diff --git a/2024/10xxx/CVE-2024-10479.json b/2024/10xxx/CVE-2024-10479.json index 4496b8e5518..dc113dd0f56 100644 --- a/2024/10xxx/CVE-2024-10479.json +++ b/2024/10xxx/CVE-2024-10479.json @@ -1,17 +1,108 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10479", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability, which was classified as problematic, was found in LinZhaoguan pb-cms up to 2.0.1. Affected is an unknown function of the file /admin#themes of the component Theme Management Module. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "deu", + "value": "Es wurde eine Schwachstelle in LinZhaoguan pb-cms bis 2.0.1 gefunden. Sie wurde als problematisch eingestuft. Es betrifft eine unbekannte Funktion der Datei /admin#themes der Komponente Theme Management Module. Mittels Manipulieren mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross Site Scripting", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "LinZhaoguan", + "product": { + "product_data": [ + { + "product_name": "pb-cms", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.0.0" + }, + { + "version_affected": "=", + "version_value": "2.0.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.282090", + "refsource": "MISC", + "name": "https://vuldb.com/?id.282090" + }, + { + "url": "https://vuldb.com/?ctiid.282090", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.282090" + }, + { + "url": "https://gitee.com/LinZhaoguan/pb-cms/issues/IAYHUP", + "refsource": "MISC", + "name": "https://gitee.com/LinZhaoguan/pb-cms/issues/IAYHUP" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "VulDB Gitee Analyzer" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 2.4, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 2.4, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 3.3, + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N" } ] } diff --git a/2024/1xxx/CVE-2024-1233.json b/2024/1xxx/CVE-2024-1233.json index 661330d8488..9aa37e3d6de 100644 --- a/2024/1xxx/CVE-2024-1233.json +++ b/2024/1xxx/CVE-2024-1233.json @@ -36,7 +36,7 @@ "product": { "product_data": [ { - "product_name": "Red Hat JBoss Enterprise Application Platform 7.1.0", + "product_name": "Red Hat JBoss Enterprise Application Platform 7", "version": { "version_data": [ { diff --git a/2024/22xxx/CVE-2024-22065.json b/2024/22xxx/CVE-2024-22065.json index 17207772f39..53f1da049a3 100644 --- a/2024/22xxx/CVE-2024-22065.json +++ b/2024/22xxx/CVE-2024-22065.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-22065", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@zte.com.cn", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is a command injection vulnerability in ZTE MF258 Pro product. Due to insufficient validation of Ping Diagnosis interface parameter, an authenticated attacker could use the vulnerability to execute arbitrary commands." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "ZTE", + "product": { + "product_data": [ + { + "product_name": "MF258 Pro", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "ZTE_MF258PRO_STD_V1.0.0B03" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/1171513586716225572", + "refsource": "MISC", + "name": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/1171513586716225572" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "EXTERNAL" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/43xxx/CVE-2024-43885.json b/2024/43xxx/CVE-2024-43885.json index f2ba40761a2..e2695ce43b0 100644 --- a/2024/43xxx/CVE-2024-43885.json +++ b/2024/43xxx/CVE-2024-43885.json @@ -5,127 +5,14 @@ "CVE_data_meta": { "ID": "CVE-2024-43885", "ASSIGNER": "cve@kernel.org", - "STATE": "PUBLIC" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix double inode unlock for direct IO sync writes\n\nIf we do a direct IO sync write, at btrfs_sync_file(), and we need to skip\ninode logging or we get an error starting a transaction or an error when\nflushing delalloc, we end up unlocking the inode when we shouldn't under\nthe 'out_release_extents' label, and then unlock it again at\nbtrfs_direct_write().\n\nFix that by checking if we have to skip inode unlocking under that label." + "value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Linux", - "product": { - "product_data": [ - { - "product_name": "Linux", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "4e17707035a6", - "version_value": "1a607d22dea4" - }, - { - "version_affected": "<", - "version_name": "6cae8d04d8b3", - "version_value": "8bd4c9220416" - }, - { - "version_affected": "<", - "version_name": "0a108bde616a", - "version_value": "7ba27f14161f" - }, - { - "version_affected": "<", - "version_name": "3831170f7406", - "version_value": "d924a0be2f21" - }, - { - "version_affected": "<", - "version_name": "939b656bc8ab", - "version_value": "e0391e92f9ab" - }, - { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "versions": [ - { - "version": "6.11-rc2", - "status": "affected" - }, - { - "version": "0", - "lessThan": "6.11-rc2", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "6.11-rc3", - "lessThanOrEqual": "*", - "status": "unaffected", - "versionType": "original_commit_for_fix" - } - ], - "defaultStatus": "affected" - } - } - ] - } - } - ] - } - } - ] - } - }, - "references": { - "reference_data": [ - { - "url": "https://git.kernel.org/stable/c/1a607d22dea4f60438747705495ec4d0af2ec451", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/1a607d22dea4f60438747705495ec4d0af2ec451" - }, - { - "url": "https://git.kernel.org/stable/c/8bd4c9220416111500c275546c69c63d42185793", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/8bd4c9220416111500c275546c69c63d42185793" - }, - { - "url": "https://git.kernel.org/stable/c/7ba27f14161fc20c4fc0051658a22ddd832eb0aa", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/7ba27f14161fc20c4fc0051658a22ddd832eb0aa" - }, - { - "url": "https://git.kernel.org/stable/c/d924a0be2f218501588cf463d70f1c71afea06d9", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/d924a0be2f218501588cf463d70f1c71afea06d9" - }, - { - "url": "https://git.kernel.org/stable/c/e0391e92f9ab4fb3dbdeb139c967dcfa7ac4b115", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/e0391e92f9ab4fb3dbdeb139c967dcfa7ac4b115" - } - ] - }, - "generator": { - "engine": "bippy-c9c4e1df01b2" } } \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51510.json b/2024/51xxx/CVE-2024-51510.json new file mode 100644 index 00000000000..4a741b8b74e --- /dev/null +++ b/2024/51xxx/CVE-2024-51510.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51510", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51511.json b/2024/51xxx/CVE-2024-51511.json new file mode 100644 index 00000000000..3742dec29f6 --- /dev/null +++ b/2024/51xxx/CVE-2024-51511.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51511", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51512.json b/2024/51xxx/CVE-2024-51512.json new file mode 100644 index 00000000000..0a213dede71 --- /dev/null +++ b/2024/51xxx/CVE-2024-51512.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51512", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51513.json b/2024/51xxx/CVE-2024-51513.json new file mode 100644 index 00000000000..21d59a99948 --- /dev/null +++ b/2024/51xxx/CVE-2024-51513.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51513", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51514.json b/2024/51xxx/CVE-2024-51514.json new file mode 100644 index 00000000000..1dee86559ed --- /dev/null +++ b/2024/51xxx/CVE-2024-51514.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51514", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51515.json b/2024/51xxx/CVE-2024-51515.json new file mode 100644 index 00000000000..368c4229a9e --- /dev/null +++ b/2024/51xxx/CVE-2024-51515.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51515", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51516.json b/2024/51xxx/CVE-2024-51516.json new file mode 100644 index 00000000000..7d3910a5b36 --- /dev/null +++ b/2024/51xxx/CVE-2024-51516.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51516", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51517.json b/2024/51xxx/CVE-2024-51517.json new file mode 100644 index 00000000000..e0d16cc2e2e --- /dev/null +++ b/2024/51xxx/CVE-2024-51517.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51517", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51518.json b/2024/51xxx/CVE-2024-51518.json new file mode 100644 index 00000000000..894d37f8256 --- /dev/null +++ b/2024/51xxx/CVE-2024-51518.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51518", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51519.json b/2024/51xxx/CVE-2024-51519.json new file mode 100644 index 00000000000..ac39d873510 --- /dev/null +++ b/2024/51xxx/CVE-2024-51519.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51519", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51520.json b/2024/51xxx/CVE-2024-51520.json new file mode 100644 index 00000000000..27cc1f84e48 --- /dev/null +++ b/2024/51xxx/CVE-2024-51520.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51520", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51521.json b/2024/51xxx/CVE-2024-51521.json new file mode 100644 index 00000000000..74641a57926 --- /dev/null +++ b/2024/51xxx/CVE-2024-51521.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51521", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51522.json b/2024/51xxx/CVE-2024-51522.json new file mode 100644 index 00000000000..909fa563ada --- /dev/null +++ b/2024/51xxx/CVE-2024-51522.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51522", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51523.json b/2024/51xxx/CVE-2024-51523.json new file mode 100644 index 00000000000..0c1455d32d8 --- /dev/null +++ b/2024/51xxx/CVE-2024-51523.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51523", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51524.json b/2024/51xxx/CVE-2024-51524.json new file mode 100644 index 00000000000..cee37cc74d1 --- /dev/null +++ b/2024/51xxx/CVE-2024-51524.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51524", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51525.json b/2024/51xxx/CVE-2024-51525.json new file mode 100644 index 00000000000..0c4836be6f9 --- /dev/null +++ b/2024/51xxx/CVE-2024-51525.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51525", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51526.json b/2024/51xxx/CVE-2024-51526.json new file mode 100644 index 00000000000..7aa35a0b33a --- /dev/null +++ b/2024/51xxx/CVE-2024-51526.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51526", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51527.json b/2024/51xxx/CVE-2024-51527.json new file mode 100644 index 00000000000..88dd99d96b5 --- /dev/null +++ b/2024/51xxx/CVE-2024-51527.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51527", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51528.json b/2024/51xxx/CVE-2024-51528.json new file mode 100644 index 00000000000..15fbd27b693 --- /dev/null +++ b/2024/51xxx/CVE-2024-51528.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51528", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51529.json b/2024/51xxx/CVE-2024-51529.json new file mode 100644 index 00000000000..63012811b17 --- /dev/null +++ b/2024/51xxx/CVE-2024-51529.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51529", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51530.json b/2024/51xxx/CVE-2024-51530.json new file mode 100644 index 00000000000..00d22b31fad --- /dev/null +++ b/2024/51xxx/CVE-2024-51530.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-51530", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file