mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
97c7bc36d5
commit
eaae314f8b
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_where() function."
|
||||
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_where() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -56,6 +56,11 @@
|
||||
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
|
||||
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php where_in() function."
|
||||
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php where_in() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -56,6 +56,11 @@
|
||||
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
|
||||
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_having() function."
|
||||
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_having() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -56,6 +56,11 @@
|
||||
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
|
||||
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php where() function."
|
||||
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php where() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_where_not_in() function."
|
||||
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_where_not_in() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -56,6 +56,11 @@
|
||||
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
|
||||
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_like() function."
|
||||
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_like() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -56,6 +56,11 @@
|
||||
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
|
||||
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php where_not_in() function."
|
||||
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php where_not_in() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -56,6 +56,11 @@
|
||||
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
|
||||
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php like() function."
|
||||
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php like() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -56,6 +56,11 @@
|
||||
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
|
||||
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php having() function."
|
||||
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php having() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -56,6 +56,11 @@
|
||||
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
|
||||
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_where_in() function."
|
||||
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_where_in() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -56,6 +56,11 @@
|
||||
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
|
||||
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_not_like() function."
|
||||
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_not_like() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -56,6 +56,11 @@
|
||||
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
|
||||
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php."
|
||||
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php. Note: Multiple third parties have disputed this as not a valid vulnerability"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -56,6 +56,11 @@
|
||||
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
|
||||
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,76 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-52424",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2023-52424",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "The IEEE 802.11 standard sometimes enables an adversary to trick a victim into connecting to an unintended or untrusted network with Home WEP, Home WPA3 SAE-loop. Enterprise 802.1X/EAP, Mesh AMPE, or FILS, aka an \"SSID Confusion\" issue. This occurs because the SSID is not always used to derive the pairwise master key or session keys, and because there is not a protected exchange of an SSID during a 4-way handshake."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.wi-fi.org/news-events/press-releases",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.wi-fi.org/news-events/press-releases"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://mentor.ieee.org/802.11/dcn/24/11-24-0938-03-000m-protect-ssid-in-4-way-handshake.docx",
|
||||
"url": "https://mentor.ieee.org/802.11/dcn/24/11-24-0938-03-000m-protect-ssid-in-4-way-handshake.docx"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.top10vpn.com/research/wifi-vulnerability-ssid/",
|
||||
"url": "https://www.top10vpn.com/research/wifi-vulnerability-ssid/"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.top10vpn.com/assets/2024/05/Top10VPN-x-Vanhoef-SSID-Confusion.pdf",
|
||||
"url": "https://www.top10vpn.com/assets/2024/05/Top10VPN-x-Vanhoef-SSID-Confusion.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In the Linux kernel through 6.7.2, an untrusted hypervisor can inject virtual interrupts 0 and 14 at any point in time and can trigger the SIGFPE signal handler in userspace applications. This affects AMD SEV-SNP and AMD SEV-ES."
|
||||
"value": "In the Linux kernel before 6.7, an untrusted hypervisor can inject virtual interrupts 0 and 14 at any point in time and can trigger the SIGFPE signal handler in userspace applications. This affects AMD SEV-SNP and AMD SEV-ES."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -56,6 +56,16 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html",
|
||||
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/torvalds/linux/commit/f35e46631b28a63ca3887d7afef1a65a5544da52",
|
||||
"url": "https://github.com/torvalds/linux/commit/f35e46631b28a63ca3887d7afef1a65a5544da52"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f35e46631b28a63ca3887d7afef1a65a5544da52",
|
||||
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f35e46631b28a63ca3887d7afef1a65a5544da52"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,109 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2024-5069",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability, which was classified as critical, has been found in SourceCodester Simple Online Mens Salon Management System 1.0. Affected by this issue is some unknown functionality of the file view_service.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-264926 is the identifier assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
"value": "Eine kritische Schwachstelle wurde in SourceCodester Simple Online Mens Salon Management System 1.0 entdeckt. Es geht hierbei um eine nicht n\u00e4her spezifizierte Funktion der Datei view_service.php. Mit der Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-89 SQL Injection",
|
||||
"cweId": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "SourceCodester",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Simple Online Mens Salon Management System",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264926",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.264926"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264926",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?ctiid.264926"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.336842",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?submit.336842"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/menxin996/Cvehub/blob/main/Men's%20Salon%20Management%20System%20%20view_service.php%20has%20Sqlinjection.pdf",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/menxin996/Cvehub/blob/main/Men's%20Salon%20Management%20System%20%20view_service.php%20has%20Sqlinjection.pdf"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Wangwei (VulDB User)"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseScore": 6.3,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "3.0",
|
||||
"baseScore": 6.3,
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "2.0",
|
||||
"baseScore": 6.5,
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
18
2024/5xxx/CVE-2024-5084.json
Normal file
18
2024/5xxx/CVE-2024-5084.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2024-5084",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user