From f2f36fc47a874787e296f57d1149898736c83ee3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 23 Jan 2024 10:00:33 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/40xxx/CVE-2023-40072.json | 40 ++++++++++++- 2023/46xxx/CVE-2023-46343.json | 71 +++++++++++++++++++++-- 2024/23xxx/CVE-2024-23180.json | 102 +++++++++++++++++++++++++++++++-- 2024/23xxx/CVE-2024-23181.json | 102 +++++++++++++++++++++++++++++++-- 2024/23xxx/CVE-2024-23182.json | 102 +++++++++++++++++++++++++++++++-- 2024/23xxx/CVE-2024-23183.json | 102 +++++++++++++++++++++++++++++++-- 2024/23xxx/CVE-2024-23348.json | 102 +++++++++++++++++++++++++++++++-- 2024/23xxx/CVE-2024-23852.json | 18 ++++++ 2024/23xxx/CVE-2024-23853.json | 18 ++++++ 9 files changed, 630 insertions(+), 27 deletions(-) create mode 100644 2024/23xxx/CVE-2024-23852.json create mode 100644 2024/23xxx/CVE-2024-23853.json diff --git a/2023/40xxx/CVE-2023-40072.json b/2023/40xxx/CVE-2023-40072.json index ced675d587c..c8f8e21ec8e 100644 --- a/2023/40xxx/CVE-2023-40072.json +++ b/2023/40xxx/CVE-2023-40072.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "OS command injection vulnerability in WAB-S600-PS all versions, and WAB-S300 all versions allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request." + "value": "OS command injection vulnerability in ELECOM network devices allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request. Affected products and versions are as follows: WAB-S600-PS all versions, WAB-S300 all versions, WAB-M1775-PS v1.1.21 and earlier, WAB-S1775 v1.1.9 and earlier, and WAB-S1167 v1.0.7 and earlier." } ] }, @@ -55,6 +55,39 @@ } ] } + }, + { + "product_name": "WAB-M1775-PS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "v1.1.21 and earlier" + } + ] + } + }, + { + "product_name": "WAB-S1775", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "v1.1.9 and earlier" + } + ] + } + }, + { + "product_name": "WAB-S1167", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "v1.0.7 and earlier" + } + ] + } } ] } @@ -64,6 +97,11 @@ }, "references": { "reference_data": [ + { + "url": "https://www.elecom.co.jp/news/security/20231114-01/", + "refsource": "MISC", + "name": "https://www.elecom.co.jp/news/security/20231114-01/" + }, { "url": "https://www.elecom.co.jp/news/security/20230810-01/", "refsource": "MISC", diff --git a/2023/46xxx/CVE-2023-46343.json b/2023/46xxx/CVE-2023-46343.json index e7dd400c0cc..873972465bd 100644 --- a/2023/46xxx/CVE-2023-46343.json +++ b/2023/46xxx/CVE-2023-46343.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-46343", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-46343", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel before 6.5.9, there is a NULL pointer dereference in send_acknowledge in net/nfc/nci/spi.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lore.kernel.org/netdev/20231013184129.18738-1-krzysztof.kozlowski@linaro.org/T/#r38bdbaf8ae15305b77f6c5bc8e15d38f405623c7", + "refsource": "MISC", + "name": "https://lore.kernel.org/netdev/20231013184129.18738-1-krzysztof.kozlowski@linaro.org/T/#r38bdbaf8ae15305b77f6c5bc8e15d38f405623c7" + }, + { + "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9", + "refsource": "MISC", + "name": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9" + }, + { + "url": "https://github.com/torvalds/linux/commit/7937609cd387246aed994e81aa4fa951358fba41", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/7937609cd387246aed994e81aa4fa951358fba41" + }, + { + "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7937609cd387246aed994e81aa4fa951358fba41", + "refsource": "MISC", + "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7937609cd387246aed994e81aa4fa951358fba41" } ] } diff --git a/2024/23xxx/CVE-2024-23180.json b/2024/23xxx/CVE-2024-23180.json index b0c94b82fba..1747136ae57 100644 --- a/2024/23xxx/CVE-2024-23180.json +++ b/2024/23xxx/CVE-2024-23180.json @@ -1,17 +1,111 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-23180", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper input validation vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute arbitrary code by uploading a specially crafted SVG file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper input validation" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "appleple inc.", + "product": { + "product_data": [ + { + "product_name": "a-blog cms Ver.3.1.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.3.1.7" + } + ] + } + }, + { + "product_name": "a-blog cms Ver.3.0.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.3.0.29" + } + ] + } + }, + { + "product_name": "a-blog cms Ver.2.11.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.2.11.58" + } + ] + } + }, + { + "product_name": "a-blog cms Ver.2.10.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.2.10.50" + } + ] + } + }, + { + "product_name": "a-blog cms", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Ver.2.9.0 and earlier " + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html", + "refsource": "MISC", + "name": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" + }, + { + "url": "https://jvn.jp/en/jp/JVN34565930/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN34565930/" } ] } diff --git a/2024/23xxx/CVE-2024-23181.json b/2024/23xxx/CVE-2024-23181.json index 0e017ad9ad9..d50f6f07f2d 100644 --- a/2024/23xxx/CVE-2024-23181.json +++ b/2024/23xxx/CVE-2024-23181.json @@ -1,17 +1,111 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-23181", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote unauthenticated attacker to execute an arbitrary script on the logged-in user's web browser." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "appleple inc.", + "product": { + "product_data": [ + { + "product_name": "a-blog cms Ver.3.1.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.3.1.7" + } + ] + } + }, + { + "product_name": "a-blog cms Ver.3.0.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.3.0.29" + } + ] + } + }, + { + "product_name": "a-blog cms Ver.2.11.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.2.11.58" + } + ] + } + }, + { + "product_name": "a-blog cms Ver.2.10.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.2.10.50" + } + ] + } + }, + { + "product_name": "a-blog cms", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Ver.2.9.0 and earlier " + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html", + "refsource": "MISC", + "name": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" + }, + { + "url": "https://jvn.jp/en/jp/JVN34565930/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN34565930/" } ] } diff --git a/2024/23xxx/CVE-2024-23182.json b/2024/23xxx/CVE-2024-23182.json index c0d1f4fd025..1c06391a81e 100644 --- a/2024/23xxx/CVE-2024-23182.json +++ b/2024/23xxx/CVE-2024-23182.json @@ -1,17 +1,111 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-23182", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Relative path traversal vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to delete arbitrary files on the server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Relative path traversal" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "appleple inc.", + "product": { + "product_data": [ + { + "product_name": "a-blog cms Ver.3.1.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.3.1.7" + } + ] + } + }, + { + "product_name": "a-blog cms Ver.3.0.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.3.0.29" + } + ] + } + }, + { + "product_name": "a-blog cms Ver.2.11.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.2.11.58" + } + ] + } + }, + { + "product_name": "a-blog cms Ver.2.10.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.2.10.50" + } + ] + } + }, + { + "product_name": "a-blog cms", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Ver.2.9.0 and earlier " + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html", + "refsource": "MISC", + "name": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" + }, + { + "url": "https://jvn.jp/en/jp/JVN34565930/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN34565930/" } ] } diff --git a/2024/23xxx/CVE-2024-23183.json b/2024/23xxx/CVE-2024-23183.json index d1ae04db8ef..3b9a701be2e 100644 --- a/2024/23xxx/CVE-2024-23183.json +++ b/2024/23xxx/CVE-2024-23183.json @@ -1,17 +1,111 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-23183", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute an arbitrary script on the logged-in user's web browser." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "appleple inc.", + "product": { + "product_data": [ + { + "product_name": "a-blog cms Ver.3.1.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.3.1.7" + } + ] + } + }, + { + "product_name": "a-blog cms Ver.3.0.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.3.0.29" + } + ] + } + }, + { + "product_name": "a-blog cms Ver.2.11.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.2.11.58" + } + ] + } + }, + { + "product_name": "a-blog cms Ver.2.10.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.2.10.50" + } + ] + } + }, + { + "product_name": "a-blog cms", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Ver.2.9.0 and earlier " + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html", + "refsource": "MISC", + "name": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" + }, + { + "url": "https://jvn.jp/en/jp/JVN34565930/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN34565930/" } ] } diff --git a/2024/23xxx/CVE-2024-23348.json b/2024/23xxx/CVE-2024-23348.json index ace6c8812c7..f77622bef93 100644 --- a/2024/23xxx/CVE-2024-23348.json +++ b/2024/23xxx/CVE-2024-23348.json @@ -1,17 +1,111 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-23348", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper input validation vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute arbitrary JavaScript code by uploading a specially crafted SVG file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper input validation" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "appleple inc.", + "product": { + "product_data": [ + { + "product_name": "a-blog cms Ver.3.1.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.3.1.7" + } + ] + } + }, + { + "product_name": "a-blog cms Ver.3.0.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.3.0.29" + } + ] + } + }, + { + "product_name": "a-blog cms Ver.2.11.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.2.11.58" + } + ] + } + }, + { + "product_name": "a-blog cms Ver.2.10.x series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to Ver.2.10.50" + } + ] + } + }, + { + "product_name": "a-blog cms", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Ver.2.9.0 and earlier " + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html", + "refsource": "MISC", + "name": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" + }, + { + "url": "https://jvn.jp/en/jp/JVN34565930/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN34565930/" } ] } diff --git a/2024/23xxx/CVE-2024-23852.json b/2024/23xxx/CVE-2024-23852.json new file mode 100644 index 00000000000..1e961435996 --- /dev/null +++ b/2024/23xxx/CVE-2024-23852.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23852", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23853.json b/2024/23xxx/CVE-2024-23853.json new file mode 100644 index 00000000000..f5660d1d836 --- /dev/null +++ b/2024/23xxx/CVE-2024-23853.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-23853", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file