +++++++ 2024/4xxx/CVE-2024-4001.json | 18 +++++++ 2024/4xxx/CVE-2024-4002.json | 18 +++++++ 2024/4xxx/CVE-2024-4003.json | 18 +++++++ 2024/4xxx/CVE-2024-4004.json | 18 +++++++ 48 files changed, 1330 insertions(+), 135 deletions(-) create mode 100644 2024/32xxx/CVE-2024-32901.json create mode 100644 2024/32xxx/CVE-2024-32902.json create mode 100644 2024/32xxx/CVE-2024-32903.json create mode 100644 2024/32xxx/CVE-2024-32904.json create mode 100644 2024/32xxx/CVE-2024-32905.json create mode 100644 2024/32xxx/CVE-2024-32906.json create mode 100644 2024/32xxx/CVE-2024-32907.json create mode 100644 2024/32xxx/CVE-2024-32908.json create mode 100644 2024/32xxx/CVE-2024-32909.json create mode 100644 2024/32xxx/CVE-2024-32910.json create mode 100644 2024/32xxx/CVE-2024-32911.json create mode 100644 2024/32xxx/CVE-2024-32912.json create mode 100644 2024/32xxx/CVE-2024-32913.json create mode 100644 2024/32xxx/CVE-2024-32914.json create mode 100644 2024/32xxx/CVE-2024-32915.json create mode 100644 2024/32xxx/CVE-2024-32916.json create mode 100644 2024/32xxx/CVE-2024-32917.json create mode 100644 2024/32xxx/CVE-2024-32918.json create mode 100644 2024/32xxx/CVE-2024-32919.json create mode 100644 2024/32xxx/CVE-2024-32920.json create mode 100644 2024/32xxx/CVE-2024-32921.json create mode 100644 2024/32xxx/CVE-2024-32922.json create mode 100644 2024/32xxx/CVE-2024-32923.json create mode 100644 2024/32xxx/CVE-2024-32924.json create mode 100644 2024/32xxx/CVE-2024-32925.json create mode 100644 2024/32xxx/CVE-2024-32926.json create mode 100644 2024/32xxx/CVE-2024-32927.json create mode 100644 2024/32xxx/CVE-2024-32928.json create mode 100644 2024/32xxx/CVE-2024-32929.json create mode 100644 2024/32xxx/CVE-2024-32930.json create mode 100644 2024/3xxx/CVE-2024-3999.json create mode 100644 2024/4xxx/CVE-2024-4000.json create mode 100644 2024/4xxx/CVE-2024-4001.json create mode 100644 2024/4xxx/CVE-2024-4002.json create mode 100644 2024/4xxx/CVE-2024-4003.json create mode 100644 2024/4xxx/CVE-2024-4004.json diff --git a/2021/41xxx/CVE-2021-41526.json b/2021/41xxx/CVE-2021-41526.json index 96c217b2403..8cf7c96456c 100644 --- a/2021/41xxx/CVE-2021-41526.json +++ b/2021/41xxx/CVE-2021-41526.json @@ -61,6 +61,11 @@ "name": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/MNDT-2021-0011/MNDT-2021-0011.md", "refsource": "MISC", "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/MNDT-2021-0011/MNDT-2021-0011.md" + }, + { + "refsource": "FULLDISC", + "name": "20240419 MindManager 23 - full disclosure", + "url": "http://seclists.org/fulldisclosure/2024/Apr/24" } ] } diff --git a/2023/22xxx/CVE-2023-22869.json b/2023/22xxx/CVE-2023-22869.json index 84c3b7c64a9..cff5b916b0b 100644 --- a/2023/22xxx/CVE-2023-22869.json +++ b/2023/22xxx/CVE-2023-22869.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-22869", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Aspera Faspex 5.0.0 through 5.0.7 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 244119." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-532 Insertion of Sensitive Information into Log File", + "cweId": "CWE-532" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Aspera Faspex", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "5.0.0", + "version_value": "5.0.7" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/7148632", + "refsource": "MISC", + "name": "https://www.ibm.com/support/pages/node/7148632" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/244119", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/244119" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/0xxx/CVE-2024-0690.json b/2024/0xxx/CVE-2024-0690.json index 1ee5523b319..0dfbf65aade 100644 --- a/2024/0xxx/CVE-2024-0690.json +++ b/2024/0xxx/CVE-2024-0690.json @@ -31,39 +31,6 @@ "affects": { "vendor": { "vendor_data": [ - { - "vendor_name": "n/a", - "product": { - "product_data": [ - { - "product_name": "ansible", - "version": { - "version_data": [ - { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "versions": [ - { - "version": "2.14.4", - "status": "unaffected" - }, - { - "version": "2.15.9", - "status": "unaffected" - }, - { - "version": "2.16.3", - "status": "unaffected" - } - ] - } - } - ] - } - } - ] - } - }, { "vendor_name": "Red Hat", "product": { @@ -138,58 +105,6 @@ } ] } - }, - { - "vendor_name": "Fedora", - "product": { - "product_data": [ - { - "product_name": "Fedora 38", - "version": { - "version_data": [ - { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "defaultStatus": "unaffected" - } - } - ] - } - }, - { - "product_name": "Fedora 39", - "version": { - "version_data": [ - { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "defaultStatus": "unaffected" - } - }, - { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "defaultStatus": "affected" - } - } - ] - } - }, - { - "product_name": "Extra Packages for Enterprise Linux 8", - "version": { - "version_data": [ - { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "defaultStatus": "unaffected" - } - } - ] - } - } - ] - } } ] } diff --git a/2024/27xxx/CVE-2024-27752.json b/2024/27xxx/CVE-2024-27752.json index d34fff7b094..011e7ffd27e 100644 --- a/2024/27xxx/CVE-2024-27752.json +++ b/2024/27xxx/CVE-2024-27752.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-27752", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-27752", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting vulnerability in CSZ CMS v.1.3.0 allows a remote attacker to execute arbitrary code via the Default Keyword field in the settings function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/flyhha/cms/blob/main/1.md", + "refsource": "MISC", + "name": "https://github.com/flyhha/cms/blob/main/1.md" } ] } diff --git a/2024/29xxx/CVE-2024-29028.json b/2024/29xxx/CVE-2024-29028.json index 0fd47b54bbc..45ab8e996c3 100644 --- a/2024/29xxx/CVE-2024-29028.json +++ b/2024/29xxx/CVE-2024-29028.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29028", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /o/get/httpmeta that allows unauthenticated users to enumerate the internal network and receive limited html values in json form. This vulnerability is fixed in 0.16.1." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-918: Server-Side Request Forgery (SSRF)", + "cweId": "CWE-918" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "usememos", + "product": { + "product_data": [ + { + "product_name": "memos", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 0.16.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/usememos/memos/commit/6ffc09d86a1302c384ef085aa70c7bddb3ce7ba9", + "refsource": "MISC", + "name": "https://github.com/usememos/memos/commit/6ffc09d86a1302c384ef085aa70c7bddb3ce7ba9" + }, + { + "url": "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos", + "refsource": "MISC", + "name": "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos" + } + ] + }, + "source": { + "advisory": "GHSA-6fcf-g3mp-xj2x", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29029.json b/2024/29xxx/CVE-2024-29029.json index 348d58bf670..456ac0b051f 100644 --- a/2024/29xxx/CVE-2024-29029.json +++ b/2024/29xxx/CVE-2024-29029.json @@ -1,17 +1,104 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29029", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /o/get/image that allows unauthenticated users to enumerate the internal network and retrieve images. The response from the image request is then copied into the response of the current server request, causing a reflected XSS vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-918: Server-Side Request Forgery (SSRF)", + "cweId": "CWE-918" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "usememos", + "product": { + "product_data": [ + { + "product_name": "memos", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "<= 0.13.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/", + "refsource": "MISC", + "name": "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/" + }, + { + "url": "https://github.com/usememos/memos/commit/bbd206e8930281eb040cc8c549641455892b9eb5", + "refsource": "MISC", + "name": "https://github.com/usememos/memos/commit/bbd206e8930281eb040cc8c549641455892b9eb5" + }, + { + "url": "https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/http_getter.go#L29", + "refsource": "MISC", + "name": "https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/http_getter.go#L29" + } + ] + }, + "source": { + "advisory": "GHSA-9cqm-mgv9-vv9j", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29030.json b/2024/29xxx/CVE-2024-29030.json index c40cd90cafa..9c8ae9f1113 100644 --- a/2024/29xxx/CVE-2024-29030.json +++ b/2024/29xxx/CVE-2024-29030.json @@ -1,17 +1,95 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29030", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /api/resource that allows authenticated users to enumerate the internal network." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-918: Server-Side Request Forgery (SSRF)", + "cweId": "CWE-918" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "usememos", + "product": { + "product_data": [ + { + "product_name": "memos", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "<= 0.13.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/", + "refsource": "MISC", + "name": "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/" + }, + { + "url": "https://github.com/usememos/memos/commit/bbd206e8930281eb040cc8c549641455892b9eb5", + "refsource": "MISC", + "name": "https://github.com/usememos/memos/commit/bbd206e8930281eb040cc8c549641455892b9eb5" + }, + { + "url": "https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/resource.go#L83", + "refsource": "MISC", + "name": "https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/resource.go#L83" + } + ] + }, + "source": { + "advisory": "GHSA-65fm-2jgr-j7qq", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29183.json b/2024/29xxx/CVE-2024-29183.json index 0e9ac6abb3f..705c2b3ec39 100644 --- a/2024/29xxx/CVE-2024-29183.json +++ b/2024/29xxx/CVE-2024-29183.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29183", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "OpenRASP is a RASP solution that directly integrates its protection engine into the application server by instrumentation. There exists a reflected XSS in the /login page due to a reflection of the redirect parameter. This allows an attacker to execute arbitrary javascript with the permissions of a user after the user logins with their account." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "baidu", + "product": { + "product_data": [ + { + "product_name": "openrasp", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "<=1.3.7" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/baidu/openrasp/commit/240fde3901c7a36aaade3683ffd5c89140a535fb", + "refsource": "MISC", + "name": "https://github.com/baidu/openrasp/commit/240fde3901c7a36aaade3683ffd5c89140a535fb" + }, + { + "url": "https://securitylab.github.com/advisories/GHSL-2023-253_openrasp", + "refsource": "MISC", + "name": "https://securitylab.github.com/advisories/GHSL-2023-253_openrasp" + } + ] + }, + "source": { + "advisory": "GHSA-64hc-fffw-56x9", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/31xxx/CVE-2024-31587.json b/2024/31xxx/CVE-2024-31587.json index baaf69564a9..1e54c3c8e33 100644 --- a/2024/31xxx/CVE-2024-31587.json +++ b/2024/31xxx/CVE-2024-31587.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-31587", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-31587", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SecuSTATION Camera V2.5.5.3116-S50-SMA-B20160811A and lower allows an unauthenticated attacker to download device configuration files via a crafted request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/kklzzcun/kklzzcun.github.io/blob/main/Camera.md", + "refsource": "MISC", + "name": "https://github.com/kklzzcun/kklzzcun.github.io/blob/main/Camera.md" } ] } diff --git a/2024/31xxx/CVE-2024-31846.json b/2024/31xxx/CVE-2024-31846.json index e8e3a48b766..f3ce9563798 100644 --- a/2024/31xxx/CVE-2024-31846.json +++ b/2024/31xxx/CVE-2024-31846.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-31846", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-31846", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Italtel Embrace 1.6.4. The web application does not restrict or incorrectly restricts access to a resource from an unauthorized actor." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.gruppotim.it/it/footer/red-team.html", + "refsource": "MISC", + "name": "https://www.gruppotim.it/it/footer/red-team.html" } ] } diff --git a/2024/32xxx/CVE-2024-32206.json b/2024/32xxx/CVE-2024-32206.json index 7f1f3d371ec..4ed79e6e2c9 100644 --- a/2024/32xxx/CVE-2024-32206.json +++ b/2024/32xxx/CVE-2024-32206.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-32206", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-32206", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A stored cross-site scripting (XSS) vulnerability in the component \\affiche\\admin\\index.php of WUZHICMS v4.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the $formdata parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/wuzhicms/wuzhicms", + "refsource": "MISC", + "name": "https://github.com/wuzhicms/wuzhicms" + }, + { + "url": "http://wuzhicms.com", + "refsource": "MISC", + "name": "http://wuzhicms.com" + }, + { + "url": "https://github.com/majic-banana/vulnerability/blob/main/POC/WUZHICMS4.1.0%20Stored%20Xss%20In%20Affiche%20Model.md", + "refsource": "MISC", + "name": "https://github.com/majic-banana/vulnerability/blob/main/POC/WUZHICMS4.1.0%20Stored%20Xss%20In%20Affiche%20Model.md" } ] } diff --git a/2024/32xxx/CVE-2024-32409.json b/2024/32xxx/CVE-2024-32409.json index fb35676ec27..e880c608080 100644 --- a/2024/32xxx/CVE-2024-32409.json +++ b/2024/32xxx/CVE-2024-32409.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-32409", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-32409", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in SEMCMS v.4.8 allows a remote attacker to execute arbitrary code via a crafted script." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://semcms.com", + "refsource": "MISC", + "name": "http://semcms.com" + }, + { + "url": "http://www.sem-cms.com/", + "refsource": "MISC", + "name": "http://www.sem-cms.com/" + }, + { + "refsource": "CONFIRM", + "name": "https://gitee.com/whats-the-bad-idea/cve", + "url": "https://gitee.com/whats-the-bad-idea/cve" } ] } diff --git a/2024/32xxx/CVE-2024-32901.json b/2024/32xxx/CVE-2024-32901.json new file mode 100644 index 00000000000..a217bf70867 --- /dev/null +++ b/2024/32xxx/CVE-2024-32901.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32901", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32902.json b/2024/32xxx/CVE-2024-32902.json new file mode 100644 index 00000000000..6030ec3071f --- /dev/null +++ b/2024/32xxx/CVE-2024-32902.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32902", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32903.json b/2024/32xxx/CVE-2024-32903.json new file mode 100644 index 00000000000..ddaaf62b8ab --- /dev/null +++ b/2024/32xxx/CVE-2024-32903.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32903", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32904.json b/2024/32xxx/CVE-2024-32904.json new file mode 100644 index 00000000000..4b10d54af74 --- /dev/null +++ b/2024/32xxx/CVE-2024-32904.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32904", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32905.json b/2024/32xxx/CVE-2024-32905.json new file mode 100644 index 00000000000..b979d659c9d --- /dev/null +++ b/2024/32xxx/CVE-2024-32905.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32905", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32906.json b/2024/32xxx/CVE-2024-32906.json new file mode 100644 index 00000000000..d1826abec05 --- /dev/null +++ b/2024/32xxx/CVE-2024-32906.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32906", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32907.json b/2024/32xxx/CVE-2024-32907.json new file mode 100644 index 00000000000..ff6a5aff1df --- /dev/null +++ b/2024/32xxx/CVE-2024-32907.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32907", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32908.json b/2024/32xxx/CVE-2024-32908.json new file mode 100644 index 00000000000..b7563ada7aa --- /dev/null +++ b/2024/32xxx/CVE-2024-32908.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32908", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32909.json b/2024/32xxx/CVE-2024-32909.json new file mode 100644 index 00000000000..53ce794d670 --- /dev/null +++ b/2024/32xxx/CVE-2024-32909.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32909", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32910.json b/2024/32xxx/CVE-2024-32910.json new file mode 100644 index 00000000000..b17013ee58a --- /dev/null +++ b/2024/32xxx/CVE-2024-32910.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32910", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32911.json b/2024/32xxx/CVE-2024-32911.json new file mode 100644 index 00000000000..edd3df23529 --- /dev/null +++ b/2024/32xxx/CVE-2024-32911.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32911", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32912.json b/2024/32xxx/CVE-2024-32912.json new file mode 100644 index 00000000000..0e976b3b56d --- /dev/null +++ b/2024/32xxx/CVE-2024-32912.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32912", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32913.json b/2024/32xxx/CVE-2024-32913.json new file mode 100644 index 00000000000..556b8ecec16 --- /dev/null +++ b/2024/32xxx/CVE-2024-32913.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32913", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32914.json b/2024/32xxx/CVE-2024-32914.json new file mode 100644 index 00000000000..fdb63281a36 --- /dev/null +++ b/2024/32xxx/CVE-2024-32914.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32914", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32915.json b/2024/32xxx/CVE-2024-32915.json new file mode 100644 index 00000000000..ce05518e643 --- /dev/null +++ b/2024/32xxx/CVE-2024-32915.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32915", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32916.json b/2024/32xxx/CVE-2024-32916.json new file mode 100644 index 00000000000..2153254835d --- /dev/null +++ b/2024/32xxx/CVE-2024-32916.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32916", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32917.json b/2024/32xxx/CVE-2024-32917.json new file mode 100644 index 00000000000..d84dc695852 --- /dev/null +++ b/2024/32xxx/CVE-2024-32917.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32917", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32918.json b/2024/32xxx/CVE-2024-32918.json new file mode 100644 index 00000000000..e482a2c58d4 --- /dev/null +++ b/2024/32xxx/CVE-2024-32918.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32918", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32919.json b/2024/32xxx/CVE-2024-32919.json new file mode 100644 index 00000000000..52c18355890 --- /dev/null +++ b/2024/32xxx/CVE-2024-32919.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32919", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32920.json b/2024/32xxx/CVE-2024-32920.json new file mode 100644 index 00000000000..b62d1cc114a --- /dev/null +++ b/2024/32xxx/CVE-2024-32920.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32920", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32921.json b/2024/32xxx/CVE-2024-32921.json new file mode 100644 index 00000000000..2caa1ceda5c --- /dev/null +++ b/2024/32xxx/CVE-2024-32921.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32921", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32922.json b/2024/32xxx/CVE-2024-32922.json new file mode 100644 index 00000000000..4193a678fe8 --- /dev/null +++ b/2024/32xxx/CVE-2024-32922.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32922", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32923.json b/2024/32xxx/CVE-2024-32923.json new file mode 100644 index 00000000000..6f9a17fd465 --- /dev/null +++ b/2024/32xxx/CVE-2024-32923.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32923", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32924.json b/2024/32xxx/CVE-2024-32924.json new file mode 100644 index 00000000000..a0f8f2b8ad3 --- /dev/null +++ b/2024/32xxx/CVE-2024-32924.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32924", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32925.json b/2024/32xxx/CVE-2024-32925.json new file mode 100644 index 00000000000..7a03bad4490 --- /dev/null +++ b/2024/32xxx/CVE-2024-32925.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32925", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32926.json b/2024/32xxx/CVE-2024-32926.json new file mode 100644 index 00000000000..c099013fe19 --- /dev/null +++ b/2024/32xxx/CVE-2024-32926.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32926", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32927.json b/2024/32xxx/CVE-2024-32927.json new file mode 100644 index 00000000000..feebac3e6c4 --- /dev/null +++ b/2024/32xxx/CVE-2024-32927.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32927", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32928.json b/2024/32xxx/CVE-2024-32928.json new file mode 100644 index 00000000000..e8cab29aca5 --- /dev/null +++ b/2024/32xxx/CVE-2024-32928.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32928", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32929.json b/2024/32xxx/CVE-2024-32929.json new file mode 100644 index 00000000000..de05c58f829 --- /dev/null +++ b/2024/32xxx/CVE-2024-32929.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32929", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/32xxx/CVE-2024-32930.json b/2024/32xxx/CVE-2024-32930.json new file mode 100644 index 00000000000..d14e5363a75 --- /dev/null +++ b/2024/32xxx/CVE-2024-32930.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-32930", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3999.json b/2024/3xxx/CVE-2024-3999.json new file mode 100644 index 00000000000..954e7a06371 --- /dev/null +++ b/2024/3xxx/CVE-2024-3999.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3999", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4000.json b/2024/4xxx/CVE-2024-4000.json new file mode 100644 index 00000000000..3dee6a25653 --- /dev/null +++ b/2024/4xxx/CVE-2024-4000.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4000", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4001.json b/2024/4xxx/CVE-2024-4001.json new file mode 100644 index 00000000000..ed77c7f561b --- /dev/null +++ b/2024/4xxx/CVE-2024-4001.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4001", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4002.json b/2024/4xxx/CVE-2024-4002.json new file mode 100644 index 00000000000..235c9f79da8 --- /dev/null +++ b/2024/4xxx/CVE-2024-4002.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4002", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4003.json b/2024/4xxx/CVE-2024-4003.json new file mode 100644 index 00000000000..93c1b7e26bc --- /dev/null +++ b/2024/4xxx/CVE-2024-4003.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4003", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/4xxx/CVE-2024-4004.json b/2024/4xxx/CVE-2024-4004.json new file mode 100644 index 00000000000..1e7f723cc03 --- /dev/null +++ b/2024/4xxx/CVE-2024-4004.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-4004", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file