diff --git a/2023/35xxx/CVE-2023-35086.json b/2023/35xxx/CVE-2023-35086.json index 71b7155f39f..18ef81dd469 100644 --- a/2023/35xxx/CVE-2023-35086.json +++ b/2023/35xxx/CVE-2023-35086.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "\nIt is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by directly using input as a format string when calling syslog in logmessage_normal function, in the do_detwan_cgi module of httpd. An unauthenticated remote attacker without privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\nThis issue affects RT-AX56U V2: 3.0.0.4.386_50460; RT-AC86U: 3.0.0.4_386_51529.\n\n" + "value": "\nIt is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by directly using input as a format string when calling syslog in logmessage_normal function, in the do_detwan_cgi module of httpd. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\nThis issue affects RT-AX56U V2: 3.0.0.4.386_50460; RT-AC86U: 3.0.0.4_386_51529.\n\n" } ] }, @@ -89,7 +89,7 @@ "value": "\n\n
RT-AX56U V2: update firmware version to 3.0.0.4_386_51598
RT-AC86U: \n\nupdate firmware version\n\n 3.0.0.4.386_51915
\n\n
" } ], - "value": "\nRT-AX56U V2: update firmware version to 3.0.0.4_386_51598\n\nRT-AC86U: \n\nupdate firmware version\n\n 3.0.0.4.386_51915\n\n\n\n\n" + "value": "\nRT-AX56U V2: update firmware version to 3.0.0.4_386_51598\n\nRT-AC86U: \n\nupdate firmware version\n\n 3.0.0.4.386_51915\n\n" } ], "impact": { @@ -98,14 +98,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", + "baseScore": 7.2, + "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ] diff --git a/2023/39xxx/CVE-2023-39238.json b/2023/39xxx/CVE-2023-39238.json index dfdc7663561..8cf5835b096 100644 --- a/2023/39xxx/CVE-2023-39238.json +++ b/2023/39xxx/CVE-2023-39238.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "\nIt is identified a format string vulnerability in ASUS RT-AX56U V2. This vulnerability is caused by lacking validation for a specific value\u00a0within its set_iperf3_svr.cgi module. An unauthenticated remote attacker can exploit this vulnerability without privilege to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\n" + "value": "\nIt is identified a format string vulnerability in ASUS RT-AX56U V2. This vulnerability is caused by lacking validation for a specific value\u00a0within its set_iperf3_svr.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\n" } ] }, @@ -56,17 +56,6 @@ } ] } - }, - { - "product_name": "RT-AC86U", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "3.0.0.4_386_51529" - } - ] - } } ] } @@ -97,10 +86,10 @@ { "base64": false, "type": "text/html", - "value": "\n\n

RT-AX55: update to 3.0.0.4.386_51948 

RT-AX56U_V2: update to 3.0.0.4.386_51948 

RT-AC86U: update to 3.0.0.4.386_51915

" + "value": "\n\n

RT-AX55: update to 3.0.0.4.386_51948 

RT-AX56U_V2: update to 3.0.0.4.386_51948 

" } ], - "value": "\nRT-AX55: update to 3.0.0.4.386_51948\u00a0\n\nRT-AX56U_V2: update to 3.0.0.4.386_51948\u00a0\n\nRT-AC86U: update to 3.0.0.4.386_51915\n\n" + "value": "\nRT-AX55: update to 3.0.0.4.386_51948\u00a0\n\nRT-AX56U_V2: update to 3.0.0.4.386_51948\u00a0\n\n" } ], "impact": { @@ -109,14 +98,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", + "baseScore": 7.2, + "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ] diff --git a/2023/39xxx/CVE-2023-39239.json b/2023/39xxx/CVE-2023-39239.json index 2a08e1c3aae..02927e38dfb 100644 --- a/2023/39xxx/CVE-2023-39239.json +++ b/2023/39xxx/CVE-2023-39239.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "\nIt is identified a format string vulnerability in ASUS RT-AX56U V2\u2019s General function API. This vulnerability is caused by lacking validation for a specific value within its apply.cgi module. An unauthenticated remote attacker can exploit this vulnerability without privilege to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\n\n\n\n" + "value": "\nIt is identified a format string vulnerability in ASUS RT-AX56U V2\u2019s General function API. This vulnerability is caused by lacking validation for a specific value within its apply.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\n" } ] }, @@ -109,14 +109,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", + "baseScore": 7.2, + "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ] diff --git a/2023/5xxx/CVE-2023-5189.json b/2023/5xxx/CVE-2023-5189.json index ff086a6cad3..e21446825b6 100644 --- a/2023/5xxx/CVE-2023-5189.json +++ b/2023/5xxx/CVE-2023-5189.json @@ -97,12 +97,34 @@ } }, { - "product_name": "Red Hat Satellite 6", + "product_name": "Red Hat Satellite 6.14 for RHEL 8", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { + "versions": [ + { + "version": "0:0.4.18-2.el8pc", + "lessThan": "*", + "versionType": "rpm", + "status": "unaffected" + } + ], + "defaultStatus": "affected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "0:0.4.18-2.el8pc", + "lessThan": "*", + "versionType": "rpm", + "status": "unaffected" + } + ], "defaultStatus": "affected" } } @@ -122,6 +144,11 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2023:7773" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:1536", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2024:1536" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-5189", "refsource": "MISC", diff --git a/2024/1xxx/CVE-2024-1580.json b/2024/1xxx/CVE-2024-1580.json index fd5df995cb6..e5380df67fc 100644 --- a/2024/1xxx/CVE-2024-1580.json +++ b/2024/1xxx/CVE-2024-1580.json @@ -99,6 +99,31 @@ "url": "https://support.apple.com/kb/HT214094", "refsource": "MISC", "name": "https://support.apple.com/kb/HT214094" + }, + { + "url": "http://seclists.org/fulldisclosure/2024/Mar/41", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2024/Mar/41" + }, + { + "url": "http://seclists.org/fulldisclosure/2024/Mar/36", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2024/Mar/36" + }, + { + "url": "http://seclists.org/fulldisclosure/2024/Mar/38", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2024/Mar/38" + }, + { + "url": "http://seclists.org/fulldisclosure/2024/Mar/37", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2024/Mar/37" + }, + { + "url": "http://seclists.org/fulldisclosure/2024/Mar/40", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2024/Mar/40" } ] }, diff --git a/2024/20xxx/CVE-2024-20259.json b/2024/20xxx/CVE-2024-20259.json index b6f539b6f2d..75825e3dbb4 100644 --- a/2024/20xxx/CVE-2024-20259.json +++ b/2024/20xxx/CVE-2024-20259.json @@ -1,17 +1,410 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-20259", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@cisco.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to a crafted IPv4 DHCP request packet being mishandled when endpoint analytics are enabled. An attacker could exploit this vulnerability by sending a crafted DHCP request through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.\r\n\r Note: The attack vector is listed as network because a DHCP relay anywhere on the network could allow exploits from networks other than the adjacent one." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Heap-based Buffer Overflow", + "cweId": "CWE-122" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cisco", + "product": { + "product_data": [ + { + "product_name": "Cisco IOS XE Software", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "17.1.1" + }, + { + "version_affected": "=", + "version_value": "17.1.1a" + }, + { + "version_affected": "=", + "version_value": "17.1.1s" + }, + { + "version_affected": "=", + "version_value": "17.1.1t" + }, + { + "version_affected": "=", + "version_value": "17.1.3" + }, + { + "version_affected": "=", + "version_value": "17.2.1" + }, + { + "version_affected": "=", + "version_value": "17.2.1r" + }, + { + "version_affected": "=", + "version_value": "17.2.1a" + }, + { + "version_affected": "=", + "version_value": "17.2.1v" + }, + { + "version_affected": "=", + "version_value": "17.2.2" + }, + { + "version_affected": "=", + "version_value": "17.2.3" + }, + { + "version_affected": "=", + "version_value": "17.3.1" + }, + { + "version_affected": "=", + "version_value": "17.3.2" + }, + { + "version_affected": "=", + "version_value": "17.3.3" + }, + { + "version_affected": "=", + "version_value": "17.3.1a" + }, + { + "version_affected": "=", + "version_value": "17.3.1w" + }, + { + "version_affected": "=", + "version_value": "17.3.2a" + }, + { + "version_affected": "=", + "version_value": "17.3.1x" + }, + { + "version_affected": "=", + "version_value": "17.3.1z" + }, + { + "version_affected": "=", + "version_value": "17.3.4" + }, + { + "version_affected": "=", + "version_value": "17.3.5" + }, + { + "version_affected": "=", + "version_value": "17.3.4a" + }, + { + "version_affected": "=", + "version_value": "17.3.6" + }, + { + "version_affected": "=", + "version_value": "17.3.4b" + }, + { + "version_affected": "=", + "version_value": "17.3.4c" + }, + { + "version_affected": "=", + "version_value": "17.3.5a" + }, + { + "version_affected": "=", + "version_value": "17.3.5b" + }, + { + "version_affected": "=", + "version_value": "17.3.7" + }, + { + "version_affected": "=", + "version_value": "17.3.8" + }, + { + "version_affected": "=", + "version_value": "17.3.8a" + }, + { + "version_affected": "=", + "version_value": "17.4.1" + }, + { + "version_affected": "=", + "version_value": "17.4.2" + }, + { + "version_affected": "=", + "version_value": "17.4.1a" + }, + { + "version_affected": "=", + "version_value": "17.4.1b" + }, + { + "version_affected": "=", + "version_value": "17.4.2a" + }, + { + "version_affected": "=", + "version_value": "17.5.1" + }, + { + "version_affected": "=", + "version_value": "17.5.1a" + }, + { + "version_affected": "=", + "version_value": "17.6.1" + }, + { + "version_affected": "=", + "version_value": "17.6.2" + }, + { + "version_affected": "=", + "version_value": "17.6.1w" + }, + { + "version_affected": "=", + "version_value": "17.6.1a" + }, + { + "version_affected": "=", + "version_value": "17.6.1x" + }, + { + "version_affected": "=", + "version_value": "17.6.3" + }, + { + "version_affected": "=", + "version_value": "17.6.1y" + }, + { + "version_affected": "=", + "version_value": "17.6.1z" + }, + { + "version_affected": "=", + "version_value": "17.6.3a" + }, + { + "version_affected": "=", + "version_value": "17.6.4" + }, + { + "version_affected": "=", + "version_value": "17.6.1z1" + }, + { + "version_affected": "=", + "version_value": "17.6.5" + }, + { + "version_affected": "=", + "version_value": "17.6.6" + }, + { + "version_affected": "=", + "version_value": "17.6.6a" + }, + { + "version_affected": "=", + "version_value": "17.6.5a" + }, + { + "version_affected": "=", + "version_value": "17.7.1" + }, + { + "version_affected": "=", + "version_value": "17.7.1a" + }, + { + "version_affected": "=", + "version_value": "17.7.1b" + }, + { + "version_affected": "=", + "version_value": "17.7.2" + }, + { + "version_affected": "=", + "version_value": "17.10.1" + }, + { + "version_affected": "=", + "version_value": "17.10.1a" + }, + { + "version_affected": "=", + "version_value": "17.10.1b" + }, + { + "version_affected": "=", + "version_value": "17.8.1" + }, + { + "version_affected": "=", + "version_value": "17.8.1a" + }, + { + "version_affected": "=", + "version_value": "17.9.1" + }, + { + "version_affected": "=", + "version_value": "17.9.1w" + }, + { + "version_affected": "=", + "version_value": "17.9.2" + }, + { + "version_affected": "=", + "version_value": "17.9.1a" + }, + { + "version_affected": "=", + "version_value": "17.9.1x" + }, + { + "version_affected": "=", + "version_value": "17.9.1y" + }, + { + "version_affected": "=", + "version_value": "17.9.3" + }, + { + "version_affected": "=", + "version_value": "17.9.2a" + }, + { + "version_affected": "=", + "version_value": "17.9.1x1" + }, + { + "version_affected": "=", + "version_value": "17.9.3a" + }, + { + "version_affected": "=", + "version_value": "17.9.4" + }, + { + "version_affected": "=", + "version_value": "17.9.1y1" + }, + { + "version_affected": "=", + "version_value": "17.9.4a" + }, + { + "version_affected": "=", + "version_value": "17.11.1" + }, + { + "version_affected": "=", + "version_value": "17.11.1a" + }, + { + "version_affected": "=", + "version_value": "17.12.1" + }, + { + "version_affected": "=", + "version_value": "17.12.1w" + }, + { + "version_affected": "=", + "version_value": "17.12.1a" + }, + { + "version_affected": "=", + "version_value": "17.11.99SW" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dhcp-dos-T3CXPO9z", + "refsource": "MISC", + "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dhcp-dos-T3CXPO9z" + } + ] + }, + "source": { + "advisory": "cisco-sa-dhcp-dos-T3CXPO9z", + "discovery": "INTERNAL", + "defects": [ + "CSCwh59449" + ] + }, + "exploit": [ + { + "lang": "en", + "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" } ] } diff --git a/2024/20xxx/CVE-2024-20276.json b/2024/20xxx/CVE-2024-20276.json index bcc5156fbdc..c68933b59c6 100644 --- a/2024/20xxx/CVE-2024-20276.json +++ b/2024/20xxx/CVE-2024-20276.json @@ -1,17 +1,118 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-20276", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@cisco.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in Cisco IOS Software for Cisco Catalyst 6000 Series Switches could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly.\r\n\r This vulnerability is due to improper handling of process-switched traffic. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncaught Exception", + "cweId": "CWE-248" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cisco", + "product": { + "product_data": [ + { + "product_name": "IOS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "15.5(1)SY5" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY6" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY7" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY8" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY9" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY10" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY11" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dos-Hq4d3tZG", + "refsource": "MISC", + "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dos-Hq4d3tZG" + } + ] + }, + "source": { + "advisory": "cisco-sa-ios-dos-Hq4d3tZG", + "discovery": "EXTERNAL", + "defects": [ + "CSCwf55936" + ] + }, + "exploit": [ + { + "lang": "en", + "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" } ] } diff --git a/2024/20xxx/CVE-2024-20278.json b/2024/20xxx/CVE-2024-20278.json index 709b66332bc..e8e9178d967 100644 --- a/2024/20xxx/CVE-2024-20278.json +++ b/2024/20xxx/CVE-2024-20278.json @@ -1,17 +1,262 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-20278", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@cisco.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate privileges to root on an affected device.\r\n\r This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input over NETCONF to an affected device. A successful exploit could allow the attacker to elevate privileges from Administrator to root." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Incomplete List of Disallowed Inputs", + "cweId": "CWE-184" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cisco", + "product": { + "product_data": [ + { + "product_name": "Cisco IOS XE Software", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "17.6.1" + }, + { + "version_affected": "=", + "version_value": "17.6.2" + }, + { + "version_affected": "=", + "version_value": "17.6.1w" + }, + { + "version_affected": "=", + "version_value": "17.6.1a" + }, + { + "version_affected": "=", + "version_value": "17.6.1x" + }, + { + "version_affected": "=", + "version_value": "17.6.3" + }, + { + "version_affected": "=", + "version_value": "17.6.1y" + }, + { + "version_affected": "=", + "version_value": "17.6.1z" + }, + { + "version_affected": "=", + "version_value": "17.6.3a" + }, + { + "version_affected": "=", + "version_value": "17.6.4" + }, + { + "version_affected": "=", + "version_value": "17.6.1z1" + }, + { + "version_affected": "=", + "version_value": "17.6.5" + }, + { + "version_affected": "=", + "version_value": "17.6.6" + }, + { + "version_affected": "=", + "version_value": "17.6.6a" + }, + { + "version_affected": "=", + "version_value": "17.6.5a" + }, + { + "version_affected": "=", + "version_value": "17.7.1" + }, + { + "version_affected": "=", + "version_value": "17.7.1a" + }, + { + "version_affected": "=", + "version_value": "17.7.1b" + }, + { + "version_affected": "=", + "version_value": "17.7.2" + }, + { + "version_affected": "=", + "version_value": "17.10.1" + }, + { + "version_affected": "=", + "version_value": "17.10.1a" + }, + { + "version_affected": "=", + "version_value": "17.10.1b" + }, + { + "version_affected": "=", + "version_value": "17.8.1" + }, + { + "version_affected": "=", + "version_value": "17.8.1a" + }, + { + "version_affected": "=", + "version_value": "17.9.1" + }, + { + "version_affected": "=", + "version_value": "17.9.1w" + }, + { + "version_affected": "=", + "version_value": "17.9.2" + }, + { + "version_affected": "=", + "version_value": "17.9.1a" + }, + { + "version_affected": "=", + "version_value": "17.9.1x" + }, + { + "version_affected": "=", + "version_value": "17.9.1y" + }, + { + "version_affected": "=", + "version_value": "17.9.3" + }, + { + "version_affected": "=", + "version_value": "17.9.2a" + }, + { + "version_affected": "=", + "version_value": "17.9.1x1" + }, + { + "version_affected": "=", + "version_value": "17.9.3a" + }, + { + "version_affected": "=", + "version_value": "17.9.4" + }, + { + "version_affected": "=", + "version_value": "17.9.1y1" + }, + { + "version_affected": "=", + "version_value": "17.9.4a" + }, + { + "version_affected": "=", + "version_value": "17.11.1" + }, + { + "version_affected": "=", + "version_value": "17.11.1a" + }, + { + "version_affected": "=", + "version_value": "17.12.1" + }, + { + "version_affected": "=", + "version_value": "17.12.1w" + }, + { + "version_affected": "=", + "version_value": "17.12.1a" + }, + { + "version_affected": "=", + "version_value": "17.11.99SW" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX", + "refsource": "MISC", + "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX" + } + ] + }, + "source": { + "advisory": "cisco-sa-iosxe-priv-esc-seAx6NLX", + "discovery": "INTERNAL", + "defects": [ + "CSCwf91143" + ] + }, + "exploit": [ + { + "lang": "en", + "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" } ] } diff --git a/2024/20xxx/CVE-2024-20306.json b/2024/20xxx/CVE-2024-20306.json index 5d222781739..7c8518004b2 100644 --- a/2024/20xxx/CVE-2024-20306.json +++ b/2024/20xxx/CVE-2024-20306.json @@ -1,17 +1,126 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-20306", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@cisco.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the Unified Threat Defense (UTD) configuration CLI of Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying host operating system. To exploit this vulnerability, an attacker must have level 15 privileges on the affected device. \r\n\r This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by submitting a crafted CLI command to an affected device. A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying operating system." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Handling of Parameters", + "cweId": "CWE-233" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cisco", + "product": { + "product_data": [ + { + "product_name": "Cisco IOS XE Software", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "17.10.1" + }, + { + "version_affected": "=", + "version_value": "17.10.1a" + }, + { + "version_affected": "=", + "version_value": "17.10.1b" + }, + { + "version_affected": "=", + "version_value": "17.11.1" + }, + { + "version_affected": "=", + "version_value": "17.11.1a" + }, + { + "version_affected": "=", + "version_value": "17.12.1" + }, + { + "version_affected": "=", + "version_value": "17.12.1w" + }, + { + "version_affected": "=", + "version_value": "17.12.1a" + }, + { + "version_affected": "=", + "version_value": "17.11.99SW" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-utd-cmd-JbL8KvHT", + "refsource": "MISC", + "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-utd-cmd-JbL8KvHT" + } + ] + }, + "source": { + "advisory": "cisco-sa-iosxe-utd-cmd-JbL8KvHT", + "discovery": "INTERNAL", + "defects": [ + "CSCwh05263" + ] + }, + "exploit": [ + { + "lang": "en", + "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" } ] } diff --git a/2024/20xxx/CVE-2024-20311.json b/2024/20xxx/CVE-2024-20311.json index 1a03feb1430..61d6950c25c 100644 --- a/2024/20xxx/CVE-2024-20311.json +++ b/2024/20xxx/CVE-2024-20311.json @@ -1,17 +1,2929 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-20311", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@cisco.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the Locator ID Separation Protocol (LISP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload.\r\n\r This vulnerability is due to the incorrect handling of LISP packets. An attacker could exploit this vulnerability by sending a crafted LISP packet to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.\r\n\r Note: This vulnerability could be exploited over either IPv4 or IPv6 transport." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncontrolled Recursion", + "cweId": "CWE-674" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cisco", + "product": { + "product_data": [ + { + "product_name": "IOS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "15.1(1)XB" + }, + { + "version_affected": "=", + "version_value": "15.2(1)S" + }, + { + "version_affected": "=", + "version_value": "15.2(2)S" + }, + { + "version_affected": "=", + "version_value": "15.2(1)S1" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S" + }, + { + "version_affected": "=", + "version_value": "15.2(1)S2" + }, + { + "version_affected": "=", + "version_value": "15.2(2)S1" + }, + { + "version_affected": "=", + "version_value": "15.2(2)S2" + }, + { + "version_affected": "=", + "version_value": "15.2(2)S0a" + }, + { + "version_affected": "=", + "version_value": "15.2(2)S0c" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S1" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S4" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S6" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S2" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S5" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S3" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S3a" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S4a" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S7" + }, + { + "version_affected": "=", + "version_value": "15.3(1)T" + }, + { + "version_affected": "=", + "version_value": "15.3(2)T" + }, + { + "version_affected": "=", + "version_value": "15.3(1)T1" + }, + { + "version_affected": "=", + "version_value": "15.3(1)T2" + }, + { + "version_affected": "=", + "version_value": "15.3(1)T3" + }, + { + "version_affected": "=", + "version_value": "15.3(1)T4" + }, + { + "version_affected": "=", + "version_value": "15.3(2)T1" + }, + { + "version_affected": "=", + "version_value": "15.3(2)T2" + }, + { + "version_affected": "=", + "version_value": "15.3(2)T3" + }, + { + "version_affected": "=", + "version_value": "15.3(2)T4" + }, + { + "version_affected": "=", + "version_value": "15.1(2)S" + }, + { + "version_affected": "=", + "version_value": "15.1(3)S" + }, + { + "version_affected": "=", + "version_value": "15.1(2)S1" + }, + { + "version_affected": "=", + "version_value": "15.1(2)S2" + }, + { + "version_affected": "=", + "version_value": "15.1(3)S1" + }, + { + "version_affected": "=", + "version_value": "15.1(3)S0a" + }, + { + "version_affected": "=", + "version_value": "15.1(3)S2" + }, + { + "version_affected": "=", + "version_value": "15.1(3)S4" + }, + { + "version_affected": "=", + "version_value": "15.1(3)S3" + }, + { + "version_affected": "=", + "version_value": "15.1(3)S5" + }, + { + "version_affected": "=", + "version_value": "15.1(3)S6" + }, + { + "version_affected": "=", + "version_value": "15.1(3)S5a" + }, + { + "version_affected": "=", + "version_value": "15.1(4)M3" + }, + { + "version_affected": "=", + "version_value": "15.1(4)M" + }, + { + "version_affected": "=", + "version_value": "15.1(4)M1" + }, + { + "version_affected": "=", + "version_value": "15.1(4)M2" + }, + { + "version_affected": "=", + "version_value": "15.1(4)M6" + }, + { + "version_affected": "=", + "version_value": "15.1(4)M5" + }, + { + "version_affected": "=", + "version_value": "15.1(4)M4" + }, + { + "version_affected": "=", + "version_value": "15.1(4)M7" + }, + { + "version_affected": "=", + "version_value": "15.1(4)M3a" + }, + { + "version_affected": "=", + "version_value": "15.1(4)M10" + }, + { + "version_affected": "=", + "version_value": "15.1(4)M8" + }, + { + "version_affected": "=", + "version_value": "15.1(4)M9" + }, + { + "version_affected": "=", + "version_value": "15.1(4)GC" + }, + { + "version_affected": "=", + "version_value": "15.1(4)GC1" + }, + { + "version_affected": "=", + "version_value": "15.1(4)GC2" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M1" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M2" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M4" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M3" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M5" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M10" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M6" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M9" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M6a" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M11" + }, + { + "version_affected": "=", + "version_value": "15.2(1)GC" + }, + { + "version_affected": "=", + "version_value": "15.2(1)GC1" + }, + { + "version_affected": "=", + "version_value": "15.2(1)GC2" + }, + { + "version_affected": "=", + "version_value": "15.2(2)GC" + }, + { + "version_affected": "=", + "version_value": "15.2(3)GC" + }, + { + "version_affected": "=", + "version_value": "15.2(3)GC1" + }, + { + "version_affected": "=", + "version_value": "15.2(4)GC" + }, + { + "version_affected": "=", + "version_value": "15.2(4)GC1" + }, + { + "version_affected": "=", + "version_value": "15.2(4)GC2" + }, + { + "version_affected": "=", + "version_value": "15.2(4)GC3" + }, + { + "version_affected": "=", + "version_value": "15.1(1)SY" + }, + { + "version_affected": "=", + "version_value": "15.1(1)SY1" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY1" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY2" + }, + { + "version_affected": "=", + "version_value": "15.1(1)SY2" + }, + { + "version_affected": "=", + "version_value": "15.1(1)SY3" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY3" + }, + { + "version_affected": "=", + "version_value": "15.1(1)SY4" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY4" + }, + { + "version_affected": "=", + "version_value": "15.1(1)SY5" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY5" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY4a" + }, + { + "version_affected": "=", + "version_value": "15.1(1)SY6" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY6" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY7" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY8" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY9" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY10" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY11" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY12" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY13" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY14" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY15" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY16" + }, + { + "version_affected": "=", + "version_value": "15.3(1)S" + }, + { + "version_affected": "=", + "version_value": "15.3(2)S" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S" + }, + { + "version_affected": "=", + "version_value": "15.3(1)S2" + }, + { + "version_affected": "=", + "version_value": "15.3(1)S1" + }, + { + "version_affected": "=", + "version_value": "15.3(2)S2" + }, + { + "version_affected": "=", + "version_value": "15.3(2)S1" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S1" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S2" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S3" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S6" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S4" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S1a" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S5" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S7" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S8" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S9" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S10" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S8a" + }, + { + "version_affected": "=", + "version_value": "15.4(1)T" + }, + { + "version_affected": "=", + "version_value": "15.4(2)T" + }, + { + "version_affected": "=", + "version_value": "15.4(1)T2" + }, + { + "version_affected": "=", + "version_value": "15.4(1)T1" + }, + { + "version_affected": "=", + "version_value": "15.4(2)T4" + }, + { + "version_affected": "=", + "version_value": "15.2(5)E1" + }, + { + "version_affected": "=", + "version_value": "15.2(5a)E1" + }, + { + "version_affected": "=", + "version_value": "15.2(5)E2" + }, + { + "version_affected": "=", + "version_value": "15.2(6)E" + }, + { + "version_affected": "=", + "version_value": "15.2(5)E2b" + }, + { + "version_affected": "=", + "version_value": "15.2(5)E2c" + }, + { + "version_affected": "=", + "version_value": "15.2(6)E0a" + }, + { + "version_affected": "=", + "version_value": "15.2(6)E1" + }, + { + "version_affected": "=", + "version_value": "15.2(6)E0c" + }, + { + "version_affected": "=", + "version_value": "15.2(6)E2" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E" + }, + { + "version_affected": "=", + "version_value": "15.2(6)E2a" + }, + { + "version_affected": "=", + "version_value": "15.2(6)E2b" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E1" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E0a" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E0b" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E0s" + }, + { + "version_affected": "=", + "version_value": "15.2(6)E3" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E2" + }, + { + "version_affected": "=", + "version_value": "15.2(7a)E0b" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E3" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E1a" + }, + { + "version_affected": "=", + "version_value": "15.2(7b)E0b" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E2a" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E4" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E3k" + }, + { + "version_affected": "=", + "version_value": "15.2(8)E" + }, + { + "version_affected": "=", + "version_value": "15.2(8)E1" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E5" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E6" + }, + { + "version_affected": "=", + "version_value": "15.2(8)E2" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E7" + }, + { + "version_affected": "=", + "version_value": "15.2(8)E3" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E8" + }, + { + "version_affected": "=", + "version_value": "15.2(8)E4" + }, + { + "version_affected": "=", + "version_value": "15.1(3)MRA" + }, + { + "version_affected": "=", + "version_value": "15.1(3)MRA1" + }, + { + "version_affected": "=", + "version_value": "15.1(3)MRA2" + }, + { + "version_affected": "=", + "version_value": "15.1(3)MRA3" + }, + { + "version_affected": "=", + "version_value": "15.1(3)MRA4" + }, + { + "version_affected": "=", + "version_value": "15.1(3)SVB1" + }, + { + "version_affected": "=", + "version_value": "15.1(3)SVB2" + }, + { + "version_affected": "=", + "version_value": "15.4(1)S" + }, + { + "version_affected": "=", + "version_value": "15.4(2)S" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S" + }, + { + "version_affected": "=", + "version_value": "15.4(1)S1" + }, + { + "version_affected": "=", + "version_value": "15.4(1)S2" + }, + { + "version_affected": "=", + "version_value": "15.4(2)S1" + }, + { + "version_affected": "=", + "version_value": "15.4(1)S3" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S1" + }, + { + "version_affected": "=", + "version_value": "15.4(2)S2" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S2" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S3" + }, + { + "version_affected": "=", + "version_value": "15.4(1)S4" + }, + { + "version_affected": "=", + "version_value": "15.4(2)S3" + }, + { + "version_affected": "=", + "version_value": "15.4(2)S4" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S4" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S5" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S6" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S7" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S6a" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S8" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S9" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S10" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M1" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M2" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M3" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M4" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M6" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M7" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M8" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M9" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M10" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M8a" + }, + { + "version_affected": "=", + "version_value": "15.1(3)SVD" + }, + { + "version_affected": "=", + "version_value": "15.1(3)SVD1" + }, + { + "version_affected": "=", + "version_value": "15.1(3)SVD2" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY1" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY0a" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY2" + }, + { + "version_affected": "=", + "version_value": "15.2(2)SY" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY1a" + }, + { + "version_affected": "=", + "version_value": "15.2(2)SY1" + }, + { + "version_affected": "=", + "version_value": "15.2(2)SY2" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY3" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY4" + }, + { + "version_affected": "=", + "version_value": "15.2(2)SY3" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY5" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY6" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY7" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY8" + }, + { + "version_affected": "=", + "version_value": "15.2(5)EX" + }, + { + "version_affected": "=", + "version_value": "15.1(3)SVF" + }, + { + "version_affected": "=", + "version_value": "15.1(3)SVF1" + }, + { + "version_affected": "=", + "version_value": "15.1(3)SVE" + }, + { + "version_affected": "=", + "version_value": "15.4(1)CG" + }, + { + "version_affected": "=", + "version_value": "15.4(1)CG1" + }, + { + "version_affected": "=", + "version_value": "15.4(2)CG" + }, + { + "version_affected": "=", + "version_value": "15.5(1)S" + }, + { + "version_affected": "=", + "version_value": "15.5(2)S" + }, + { + "version_affected": "=", + "version_value": "15.5(1)S1" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S" + }, + { + "version_affected": "=", + "version_value": "15.5(1)S2" + }, + { + "version_affected": "=", + "version_value": "15.5(1)S3" + }, + { + "version_affected": "=", + "version_value": "15.5(2)S1" + }, + { + "version_affected": "=", + "version_value": "15.5(2)S2" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S1" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S1a" + }, + { + "version_affected": "=", + "version_value": "15.5(2)S3" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S2" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S0a" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S3" + }, + { + "version_affected": "=", + "version_value": "15.5(1)S4" + }, + { + "version_affected": "=", + "version_value": "15.5(2)S4" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S4" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S5" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S6" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S6a" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S7" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S6b" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S8" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S9" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S10" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S9a" + }, + { + "version_affected": "=", + "version_value": "15.1(3)SVG" + }, + { + "version_affected": "=", + "version_value": "15.2(6)EB" + }, + { + "version_affected": "=", + "version_value": "15.5(2)T" + }, + { + "version_affected": "=", + "version_value": "15.5(1)T3" + }, + { + "version_affected": "=", + "version_value": "15.5(2)T1" + }, + { + "version_affected": "=", + "version_value": "15.5(2)T2" + }, + { + "version_affected": "=", + "version_value": "15.5(2)T3" + }, + { + "version_affected": "=", + "version_value": "15.5(2)T4" + }, + { + "version_affected": "=", + "version_value": "15.5(1)T4" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M1" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M0a" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M2" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M3" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M4" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M4a" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M5" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M6" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M7" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M6a" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M8" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M9" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M10" + }, + { + "version_affected": "=", + "version_value": "15.5(3)SN" + }, + { + "version_affected": "=", + "version_value": "15.6(1)S" + }, + { + "version_affected": "=", + "version_value": "15.6(2)S" + }, + { + "version_affected": "=", + "version_value": "15.6(2)S1" + }, + { + "version_affected": "=", + "version_value": "15.6(1)S1" + }, + { + "version_affected": "=", + "version_value": "15.6(1)S2" + }, + { + "version_affected": "=", + "version_value": "15.6(2)S2" + }, + { + "version_affected": "=", + "version_value": "15.6(1)S3" + }, + { + "version_affected": "=", + "version_value": "15.6(2)S3" + }, + { + "version_affected": "=", + "version_value": "15.6(1)S4" + }, + { + "version_affected": "=", + "version_value": "15.6(2)S4" + }, + { + "version_affected": "=", + "version_value": "15.6(1)T" + }, + { + "version_affected": "=", + "version_value": "15.6(2)T" + }, + { + "version_affected": "=", + "version_value": "15.6(1)T0a" + }, + { + "version_affected": "=", + "version_value": "15.6(1)T1" + }, + { + "version_affected": "=", + "version_value": "15.6(2)T1" + }, + { + "version_affected": "=", + "version_value": "15.6(1)T2" + }, + { + "version_affected": "=", + "version_value": "15.6(2)T2" + }, + { + "version_affected": "=", + "version_value": "15.6(1)T3" + }, + { + "version_affected": "=", + "version_value": "15.6(2)T3" + }, + { + "version_affected": "=", + "version_value": "15.3(1)SY" + }, + { + "version_affected": "=", + "version_value": "15.3(1)SY1" + }, + { + "version_affected": "=", + "version_value": "15.3(1)SY2" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP1" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP2" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP3" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP4" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP5" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP6" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP7" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP8" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP9" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP10" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SN" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M1" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M0a" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M1b" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M2" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M2a" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M3" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M3a" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M4" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M5" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M6" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M7" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M6a" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M6b" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M8" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M9" + }, + { + "version_affected": "=", + "version_value": "15.1(3)SVJ2" + }, + { + "version_affected": "=", + "version_value": "15.4(1)SY" + }, + { + "version_affected": "=", + "version_value": "15.4(1)SY1" + }, + { + "version_affected": "=", + "version_value": "15.4(1)SY2" + }, + { + "version_affected": "=", + "version_value": "15.4(1)SY3" + }, + { + "version_affected": "=", + "version_value": "15.4(1)SY4" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY1" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY2" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY3" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY4" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY5" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY6" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY7" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY8" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY9" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY10" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY11" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M1" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M0a" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M3" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M2" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M4" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M5" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M4a" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M4b" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M6" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M7" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M8" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M9" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M1" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M0a" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M0b" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M2" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M1a" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M3" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M2a" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M4" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M3a" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M3b" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M5" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M6" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M7" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M8" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M9" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M10" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M1" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M0a" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M2" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M3" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M2a" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M3a" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M4" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M3b" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M5" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M4a" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M6" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M7" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M6a" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M6b" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M7a" + } + ] + } + }, + { + "product_name": "Cisco IOS XE Software", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.7.0S" + }, + { + "version_affected": "=", + "version_value": "3.7.1S" + }, + { + "version_affected": "=", + "version_value": "3.7.2S" + }, + { + "version_affected": "=", + "version_value": "3.7.3S" + }, + { + "version_affected": "=", + "version_value": "3.7.4S" + }, + { + "version_affected": "=", + "version_value": "3.7.5S" + }, + { + "version_affected": "=", + "version_value": "3.7.6S" + }, + { + "version_affected": "=", + "version_value": "3.7.7S" + }, + { + "version_affected": "=", + "version_value": "3.7.4aS" + }, + { + "version_affected": "=", + "version_value": "3.7.2tS" + }, + { + "version_affected": "=", + "version_value": "3.7.0bS" + }, + { + "version_affected": "=", + "version_value": "3.7.1aS" + }, + { + "version_affected": "=", + "version_value": "3.8.0S" + }, + { + "version_affected": "=", + "version_value": "3.8.1S" + }, + { + "version_affected": "=", + "version_value": "3.8.2S" + }, + { + "version_affected": "=", + "version_value": "3.9.1S" + }, + { + "version_affected": "=", + "version_value": "3.9.0S" + }, + { + "version_affected": "=", + "version_value": "3.9.2S" + }, + { + "version_affected": "=", + "version_value": "3.9.1aS" + }, + { + "version_affected": "=", + "version_value": "3.9.0aS" + }, + { + "version_affected": "=", + "version_value": "3.10.0S" + }, + { + "version_affected": "=", + "version_value": "3.10.1S" + }, + { + "version_affected": "=", + "version_value": "3.10.2S" + }, + { + "version_affected": "=", + "version_value": "3.10.3S" + }, + { + "version_affected": "=", + "version_value": "3.10.4S" + }, + { + "version_affected": "=", + "version_value": "3.10.5S" + }, + { + "version_affected": "=", + "version_value": "3.10.6S" + }, + { + "version_affected": "=", + "version_value": "3.10.2tS" + }, + { + "version_affected": "=", + "version_value": "3.10.7S" + }, + { + "version_affected": "=", + "version_value": "3.10.1xbS" + }, + { + "version_affected": "=", + "version_value": "3.10.8S" + }, + { + "version_affected": "=", + "version_value": "3.10.8aS" + }, + { + "version_affected": "=", + "version_value": "3.10.9S" + }, + { + "version_affected": "=", + "version_value": "3.10.10S" + }, + { + "version_affected": "=", + "version_value": "3.11.1S" + }, + { + "version_affected": "=", + "version_value": "3.11.2S" + }, + { + "version_affected": "=", + "version_value": "3.11.0S" + }, + { + "version_affected": "=", + "version_value": "3.11.3S" + }, + { + "version_affected": "=", + "version_value": "3.11.4S" + }, + { + "version_affected": "=", + "version_value": "3.12.0S" + }, + { + "version_affected": "=", + "version_value": "3.12.1S" + }, + { + "version_affected": "=", + "version_value": "3.12.2S" + }, + { + "version_affected": "=", + "version_value": "3.12.3S" + }, + { + "version_affected": "=", + "version_value": "3.12.0aS" + }, + { + "version_affected": "=", + "version_value": "3.12.4S" + }, + { + "version_affected": "=", + "version_value": "3.13.0S" + }, + { + "version_affected": "=", + "version_value": "3.13.1S" + }, + { + "version_affected": "=", + "version_value": "3.13.2S" + }, + { + "version_affected": "=", + "version_value": "3.13.3S" + }, + { + "version_affected": "=", + "version_value": "3.13.4S" + }, + { + "version_affected": "=", + "version_value": "3.13.5S" + }, + { + "version_affected": "=", + "version_value": "3.13.2aS" + }, + { + "version_affected": "=", + "version_value": "3.13.0aS" + }, + { + "version_affected": "=", + "version_value": "3.13.5aS" + }, + { + "version_affected": "=", + "version_value": "3.13.6S" + }, + { + "version_affected": "=", + "version_value": "3.13.7S" + }, + { + "version_affected": "=", + "version_value": "3.13.6aS" + }, + { + "version_affected": "=", + "version_value": "3.13.7aS" + }, + { + "version_affected": "=", + "version_value": "3.13.8S" + }, + { + "version_affected": "=", + "version_value": "3.13.9S" + }, + { + "version_affected": "=", + "version_value": "3.13.10S" + }, + { + "version_affected": "=", + "version_value": "3.14.0S" + }, + { + "version_affected": "=", + "version_value": "3.14.1S" + }, + { + "version_affected": "=", + "version_value": "3.14.2S" + }, + { + "version_affected": "=", + "version_value": "3.14.3S" + }, + { + "version_affected": "=", + "version_value": "3.14.4S" + }, + { + "version_affected": "=", + "version_value": "3.15.0S" + }, + { + "version_affected": "=", + "version_value": "3.15.1S" + }, + { + "version_affected": "=", + "version_value": "3.15.2S" + }, + { + "version_affected": "=", + "version_value": "3.15.1cS" + }, + { + "version_affected": "=", + "version_value": "3.15.3S" + }, + { + "version_affected": "=", + "version_value": "3.15.4S" + }, + { + "version_affected": "=", + "version_value": "3.16.0S" + }, + { + "version_affected": "=", + "version_value": "3.16.1S" + }, + { + "version_affected": "=", + "version_value": "3.16.1aS" + }, + { + "version_affected": "=", + "version_value": "3.16.2S" + }, + { + "version_affected": "=", + "version_value": "3.16.2aS" + }, + { + "version_affected": "=", + "version_value": "3.16.0cS" + }, + { + "version_affected": "=", + "version_value": "3.16.3S" + }, + { + "version_affected": "=", + "version_value": "3.16.2bS" + }, + { + "version_affected": "=", + "version_value": "3.16.3aS" + }, + { + "version_affected": "=", + "version_value": "3.16.4S" + }, + { + "version_affected": "=", + "version_value": "3.16.4aS" + }, + { + "version_affected": "=", + "version_value": "3.16.4bS" + }, + { + "version_affected": "=", + "version_value": "3.16.5S" + }, + { + "version_affected": "=", + "version_value": "3.16.4dS" + }, + { + "version_affected": "=", + "version_value": "3.16.6S" + }, + { + "version_affected": "=", + "version_value": "3.16.7S" + }, + { + "version_affected": "=", + "version_value": "3.16.6bS" + }, + { + "version_affected": "=", + "version_value": "3.16.7aS" + }, + { + "version_affected": "=", + "version_value": "3.16.7bS" + }, + { + "version_affected": "=", + "version_value": "3.16.8S" + }, + { + "version_affected": "=", + "version_value": "3.16.9S" + }, + { + "version_affected": "=", + "version_value": "3.16.10S" + }, + { + "version_affected": "=", + "version_value": "3.17.0S" + }, + { + "version_affected": "=", + "version_value": "3.17.1S" + }, + { + "version_affected": "=", + "version_value": "3.17.2S" + }, + { + "version_affected": "=", + "version_value": "3.17.1aS" + }, + { + "version_affected": "=", + "version_value": "3.17.3S" + }, + { + "version_affected": "=", + "version_value": "3.17.4S" + }, + { + "version_affected": "=", + "version_value": "16.1.1" + }, + { + "version_affected": "=", + "version_value": "16.1.2" + }, + { + "version_affected": "=", + "version_value": "16.1.3" + }, + { + "version_affected": "=", + "version_value": "16.2.1" + }, + { + "version_affected": "=", + "version_value": "16.2.2" + }, + { + "version_affected": "=", + "version_value": "16.3.1" + }, + { + "version_affected": "=", + "version_value": "16.3.2" + }, + { + "version_affected": "=", + "version_value": "16.3.3" + }, + { + "version_affected": "=", + "version_value": "16.3.1a" + }, + { + "version_affected": "=", + "version_value": "16.3.4" + }, + { + "version_affected": "=", + "version_value": "16.3.5" + }, + { + "version_affected": "=", + "version_value": "16.3.5b" + }, + { + "version_affected": "=", + "version_value": "16.3.6" + }, + { + "version_affected": "=", + "version_value": "16.3.7" + }, + { + "version_affected": "=", + "version_value": "16.3.8" + }, + { + "version_affected": "=", + "version_value": "16.3.9" + }, + { + "version_affected": "=", + "version_value": "16.3.10" + }, + { + "version_affected": "=", + "version_value": "16.3.11" + }, + { + "version_affected": "=", + "version_value": "16.4.1" + }, + { + "version_affected": "=", + "version_value": "16.4.2" + }, + { + "version_affected": "=", + "version_value": "16.4.3" + }, + { + "version_affected": "=", + "version_value": "16.5.1" + }, + { + "version_affected": "=", + "version_value": "16.5.1a" + }, + { + "version_affected": "=", + "version_value": "16.5.1b" + }, + { + "version_affected": "=", + "version_value": "16.5.2" + }, + { + "version_affected": "=", + "version_value": "16.5.3" + }, + { + "version_affected": "=", + "version_value": "3.18.0aS" + }, + { + "version_affected": "=", + "version_value": "3.18.0S" + }, + { + "version_affected": "=", + "version_value": "3.18.1S" + }, + { + "version_affected": "=", + "version_value": "3.18.2S" + }, + { + "version_affected": "=", + "version_value": "3.18.3S" + }, + { + "version_affected": "=", + "version_value": "3.18.4S" + }, + { + "version_affected": "=", + "version_value": "3.18.0SP" + }, + { + "version_affected": "=", + "version_value": "3.18.1SP" + }, + { + "version_affected": "=", + "version_value": "3.18.1aSP" + }, + { + "version_affected": "=", + "version_value": "3.18.1bSP" + }, + { + "version_affected": "=", + "version_value": "3.18.1cSP" + }, + { + "version_affected": "=", + "version_value": "3.18.2SP" + }, + { + "version_affected": "=", + "version_value": "3.18.2aSP" + }, + { + "version_affected": "=", + "version_value": "3.18.3SP" + }, + { + "version_affected": "=", + "version_value": "3.18.4SP" + }, + { + "version_affected": "=", + "version_value": "3.18.3aSP" + }, + { + "version_affected": "=", + "version_value": "3.18.3bSP" + }, + { + "version_affected": "=", + "version_value": "3.18.5SP" + }, + { + "version_affected": "=", + "version_value": "3.18.6SP" + }, + { + "version_affected": "=", + "version_value": "3.18.7SP" + }, + { + "version_affected": "=", + "version_value": "3.18.8aSP" + }, + { + "version_affected": "=", + "version_value": "3.18.9SP" + }, + { + "version_affected": "=", + "version_value": "3.9.1E" + }, + { + "version_affected": "=", + "version_value": "3.9.2E" + }, + { + "version_affected": "=", + "version_value": "16.6.1" + }, + { + "version_affected": "=", + "version_value": "16.6.2" + }, + { + "version_affected": "=", + "version_value": "16.6.3" + }, + { + "version_affected": "=", + "version_value": "16.6.4" + }, + { + "version_affected": "=", + "version_value": "16.6.5" + }, + { + "version_affected": "=", + "version_value": "16.6.4a" + }, + { + "version_affected": "=", + "version_value": "16.6.5a" + }, + { + "version_affected": "=", + "version_value": "16.6.6" + }, + { + "version_affected": "=", + "version_value": "16.6.7" + }, + { + "version_affected": "=", + "version_value": "16.6.8" + }, + { + "version_affected": "=", + "version_value": "16.6.9" + }, + { + "version_affected": "=", + "version_value": "16.6.10" + }, + { + "version_affected": "=", + "version_value": "16.7.1" + }, + { + "version_affected": "=", + "version_value": "16.7.1a" + }, + { + "version_affected": "=", + "version_value": "16.7.1b" + }, + { + "version_affected": "=", + "version_value": "16.7.2" + }, + { + "version_affected": "=", + "version_value": "16.7.3" + }, + { + "version_affected": "=", + "version_value": "16.7.4" + }, + { + "version_affected": "=", + "version_value": "16.8.1" + }, + { + "version_affected": "=", + "version_value": "16.8.1a" + }, + { + "version_affected": "=", + "version_value": "16.8.1b" + }, + { + "version_affected": "=", + "version_value": "16.8.1s" + }, + { + "version_affected": "=", + "version_value": "16.8.1c" + }, + { + "version_affected": "=", + "version_value": "16.8.1d" + }, + { + "version_affected": "=", + "version_value": "16.8.2" + }, + { + "version_affected": "=", + "version_value": "16.8.1e" + }, + { + "version_affected": "=", + "version_value": "16.8.3" + }, + { + "version_affected": "=", + "version_value": "16.9.1" + }, + { + "version_affected": "=", + "version_value": "16.9.2" + }, + { + "version_affected": "=", + "version_value": "16.9.1a" + }, + { + "version_affected": "=", + "version_value": "16.9.1b" + }, + { + "version_affected": "=", + "version_value": "16.9.1s" + }, + { + "version_affected": "=", + "version_value": "16.9.3" + }, + { + "version_affected": "=", + "version_value": "16.9.4" + }, + { + "version_affected": "=", + "version_value": "16.9.3a" + }, + { + "version_affected": "=", + "version_value": "16.9.5" + }, + { + "version_affected": "=", + "version_value": "16.9.5f" + }, + { + "version_affected": "=", + "version_value": "16.9.6" + }, + { + "version_affected": "=", + "version_value": "16.9.7" + }, + { + "version_affected": "=", + "version_value": "16.9.8" + }, + { + "version_affected": "=", + "version_value": "16.10.1" + }, + { + "version_affected": "=", + "version_value": "16.10.1a" + }, + { + "version_affected": "=", + "version_value": "16.10.1b" + }, + { + "version_affected": "=", + "version_value": "16.10.1s" + }, + { + "version_affected": "=", + "version_value": "16.10.1c" + }, + { + "version_affected": "=", + "version_value": "16.10.1e" + }, + { + "version_affected": "=", + "version_value": "16.10.1d" + }, + { + "version_affected": "=", + "version_value": "16.10.2" + }, + { + "version_affected": "=", + "version_value": "16.10.1f" + }, + { + "version_affected": "=", + "version_value": "16.10.1g" + }, + { + "version_affected": "=", + "version_value": "16.10.3" + }, + { + "version_affected": "=", + "version_value": "3.10.0E" + }, + { + "version_affected": "=", + "version_value": "3.10.1E" + }, + { + "version_affected": "=", + "version_value": "3.10.0cE" + }, + { + "version_affected": "=", + "version_value": "3.10.2E" + }, + { + "version_affected": "=", + "version_value": "3.10.3E" + }, + { + "version_affected": "=", + "version_value": "16.11.1" + }, + { + "version_affected": "=", + "version_value": "16.11.1a" + }, + { + "version_affected": "=", + "version_value": "16.11.1b" + }, + { + "version_affected": "=", + "version_value": "16.11.2" + }, + { + "version_affected": "=", + "version_value": "16.11.1s" + }, + { + "version_affected": "=", + "version_value": "16.12.1" + }, + { + "version_affected": "=", + "version_value": "16.12.1s" + }, + { + "version_affected": "=", + "version_value": "16.12.1a" + }, + { + "version_affected": "=", + "version_value": "16.12.1c" + }, + { + "version_affected": "=", + "version_value": "16.12.1w" + }, + { + "version_affected": "=", + "version_value": "16.12.2" + }, + { + "version_affected": "=", + "version_value": "16.12.1y" + }, + { + "version_affected": "=", + "version_value": "16.12.2a" + }, + { + "version_affected": "=", + "version_value": "16.12.3" + }, + { + "version_affected": "=", + "version_value": "16.12.8" + }, + { + "version_affected": "=", + "version_value": "16.12.2s" + }, + { + "version_affected": "=", + "version_value": "16.12.1x" + }, + { + "version_affected": "=", + "version_value": "16.12.1t" + }, + { + "version_affected": "=", + "version_value": "16.12.4" + }, + { + "version_affected": "=", + "version_value": "16.12.3s" + }, + { + "version_affected": "=", + "version_value": "16.12.3a" + }, + { + "version_affected": "=", + "version_value": "16.12.4a" + }, + { + "version_affected": "=", + "version_value": "16.12.5" + }, + { + "version_affected": "=", + "version_value": "16.12.6" + }, + { + "version_affected": "=", + "version_value": "16.12.1z1" + }, + { + "version_affected": "=", + "version_value": "16.12.5a" + }, + { + "version_affected": "=", + "version_value": "16.12.5b" + }, + { + "version_affected": "=", + "version_value": "16.12.1z2" + }, + { + "version_affected": "=", + "version_value": "16.12.6a" + }, + { + "version_affected": "=", + "version_value": "16.12.7" + }, + { + "version_affected": "=", + "version_value": "16.12.9" + }, + { + "version_affected": "=", + "version_value": "3.11.0E" + }, + { + "version_affected": "=", + "version_value": "3.11.1E" + }, + { + "version_affected": "=", + "version_value": "3.11.2E" + }, + { + "version_affected": "=", + "version_value": "3.11.3E" + }, + { + "version_affected": "=", + "version_value": "3.11.1aE" + }, + { + "version_affected": "=", + "version_value": "3.11.4E" + }, + { + "version_affected": "=", + "version_value": "3.11.3aE" + }, + { + "version_affected": "=", + "version_value": "3.11.5E" + }, + { + "version_affected": "=", + "version_value": "3.11.6E" + }, + { + "version_affected": "=", + "version_value": "3.11.7E" + }, + { + "version_affected": "=", + "version_value": "3.11.8E" + }, + { + "version_affected": "=", + "version_value": "17.1.1" + }, + { + "version_affected": "=", + "version_value": "17.1.1a" + }, + { + "version_affected": "=", + "version_value": "17.1.1s" + }, + { + "version_affected": "=", + "version_value": "17.1.1t" + }, + { + "version_affected": "=", + "version_value": "17.1.3" + }, + { + "version_affected": "=", + "version_value": "17.2.1" + }, + { + "version_affected": "=", + "version_value": "17.2.1r" + }, + { + "version_affected": "=", + "version_value": "17.2.1a" + }, + { + "version_affected": "=", + "version_value": "17.2.1v" + }, + { + "version_affected": "=", + "version_value": "17.2.2" + }, + { + "version_affected": "=", + "version_value": "17.2.3" + }, + { + "version_affected": "=", + "version_value": "17.3.1" + }, + { + "version_affected": "=", + "version_value": "17.3.2" + }, + { + "version_affected": "=", + "version_value": "17.3.3" + }, + { + "version_affected": "=", + "version_value": "17.3.1a" + }, + { + "version_affected": "=", + "version_value": "17.3.1w" + }, + { + "version_affected": "=", + "version_value": "17.3.2a" + }, + { + "version_affected": "=", + "version_value": "17.3.1x" + }, + { + "version_affected": "=", + "version_value": "17.3.1z" + }, + { + "version_affected": "=", + "version_value": "17.3.4" + }, + { + "version_affected": "=", + "version_value": "17.3.5" + }, + { + "version_affected": "=", + "version_value": "17.3.4a" + }, + { + "version_affected": "=", + "version_value": "17.3.6" + }, + { + "version_affected": "=", + "version_value": "17.3.4b" + }, + { + "version_affected": "=", + "version_value": "17.3.4c" + }, + { + "version_affected": "=", + "version_value": "17.3.5a" + }, + { + "version_affected": "=", + "version_value": "17.3.5b" + }, + { + "version_affected": "=", + "version_value": "17.3.7" + }, + { + "version_affected": "=", + "version_value": "17.4.1" + }, + { + "version_affected": "=", + "version_value": "17.4.2" + }, + { + "version_affected": "=", + "version_value": "17.4.1a" + }, + { + "version_affected": "=", + "version_value": "17.4.1b" + }, + { + "version_affected": "=", + "version_value": "17.4.2a" + }, + { + "version_affected": "=", + "version_value": "17.5.1" + }, + { + "version_affected": "=", + "version_value": "17.5.1a" + }, + { + "version_affected": "=", + "version_value": "17.6.1" + }, + { + "version_affected": "=", + "version_value": "17.6.2" + }, + { + "version_affected": "=", + "version_value": "17.6.1w" + }, + { + "version_affected": "=", + "version_value": "17.6.1a" + }, + { + "version_affected": "=", + "version_value": "17.6.1x" + }, + { + "version_affected": "=", + "version_value": "17.6.3" + }, + { + "version_affected": "=", + "version_value": "17.6.1y" + }, + { + "version_affected": "=", + "version_value": "17.6.1z" + }, + { + "version_affected": "=", + "version_value": "17.6.3a" + }, + { + "version_affected": "=", + "version_value": "17.6.4" + }, + { + "version_affected": "=", + "version_value": "17.6.1z1" + }, + { + "version_affected": "=", + "version_value": "17.6.5" + }, + { + "version_affected": "=", + "version_value": "17.6.5a" + }, + { + "version_affected": "=", + "version_value": "17.7.1" + }, + { + "version_affected": "=", + "version_value": "17.7.1a" + }, + { + "version_affected": "=", + "version_value": "17.7.1b" + }, + { + "version_affected": "=", + "version_value": "17.7.2" + }, + { + "version_affected": "=", + "version_value": "17.10.1" + }, + { + "version_affected": "=", + "version_value": "17.10.1a" + }, + { + "version_affected": "=", + "version_value": "17.10.1b" + }, + { + "version_affected": "=", + "version_value": "17.8.1" + }, + { + "version_affected": "=", + "version_value": "17.8.1a" + }, + { + "version_affected": "=", + "version_value": "17.9.1" + }, + { + "version_affected": "=", + "version_value": "17.9.1w" + }, + { + "version_affected": "=", + "version_value": "17.9.2" + }, + { + "version_affected": "=", + "version_value": "17.9.1a" + }, + { + "version_affected": "=", + "version_value": "17.9.1x" + }, + { + "version_affected": "=", + "version_value": "17.9.1y" + }, + { + "version_affected": "=", + "version_value": "17.9.3" + }, + { + "version_affected": "=", + "version_value": "17.9.2a" + }, + { + "version_affected": "=", + "version_value": "17.9.1x1" + }, + { + "version_affected": "=", + "version_value": "17.9.3a" + }, + { + "version_affected": "=", + "version_value": "17.11.1" + }, + { + "version_affected": "=", + "version_value": "17.11.1a" + }, + { + "version_affected": "=", + "version_value": "17.11.99SW" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lisp-3gYXs3qP", + "refsource": "MISC", + "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lisp-3gYXs3qP" + } + ] + }, + "source": { + "advisory": "cisco-sa-lisp-3gYXs3qP", + "discovery": "INTERNAL", + "defects": [ + "CSCwf36266" + ] + }, + "exploit": [ + { + "lang": "en", + "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" } ] } diff --git a/2024/20xxx/CVE-2024-20312.json b/2024/20xxx/CVE-2024-20312.json index 18fbbe7cced..1fe2cd43906 100644 --- a/2024/20xxx/CVE-2024-20312.json +++ b/2024/20xxx/CVE-2024-20312.json @@ -1,17 +1,3341 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-20312", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@cisco.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to insufficient input validation when parsing an ingress IS-IS packet. An attacker could exploit this vulnerability by sending a crafted IS-IS packet to an affected device after forming an adjacency. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.\r\n\r Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2-adjacent to the affected device and have formed an adjacency." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "NULL Pointer Dereference", + "cweId": "CWE-476" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cisco", + "product": { + "product_data": [ + { + "product_name": "IOS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "15.2(1)S" + }, + { + "version_affected": "=", + "version_value": "15.2(2)S" + }, + { + "version_affected": "=", + "version_value": "15.2(1)S1" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S" + }, + { + "version_affected": "=", + "version_value": "15.2(1)S2" + }, + { + "version_affected": "=", + "version_value": "15.2(2)S1" + }, + { + "version_affected": "=", + "version_value": "15.2(2)S2" + }, + { + "version_affected": "=", + "version_value": "15.2(2)S0a" + }, + { + "version_affected": "=", + "version_value": "15.2(2)S0c" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S1" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S4" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S6" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S2" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S5" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S3" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S3a" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S4a" + }, + { + "version_affected": "=", + "version_value": "15.2(4)S7" + }, + { + "version_affected": "=", + "version_value": "15.3(1)T" + }, + { + "version_affected": "=", + "version_value": "15.3(2)T" + }, + { + "version_affected": "=", + "version_value": "15.3(1)T1" + }, + { + "version_affected": "=", + "version_value": "15.3(1)T2" + }, + { + "version_affected": "=", + "version_value": "15.3(1)T3" + }, + { + "version_affected": "=", + "version_value": "15.3(1)T4" + }, + { + "version_affected": "=", + "version_value": "15.3(2)T1" + }, + { + "version_affected": "=", + "version_value": "15.3(2)T2" + }, + { + "version_affected": "=", + "version_value": "15.3(2)T3" + }, + { + "version_affected": "=", + "version_value": "15.3(2)T4" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SG" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SG1" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SG2" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SG3" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SG4" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SG5" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SG6" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SG7" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SG8" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M1" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M2" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M4" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M3" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M5" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M8" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M10" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M7" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M6" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M9" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M6a" + }, + { + "version_affected": "=", + "version_value": "15.2(4)M11" + }, + { + "version_affected": "=", + "version_value": "15.0(1)EX" + }, + { + "version_affected": "=", + "version_value": "15.2(3)GC" + }, + { + "version_affected": "=", + "version_value": "15.2(3)GC1" + }, + { + "version_affected": "=", + "version_value": "15.2(4)GC" + }, + { + "version_affected": "=", + "version_value": "15.2(4)GC1" + }, + { + "version_affected": "=", + "version_value": "15.2(4)GC2" + }, + { + "version_affected": "=", + "version_value": "15.2(4)GC3" + }, + { + "version_affected": "=", + "version_value": "15.1(1)SY" + }, + { + "version_affected": "=", + "version_value": "15.1(1)SY1" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY1" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY2" + }, + { + "version_affected": "=", + "version_value": "15.1(1)SY2" + }, + { + "version_affected": "=", + "version_value": "15.1(1)SY3" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY3" + }, + { + "version_affected": "=", + "version_value": "15.1(1)SY4" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY4" + }, + { + "version_affected": "=", + "version_value": "15.1(1)SY5" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY5" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY4a" + }, + { + "version_affected": "=", + "version_value": "15.1(1)SY6" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY6" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY7" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY8" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY9" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY10" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY11" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY12" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY13" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY14" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY15" + }, + { + "version_affected": "=", + "version_value": "15.1(2)SY16" + }, + { + "version_affected": "=", + "version_value": "15.3(1)S" + }, + { + "version_affected": "=", + "version_value": "15.3(2)S" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S" + }, + { + "version_affected": "=", + "version_value": "15.3(1)S2" + }, + { + "version_affected": "=", + "version_value": "15.3(1)S1" + }, + { + "version_affected": "=", + "version_value": "15.3(2)S2" + }, + { + "version_affected": "=", + "version_value": "15.3(2)S1" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S1" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S2" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S3" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S6" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S4" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S1a" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S5" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S7" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S8" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S9" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S10" + }, + { + "version_affected": "=", + "version_value": "15.3(3)S8a" + }, + { + "version_affected": "=", + "version_value": "15.4(1)T" + }, + { + "version_affected": "=", + "version_value": "15.4(2)T" + }, + { + "version_affected": "=", + "version_value": "15.4(1)T2" + }, + { + "version_affected": "=", + "version_value": "15.4(1)T1" + }, + { + "version_affected": "=", + "version_value": "15.4(1)T3" + }, + { + "version_affected": "=", + "version_value": "15.4(2)T1" + }, + { + "version_affected": "=", + "version_value": "15.4(2)T3" + }, + { + "version_affected": "=", + "version_value": "15.4(2)T2" + }, + { + "version_affected": "=", + "version_value": "15.4(1)T4" + }, + { + "version_affected": "=", + "version_value": "15.4(2)T4" + }, + { + "version_affected": "=", + "version_value": "15.2(1)E" + }, + { + "version_affected": "=", + "version_value": "15.2(2)E" + }, + { + "version_affected": "=", + "version_value": "15.2(1)E1" + }, + { + "version_affected": "=", + "version_value": "15.2(3)E" + }, + { + "version_affected": "=", + "version_value": "15.2(1)E2" + }, + { + "version_affected": "=", + "version_value": "15.2(1)E3" + }, + { + "version_affected": "=", + "version_value": "15.2(2)E1" + }, + { + "version_affected": "=", + "version_value": "15.2(4)E" + }, + { + "version_affected": "=", + "version_value": "15.2(3)E1" + }, + { + "version_affected": "=", + "version_value": "15.2(2)E2" + }, + { + "version_affected": "=", + "version_value": "15.2(2)E3" + }, + { + "version_affected": "=", + "version_value": "15.2(2a)E2" + }, + { + "version_affected": "=", + "version_value": "15.2(3)E2" + }, + { + "version_affected": "=", + "version_value": "15.2(3a)E" + }, + { + "version_affected": "=", + "version_value": "15.2(3)E3" + }, + { + "version_affected": "=", + "version_value": "15.2(4)E1" + }, + { + "version_affected": "=", + "version_value": "15.2(2)E4" + }, + { + "version_affected": "=", + "version_value": "15.2(2)E5" + }, + { + "version_affected": "=", + "version_value": "15.2(4)E2" + }, + { + "version_affected": "=", + "version_value": "15.2(3)E4" + }, + { + "version_affected": "=", + "version_value": "15.2(5)E" + }, + { + "version_affected": "=", + "version_value": "15.2(4)E3" + }, + { + "version_affected": "=", + "version_value": "15.2(2)E6" + }, + { + "version_affected": "=", + "version_value": "15.2(5)E1" + }, + { + "version_affected": "=", + "version_value": "15.2(2)E5a" + }, + { + "version_affected": "=", + "version_value": "15.2(3)E5" + }, + { + "version_affected": "=", + "version_value": "15.2(2)E5b" + }, + { + "version_affected": "=", + "version_value": "15.2(5a)E1" + }, + { + "version_affected": "=", + "version_value": "15.2(4)E4" + }, + { + "version_affected": "=", + "version_value": "15.2(2)E7" + }, + { + "version_affected": "=", + "version_value": "15.2(5)E2" + }, + { + "version_affected": "=", + "version_value": "15.2(6)E" + }, + { + "version_affected": "=", + "version_value": "15.2(5)E2b" + }, + { + "version_affected": "=", + "version_value": "15.2(4)E5" + }, + { + "version_affected": "=", + "version_value": "15.2(5)E2c" + }, + { + "version_affected": "=", + "version_value": "15.2(2)E8" + }, + { + "version_affected": "=", + "version_value": "15.2(6)E0a" + }, + { + "version_affected": "=", + "version_value": "15.2(6)E1" + }, + { + "version_affected": "=", + "version_value": "15.2(2)E7b" + }, + { + "version_affected": "=", + "version_value": "15.2(4)E5a" + }, + { + "version_affected": "=", + "version_value": "15.2(6)E0c" + }, + { + "version_affected": "=", + "version_value": "15.2(4)E6" + }, + { + "version_affected": "=", + "version_value": "15.2(6)E2" + }, + { + "version_affected": "=", + "version_value": "15.2(2)E9" + }, + { + "version_affected": "=", + "version_value": "15.2(4)E7" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E" + }, + { + "version_affected": "=", + "version_value": "15.2(2)E10" + }, + { + "version_affected": "=", + "version_value": "15.2(4)E8" + }, + { + "version_affected": "=", + "version_value": "15.2(6)E2a" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E1" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E0b" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E0s" + }, + { + "version_affected": "=", + "version_value": "15.2(6)E3" + }, + { + "version_affected": "=", + "version_value": "15.2(4)E9" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E2" + }, + { + "version_affected": "=", + "version_value": "15.2(7a)E0b" + }, + { + "version_affected": "=", + "version_value": "15.2(4)E10" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E3" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E1a" + }, + { + "version_affected": "=", + "version_value": "15.2(7b)E0b" + }, + { + "version_affected": "=", + "version_value": "15.2(4)E10a" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E4" + }, + { + "version_affected": "=", + "version_value": "15.2(8)E" + }, + { + "version_affected": "=", + "version_value": "15.2(8)E1" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E5" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E6" + }, + { + "version_affected": "=", + "version_value": "15.2(8)E2" + }, + { + "version_affected": "=", + "version_value": "15.2(4)E10d" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E7" + }, + { + "version_affected": "=", + "version_value": "15.2(8)E3" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E8" + }, + { + "version_affected": "=", + "version_value": "15.2(8)E4" + }, + { + "version_affected": "=", + "version_value": "15.2(4)E10e" + }, + { + "version_affected": "=", + "version_value": "15.2(7)E9" + }, + { + "version_affected": "=", + "version_value": "15.2(8)E5" + }, + { + "version_affected": "=", + "version_value": "15.4(1)S" + }, + { + "version_affected": "=", + "version_value": "15.4(2)S" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S" + }, + { + "version_affected": "=", + "version_value": "15.4(1)S1" + }, + { + "version_affected": "=", + "version_value": "15.4(1)S2" + }, + { + "version_affected": "=", + "version_value": "15.4(2)S1" + }, + { + "version_affected": "=", + "version_value": "15.4(1)S3" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S1" + }, + { + "version_affected": "=", + "version_value": "15.4(2)S2" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S2" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S3" + }, + { + "version_affected": "=", + "version_value": "15.4(1)S4" + }, + { + "version_affected": "=", + "version_value": "15.4(2)S3" + }, + { + "version_affected": "=", + "version_value": "15.4(2)S4" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S4" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S5" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S6" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S7" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S6a" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S8" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S9" + }, + { + "version_affected": "=", + "version_value": "15.4(3)S10" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M1" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M2" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M3" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M5" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M4" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M6" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M7" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M8" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M9" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M10" + }, + { + "version_affected": "=", + "version_value": "15.3(3)M8a" + }, + { + "version_affected": "=", + "version_value": "15.2(1)EY" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY1" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY0a" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY2" + }, + { + "version_affected": "=", + "version_value": "15.2(2)SY" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY1a" + }, + { + "version_affected": "=", + "version_value": "15.2(2)SY1" + }, + { + "version_affected": "=", + "version_value": "15.2(2)SY2" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY3" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY4" + }, + { + "version_affected": "=", + "version_value": "15.2(2)SY3" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY5" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY6" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY7" + }, + { + "version_affected": "=", + "version_value": "15.2(1)SY8" + }, + { + "version_affected": "=", + "version_value": "15.4(1)CG" + }, + { + "version_affected": "=", + "version_value": "15.4(1)CG1" + }, + { + "version_affected": "=", + "version_value": "15.4(2)CG" + }, + { + "version_affected": "=", + "version_value": "15.5(1)S" + }, + { + "version_affected": "=", + "version_value": "15.5(2)S" + }, + { + "version_affected": "=", + "version_value": "15.5(1)S1" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S" + }, + { + "version_affected": "=", + "version_value": "15.5(1)S2" + }, + { + "version_affected": "=", + "version_value": "15.5(1)S3" + }, + { + "version_affected": "=", + "version_value": "15.5(2)S1" + }, + { + "version_affected": "=", + "version_value": "15.5(2)S2" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S1" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S1a" + }, + { + "version_affected": "=", + "version_value": "15.5(2)S3" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S2" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S0a" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S3" + }, + { + "version_affected": "=", + "version_value": "15.5(1)S4" + }, + { + "version_affected": "=", + "version_value": "15.5(2)S4" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S4" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S5" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S6" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S6a" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S7" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S6b" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S8" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S9" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S10" + }, + { + "version_affected": "=", + "version_value": "15.5(3)S9a" + }, + { + "version_affected": "=", + "version_value": "15.2(2)EB" + }, + { + "version_affected": "=", + "version_value": "15.2(2)EB1" + }, + { + "version_affected": "=", + "version_value": "15.2(2)EB2" + }, + { + "version_affected": "=", + "version_value": "15.2(6)EB" + }, + { + "version_affected": "=", + "version_value": "15.5(1)T" + }, + { + "version_affected": "=", + "version_value": "15.5(1)T1" + }, + { + "version_affected": "=", + "version_value": "15.5(2)T" + }, + { + "version_affected": "=", + "version_value": "15.5(1)T2" + }, + { + "version_affected": "=", + "version_value": "15.5(1)T3" + }, + { + "version_affected": "=", + "version_value": "15.5(2)T1" + }, + { + "version_affected": "=", + "version_value": "15.5(2)T2" + }, + { + "version_affected": "=", + "version_value": "15.5(2)T3" + }, + { + "version_affected": "=", + "version_value": "15.5(2)T4" + }, + { + "version_affected": "=", + "version_value": "15.5(1)T4" + }, + { + "version_affected": "=", + "version_value": "15.2(2)EA" + }, + { + "version_affected": "=", + "version_value": "15.2(2)EA1" + }, + { + "version_affected": "=", + "version_value": "15.2(2)EA2" + }, + { + "version_affected": "=", + "version_value": "15.2(3)EA" + }, + { + "version_affected": "=", + "version_value": "15.2(4)EA" + }, + { + "version_affected": "=", + "version_value": "15.2(4)EA1" + }, + { + "version_affected": "=", + "version_value": "15.2(2)EA3" + }, + { + "version_affected": "=", + "version_value": "15.2(4)EA3" + }, + { + "version_affected": "=", + "version_value": "15.2(5)EA" + }, + { + "version_affected": "=", + "version_value": "15.2(4)EA4" + }, + { + "version_affected": "=", + "version_value": "15.2(4)EA5" + }, + { + "version_affected": "=", + "version_value": "15.2(4)EA6" + }, + { + "version_affected": "=", + "version_value": "15.2(4)EA7" + }, + { + "version_affected": "=", + "version_value": "15.2(4)EA8" + }, + { + "version_affected": "=", + "version_value": "15.2(4)EA9" + }, + { + "version_affected": "=", + "version_value": "15.2(4)EA9a" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M1" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M0a" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M2" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M3" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M4" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M4a" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M5" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M6" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M7" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M6a" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M8" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M9" + }, + { + "version_affected": "=", + "version_value": "15.5(3)M10" + }, + { + "version_affected": "=", + "version_value": "15.5(3)SN" + }, + { + "version_affected": "=", + "version_value": "15.6(1)S" + }, + { + "version_affected": "=", + "version_value": "15.6(2)S" + }, + { + "version_affected": "=", + "version_value": "15.6(2)S1" + }, + { + "version_affected": "=", + "version_value": "15.6(1)S1" + }, + { + "version_affected": "=", + "version_value": "15.6(1)S2" + }, + { + "version_affected": "=", + "version_value": "15.6(2)S2" + }, + { + "version_affected": "=", + "version_value": "15.6(1)S3" + }, + { + "version_affected": "=", + "version_value": "15.6(2)S3" + }, + { + "version_affected": "=", + "version_value": "15.6(1)S4" + }, + { + "version_affected": "=", + "version_value": "15.6(2)S4" + }, + { + "version_affected": "=", + "version_value": "15.6(1)T" + }, + { + "version_affected": "=", + "version_value": "15.6(2)T" + }, + { + "version_affected": "=", + "version_value": "15.6(1)T0a" + }, + { + "version_affected": "=", + "version_value": "15.6(1)T1" + }, + { + "version_affected": "=", + "version_value": "15.6(2)T1" + }, + { + "version_affected": "=", + "version_value": "15.6(1)T2" + }, + { + "version_affected": "=", + "version_value": "15.6(2)T2" + }, + { + "version_affected": "=", + "version_value": "15.6(1)T3" + }, + { + "version_affected": "=", + "version_value": "15.6(2)T3" + }, + { + "version_affected": "=", + "version_value": "15.3(1)SY" + }, + { + "version_affected": "=", + "version_value": "15.3(1)SY1" + }, + { + "version_affected": "=", + "version_value": "15.3(1)SY2" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP1" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP2" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP3" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP4" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP5" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP6" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP7" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP8" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP9" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SP10" + }, + { + "version_affected": "=", + "version_value": "15.6(2)SN" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M1" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M0a" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M1b" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M2" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M3" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M3a" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M4" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M5" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M6" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M7" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M6a" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M6b" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M8" + }, + { + "version_affected": "=", + "version_value": "15.6(3)M9" + }, + { + "version_affected": "=", + "version_value": "15.2(4)EC1" + }, + { + "version_affected": "=", + "version_value": "15.2(4)EC2" + }, + { + "version_affected": "=", + "version_value": "15.4(1)SY" + }, + { + "version_affected": "=", + "version_value": "15.4(1)SY1" + }, + { + "version_affected": "=", + "version_value": "15.4(1)SY2" + }, + { + "version_affected": "=", + "version_value": "15.4(1)SY3" + }, + { + "version_affected": "=", + "version_value": "15.4(1)SY4" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY1" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY2" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY3" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY4" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY5" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY6" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY7" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY8" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY9" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY10" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY11" + }, + { + "version_affected": "=", + "version_value": "15.5(1)SY12" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M1" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M0a" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M3" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M2" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M4" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M5" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M4a" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M4b" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M6" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M7" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M8" + }, + { + "version_affected": "=", + "version_value": "15.7(3)M9" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M1" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M0a" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M0b" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M2" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M1a" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M3" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M2a" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M4" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M3a" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M3b" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M5" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M6" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M7" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M8" + }, + { + "version_affected": "=", + "version_value": "15.8(3)M9" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M1" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M0a" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M2" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M3" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M2a" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M3a" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M4" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M3b" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M5" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M4a" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M6" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M7" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M6a" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M6b" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M8" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M7a" + }, + { + "version_affected": "=", + "version_value": "15.9(3)M8b" + } + ] + } + }, + { + "product_name": "Cisco IOS XE Software", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.7.0S" + }, + { + "version_affected": "=", + "version_value": "3.7.1S" + }, + { + "version_affected": "=", + "version_value": "3.7.2S" + }, + { + "version_affected": "=", + "version_value": "3.7.3S" + }, + { + "version_affected": "=", + "version_value": "3.7.4S" + }, + { + "version_affected": "=", + "version_value": "3.7.5S" + }, + { + "version_affected": "=", + "version_value": "3.7.6S" + }, + { + "version_affected": "=", + "version_value": "3.7.7S" + }, + { + "version_affected": "=", + "version_value": "3.7.4aS" + }, + { + "version_affected": "=", + "version_value": "3.7.2tS" + }, + { + "version_affected": "=", + "version_value": "3.7.0bS" + }, + { + "version_affected": "=", + "version_value": "3.7.1aS" + }, + { + "version_affected": "=", + "version_value": "3.8.0S" + }, + { + "version_affected": "=", + "version_value": "3.8.1S" + }, + { + "version_affected": "=", + "version_value": "3.8.2S" + }, + { + "version_affected": "=", + "version_value": "3.9.1S" + }, + { + "version_affected": "=", + "version_value": "3.9.0S" + }, + { + "version_affected": "=", + "version_value": "3.9.2S" + }, + { + "version_affected": "=", + "version_value": "3.9.1aS" + }, + { + "version_affected": "=", + "version_value": "3.9.0aS" + }, + { + "version_affected": "=", + "version_value": "3.2.0SE" + }, + { + "version_affected": "=", + "version_value": "3.2.1SE" + }, + { + "version_affected": "=", + "version_value": "3.2.2SE" + }, + { + "version_affected": "=", + "version_value": "3.2.3SE" + }, + { + "version_affected": "=", + "version_value": "3.3.0SE" + }, + { + "version_affected": "=", + "version_value": "3.3.1SE" + }, + { + "version_affected": "=", + "version_value": "3.3.2SE" + }, + { + "version_affected": "=", + "version_value": "3.3.3SE" + }, + { + "version_affected": "=", + "version_value": "3.3.4SE" + }, + { + "version_affected": "=", + "version_value": "3.3.5SE" + }, + { + "version_affected": "=", + "version_value": "3.3.0XO" + }, + { + "version_affected": "=", + "version_value": "3.3.1XO" + }, + { + "version_affected": "=", + "version_value": "3.3.2XO" + }, + { + "version_affected": "=", + "version_value": "3.4.0SG" + }, + { + "version_affected": "=", + "version_value": "3.4.2SG" + }, + { + "version_affected": "=", + "version_value": "3.4.1SG" + }, + { + "version_affected": "=", + "version_value": "3.4.3SG" + }, + { + "version_affected": "=", + "version_value": "3.4.4SG" + }, + { + "version_affected": "=", + "version_value": "3.4.5SG" + }, + { + "version_affected": "=", + "version_value": "3.4.6SG" + }, + { + "version_affected": "=", + "version_value": "3.4.7SG" + }, + { + "version_affected": "=", + "version_value": "3.4.8SG" + }, + { + "version_affected": "=", + "version_value": "3.5.0E" + }, + { + "version_affected": "=", + "version_value": "3.5.1E" + }, + { + "version_affected": "=", + "version_value": "3.5.2E" + }, + { + "version_affected": "=", + "version_value": "3.5.3E" + }, + { + "version_affected": "=", + "version_value": "3.10.0S" + }, + { + "version_affected": "=", + "version_value": "3.10.1S" + }, + { + "version_affected": "=", + "version_value": "3.10.2S" + }, + { + "version_affected": "=", + "version_value": "3.10.3S" + }, + { + "version_affected": "=", + "version_value": "3.10.4S" + }, + { + "version_affected": "=", + "version_value": "3.10.5S" + }, + { + "version_affected": "=", + "version_value": "3.10.6S" + }, + { + "version_affected": "=", + "version_value": "3.10.2tS" + }, + { + "version_affected": "=", + "version_value": "3.10.7S" + }, + { + "version_affected": "=", + "version_value": "3.10.1xbS" + }, + { + "version_affected": "=", + "version_value": "3.10.8S" + }, + { + "version_affected": "=", + "version_value": "3.10.8aS" + }, + { + "version_affected": "=", + "version_value": "3.10.9S" + }, + { + "version_affected": "=", + "version_value": "3.10.10S" + }, + { + "version_affected": "=", + "version_value": "3.11.1S" + }, + { + "version_affected": "=", + "version_value": "3.11.2S" + }, + { + "version_affected": "=", + "version_value": "3.11.0S" + }, + { + "version_affected": "=", + "version_value": "3.11.3S" + }, + { + "version_affected": "=", + "version_value": "3.11.4S" + }, + { + "version_affected": "=", + "version_value": "3.12.0S" + }, + { + "version_affected": "=", + "version_value": "3.12.1S" + }, + { + "version_affected": "=", + "version_value": "3.12.2S" + }, + { + "version_affected": "=", + "version_value": "3.12.3S" + }, + { + "version_affected": "=", + "version_value": "3.12.0aS" + }, + { + "version_affected": "=", + "version_value": "3.12.4S" + }, + { + "version_affected": "=", + "version_value": "3.13.0S" + }, + { + "version_affected": "=", + "version_value": "3.13.1S" + }, + { + "version_affected": "=", + "version_value": "3.13.2S" + }, + { + "version_affected": "=", + "version_value": "3.13.3S" + }, + { + "version_affected": "=", + "version_value": "3.13.4S" + }, + { + "version_affected": "=", + "version_value": "3.13.5S" + }, + { + "version_affected": "=", + "version_value": "3.13.2aS" + }, + { + "version_affected": "=", + "version_value": "3.13.0aS" + }, + { + "version_affected": "=", + "version_value": "3.13.5aS" + }, + { + "version_affected": "=", + "version_value": "3.13.6S" + }, + { + "version_affected": "=", + "version_value": "3.13.7S" + }, + { + "version_affected": "=", + "version_value": "3.13.6aS" + }, + { + "version_affected": "=", + "version_value": "3.13.7aS" + }, + { + "version_affected": "=", + "version_value": "3.13.8S" + }, + { + "version_affected": "=", + "version_value": "3.13.9S" + }, + { + "version_affected": "=", + "version_value": "3.13.10S" + }, + { + "version_affected": "=", + "version_value": "3.6.0E" + }, + { + "version_affected": "=", + "version_value": "3.6.1E" + }, + { + "version_affected": "=", + "version_value": "3.6.2aE" + }, + { + "version_affected": "=", + "version_value": "3.6.2E" + }, + { + "version_affected": "=", + "version_value": "3.6.3E" + }, + { + "version_affected": "=", + "version_value": "3.6.4E" + }, + { + "version_affected": "=", + "version_value": "3.6.5E" + }, + { + "version_affected": "=", + "version_value": "3.6.6E" + }, + { + "version_affected": "=", + "version_value": "3.6.5aE" + }, + { + "version_affected": "=", + "version_value": "3.6.5bE" + }, + { + "version_affected": "=", + "version_value": "3.6.7E" + }, + { + "version_affected": "=", + "version_value": "3.6.8E" + }, + { + "version_affected": "=", + "version_value": "3.6.7bE" + }, + { + "version_affected": "=", + "version_value": "3.6.9E" + }, + { + "version_affected": "=", + "version_value": "3.6.10E" + }, + { + "version_affected": "=", + "version_value": "3.14.0S" + }, + { + "version_affected": "=", + "version_value": "3.14.1S" + }, + { + "version_affected": "=", + "version_value": "3.14.2S" + }, + { + "version_affected": "=", + "version_value": "3.14.3S" + }, + { + "version_affected": "=", + "version_value": "3.14.4S" + }, + { + "version_affected": "=", + "version_value": "3.15.0S" + }, + { + "version_affected": "=", + "version_value": "3.15.1S" + }, + { + "version_affected": "=", + "version_value": "3.15.2S" + }, + { + "version_affected": "=", + "version_value": "3.15.1cS" + }, + { + "version_affected": "=", + "version_value": "3.15.3S" + }, + { + "version_affected": "=", + "version_value": "3.15.4S" + }, + { + "version_affected": "=", + "version_value": "3.7.0E" + }, + { + "version_affected": "=", + "version_value": "3.7.1E" + }, + { + "version_affected": "=", + "version_value": "3.7.2E" + }, + { + "version_affected": "=", + "version_value": "3.7.3E" + }, + { + "version_affected": "=", + "version_value": "3.7.4E" + }, + { + "version_affected": "=", + "version_value": "3.7.5E" + }, + { + "version_affected": "=", + "version_value": "3.16.0S" + }, + { + "version_affected": "=", + "version_value": "3.16.1S" + }, + { + "version_affected": "=", + "version_value": "3.16.1aS" + }, + { + "version_affected": "=", + "version_value": "3.16.2S" + }, + { + "version_affected": "=", + "version_value": "3.16.2aS" + }, + { + "version_affected": "=", + "version_value": "3.16.0cS" + }, + { + "version_affected": "=", + "version_value": "3.16.3S" + }, + { + "version_affected": "=", + "version_value": "3.16.2bS" + }, + { + "version_affected": "=", + "version_value": "3.16.3aS" + }, + { + "version_affected": "=", + "version_value": "3.16.4S" + }, + { + "version_affected": "=", + "version_value": "3.16.4aS" + }, + { + "version_affected": "=", + "version_value": "3.16.4bS" + }, + { + "version_affected": "=", + "version_value": "3.16.5S" + }, + { + "version_affected": "=", + "version_value": "3.16.4dS" + }, + { + "version_affected": "=", + "version_value": "3.16.6S" + }, + { + "version_affected": "=", + "version_value": "3.16.7S" + }, + { + "version_affected": "=", + "version_value": "3.16.6bS" + }, + { + "version_affected": "=", + "version_value": "3.16.7aS" + }, + { + "version_affected": "=", + "version_value": "3.16.7bS" + }, + { + "version_affected": "=", + "version_value": "3.16.8S" + }, + { + "version_affected": "=", + "version_value": "3.16.9S" + }, + { + "version_affected": "=", + "version_value": "3.16.10S" + }, + { + "version_affected": "=", + "version_value": "3.17.0S" + }, + { + "version_affected": "=", + "version_value": "3.17.1S" + }, + { + "version_affected": "=", + "version_value": "3.17.2S" + }, + { + "version_affected": "=", + "version_value": "3.17.1aS" + }, + { + "version_affected": "=", + "version_value": "3.17.3S" + }, + { + "version_affected": "=", + "version_value": "3.17.4S" + }, + { + "version_affected": "=", + "version_value": "16.1.1" + }, + { + "version_affected": "=", + "version_value": "16.1.2" + }, + { + "version_affected": "=", + "version_value": "16.1.3" + }, + { + "version_affected": "=", + "version_value": "16.2.1" + }, + { + "version_affected": "=", + "version_value": "16.2.2" + }, + { + "version_affected": "=", + "version_value": "3.8.0E" + }, + { + "version_affected": "=", + "version_value": "3.8.1E" + }, + { + "version_affected": "=", + "version_value": "3.8.2E" + }, + { + "version_affected": "=", + "version_value": "3.8.3E" + }, + { + "version_affected": "=", + "version_value": "3.8.4E" + }, + { + "version_affected": "=", + "version_value": "3.8.5E" + }, + { + "version_affected": "=", + "version_value": "3.8.5aE" + }, + { + "version_affected": "=", + "version_value": "3.8.6E" + }, + { + "version_affected": "=", + "version_value": "3.8.7E" + }, + { + "version_affected": "=", + "version_value": "3.8.8E" + }, + { + "version_affected": "=", + "version_value": "3.8.9E" + }, + { + "version_affected": "=", + "version_value": "3.8.10E" + }, + { + "version_affected": "=", + "version_value": "3.8.10eE" + }, + { + "version_affected": "=", + "version_value": "16.3.1" + }, + { + "version_affected": "=", + "version_value": "16.3.2" + }, + { + "version_affected": "=", + "version_value": "16.3.3" + }, + { + "version_affected": "=", + "version_value": "16.3.1a" + }, + { + "version_affected": "=", + "version_value": "16.3.4" + }, + { + "version_affected": "=", + "version_value": "16.3.5" + }, + { + "version_affected": "=", + "version_value": "16.3.5b" + }, + { + "version_affected": "=", + "version_value": "16.3.6" + }, + { + "version_affected": "=", + "version_value": "16.3.7" + }, + { + "version_affected": "=", + "version_value": "16.3.8" + }, + { + "version_affected": "=", + "version_value": "16.3.9" + }, + { + "version_affected": "=", + "version_value": "16.3.10" + }, + { + "version_affected": "=", + "version_value": "16.3.11" + }, + { + "version_affected": "=", + "version_value": "16.4.1" + }, + { + "version_affected": "=", + "version_value": "16.4.2" + }, + { + "version_affected": "=", + "version_value": "16.4.3" + }, + { + "version_affected": "=", + "version_value": "16.5.1" + }, + { + "version_affected": "=", + "version_value": "16.5.1a" + }, + { + "version_affected": "=", + "version_value": "16.5.1b" + }, + { + "version_affected": "=", + "version_value": "16.5.2" + }, + { + "version_affected": "=", + "version_value": "16.5.3" + }, + { + "version_affected": "=", + "version_value": "3.18.0aS" + }, + { + "version_affected": "=", + "version_value": "3.18.0S" + }, + { + "version_affected": "=", + "version_value": "3.18.1S" + }, + { + "version_affected": "=", + "version_value": "3.18.2S" + }, + { + "version_affected": "=", + "version_value": "3.18.3S" + }, + { + "version_affected": "=", + "version_value": "3.18.4S" + }, + { + "version_affected": "=", + "version_value": "3.18.0SP" + }, + { + "version_affected": "=", + "version_value": "3.18.1SP" + }, + { + "version_affected": "=", + "version_value": "3.18.1aSP" + }, + { + "version_affected": "=", + "version_value": "3.18.1bSP" + }, + { + "version_affected": "=", + "version_value": "3.18.1cSP" + }, + { + "version_affected": "=", + "version_value": "3.18.2SP" + }, + { + "version_affected": "=", + "version_value": "3.18.2aSP" + }, + { + "version_affected": "=", + "version_value": "3.18.3SP" + }, + { + "version_affected": "=", + "version_value": "3.18.4SP" + }, + { + "version_affected": "=", + "version_value": "3.18.3aSP" + }, + { + "version_affected": "=", + "version_value": "3.18.3bSP" + }, + { + "version_affected": "=", + "version_value": "3.18.5SP" + }, + { + "version_affected": "=", + "version_value": "3.18.6SP" + }, + { + "version_affected": "=", + "version_value": "3.18.7SP" + }, + { + "version_affected": "=", + "version_value": "3.18.8aSP" + }, + { + "version_affected": "=", + "version_value": "3.18.9SP" + }, + { + "version_affected": "=", + "version_value": "3.9.0E" + }, + { + "version_affected": "=", + "version_value": "3.9.1E" + }, + { + "version_affected": "=", + "version_value": "3.9.2E" + }, + { + "version_affected": "=", + "version_value": "16.6.1" + }, + { + "version_affected": "=", + "version_value": "16.6.2" + }, + { + "version_affected": "=", + "version_value": "16.6.3" + }, + { + "version_affected": "=", + "version_value": "16.6.4" + }, + { + "version_affected": "=", + "version_value": "16.6.5" + }, + { + "version_affected": "=", + "version_value": "16.6.4a" + }, + { + "version_affected": "=", + "version_value": "16.6.5a" + }, + { + "version_affected": "=", + "version_value": "16.6.6" + }, + { + "version_affected": "=", + "version_value": "16.6.7" + }, + { + "version_affected": "=", + "version_value": "16.6.8" + }, + { + "version_affected": "=", + "version_value": "16.6.9" + }, + { + "version_affected": "=", + "version_value": "16.6.10" + }, + { + "version_affected": "=", + "version_value": "16.7.1" + }, + { + "version_affected": "=", + "version_value": "16.7.1a" + }, + { + "version_affected": "=", + "version_value": "16.7.1b" + }, + { + "version_affected": "=", + "version_value": "16.7.2" + }, + { + "version_affected": "=", + "version_value": "16.7.3" + }, + { + "version_affected": "=", + "version_value": "16.7.4" + }, + { + "version_affected": "=", + "version_value": "16.8.1" + }, + { + "version_affected": "=", + "version_value": "16.8.1a" + }, + { + "version_affected": "=", + "version_value": "16.8.1b" + }, + { + "version_affected": "=", + "version_value": "16.8.1s" + }, + { + "version_affected": "=", + "version_value": "16.8.1c" + }, + { + "version_affected": "=", + "version_value": "16.8.1d" + }, + { + "version_affected": "=", + "version_value": "16.8.2" + }, + { + "version_affected": "=", + "version_value": "16.8.1e" + }, + { + "version_affected": "=", + "version_value": "16.8.3" + }, + { + "version_affected": "=", + "version_value": "16.9.1" + }, + { + "version_affected": "=", + "version_value": "16.9.2" + }, + { + "version_affected": "=", + "version_value": "16.9.1a" + }, + { + "version_affected": "=", + "version_value": "16.9.1b" + }, + { + "version_affected": "=", + "version_value": "16.9.1s" + }, + { + "version_affected": "=", + "version_value": "16.9.3" + }, + { + "version_affected": "=", + "version_value": "16.9.4" + }, + { + "version_affected": "=", + "version_value": "16.9.3a" + }, + { + "version_affected": "=", + "version_value": "16.9.5" + }, + { + "version_affected": "=", + "version_value": "16.9.5f" + }, + { + "version_affected": "=", + "version_value": "16.9.6" + }, + { + "version_affected": "=", + "version_value": "16.9.7" + }, + { + "version_affected": "=", + "version_value": "16.9.8" + }, + { + "version_affected": "=", + "version_value": "16.10.1" + }, + { + "version_affected": "=", + "version_value": "16.10.1a" + }, + { + "version_affected": "=", + "version_value": "16.10.1b" + }, + { + "version_affected": "=", + "version_value": "16.10.1s" + }, + { + "version_affected": "=", + "version_value": "16.10.1c" + }, + { + "version_affected": "=", + "version_value": "16.10.1e" + }, + { + "version_affected": "=", + "version_value": "16.10.1d" + }, + { + "version_affected": "=", + "version_value": "16.10.2" + }, + { + "version_affected": "=", + "version_value": "16.10.1f" + }, + { + "version_affected": "=", + "version_value": "16.10.1g" + }, + { + "version_affected": "=", + "version_value": "16.10.3" + }, + { + "version_affected": "=", + "version_value": "3.10.0E" + }, + { + "version_affected": "=", + "version_value": "3.10.1E" + }, + { + "version_affected": "=", + "version_value": "3.10.0cE" + }, + { + "version_affected": "=", + "version_value": "3.10.2E" + }, + { + "version_affected": "=", + "version_value": "3.10.3E" + }, + { + "version_affected": "=", + "version_value": "16.11.1" + }, + { + "version_affected": "=", + "version_value": "16.11.1a" + }, + { + "version_affected": "=", + "version_value": "16.11.1b" + }, + { + "version_affected": "=", + "version_value": "16.11.2" + }, + { + "version_affected": "=", + "version_value": "16.11.1s" + }, + { + "version_affected": "=", + "version_value": "16.12.1" + }, + { + "version_affected": "=", + "version_value": "16.12.1s" + }, + { + "version_affected": "=", + "version_value": "16.12.1a" + }, + { + "version_affected": "=", + "version_value": "16.12.1c" + }, + { + "version_affected": "=", + "version_value": "16.12.1w" + }, + { + "version_affected": "=", + "version_value": "16.12.2" + }, + { + "version_affected": "=", + "version_value": "16.12.1y" + }, + { + "version_affected": "=", + "version_value": "16.12.2a" + }, + { + "version_affected": "=", + "version_value": "16.12.3" + }, + { + "version_affected": "=", + "version_value": "16.12.8" + }, + { + "version_affected": "=", + "version_value": "16.12.2s" + }, + { + "version_affected": "=", + "version_value": "16.12.1x" + }, + { + "version_affected": "=", + "version_value": "16.12.1t" + }, + { + "version_affected": "=", + "version_value": "16.12.4" + }, + { + "version_affected": "=", + "version_value": "16.12.3s" + }, + { + "version_affected": "=", + "version_value": "16.12.3a" + }, + { + "version_affected": "=", + "version_value": "16.12.4a" + }, + { + "version_affected": "=", + "version_value": "16.12.5" + }, + { + "version_affected": "=", + "version_value": "16.12.6" + }, + { + "version_affected": "=", + "version_value": "16.12.1z1" + }, + { + "version_affected": "=", + "version_value": "16.12.5a" + }, + { + "version_affected": "=", + "version_value": "16.12.5b" + }, + { + "version_affected": "=", + "version_value": "16.12.1z2" + }, + { + "version_affected": "=", + "version_value": "16.12.6a" + }, + { + "version_affected": "=", + "version_value": "16.12.7" + }, + { + "version_affected": "=", + "version_value": "16.12.9" + }, + { + "version_affected": "=", + "version_value": "16.12.10" + }, + { + "version_affected": "=", + "version_value": "16.12.10a" + }, + { + "version_affected": "=", + "version_value": "3.11.0E" + }, + { + "version_affected": "=", + "version_value": "3.11.1E" + }, + { + "version_affected": "=", + "version_value": "3.11.2E" + }, + { + "version_affected": "=", + "version_value": "3.11.3E" + }, + { + "version_affected": "=", + "version_value": "3.11.1aE" + }, + { + "version_affected": "=", + "version_value": "3.11.4E" + }, + { + "version_affected": "=", + "version_value": "3.11.3aE" + }, + { + "version_affected": "=", + "version_value": "3.11.5E" + }, + { + "version_affected": "=", + "version_value": "3.11.6E" + }, + { + "version_affected": "=", + "version_value": "3.11.7E" + }, + { + "version_affected": "=", + "version_value": "3.11.8E" + }, + { + "version_affected": "=", + "version_value": "3.11.9E" + }, + { + "version_affected": "=", + "version_value": "17.1.1" + }, + { + "version_affected": "=", + "version_value": "17.1.1a" + }, + { + "version_affected": "=", + "version_value": "17.1.1s" + }, + { + "version_affected": "=", + "version_value": "17.1.1t" + }, + { + "version_affected": "=", + "version_value": "17.1.3" + }, + { + "version_affected": "=", + "version_value": "17.2.1" + }, + { + "version_affected": "=", + "version_value": "17.2.1r" + }, + { + "version_affected": "=", + "version_value": "17.2.1a" + }, + { + "version_affected": "=", + "version_value": "17.2.1v" + }, + { + "version_affected": "=", + "version_value": "17.2.2" + }, + { + "version_affected": "=", + "version_value": "17.2.3" + }, + { + "version_affected": "=", + "version_value": "17.3.1" + }, + { + "version_affected": "=", + "version_value": "17.3.2" + }, + { + "version_affected": "=", + "version_value": "17.3.3" + }, + { + "version_affected": "=", + "version_value": "17.3.1a" + }, + { + "version_affected": "=", + "version_value": "17.3.1w" + }, + { + "version_affected": "=", + "version_value": "17.3.2a" + }, + { + "version_affected": "=", + "version_value": "17.3.1x" + }, + { + "version_affected": "=", + "version_value": "17.3.1z" + }, + { + "version_affected": "=", + "version_value": "17.3.4" + }, + { + "version_affected": "=", + "version_value": "17.3.5" + }, + { + "version_affected": "=", + "version_value": "17.3.4a" + }, + { + "version_affected": "=", + "version_value": "17.3.6" + }, + { + "version_affected": "=", + "version_value": "17.3.4b" + }, + { + "version_affected": "=", + "version_value": "17.3.4c" + }, + { + "version_affected": "=", + "version_value": "17.3.5a" + }, + { + "version_affected": "=", + "version_value": "17.3.5b" + }, + { + "version_affected": "=", + "version_value": "17.3.7" + }, + { + "version_affected": "=", + "version_value": "17.3.8" + }, + { + "version_affected": "=", + "version_value": "17.3.8a" + }, + { + "version_affected": "=", + "version_value": "17.4.1" + }, + { + "version_affected": "=", + "version_value": "17.4.2" + }, + { + "version_affected": "=", + "version_value": "17.4.1a" + }, + { + "version_affected": "=", + "version_value": "17.4.1b" + }, + { + "version_affected": "=", + "version_value": "17.4.2a" + }, + { + "version_affected": "=", + "version_value": "17.5.1" + }, + { + "version_affected": "=", + "version_value": "17.5.1a" + }, + { + "version_affected": "=", + "version_value": "17.6.1" + }, + { + "version_affected": "=", + "version_value": "17.6.2" + }, + { + "version_affected": "=", + "version_value": "17.6.1w" + }, + { + "version_affected": "=", + "version_value": "17.6.1a" + }, + { + "version_affected": "=", + "version_value": "17.6.1x" + }, + { + "version_affected": "=", + "version_value": "17.6.3" + }, + { + "version_affected": "=", + "version_value": "17.6.1y" + }, + { + "version_affected": "=", + "version_value": "17.6.1z" + }, + { + "version_affected": "=", + "version_value": "17.6.3a" + }, + { + "version_affected": "=", + "version_value": "17.6.4" + }, + { + "version_affected": "=", + "version_value": "17.6.1z1" + }, + { + "version_affected": "=", + "version_value": "17.6.5" + }, + { + "version_affected": "=", + "version_value": "17.6.5a" + }, + { + "version_affected": "=", + "version_value": "17.7.1" + }, + { + "version_affected": "=", + "version_value": "17.7.1a" + }, + { + "version_affected": "=", + "version_value": "17.7.1b" + }, + { + "version_affected": "=", + "version_value": "17.7.2" + }, + { + "version_affected": "=", + "version_value": "17.10.1" + }, + { + "version_affected": "=", + "version_value": "17.10.1a" + }, + { + "version_affected": "=", + "version_value": "17.10.1b" + }, + { + "version_affected": "=", + "version_value": "17.8.1" + }, + { + "version_affected": "=", + "version_value": "17.8.1a" + }, + { + "version_affected": "=", + "version_value": "17.9.1" + }, + { + "version_affected": "=", + "version_value": "17.9.1w" + }, + { + "version_affected": "=", + "version_value": "17.9.2" + }, + { + "version_affected": "=", + "version_value": "17.9.1a" + }, + { + "version_affected": "=", + "version_value": "17.9.1x" + }, + { + "version_affected": "=", + "version_value": "17.9.1y" + }, + { + "version_affected": "=", + "version_value": "17.9.3" + }, + { + "version_affected": "=", + "version_value": "17.9.2a" + }, + { + "version_affected": "=", + "version_value": "17.9.1x1" + }, + { + "version_affected": "=", + "version_value": "17.9.3a" + }, + { + "version_affected": "=", + "version_value": "17.9.1y1" + }, + { + "version_affected": "=", + "version_value": "17.11.1" + }, + { + "version_affected": "=", + "version_value": "17.11.1a" + }, + { + "version_affected": "=", + "version_value": "17.11.99SW" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-isis-sGjyOUHX", + "refsource": "MISC", + "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-isis-sGjyOUHX" + } + ] + }, + "source": { + "advisory": "cisco-sa-isis-sGjyOUHX", + "discovery": "INTERNAL", + "defects": [ + "CSCwf54007" + ] + }, + "exploit": [ + { + "lang": "en", + "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" } ] } diff --git a/2024/20xxx/CVE-2024-20314.json b/2024/20xxx/CVE-2024-20314.json index f0d3e871761..506cd02d11a 100644 --- a/2024/20xxx/CVE-2024-20314.json +++ b/2024/20xxx/CVE-2024-20314.json @@ -1,17 +1,834 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-20314", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@cisco.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the IPv4 Software-Defined Access (SD-Access) fabric edge node feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause high CPU utilization and stop all traffic processing, resulting in a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper handling of certain IPv4 packets. An attacker could exploit this vulnerability by sending certain IPv4 packets to an affected device. A successful exploit could allow the attacker to cause the device to exhaust CPU resources and stop processing traffic, resulting in a DoS condition." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Operator Precedence Logic Error", + "cweId": "CWE-783" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cisco", + "product": { + "product_data": [ + { + "product_name": "Cisco IOS XE Software", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "16.1.1" + }, + { + "version_affected": "=", + "version_value": "16.1.2" + }, + { + "version_affected": "=", + "version_value": "16.1.3" + }, + { + "version_affected": "=", + "version_value": "16.2.1" + }, + { + "version_affected": "=", + "version_value": "16.2.2" + }, + { + "version_affected": "=", + "version_value": "16.3.1" + }, + { + "version_affected": "=", + "version_value": "16.3.2" + }, + { + "version_affected": "=", + "version_value": "16.3.3" + }, + { + "version_affected": "=", + "version_value": "16.3.1a" + }, + { + "version_affected": "=", + "version_value": "16.3.4" + }, + { + "version_affected": "=", + "version_value": "16.3.5" + }, + { + "version_affected": "=", + "version_value": "16.3.5b" + }, + { + "version_affected": "=", + "version_value": "16.3.6" + }, + { + "version_affected": "=", + "version_value": "16.3.7" + }, + { + "version_affected": "=", + "version_value": "16.3.8" + }, + { + "version_affected": "=", + "version_value": "16.3.9" + }, + { + "version_affected": "=", + "version_value": "16.3.10" + }, + { + "version_affected": "=", + "version_value": "16.3.11" + }, + { + "version_affected": "=", + "version_value": "16.4.1" + }, + { + "version_affected": "=", + "version_value": "16.4.2" + }, + { + "version_affected": "=", + "version_value": "16.4.3" + }, + { + "version_affected": "=", + "version_value": "16.5.1" + }, + { + "version_affected": "=", + "version_value": "16.5.1a" + }, + { + "version_affected": "=", + "version_value": "16.5.1b" + }, + { + "version_affected": "=", + "version_value": "16.5.2" + }, + { + "version_affected": "=", + "version_value": "16.5.3" + }, + { + "version_affected": "=", + "version_value": "16.6.1" + }, + { + "version_affected": "=", + "version_value": "16.6.2" + }, + { + "version_affected": "=", + "version_value": "16.6.3" + }, + { + "version_affected": "=", + "version_value": "16.6.4" + }, + { + "version_affected": "=", + "version_value": "16.6.5" + }, + { + "version_affected": "=", + "version_value": "16.6.4a" + }, + { + "version_affected": "=", + "version_value": "16.6.5a" + }, + { + "version_affected": "=", + "version_value": "16.6.6" + }, + { + "version_affected": "=", + "version_value": "16.6.7" + }, + { + "version_affected": "=", + "version_value": "16.6.8" + }, + { + "version_affected": "=", + "version_value": "16.6.9" + }, + { + "version_affected": "=", + "version_value": "16.6.10" + }, + { + "version_affected": "=", + "version_value": "16.7.1" + }, + { + "version_affected": "=", + "version_value": "16.7.1a" + }, + { + "version_affected": "=", + "version_value": "16.7.1b" + }, + { + "version_affected": "=", + "version_value": "16.7.2" + }, + { + "version_affected": "=", + "version_value": "16.7.3" + }, + { + "version_affected": "=", + "version_value": "16.7.4" + }, + { + "version_affected": "=", + "version_value": "16.8.1" + }, + { + "version_affected": "=", + "version_value": "16.8.1a" + }, + { + "version_affected": "=", + "version_value": "16.8.1b" + }, + { + "version_affected": "=", + "version_value": "16.8.1s" + }, + { + "version_affected": "=", + "version_value": "16.8.1c" + }, + { + "version_affected": "=", + "version_value": "16.8.1d" + }, + { + "version_affected": "=", + "version_value": "16.8.2" + }, + { + "version_affected": "=", + "version_value": "16.8.1e" + }, + { + "version_affected": "=", + "version_value": "16.8.3" + }, + { + "version_affected": "=", + "version_value": "16.9.1" + }, + { + "version_affected": "=", + "version_value": "16.9.2" + }, + { + "version_affected": "=", + "version_value": "16.9.1a" + }, + { + "version_affected": "=", + "version_value": "16.9.1b" + }, + { + "version_affected": "=", + "version_value": "16.9.1s" + }, + { + "version_affected": "=", + "version_value": "16.9.3" + }, + { + "version_affected": "=", + "version_value": "16.9.4" + }, + { + "version_affected": "=", + "version_value": "16.9.3a" + }, + { + "version_affected": "=", + "version_value": "16.9.5" + }, + { + "version_affected": "=", + "version_value": "16.9.5f" + }, + { + "version_affected": "=", + "version_value": "16.9.6" + }, + { + "version_affected": "=", + "version_value": "16.9.7" + }, + { + "version_affected": "=", + "version_value": "16.9.8" + }, + { + "version_affected": "=", + "version_value": "16.10.1" + }, + { + "version_affected": "=", + "version_value": "16.10.1a" + }, + { + "version_affected": "=", + "version_value": "16.10.1b" + }, + { + "version_affected": "=", + "version_value": "16.10.1s" + }, + { + "version_affected": "=", + "version_value": "16.10.1c" + }, + { + "version_affected": "=", + "version_value": "16.10.1e" + }, + { + "version_affected": "=", + "version_value": "16.10.1d" + }, + { + "version_affected": "=", + "version_value": "16.10.2" + }, + { + "version_affected": "=", + "version_value": "16.10.1f" + }, + { + "version_affected": "=", + "version_value": "16.10.1g" + }, + { + "version_affected": "=", + "version_value": "16.10.3" + }, + { + "version_affected": "=", + "version_value": "16.11.1" + }, + { + "version_affected": "=", + "version_value": "16.11.1a" + }, + { + "version_affected": "=", + "version_value": "16.11.1b" + }, + { + "version_affected": "=", + "version_value": "16.11.2" + }, + { + "version_affected": "=", + "version_value": "16.11.1s" + }, + { + "version_affected": "=", + "version_value": "16.12.1" + }, + { + "version_affected": "=", + "version_value": "16.12.1s" + }, + { + "version_affected": "=", + "version_value": "16.12.1a" + }, + { + "version_affected": "=", + "version_value": "16.12.1c" + }, + { + "version_affected": "=", + "version_value": "16.12.1w" + }, + { + "version_affected": "=", + "version_value": "16.12.2" + }, + { + "version_affected": "=", + "version_value": "16.12.1y" + }, + { + "version_affected": "=", + "version_value": "16.12.2a" + }, + { + "version_affected": "=", + "version_value": "16.12.3" + }, + { + "version_affected": "=", + "version_value": "16.12.8" + }, + { + "version_affected": "=", + "version_value": "16.12.2s" + }, + { + "version_affected": "=", + "version_value": "16.12.1x" + }, + { + "version_affected": "=", + "version_value": "16.12.1t" + }, + { + "version_affected": "=", + "version_value": "16.12.4" + }, + { + "version_affected": "=", + "version_value": "16.12.3s" + }, + { + "version_affected": "=", + "version_value": "16.12.3a" + }, + { + "version_affected": "=", + "version_value": "16.12.4a" + }, + { + "version_affected": "=", + "version_value": "16.12.5" + }, + { + "version_affected": "=", + "version_value": "16.12.6" + }, + { + "version_affected": "=", + "version_value": "16.12.1z1" + }, + { + "version_affected": "=", + "version_value": "16.12.5a" + }, + { + "version_affected": "=", + "version_value": "16.12.5b" + }, + { + "version_affected": "=", + "version_value": "16.12.1z2" + }, + { + "version_affected": "=", + "version_value": "16.12.6a" + }, + { + "version_affected": "=", + "version_value": "16.12.7" + }, + { + "version_affected": "=", + "version_value": "16.12.9" + }, + { + "version_affected": "=", + "version_value": "16.12.10" + }, + { + "version_affected": "=", + "version_value": "16.12.10a" + }, + { + "version_affected": "=", + "version_value": "17.1.1" + }, + { + "version_affected": "=", + "version_value": "17.1.1a" + }, + { + "version_affected": "=", + "version_value": "17.1.1s" + }, + { + "version_affected": "=", + "version_value": "17.1.1t" + }, + { + "version_affected": "=", + "version_value": "17.1.3" + }, + { + "version_affected": "=", + "version_value": "17.2.1" + }, + { + "version_affected": "=", + "version_value": "17.2.1r" + }, + { + "version_affected": "=", + "version_value": "17.2.1a" + }, + { + "version_affected": "=", + "version_value": "17.2.1v" + }, + { + "version_affected": "=", + "version_value": "17.2.2" + }, + { + "version_affected": "=", + "version_value": "17.2.3" + }, + { + "version_affected": "=", + "version_value": "17.3.1" + }, + { + "version_affected": "=", + "version_value": "17.3.2" + }, + { + "version_affected": "=", + "version_value": "17.3.3" + }, + { + "version_affected": "=", + "version_value": "17.3.1a" + }, + { + "version_affected": "=", + "version_value": "17.3.1w" + }, + { + "version_affected": "=", + "version_value": "17.3.2a" + }, + { + "version_affected": "=", + "version_value": "17.3.1x" + }, + { + "version_affected": "=", + "version_value": "17.3.1z" + }, + { + "version_affected": "=", + "version_value": "17.3.4" + }, + { + "version_affected": "=", + "version_value": "17.3.5" + }, + { + "version_affected": "=", + "version_value": "17.3.4a" + }, + { + "version_affected": "=", + "version_value": "17.3.6" + }, + { + "version_affected": "=", + "version_value": "17.3.4b" + }, + { + "version_affected": "=", + "version_value": "17.3.4c" + }, + { + "version_affected": "=", + "version_value": "17.3.5a" + }, + { + "version_affected": "=", + "version_value": "17.3.5b" + }, + { + "version_affected": "=", + "version_value": "17.3.7" + }, + { + "version_affected": "=", + "version_value": "17.4.1" + }, + { + "version_affected": "=", + "version_value": "17.4.2" + }, + { + "version_affected": "=", + "version_value": "17.4.1a" + }, + { + "version_affected": "=", + "version_value": "17.4.1b" + }, + { + "version_affected": "=", + "version_value": "17.4.2a" + }, + { + "version_affected": "=", + "version_value": "17.5.1" + }, + { + "version_affected": "=", + "version_value": "17.5.1a" + }, + { + "version_affected": "=", + "version_value": "17.6.1" + }, + { + "version_affected": "=", + "version_value": "17.6.2" + }, + { + "version_affected": "=", + "version_value": "17.6.1w" + }, + { + "version_affected": "=", + "version_value": "17.6.1a" + }, + { + "version_affected": "=", + "version_value": "17.6.1x" + }, + { + "version_affected": "=", + "version_value": "17.6.3" + }, + { + "version_affected": "=", + "version_value": "17.6.1y" + }, + { + "version_affected": "=", + "version_value": "17.6.1z" + }, + { + "version_affected": "=", + "version_value": "17.6.3a" + }, + { + "version_affected": "=", + "version_value": "17.6.4" + }, + { + "version_affected": "=", + "version_value": "17.6.1z1" + }, + { + "version_affected": "=", + "version_value": "17.6.5" + }, + { + "version_affected": "=", + "version_value": "17.6.5a" + }, + { + "version_affected": "=", + "version_value": "17.7.1" + }, + { + "version_affected": "=", + "version_value": "17.7.1a" + }, + { + "version_affected": "=", + "version_value": "17.7.1b" + }, + { + "version_affected": "=", + "version_value": "17.7.2" + }, + { + "version_affected": "=", + "version_value": "17.10.1" + }, + { + "version_affected": "=", + "version_value": "17.10.1a" + }, + { + "version_affected": "=", + "version_value": "17.10.1b" + }, + { + "version_affected": "=", + "version_value": "17.8.1" + }, + { + "version_affected": "=", + "version_value": "17.8.1a" + }, + { + "version_affected": "=", + "version_value": "17.9.1" + }, + { + "version_affected": "=", + "version_value": "17.9.1w" + }, + { + "version_affected": "=", + "version_value": "17.9.2" + }, + { + "version_affected": "=", + "version_value": "17.9.1a" + }, + { + "version_affected": "=", + "version_value": "17.9.1x" + }, + { + "version_affected": "=", + "version_value": "17.9.1y" + }, + { + "version_affected": "=", + "version_value": "17.9.3" + }, + { + "version_affected": "=", + "version_value": "17.9.2a" + }, + { + "version_affected": "=", + "version_value": "17.9.1x1" + }, + { + "version_affected": "=", + "version_value": "17.9.3a" + }, + { + "version_affected": "=", + "version_value": "17.9.4" + }, + { + "version_affected": "=", + "version_value": "17.9.1y1" + }, + { + "version_affected": "=", + "version_value": "17.9.4a" + }, + { + "version_affected": "=", + "version_value": "17.11.1" + }, + { + "version_affected": "=", + "version_value": "17.11.1a" + }, + { + "version_affected": "=", + "version_value": "17.12.1" + }, + { + "version_affected": "=", + "version_value": "17.12.1w" + }, + { + "version_affected": "=", + "version_value": "17.12.1a" + }, + { + "version_affected": "=", + "version_value": "17.11.99SW" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sda-edge-dos-qZWuWXWG", + "refsource": "MISC", + "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sda-edge-dos-qZWuWXWG" + } + ] + }, + "source": { + "advisory": "cisco-sa-ios-xe-sda-edge-dos-qZWuWXWG", + "discovery": "EXTERNAL", + "defects": [ + "CSCwh41093" + ] + }, + "exploit": [ + { + "lang": "en", + "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" } ] } diff --git a/2024/20xxx/CVE-2024-20316.json b/2024/20xxx/CVE-2024-20316.json index 3d851d6d0e9..fb18119cc02 100644 --- a/2024/20xxx/CVE-2024-20316.json +++ b/2024/20xxx/CVE-2024-20316.json @@ -1,17 +1,731 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-20316", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@cisco.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the data model interface (DMI) services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access resources that should have been protected by a configured IPv4 access control list (ACL).\r\n\r This vulnerability is due to improper handling of error conditions when a successfully authorized device administrator updates an IPv4 ACL using the NETCONF or RESTCONF protocol, and the update would reorder access control entries (ACEs) in the updated ACL. An attacker could exploit this vulnerability by accessing resources that should have been protected across an affected device." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Detection of Error Condition Without Action", + "cweId": "CWE-390" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cisco", + "product": { + "product_data": [ + { + "product_name": "Cisco IOS XE Software", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "16.3.1" + }, + { + "version_affected": "=", + "version_value": "16.3.2" + }, + { + "version_affected": "=", + "version_value": "16.3.3" + }, + { + "version_affected": "=", + "version_value": "16.3.1a" + }, + { + "version_affected": "=", + "version_value": "16.3.4" + }, + { + "version_affected": "=", + "version_value": "16.3.5" + }, + { + "version_affected": "=", + "version_value": "16.3.5b" + }, + { + "version_affected": "=", + "version_value": "16.3.6" + }, + { + "version_affected": "=", + "version_value": "16.3.7" + }, + { + "version_affected": "=", + "version_value": "16.3.8" + }, + { + "version_affected": "=", + "version_value": "16.3.9" + }, + { + "version_affected": "=", + "version_value": "16.3.10" + }, + { + "version_affected": "=", + "version_value": "16.3.11" + }, + { + "version_affected": "=", + "version_value": "16.4.1" + }, + { + "version_affected": "=", + "version_value": "16.4.2" + }, + { + "version_affected": "=", + "version_value": "16.4.3" + }, + { + "version_affected": "=", + "version_value": "16.5.1" + }, + { + "version_affected": "=", + "version_value": "16.5.1a" + }, + { + "version_affected": "=", + "version_value": "16.5.1b" + }, + { + "version_affected": "=", + "version_value": "16.5.2" + }, + { + "version_affected": "=", + "version_value": "16.5.3" + }, + { + "version_affected": "=", + "version_value": "16.6.1" + }, + { + "version_affected": "=", + "version_value": "16.6.2" + }, + { + "version_affected": "=", + "version_value": "16.6.3" + }, + { + "version_affected": "=", + "version_value": "16.6.4" + }, + { + "version_affected": "=", + "version_value": "16.6.5" + }, + { + "version_affected": "=", + "version_value": "16.6.4a" + }, + { + "version_affected": "=", + "version_value": "16.6.5a" + }, + { + "version_affected": "=", + "version_value": "16.6.6" + }, + { + "version_affected": "=", + "version_value": "16.6.7" + }, + { + "version_affected": "=", + "version_value": "16.6.8" + }, + { + "version_affected": "=", + "version_value": "16.6.9" + }, + { + "version_affected": "=", + "version_value": "16.6.10" + }, + { + "version_affected": "=", + "version_value": "16.7.1" + }, + { + "version_affected": "=", + "version_value": "16.7.2" + }, + { + "version_affected": "=", + "version_value": "16.7.3" + }, + { + "version_affected": "=", + "version_value": "16.8.1" + }, + { + "version_affected": "=", + "version_value": "16.8.1a" + }, + { + "version_affected": "=", + "version_value": "16.8.1b" + }, + { + "version_affected": "=", + "version_value": "16.8.1s" + }, + { + "version_affected": "=", + "version_value": "16.8.1c" + }, + { + "version_affected": "=", + "version_value": "16.8.2" + }, + { + "version_affected": "=", + "version_value": "16.8.3" + }, + { + "version_affected": "=", + "version_value": "16.9.1" + }, + { + "version_affected": "=", + "version_value": "16.9.2" + }, + { + "version_affected": "=", + "version_value": "16.9.1a" + }, + { + "version_affected": "=", + "version_value": "16.9.1b" + }, + { + "version_affected": "=", + "version_value": "16.9.1s" + }, + { + "version_affected": "=", + "version_value": "16.9.3" + }, + { + "version_affected": "=", + "version_value": "16.9.4" + }, + { + "version_affected": "=", + "version_value": "16.9.3a" + }, + { + "version_affected": "=", + "version_value": "16.9.5" + }, + { + "version_affected": "=", + "version_value": "16.9.5f" + }, + { + "version_affected": "=", + "version_value": "16.9.6" + }, + { + "version_affected": "=", + "version_value": "16.9.7" + }, + { + "version_affected": "=", + "version_value": "16.9.8" + }, + { + "version_affected": "=", + "version_value": "16.10.1" + }, + { + "version_affected": "=", + "version_value": "16.10.1a" + }, + { + "version_affected": "=", + "version_value": "16.10.1b" + }, + { + "version_affected": "=", + "version_value": "16.10.1s" + }, + { + "version_affected": "=", + "version_value": "16.10.1e" + }, + { + "version_affected": "=", + "version_value": "16.10.2" + }, + { + "version_affected": "=", + "version_value": "16.10.3" + }, + { + "version_affected": "=", + "version_value": "16.11.1" + }, + { + "version_affected": "=", + "version_value": "16.11.1a" + }, + { + "version_affected": "=", + "version_value": "16.11.1b" + }, + { + "version_affected": "=", + "version_value": "16.11.2" + }, + { + "version_affected": "=", + "version_value": "16.11.1s" + }, + { + "version_affected": "=", + "version_value": "16.12.1" + }, + { + "version_affected": "=", + "version_value": "16.12.1s" + }, + { + "version_affected": "=", + "version_value": "16.12.1a" + }, + { + "version_affected": "=", + "version_value": "16.12.1c" + }, + { + "version_affected": "=", + "version_value": "16.12.2" + }, + { + "version_affected": "=", + "version_value": "16.12.2a" + }, + { + "version_affected": "=", + "version_value": "16.12.3" + }, + { + "version_affected": "=", + "version_value": "16.12.8" + }, + { + "version_affected": "=", + "version_value": "16.12.2s" + }, + { + "version_affected": "=", + "version_value": "16.12.1t" + }, + { + "version_affected": "=", + "version_value": "16.12.4" + }, + { + "version_affected": "=", + "version_value": "16.12.3s" + }, + { + "version_affected": "=", + "version_value": "16.12.3a" + }, + { + "version_affected": "=", + "version_value": "16.12.4a" + }, + { + "version_affected": "=", + "version_value": "16.12.5" + }, + { + "version_affected": "=", + "version_value": "16.12.6" + }, + { + "version_affected": "=", + "version_value": "16.12.5a" + }, + { + "version_affected": "=", + "version_value": "16.12.5b" + }, + { + "version_affected": "=", + "version_value": "16.12.6a" + }, + { + "version_affected": "=", + "version_value": "16.12.7" + }, + { + "version_affected": "=", + "version_value": "16.12.9" + }, + { + "version_affected": "=", + "version_value": "16.12.10" + }, + { + "version_affected": "=", + "version_value": "16.12.10a" + }, + { + "version_affected": "=", + "version_value": "16.12.11" + }, + { + "version_affected": "=", + "version_value": "17.1.1" + }, + { + "version_affected": "=", + "version_value": "17.1.1a" + }, + { + "version_affected": "=", + "version_value": "17.1.1s" + }, + { + "version_affected": "=", + "version_value": "17.1.1t" + }, + { + "version_affected": "=", + "version_value": "17.1.3" + }, + { + "version_affected": "=", + "version_value": "17.2.1" + }, + { + "version_affected": "=", + "version_value": "17.2.1r" + }, + { + "version_affected": "=", + "version_value": "17.2.1a" + }, + { + "version_affected": "=", + "version_value": "17.2.1v" + }, + { + "version_affected": "=", + "version_value": "17.2.2" + }, + { + "version_affected": "=", + "version_value": "17.2.3" + }, + { + "version_affected": "=", + "version_value": "17.3.1" + }, + { + "version_affected": "=", + "version_value": "17.3.2" + }, + { + "version_affected": "=", + "version_value": "17.3.3" + }, + { + "version_affected": "=", + "version_value": "17.3.1a" + }, + { + "version_affected": "=", + "version_value": "17.3.2a" + }, + { + "version_affected": "=", + "version_value": "17.3.4" + }, + { + "version_affected": "=", + "version_value": "17.3.5" + }, + { + "version_affected": "=", + "version_value": "17.3.4a" + }, + { + "version_affected": "=", + "version_value": "17.3.6" + }, + { + "version_affected": "=", + "version_value": "17.3.4b" + }, + { + "version_affected": "=", + "version_value": "17.3.4c" + }, + { + "version_affected": "=", + "version_value": "17.3.5a" + }, + { + "version_affected": "=", + "version_value": "17.3.5b" + }, + { + "version_affected": "=", + "version_value": "17.3.7" + }, + { + "version_affected": "=", + "version_value": "17.3.8" + }, + { + "version_affected": "=", + "version_value": "17.3.8a" + }, + { + "version_affected": "=", + "version_value": "17.4.1" + }, + { + "version_affected": "=", + "version_value": "17.4.2" + }, + { + "version_affected": "=", + "version_value": "17.4.1a" + }, + { + "version_affected": "=", + "version_value": "17.4.1b" + }, + { + "version_affected": "=", + "version_value": "17.4.2a" + }, + { + "version_affected": "=", + "version_value": "17.5.1" + }, + { + "version_affected": "=", + "version_value": "17.5.1a" + }, + { + "version_affected": "=", + "version_value": "17.6.1" + }, + { + "version_affected": "=", + "version_value": "17.6.2" + }, + { + "version_affected": "=", + "version_value": "17.6.1a" + }, + { + "version_affected": "=", + "version_value": "17.6.3" + }, + { + "version_affected": "=", + "version_value": "17.6.3a" + }, + { + "version_affected": "=", + "version_value": "17.6.4" + }, + { + "version_affected": "=", + "version_value": "17.6.5" + }, + { + "version_affected": "=", + "version_value": "17.6.6" + }, + { + "version_affected": "=", + "version_value": "17.6.6a" + }, + { + "version_affected": "=", + "version_value": "17.6.5a" + }, + { + "version_affected": "=", + "version_value": "17.7.1" + }, + { + "version_affected": "=", + "version_value": "17.7.1a" + }, + { + "version_affected": "=", + "version_value": "17.7.1b" + }, + { + "version_affected": "=", + "version_value": "17.7.2" + }, + { + "version_affected": "=", + "version_value": "17.10.1" + }, + { + "version_affected": "=", + "version_value": "17.10.1a" + }, + { + "version_affected": "=", + "version_value": "17.10.1b" + }, + { + "version_affected": "=", + "version_value": "17.8.1" + }, + { + "version_affected": "=", + "version_value": "17.8.1a" + }, + { + "version_affected": "=", + "version_value": "17.9.1" + }, + { + "version_affected": "=", + "version_value": "17.9.2" + }, + { + "version_affected": "=", + "version_value": "17.9.1a" + }, + { + "version_affected": "=", + "version_value": "17.9.3" + }, + { + "version_affected": "=", + "version_value": "17.9.2a" + }, + { + "version_affected": "=", + "version_value": "17.9.3a" + }, + { + "version_affected": "=", + "version_value": "17.9.4" + }, + { + "version_affected": "=", + "version_value": "17.9.4a" + }, + { + "version_affected": "=", + "version_value": "17.11.1" + }, + { + "version_affected": "=", + "version_value": "17.11.1a" + }, + { + "version_affected": "=", + "version_value": "17.12.1" + }, + { + "version_affected": "=", + "version_value": "17.12.1a" + }, + { + "version_affected": "=", + "version_value": "17.12.2" + }, + { + "version_affected": "=", + "version_value": "17.12.2a" + }, + { + "version_affected": "=", + "version_value": "17.11.99SW" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dmi-acl-bypass-Xv8FO8Vz", + "refsource": "MISC", + "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dmi-acl-bypass-Xv8FO8Vz" + } + ] + }, + "source": { + "advisory": "cisco-sa-dmi-acl-bypass-Xv8FO8Vz", + "discovery": "EXTERNAL", + "defects": [ + "CSCwf92391", + "CSCwe12169" + ] + }, + "exploit": [ + { + "lang": "en", + "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" } ] } diff --git a/2024/20xxx/CVE-2024-20324.json b/2024/20xxx/CVE-2024-20324.json index 3399c93926b..14225fb42af 100644 --- a/2024/20xxx/CVE-2024-20324.json +++ b/2024/20xxx/CVE-2024-20324.json @@ -1,17 +1,330 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-20324", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@cisco.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, low-privileged, local attacker to access WLAN configuration details including passwords.\r\n\r This vulnerability is due to improper privilege checks. An attacker could exploit this vulnerability by using the show and show tech wireless CLI commands to access configuration details, including passwords. A successful exploit could allow the attacker to access configuration details that they are not authorized to access." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Handling of Insufficient Privileges", + "cweId": "CWE-274" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cisco", + "product": { + "product_data": [ + { + "product_name": "Cisco IOS XE Software", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "16.10.1" + }, + { + "version_affected": "=", + "version_value": "16.10.1s" + }, + { + "version_affected": "=", + "version_value": "16.10.1e" + }, + { + "version_affected": "=", + "version_value": "16.11.1" + }, + { + "version_affected": "=", + "version_value": "16.11.1a" + }, + { + "version_affected": "=", + "version_value": "16.11.1b" + }, + { + "version_affected": "=", + "version_value": "16.11.2" + }, + { + "version_affected": "=", + "version_value": "16.12.1" + }, + { + "version_affected": "=", + "version_value": "16.12.1s" + }, + { + "version_affected": "=", + "version_value": "16.12.3" + }, + { + "version_affected": "=", + "version_value": "16.12.8" + }, + { + "version_affected": "=", + "version_value": "16.12.2s" + }, + { + "version_affected": "=", + "version_value": "16.12.1t" + }, + { + "version_affected": "=", + "version_value": "16.12.4" + }, + { + "version_affected": "=", + "version_value": "16.12.3s" + }, + { + "version_affected": "=", + "version_value": "16.12.4a" + }, + { + "version_affected": "=", + "version_value": "16.12.5" + }, + { + "version_affected": "=", + "version_value": "16.12.6" + }, + { + "version_affected": "=", + "version_value": "16.12.6a" + }, + { + "version_affected": "=", + "version_value": "16.12.7" + }, + { + "version_affected": "=", + "version_value": "17.1.1" + }, + { + "version_affected": "=", + "version_value": "17.1.1s" + }, + { + "version_affected": "=", + "version_value": "17.1.1t" + }, + { + "version_affected": "=", + "version_value": "17.1.3" + }, + { + "version_affected": "=", + "version_value": "17.2.1" + }, + { + "version_affected": "=", + "version_value": "17.2.1a" + }, + { + "version_affected": "=", + "version_value": "17.3.1" + }, + { + "version_affected": "=", + "version_value": "17.3.2" + }, + { + "version_affected": "=", + "version_value": "17.3.3" + }, + { + "version_affected": "=", + "version_value": "17.3.2a" + }, + { + "version_affected": "=", + "version_value": "17.3.4" + }, + { + "version_affected": "=", + "version_value": "17.3.5" + }, + { + "version_affected": "=", + "version_value": "17.3.6" + }, + { + "version_affected": "=", + "version_value": "17.3.4c" + }, + { + "version_affected": "=", + "version_value": "17.3.5a" + }, + { + "version_affected": "=", + "version_value": "17.3.5b" + }, + { + "version_affected": "=", + "version_value": "17.3.7" + }, + { + "version_affected": "=", + "version_value": "17.3.8" + }, + { + "version_affected": "=", + "version_value": "17.3.8a" + }, + { + "version_affected": "=", + "version_value": "17.4.1" + }, + { + "version_affected": "=", + "version_value": "17.5.1" + }, + { + "version_affected": "=", + "version_value": "17.6.1" + }, + { + "version_affected": "=", + "version_value": "17.6.2" + }, + { + "version_affected": "=", + "version_value": "17.6.3" + }, + { + "version_affected": "=", + "version_value": "17.6.4" + }, + { + "version_affected": "=", + "version_value": "17.6.5" + }, + { + "version_affected": "=", + "version_value": "17.6.6" + }, + { + "version_affected": "=", + "version_value": "17.6.6a" + }, + { + "version_affected": "=", + "version_value": "17.6.5a" + }, + { + "version_affected": "=", + "version_value": "17.7.1" + }, + { + "version_affected": "=", + "version_value": "17.10.1" + }, + { + "version_affected": "=", + "version_value": "17.10.1a" + }, + { + "version_affected": "=", + "version_value": "17.8.1" + }, + { + "version_affected": "=", + "version_value": "17.9.1" + }, + { + "version_affected": "=", + "version_value": "17.9.2" + }, + { + "version_affected": "=", + "version_value": "17.9.3" + }, + { + "version_affected": "=", + "version_value": "17.9.4" + }, + { + "version_affected": "=", + "version_value": "17.9.4a" + }, + { + "version_affected": "=", + "version_value": "17.11.1" + }, + { + "version_affected": "=", + "version_value": "17.12.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-wlc-privesc-RjSMrmPK", + "refsource": "MISC", + "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-wlc-privesc-RjSMrmPK" + } + ] + }, + "source": { + "advisory": "cisco-sa-iosxe-wlc-privesc-RjSMrmPK", + "discovery": "INTERNAL", + "defects": [ + "CSCwf36190" + ] + }, + "exploit": [ + { + "lang": "en", + "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" } ] } diff --git a/2024/20xxx/CVE-2024-20333.json b/2024/20xxx/CVE-2024-20333.json index e6ffe6e8d95..e678d9006d5 100644 --- a/2024/20xxx/CVE-2024-20333.json +++ b/2024/20xxx/CVE-2024-20333.json @@ -1,17 +1,194 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-20333", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@cisco.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the web-based management interface of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an authenticated, remote attacker to change specific data within the interface on an affected device.\r\n\r This vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to change a specific field within the web-based management interface, even though they should not have access to change that field." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Authorization", + "cweId": "CWE-285" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cisco", + "product": { + "product_data": [ + { + "product_name": "Cisco Digital Network Architecture Center (DNA Center)", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.1.2.0" + }, + { + "version_affected": "=", + "version_value": "2.1.2.3" + }, + { + "version_affected": "=", + "version_value": "2.1.2.4" + }, + { + "version_affected": "=", + "version_value": "2.1.2.5" + }, + { + "version_affected": "=", + "version_value": "2.1.2.6" + }, + { + "version_affected": "=", + "version_value": "2.1.2.7" + }, + { + "version_affected": "=", + "version_value": "2.1.2.8" + }, + { + "version_affected": "=", + "version_value": "2.2.2.3" + }, + { + "version_affected": "=", + "version_value": "2.2.1.3" + }, + { + "version_affected": "=", + "version_value": "2.2.2.4" + }, + { + "version_affected": "=", + "version_value": "2.2.2.5" + }, + { + "version_affected": "=", + "version_value": "2.2.2.8" + }, + { + "version_affected": "=", + "version_value": "2.2.3.4" + }, + { + "version_affected": "=", + "version_value": "2.2.3.3" + }, + { + "version_affected": "=", + "version_value": "2.2.2.6" + }, + { + "version_affected": "=", + "version_value": "2.2.3.5" + }, + { + "version_affected": "=", + "version_value": "2.2.2.9" + }, + { + "version_affected": "=", + "version_value": "2.2.3.6" + }, + { + "version_affected": "=", + "version_value": "2.3.3.4" + }, + { + "version_affected": "=", + "version_value": "2.3.3.5" + }, + { + "version_affected": "=", + "version_value": "2.3.3.6" + }, + { + "version_affected": "=", + "version_value": "2.3.3.7" + }, + { + "version_affected": "=", + "version_value": "2.3.5.3" + }, + { + "version_affected": "=", + "version_value": "VA Launchpad 1.2.1" + }, + { + "version_affected": "=", + "version_value": "VA Launchpad 1.3.0" + }, + { + "version_affected": "=", + "version_value": "VA Launchpad 1.5.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccc-authz-bypass-5EKchJRb", + "refsource": "MISC", + "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccc-authz-bypass-5EKchJRb" + } + ] + }, + "source": { + "advisory": "cisco-sa-ccc-authz-bypass-5EKchJRb", + "discovery": "INTERNAL", + "defects": [ + "CSCwd69988" + ] + }, + "exploit": [ + { + "lang": "en", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" } ] } diff --git a/2024/20xxx/CVE-2024-20354.json b/2024/20xxx/CVE-2024-20354.json index 1d4d1ff768d..6ffb22d098e 100644 --- a/2024/20xxx/CVE-2024-20354.json +++ b/2024/20xxx/CVE-2024-20354.json @@ -1,17 +1,105 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-20354", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@cisco.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device.\r\n\r This vulnerability is due to incomplete cleanup of resources when dropping certain malformed frames. An attacker could exploit this vulnerability by connecting as a wireless client to an affected AP and sending specific malformed frames over the wireless connection. A successful exploit could allow the attacker to cause degradation of service to other clients, which could potentially lead to a complete DoS condition." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Cleanup on Thrown Exception", + "cweId": "CWE-460" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cisco", + "product": { + "product_data": [ + { + "product_name": "Cisco Aironet Access Point Software", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "N/A" + } + ] + } + }, + { + "product_name": "Cisco Aironet Access Point Software (IOS XE Controller)", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "N/A" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-ap-dos-PPPtcVW", + "refsource": "MISC", + "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-ap-dos-PPPtcVW" + } + ] + }, + "source": { + "advisory": "cisco-sa-airo-ap-dos-PPPtcVW", + "discovery": "EXTERNAL", + "defects": [ + "CSCwh81027" + ] + }, + "exploit": [ + { + "lang": "en", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" } ] } diff --git a/2024/23xxx/CVE-2024-23451.json b/2024/23xxx/CVE-2024-23451.json index df548eeaeb9..022fccf144c 100644 --- a/2024/23xxx/CVE-2024-23451.json +++ b/2024/23xxx/CVE-2024-23451.json @@ -1,17 +1,88 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-23451", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@elastic.co", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Incorrect Authorization issue exists in the API key based security model for Remote Cluster Security, which is currently in Beta, in Elasticsearch 8.10.0 and before 8.13.0. This allows a\u00a0malicious user with a valid API key for a remote cluster configured to use the new Remote Cluster Security to read arbitrary documents from any index on the remote cluster, and only if they use the Elasticsearch custom transport protocol to issue requests with the target index ID, the shard ID and the document ID. None of Elasticsearch REST API endpoints are affected by this issue." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-863 Incorrect Authorization", + "cweId": "CWE-863" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Elastic", + "product": { + "product_data": [ + { + "product_name": "Elasticsearch", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "8.10.0", + "version_value": "8.13.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://discuss.elastic.co/t/elasticsearch-8-13-0-security-update-esa-2024-07/356315", + "refsource": "MISC", + "name": "https://discuss.elastic.co/t/elasticsearch-8-13-0-security-update-esa-2024-07/356315" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29913.json b/2024/29xxx/CVE-2024-29913.json index 1270870b15c..26fd3cfc11e 100644 --- a/2024/29xxx/CVE-2024-29913.json +++ b/2024/29xxx/CVE-2024-29913.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29913", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeum Tutor LMS Elementor Addons allows Stored XSS.This issue affects Tutor LMS Elementor Addons: from n/a through 2.1.3.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Themeum", + "product": { + "product_data": [ + { + "product_name": "Tutor LMS Elementor Addons", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "2.1.4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "2.1.3", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/tutor-lms-elementor-addons/wordpress-tutor-lms-elementor-addons-plugin-2-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/tutor-lms-elementor-addons/wordpress-tutor-lms-elementor-addons-plugin-2-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 2.1.4 or a higher version." + } + ], + "value": "Update to 2.1.4 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "Abu Hurayra (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29914.json b/2024/29xxx/CVE-2024-29914.json index 5835e7f2332..844d8761a08 100644 --- a/2024/29xxx/CVE-2024-29914.json +++ b/2024/29xxx/CVE-2024-29914.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29914", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MotoPress Stratum allows Stored XSS.This issue affects Stratum: from n/a through 1.3.15.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "MotoPress", + "product": { + "product_data": [ + { + "product_name": "Stratum", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "1.3.16", + "status": "unaffected" + } + ], + "lessThanOrEqual": "1.3.15", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/stratum/wordpress-stratum-elementor-widgets-plugin-1-3-15-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/stratum/wordpress-stratum-elementor-widgets-plugin-1-3-15-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 1.3.16 or a higher version." + } + ], + "value": "Update to 1.3.16 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "Abu Hurayra (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29915.json b/2024/29xxx/CVE-2024-29915.json index 07b6f489bb4..928361b53e0 100644 --- a/2024/29xxx/CVE-2024-29915.json +++ b/2024/29xxx/CVE-2024-29915.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29915", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Podlove Podlove Podcast Publisher allows Reflected XSS.This issue affects Podlove Podcast Publisher: from n/a through 4.0.9.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Podlove", + "product": { + "product_data": [ + { + "product_name": "Podlove Podcast Publisher", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "4.0.10", + "status": "unaffected" + } + ], + "lessThanOrEqual": "4.0.9", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/podlove-podcasting-plugin-for-wordpress/wordpress-podlove-podcast-publisher-plugin-4-0-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/podlove-podcasting-plugin-for-wordpress/wordpress-podlove-podcast-publisher-plugin-4-0-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 4.0.10 or a higher version." + } + ], + "value": "Update to 4.0.10 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "Dimas Maulana (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29917.json b/2024/29xxx/CVE-2024-29917.json index 9c2e57dba73..fa0bf0ff2a2 100644 --- a/2024/29xxx/CVE-2024-29917.json +++ b/2024/29xxx/CVE-2024-29917.json @@ -1,17 +1,105 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29917", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Compact WP Audio Player allows Stored XSS.This issue affects Compact WP Audio Player: from n/a through 1.9.9.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/compact-wp-audio-player/wordpress-compact-wp-audio-player-plugin-1-9-9-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/compact-wp-audio-player/wordpress-compact-wp-audio-player-plugin-1-9-9-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 1.9.10 or a higher version." + } + ], + "value": "Update to 1.9.10 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "LVT-tholv2k (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29918.json b/2024/29xxx/CVE-2024-29918.json index 7ccd00e8c9e..55d0194ae94 100644 --- a/2024/29xxx/CVE-2024-29918.json +++ b/2024/29xxx/CVE-2024-29918.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29918", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Survey Maker team Survey Maker allows Reflected XSS.This issue affects Survey Maker: from n/a through 4.0.6.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Survey Maker team", + "product": { + "product_data": [ + { + "product_name": "Survey Maker", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "4.0.7", + "status": "unaffected" + } + ], + "lessThanOrEqual": "4.0.6", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/survey-maker/wordpress-survey-maker-plugin-4-0-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/survey-maker/wordpress-survey-maker-plugin-4-0-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 4.0.7 or a higher version." + } + ], + "value": "Update to 4.0.7 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "Dimas Maulana (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29919.json b/2024/29xxx/CVE-2024-29919.json index 6c019f8bb70..124fc6c2595 100644 --- a/2024/29xxx/CVE-2024-29919.json +++ b/2024/29xxx/CVE-2024-29919.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29919", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Photo Gallery Team Photo Gallery by Ays allows Reflected XSS.This issue affects Photo Gallery by Ays: from n/a through 5.5.2.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Photo Gallery Team", + "product": { + "product_data": [ + { + "product_name": "Photo Gallery by Ays", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "5.5.3", + "status": "unaffected" + } + ], + "lessThanOrEqual": "5.5.2", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/gallery-photo-gallery/wordpress-photo-gallery-by-ays-plugin-5-5-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/gallery-photo-gallery/wordpress-photo-gallery-by-ays-plugin-5-5-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 5.5.3 or a higher version." + } + ], + "value": "Update to 5.5.3 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "Majed Refaea (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29920.json b/2024/29xxx/CVE-2024-29920.json index 665022ade67..22d3389a33a 100644 --- a/2024/29xxx/CVE-2024-29920.json +++ b/2024/29xxx/CVE-2024-29920.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29920", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Moveaddons Move Addons for Elementor allows Stored XSS.This issue affects Move Addons for Elementor: from n/a through 1.2.9.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Moveaddons", + "product": { + "product_data": [ + { + "product_name": "Move Addons for Elementor", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "1.3.0", + "status": "unaffected" + } + ], + "lessThanOrEqual": "1.2.9", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/move-addons/wordpress-move-addons-for-elementor-plugin-1-2-9-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/move-addons/wordpress-move-addons-for-elementor-plugin-1-2-9-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 1.3.0 or a higher version." + } + ], + "value": "Update to 1.3.0 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "Abu Hurayra (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29921.json b/2024/29xxx/CVE-2024-29921.json index b1a68799328..1b67b022eeb 100644 --- a/2024/29xxx/CVE-2024-29921.json +++ b/2024/29xxx/CVE-2024-29921.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29921", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Supsystic Photo Gallery by Supsystic allows Stored XSS.This issue affects Photo Gallery by Supsystic: from n/a through 1.15.16.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Supsystic", + "product": { + "product_data": [ + { + "product_name": "Photo Gallery by Supsystic", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "1.15.17", + "status": "unaffected" + } + ], + "lessThanOrEqual": "1.15.16", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/gallery-by-supsystic/wordpress-photo-gallery-by-supsystic-plugin-1-15-16-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/gallery-by-supsystic/wordpress-photo-gallery-by-supsystic-plugin-1-15-16-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 1.15.17 or a higher version." + } + ], + "value": "Update to 1.15.17 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "Jean Tirstan T (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29922.json b/2024/29xxx/CVE-2024-29922.json index 3e75afedb5d..7e8a4cfbc16 100644 --- a/2024/29xxx/CVE-2024-29922.json +++ b/2024/29xxx/CVE-2024-29922.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29922", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Quantum Cloud Slider Hero allows Stored XSS.This issue affects Slider Hero: from n/a through 8.6.1.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Quantum Cloud", + "product": { + "product_data": [ + { + "product_name": "Slider Hero", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "8.7.0", + "status": "unaffected" + } + ], + "lessThanOrEqual": "8.6.1", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/slider-hero/wordpress-slider-hero-plugin-8-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/slider-hero/wordpress-slider-hero-plugin-8-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 8.7.0 or a higher version." + } + ], + "value": "Update to 8.7.0 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "Jean Tirstan T (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29923.json b/2024/29xxx/CVE-2024-29923.json index 31ef74114ff..81ec2076a45 100644 --- a/2024/29xxx/CVE-2024-29923.json +++ b/2024/29xxx/CVE-2024-29923.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29923", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PropertyHive allows Reflected XSS.This issue affects PropertyHive: from n/a through 2.0.8.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "PropertyHive", + "product": { + "product_data": [ + { + "product_name": "PropertyHive", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "2.0.9", + "status": "unaffected" + } + ], + "lessThanOrEqual": "2.0.8", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/propertyhive/wordpress-propertyhive-plugin-2-0-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/propertyhive/wordpress-propertyhive-plugin-2-0-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 2.0.9 or a higher version." + } + ], + "value": "Update to 2.0.9 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "Yudistira Arya (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29924.json b/2024/29xxx/CVE-2024-29924.json index 0bf9d11b589..ace48762677 100644 --- a/2024/29xxx/CVE-2024-29924.json +++ b/2024/29xxx/CVE-2024-29924.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29924", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in W3 Eden, Inc. Premium Packages allows Reflected XSS.This issue affects Premium Packages: from n/a through 5.8.2.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "W3 Eden, Inc.", + "product": { + "product_data": [ + { + "product_name": "Premium Packages", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "5.8.3", + "status": "unaffected" + } + ], + "lessThanOrEqual": "5.8.2", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/wpdm-premium-packages/wordpress-premium-packages-plugin-5-8-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/wpdm-premium-packages/wordpress-premium-packages-plugin-5-8-2-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 5.8.3 or a higher version." + } + ], + "value": "Update to 5.8.3 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "Yudistira Arya (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/29xxx/CVE-2024-29925.json b/2024/29xxx/CVE-2024-29925.json index a5378d33ed7..26a0c7ab8cd 100644 --- a/2024/29xxx/CVE-2024-29925.json +++ b/2024/29xxx/CVE-2024-29925.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-29925", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpWax Post Grid, Slider & Carousel Ultimate allows Stored XSS.This issue affects Post Grid, Slider & Carousel Ultimate: from n/a through 1.6.6.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "wpWax", + "product": { + "product_data": [ + { + "product_name": "Post Grid, Slider & Carousel Ultimate", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "1.6.7", + "status": "unaffected" + } + ], + "lessThanOrEqual": "1.6.6", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/post-grid-carousel-ultimate/wordpress-post-grid-slider-carousel-ultimate-plugin-1-6-6-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/post-grid-carousel-ultimate/wordpress-post-grid-slider-carousel-ultimate-plugin-1-6-6-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 1.6.7 or a higher version." + } + ], + "value": "Update to 1.6.7 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "LVT-tholv2k (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/2xxx/CVE-2024-2987.json b/2024/2xxx/CVE-2024-2987.json new file mode 100644 index 00000000000..aeaae66ec2a --- /dev/null +++ b/2024/2xxx/CVE-2024-2987.json @@ -0,0 +1,110 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2024-2987", + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability classified as critical has been found in Tenda FH1202 1.2.0.14(408). Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument mac leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258156. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Es wurde eine kritische Schwachstelle in Tenda FH1202 1.2.0.14(408) entdeckt. Hiervon betroffen ist die Funktion GetParentControlInfo der Datei /goform/GetParentControlInfo. Durch Manipulieren des Arguments mac mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-121 Stack-based Buffer Overflow", + "cweId": "CWE-121" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Tenda", + "product": { + "product_data": [ + { + "product_name": "FH1202", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.2.0.14(408)" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.258156", + "refsource": "MISC", + "name": "https://vuldb.com/?id.258156" + }, + { + "url": "https://vuldb.com/?ctiid.258156", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.258156" + }, + { + "url": "https://vuldb.com/?submit.301285", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.301285" + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/GetParentControlInfo.md", + "refsource": "MISC", + "name": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/GetParentControlInfo.md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "wxhwxhwxh_tu (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 8.8, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 8.8, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 9, + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C" + } + ] + } +} \ No newline at end of file diff --git a/2024/2xxx/CVE-2024-2989.json b/2024/2xxx/CVE-2024-2989.json new file mode 100644 index 00000000000..3c4b00df219 --- /dev/null +++ b/2024/2xxx/CVE-2024-2989.json @@ -0,0 +1,110 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2024-2989", + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability, which was classified as critical, has been found in Tenda FH1203 2.0.1.6. Affected by this issue is the function fromNatStaticSetting of the file /goform/NatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-258158 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Eine kritische Schwachstelle wurde in Tenda FH1203 2.0.1.6 entdeckt. Betroffen davon ist die Funktion fromNatStaticSetting der Datei /goform/NatStaticSetting. Durch Beeinflussen des Arguments page mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-121 Stack-based Buffer Overflow", + "cweId": "CWE-121" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Tenda", + "product": { + "product_data": [ + { + "product_name": "FH1203", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.0.1.6" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.258158", + "refsource": "MISC", + "name": "https://vuldb.com/?id.258158" + }, + { + "url": "https://vuldb.com/?ctiid.258158", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.258158" + }, + { + "url": "https://vuldb.com/?submit.301364", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.301364" + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromNatStaticSetting.md", + "refsource": "MISC", + "name": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromNatStaticSetting.md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "wxhwxhwxh_tu (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 8.8, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 8.8, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 9, + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C" + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30461.json b/2024/30xxx/CVE-2024-30461.json new file mode 100644 index 00000000000..710c881059a --- /dev/null +++ b/2024/30xxx/CVE-2024-30461.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30461", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30462.json b/2024/30xxx/CVE-2024-30462.json new file mode 100644 index 00000000000..058d3cdfbc9 --- /dev/null +++ b/2024/30xxx/CVE-2024-30462.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30462", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30463.json b/2024/30xxx/CVE-2024-30463.json new file mode 100644 index 00000000000..743e878b112 --- /dev/null +++ b/2024/30xxx/CVE-2024-30463.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30463", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30464.json b/2024/30xxx/CVE-2024-30464.json new file mode 100644 index 00000000000..105b08f686d --- /dev/null +++ b/2024/30xxx/CVE-2024-30464.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30464", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30465.json b/2024/30xxx/CVE-2024-30465.json new file mode 100644 index 00000000000..b3aad71f58b --- /dev/null +++ b/2024/30xxx/CVE-2024-30465.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30465", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30466.json b/2024/30xxx/CVE-2024-30466.json new file mode 100644 index 00000000000..6de18832635 --- /dev/null +++ b/2024/30xxx/CVE-2024-30466.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30466", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30467.json b/2024/30xxx/CVE-2024-30467.json new file mode 100644 index 00000000000..380e8a1a17e --- /dev/null +++ b/2024/30xxx/CVE-2024-30467.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30467", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30468.json b/2024/30xxx/CVE-2024-30468.json new file mode 100644 index 00000000000..a2938eea698 --- /dev/null +++ b/2024/30xxx/CVE-2024-30468.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30468", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30469.json b/2024/30xxx/CVE-2024-30469.json new file mode 100644 index 00000000000..814f4071b62 --- /dev/null +++ b/2024/30xxx/CVE-2024-30469.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30469", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30470.json b/2024/30xxx/CVE-2024-30470.json new file mode 100644 index 00000000000..879988108cd --- /dev/null +++ b/2024/30xxx/CVE-2024-30470.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30470", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30562.json b/2024/30xxx/CVE-2024-30562.json new file mode 100644 index 00000000000..86ff6aa6c8c --- /dev/null +++ b/2024/30xxx/CVE-2024-30562.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30562", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30563.json b/2024/30xxx/CVE-2024-30563.json new file mode 100644 index 00000000000..6141a3bda6c --- /dev/null +++ b/2024/30xxx/CVE-2024-30563.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30563", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30564.json b/2024/30xxx/CVE-2024-30564.json new file mode 100644 index 00000000000..88d853815f9 --- /dev/null +++ b/2024/30xxx/CVE-2024-30564.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30564", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30565.json b/2024/30xxx/CVE-2024-30565.json new file mode 100644 index 00000000000..c37f26236c2 --- /dev/null +++ b/2024/30xxx/CVE-2024-30565.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30565", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30566.json b/2024/30xxx/CVE-2024-30566.json new file mode 100644 index 00000000000..cdc4cd1cefe --- /dev/null +++ b/2024/30xxx/CVE-2024-30566.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30566", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30567.json b/2024/30xxx/CVE-2024-30567.json new file mode 100644 index 00000000000..d6ec12fdaed --- /dev/null +++ b/2024/30xxx/CVE-2024-30567.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30567", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30568.json b/2024/30xxx/CVE-2024-30568.json new file mode 100644 index 00000000000..3dfb71934a6 --- /dev/null +++ b/2024/30xxx/CVE-2024-30568.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30568", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30569.json b/2024/30xxx/CVE-2024-30569.json new file mode 100644 index 00000000000..25de33f90a2 --- /dev/null +++ b/2024/30xxx/CVE-2024-30569.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30569", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30570.json b/2024/30xxx/CVE-2024-30570.json new file mode 100644 index 00000000000..f7fe1a69b56 --- /dev/null +++ b/2024/30xxx/CVE-2024-30570.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30570", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30571.json b/2024/30xxx/CVE-2024-30571.json new file mode 100644 index 00000000000..6fc380666d1 --- /dev/null +++ b/2024/30xxx/CVE-2024-30571.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30571", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30572.json b/2024/30xxx/CVE-2024-30572.json new file mode 100644 index 00000000000..22d70f45b19 --- /dev/null +++ b/2024/30xxx/CVE-2024-30572.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30572", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30573.json b/2024/30xxx/CVE-2024-30573.json new file mode 100644 index 00000000000..2931789ceeb --- /dev/null +++ b/2024/30xxx/CVE-2024-30573.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30573", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30574.json b/2024/30xxx/CVE-2024-30574.json new file mode 100644 index 00000000000..ffdf5105b96 --- /dev/null +++ b/2024/30xxx/CVE-2024-30574.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30574", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30800.json b/2024/30xxx/CVE-2024-30800.json new file mode 100644 index 00000000000..6b44844b08e --- /dev/null +++ b/2024/30xxx/CVE-2024-30800.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30800", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30801.json b/2024/30xxx/CVE-2024-30801.json new file mode 100644 index 00000000000..5400bca19dd --- /dev/null +++ b/2024/30xxx/CVE-2024-30801.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30801", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30802.json b/2024/30xxx/CVE-2024-30802.json new file mode 100644 index 00000000000..b21ed4d1e21 --- /dev/null +++ b/2024/30xxx/CVE-2024-30802.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30802", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30803.json b/2024/30xxx/CVE-2024-30803.json new file mode 100644 index 00000000000..18a50e2360b --- /dev/null +++ b/2024/30xxx/CVE-2024-30803.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30803", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30804.json b/2024/30xxx/CVE-2024-30804.json new file mode 100644 index 00000000000..79259fb8ba3 --- /dev/null +++ b/2024/30xxx/CVE-2024-30804.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30804", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30805.json b/2024/30xxx/CVE-2024-30805.json new file mode 100644 index 00000000000..3a4f9fc1a0b --- /dev/null +++ b/2024/30xxx/CVE-2024-30805.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30805", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30806.json b/2024/30xxx/CVE-2024-30806.json new file mode 100644 index 00000000000..1035fa0ca96 --- /dev/null +++ b/2024/30xxx/CVE-2024-30806.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30806", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30807.json b/2024/30xxx/CVE-2024-30807.json new file mode 100644 index 00000000000..60cba1a615d --- /dev/null +++ b/2024/30xxx/CVE-2024-30807.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30807", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30808.json b/2024/30xxx/CVE-2024-30808.json new file mode 100644 index 00000000000..a7f85f07aef --- /dev/null +++ b/2024/30xxx/CVE-2024-30808.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30808", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30809.json b/2024/30xxx/CVE-2024-30809.json new file mode 100644 index 00000000000..99214f221c7 --- /dev/null +++ b/2024/30xxx/CVE-2024-30809.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30809", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30810.json b/2024/30xxx/CVE-2024-30810.json new file mode 100644 index 00000000000..74ab56480db --- /dev/null +++ b/2024/30xxx/CVE-2024-30810.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30810", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30811.json b/2024/30xxx/CVE-2024-30811.json new file mode 100644 index 00000000000..f751fe95335 --- /dev/null +++ b/2024/30xxx/CVE-2024-30811.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30811", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30812.json b/2024/30xxx/CVE-2024-30812.json new file mode 100644 index 00000000000..fa1b5f5fe97 --- /dev/null +++ b/2024/30xxx/CVE-2024-30812.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30812", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30813.json b/2024/30xxx/CVE-2024-30813.json new file mode 100644 index 00000000000..ec0cdf75377 --- /dev/null +++ b/2024/30xxx/CVE-2024-30813.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30813", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30814.json b/2024/30xxx/CVE-2024-30814.json new file mode 100644 index 00000000000..d4c5d639cb1 --- /dev/null +++ b/2024/30xxx/CVE-2024-30814.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30814", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30815.json b/2024/30xxx/CVE-2024-30815.json new file mode 100644 index 00000000000..c7987a01203 --- /dev/null +++ b/2024/30xxx/CVE-2024-30815.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30815", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30816.json b/2024/30xxx/CVE-2024-30816.json new file mode 100644 index 00000000000..803c9122a9f --- /dev/null +++ b/2024/30xxx/CVE-2024-30816.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30816", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30817.json b/2024/30xxx/CVE-2024-30817.json new file mode 100644 index 00000000000..641ac9b4649 --- /dev/null +++ b/2024/30xxx/CVE-2024-30817.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30817", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30818.json b/2024/30xxx/CVE-2024-30818.json new file mode 100644 index 00000000000..ac5e81e63c2 --- /dev/null +++ b/2024/30xxx/CVE-2024-30818.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30818", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30819.json b/2024/30xxx/CVE-2024-30819.json new file mode 100644 index 00000000000..002161de442 --- /dev/null +++ b/2024/30xxx/CVE-2024-30819.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30819", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30820.json b/2024/30xxx/CVE-2024-30820.json new file mode 100644 index 00000000000..ca38581174c --- /dev/null +++ b/2024/30xxx/CVE-2024-30820.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30820", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30821.json b/2024/30xxx/CVE-2024-30821.json new file mode 100644 index 00000000000..a861706300d --- /dev/null +++ b/2024/30xxx/CVE-2024-30821.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30821", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30822.json b/2024/30xxx/CVE-2024-30822.json new file mode 100644 index 00000000000..b436af141ec --- /dev/null +++ b/2024/30xxx/CVE-2024-30822.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30822", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/30xxx/CVE-2024-30823.json b/2024/30xxx/CVE-2024-30823.json new file mode 100644 index 00000000000..d2016ff50f4 --- /dev/null +++ b/2024/30xxx/CVE-2024-30823.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-30823", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31052.json b/2024/31xxx/CVE-2024-31052.json new file mode 100644 index 00000000000..01a64f2be6f --- /dev/null +++ b/2024/31xxx/CVE-2024-31052.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31052", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31053.json b/2024/31xxx/CVE-2024-31053.json new file mode 100644 index 00000000000..30ed78b3294 --- /dev/null +++ b/2024/31xxx/CVE-2024-31053.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31053", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31054.json b/2024/31xxx/CVE-2024-31054.json new file mode 100644 index 00000000000..adc8b209f16 --- /dev/null +++ b/2024/31xxx/CVE-2024-31054.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31054", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31055.json b/2024/31xxx/CVE-2024-31055.json new file mode 100644 index 00000000000..ae888754aca --- /dev/null +++ b/2024/31xxx/CVE-2024-31055.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31055", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31056.json b/2024/31xxx/CVE-2024-31056.json new file mode 100644 index 00000000000..18b03a02d0e --- /dev/null +++ b/2024/31xxx/CVE-2024-31056.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31056", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31057.json b/2024/31xxx/CVE-2024-31057.json new file mode 100644 index 00000000000..99d49057b10 --- /dev/null +++ b/2024/31xxx/CVE-2024-31057.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31057", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31058.json b/2024/31xxx/CVE-2024-31058.json new file mode 100644 index 00000000000..c753358c795 --- /dev/null +++ b/2024/31xxx/CVE-2024-31058.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31058", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31059.json b/2024/31xxx/CVE-2024-31059.json new file mode 100644 index 00000000000..0ecf74bbaac --- /dev/null +++ b/2024/31xxx/CVE-2024-31059.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31059", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31060.json b/2024/31xxx/CVE-2024-31060.json new file mode 100644 index 00000000000..2517ebb4bdd --- /dev/null +++ b/2024/31xxx/CVE-2024-31060.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31060", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31061.json b/2024/31xxx/CVE-2024-31061.json new file mode 100644 index 00000000000..fff18cc5a29 --- /dev/null +++ b/2024/31xxx/CVE-2024-31061.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31061", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31062.json b/2024/31xxx/CVE-2024-31062.json new file mode 100644 index 00000000000..c4ca4942f3f --- /dev/null +++ b/2024/31xxx/CVE-2024-31062.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31062", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31063.json b/2024/31xxx/CVE-2024-31063.json new file mode 100644 index 00000000000..4d0f5797962 --- /dev/null +++ b/2024/31xxx/CVE-2024-31063.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31063", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31064.json b/2024/31xxx/CVE-2024-31064.json new file mode 100644 index 00000000000..6e1907a0bb5 --- /dev/null +++ b/2024/31xxx/CVE-2024-31064.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31064", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/31xxx/CVE-2024-31065.json b/2024/31xxx/CVE-2024-31065.json new file mode 100644 index 00000000000..45c25ec3304 --- /dev/null +++ b/2024/31xxx/CVE-2024-31065.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-31065", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3018.json b/2024/3xxx/CVE-2024-3018.json new file mode 100644 index 00000000000..50292fd0875 --- /dev/null +++ b/2024/3xxx/CVE-2024-3018.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3018", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3019.json b/2024/3xxx/CVE-2024-3019.json new file mode 100644 index 00000000000..d11568cf61e --- /dev/null +++ b/2024/3xxx/CVE-2024-3019.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3019", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3020.json b/2024/3xxx/CVE-2024-3020.json new file mode 100644 index 00000000000..1eb4894f9d6 --- /dev/null +++ b/2024/3xxx/CVE-2024-3020.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3020", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3021.json b/2024/3xxx/CVE-2024-3021.json new file mode 100644 index 00000000000..47843f2f190 --- /dev/null +++ b/2024/3xxx/CVE-2024-3021.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3021", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file