"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-09-09 17:00:36 +00:00
parent 4403c2bc0c
commit 084a3d30c9
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
6 changed files with 292 additions and 115 deletions

View File

@ -1,93 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"DATE_PUBLIC": "2018-07-02T00:00:00",
"ID": "CVE-2018-1546",
"ASSIGNER": "psirt@us.ibm.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "API Connect",
"version": {
"version_data": [
{
"version_value": "5.0.1.0"
},
{
"version_value": "5.0.0.0"
},
{
"version_value": "5.0.2.0"
},
{
"version_value": "5.0.5.0"
},
{
"version_value": "5.0.6.0"
},
{
"version_value": "5.0.6.1"
},
{
"version_value": "5.0.6.2"
},
{
"version_value": "5.0.7.0"
},
{
"version_value": "5.0.7.1"
},
{
"version_value": "5.0.3.0"
},
{
"version_value": "5.0.4.0"
},
{
"version_value": "5.0.7.2"
},
{
"version_value": "5.0.6.3"
},
{
"version_value": "5.0.6.4"
},
{
"version_value": "5.0.8.0"
},
{
"version_value": "5.0.8.1"
},
{
"version_value": "5.0.6.5"
},
{
"version_value": "5.0.6.6"
},
{
"version_value": "5.0.8.2"
},
{
"version_value": "5.0.8.3"
}
]
}
}
]
},
"vendor_name": "IBM"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -96,26 +15,6 @@
}
]
},
"impact": {
"cvssv3": {
"BM": {
"A": "N",
"AC": "H",
"AV": "N",
"C": "H",
"I": "N",
"PR": "N",
"S": "U",
"SCORE": "5.900",
"UI": "N"
},
"TM": {
"E": "U",
"RC": "C",
"RL": "O"
}
}
},
"problemtype": {
"problemtype_data": [
{
@ -128,17 +27,141 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBM",
"product": {
"product_data": [
{
"product_name": "API Connect",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.0.1.0"
},
{
"version_affected": "=",
"version_value": "5.0.0.0"
},
{
"version_affected": "=",
"version_value": "5.0.2.0"
},
{
"version_affected": "=",
"version_value": "5.0.5.0"
},
{
"version_affected": "=",
"version_value": "5.0.6.0"
},
{
"version_affected": "=",
"version_value": "5.0.6.1"
},
{
"version_affected": "=",
"version_value": "5.0.6.2"
},
{
"version_affected": "=",
"version_value": "5.0.7.0"
},
{
"version_affected": "=",
"version_value": "5.0.7.1"
},
{
"version_affected": "=",
"version_value": "5.0.3.0"
},
{
"version_affected": "=",
"version_value": "5.0.4.0"
},
{
"version_affected": "=",
"version_value": "5.0.7.2"
},
{
"version_affected": "=",
"version_value": "5.0.6.3"
},
{
"version_affected": "=",
"version_value": "5.0.6.4"
},
{
"version_affected": "=",
"version_value": "5.0.8.0"
},
{
"version_affected": "=",
"version_value": "5.0.8.1"
},
{
"version_affected": "=",
"version_value": "5.0.6.5"
},
{
"version_affected": "=",
"version_value": "5.0.6.6"
},
{
"version_affected": "=",
"version_value": "5.0.8.2"
},
{
"version_affected": "=",
"version_value": "5.0.8.3"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "ibm-api-cve20181546-info-disc(142650)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/142650"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/142650",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/142650"
},
{
"name": "https://www-prd-trops.events.ibm.com/node/715299",
"refsource": "CONFIRM",
"url": "https://www-prd-trops.events.ibm.com/node/715299"
"url": "https://www.ibm.com/support/pages/node/715299",
"refsource": "MISC",
"name": "https://www.ibm.com/support/pages/node/715299"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,99 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-45406",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security-advisories@github.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Craft is a content management system (CMS). Craft CMS 5 stored XSS can be triggered by the breadcrumb list and title fields with user input."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
"cweId": "CWE-80"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "craftcms",
"product": {
"product_data": [
{
"product_name": "cms",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": ">= 5.0.0, < 5.1.2"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-28h4-788g-rh42",
"refsource": "MISC",
"name": "https://github.com/craftcms/cms/security/advisories/GHSA-28h4-788g-rh42"
},
{
"url": "https://github.com/craftcms/cms/commit/b7348942f8131b3868ec6f46d615baae50151bb8",
"refsource": "MISC",
"name": "https://github.com/craftcms/cms/commit/b7348942f8131b3868ec6f46d615baae50151bb8"
}
]
},
"source": {
"advisory": "GHSA-28h4-788g-rh42",
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-8612",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-8613",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-8614",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-8615",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}