diff --git a/2023/6xxx/CVE-2023-6267.json b/2023/6xxx/CVE-2023-6267.json index eb11a1c4bf3..ed2847072b1 100644 --- a/2023/6xxx/CVE-2023-6267.json +++ b/2023/6xxx/CVE-2023-6267.json @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Handling of Insufficient Permissions or Privileges ", + "value": "Improper Handling of Insufficient Permissions or Privileges", "cweId": "CWE-280" } ] diff --git a/2023/6xxx/CVE-2023-6393.json b/2023/6xxx/CVE-2023-6393.json index d45f55c7933..d057a979933 100644 --- a/2023/6xxx/CVE-2023-6393.json +++ b/2023/6xxx/CVE-2023-6393.json @@ -35,6 +35,27 @@ "vendor_name": "Red Hat", "product": { "product_data": [ + { + "product_name": "Red Hat build of Quarkus 2.13.9.Final", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "2.13.9.Final-redhat-00002", + "lessThan": "*", + "versionType": "rpm", + "status": "unaffected" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, { "product_name": "Red Hat build of Quarkus", "version": { @@ -56,6 +77,11 @@ }, "references": { "reference_data": [ + { + "url": "https://access.redhat.com/errata/RHSA-2023:7700", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2023:7700" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6393", "refsource": "MISC", diff --git a/2023/6xxx/CVE-2023-6394.json b/2023/6xxx/CVE-2023-6394.json index 356c50e7c8c..19b84b99ee6 100644 --- a/2023/6xxx/CVE-2023-6394.json +++ b/2023/6xxx/CVE-2023-6394.json @@ -35,6 +35,27 @@ "vendor_name": "Red Hat", "product": { "product_data": [ + { + "product_name": "Red Hat build of Quarkus 2.13.9.Final", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "2.13.9.Final-redhat-00002", + "lessThan": "*", + "versionType": "rpm", + "status": "unaffected" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, { "product_name": "Red Hat build of Quarkus 3.2.9.Final", "version": { @@ -55,19 +76,6 @@ } ] } - }, - { - "product_name": "Red Hat build of Quarkus", - "version": { - "version_data": [ - { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "defaultStatus": "affected" - } - } - ] - } } ] } @@ -82,6 +90,11 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2023:7612" }, + { + "url": "https://access.redhat.com/errata/RHSA-2023:7700", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2023:7700" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6394", "refsource": "MISC", diff --git a/2023/6xxx/CVE-2023-6546.json b/2023/6xxx/CVE-2023-6546.json index 402f0d23130..0d9de3938b7 100644 --- a/2023/6xxx/CVE-2023-6546.json +++ b/2023/6xxx/CVE-2023-6546.json @@ -170,6 +170,12 @@ ], "defaultStatus": "affected" } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "unaffected" + } } ] } @@ -801,6 +807,11 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2024:4731" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:4970", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2024:4970" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6546", "refsource": "MISC", diff --git a/2024/0xxx/CVE-2024-0560.json b/2024/0xxx/CVE-2024-0560.json index 99d6d5af26d..27f62aaaf17 100644 --- a/2024/0xxx/CVE-2024-0560.json +++ b/2024/0xxx/CVE-2024-0560.json @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Handling of Insufficient Permissions or Privileges ", + "value": "Improper Handling of Insufficient Permissions or Privileges", "cweId": "CWE-280" } ] diff --git a/2024/0xxx/CVE-2024-0874.json b/2024/0xxx/CVE-2024-0874.json index 482644d2161..02f32f42455 100644 --- a/2024/0xxx/CVE-2024-0874.json +++ b/2024/0xxx/CVE-2024-0874.json @@ -35,6 +35,27 @@ "vendor_name": "Red Hat", "product": { "product_data": [ + { + "product_name": "Red Hat OpenShift Container Platform 4.15", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "v4.15.0-202407230407.p0.g1326282.assembly.stream.el9", + "lessThan": "*", + "versionType": "rpm", + "status": "unaffected" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, { "product_name": "Red Hat OpenShift Container Platform 4.16", "version": { @@ -95,6 +116,11 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2024:0041" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:4850", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2024:4850" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-0874", "refsource": "MISC", diff --git a/2024/1xxx/CVE-2024-1023.json b/2024/1xxx/CVE-2024-1023.json index 0ad470047ac..8bfd5ae681d 100644 --- a/2024/1xxx/CVE-2024-1023.json +++ b/2024/1xxx/CVE-2024-1023.json @@ -259,19 +259,6 @@ ] } }, - { - "product_name": "Red Hat build of Apache Camel 4.0 for Spring Boot", - "version": { - "version_data": [ - { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "defaultStatus": "affected" - } - } - ] - } - }, { "product_name": "Red Hat build of Apache Camel for Spring Boot", "version": { diff --git a/2024/1xxx/CVE-2024-1300.json b/2024/1xxx/CVE-2024-1300.json index a2586f01972..62f2cda8a96 100644 --- a/2024/1xxx/CVE-2024-1300.json +++ b/2024/1xxx/CVE-2024-1300.json @@ -309,19 +309,6 @@ ] } }, - { - "product_name": "Red Hat build of Apache Camel 4.0 for Spring Boot", - "version": { - "version_data": [ - { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "defaultStatus": "affected" - } - } - ] - } - }, { "product_name": "Red Hat build of Apache Camel for Spring Boot", "version": { diff --git a/2024/1xxx/CVE-2024-1394.json b/2024/1xxx/CVE-2024-1394.json index 419d761eb9d..643c0dc3bf7 100644 --- a/2024/1xxx/CVE-2024-1394.json +++ b/2024/1xxx/CVE-2024-1394.json @@ -607,7 +607,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.25.0-2.2.el8", + "version": "0:1.25.0-2.2.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -621,7 +621,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:2.14.0-7.1.rhaos4.12.el8", + "version": "0:2.14.0-5.2.rhaos4.12.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -635,7 +635,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.12.0-202403251017.p0.gd4c9e3c.assembly.stream.el9", + "version": "0:4.12.0-202403251017.p0.gd4c9e3c.assembly.stream.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -649,7 +649,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-2.1.rhaos4.12.el8", + "version": "3:4.2.0-7.2.rhaos4.12.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -698,7 +698,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "1:1.29.1-2.2.rhaos4.13.el8", + "version": "1:1.29.1-2.2.rhaos4.13.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -726,7 +726,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.26.5-11.1.rhaos4.13.git919cc6e.el8", + "version": "0:1.26.5-11.1.rhaos4.13.git919cc6e.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -768,7 +768,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.13.0-202404020737.p0.gd192e90.assembly.stream.el9", + "version": "0:4.13.0-202404020737.p0.gd192e90.assembly.stream.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -796,7 +796,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "4:1.1.12-1.1.rhaos4.13.el8", + "version": "4:1.1.12-1.1.rhaos4.13.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -943,7 +943,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "2:1.11.2-10.3.rhaos4.14.el8", + "version": "2:1.11.2-10.3.rhaos4.14.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -957,7 +957,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "1:1.29.1-10.4.rhaos4.14.el9", + "version": "1:1.29.1-10.4.rhaos4.14.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -985,7 +985,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:2.1.7-3.4.rhaos4.14.el8", + "version": "3:2.1.7-3.4.rhaos4.14.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1027,7 +1027,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.27.0-3.2.el8", + "version": "0:1.27.0-3.2.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1055,7 +1055,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.14.0-202404160939.p0.g7bee54d.assembly.stream.el9", + "version": "0:4.14.0-202404160939.p0.g7bee54d.assembly.stream.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1083,7 +1083,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.14.0-202404151639.p0.g81558cc.assembly.stream.el8", + "version": "0:4.14.0-202404151639.p0.g81558cc.assembly.stream.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1125,7 +1125,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.14.0-202404151639.p0.g607e2dd.assembly.stream.el9", + "version": "0:4.14.0-202404151639.p0.g607e2dd.assembly.stream.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1153,7 +1153,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "4:1.1.12-1.2.rhaos4.14.el9", + "version": "4:1.1.12-1.2.rhaos4.14.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1167,7 +1167,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "2:1.11.2-10.4.rhaos4.14.el8", + "version": "2:1.11.2-10.4.rhaos4.14.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1244,7 +1244,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.28.4-8.rhaos4.15.git24f50b9.el9", + "version": "0:1.28.4-8.rhaos4.15.git24f50b9.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1258,7 +1258,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.28.0-3.1.el8", + "version": "0:1.28.0-3.1.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1286,7 +1286,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.15.0-202403211240.p0.g62c4d45.assembly.stream.el8", + "version": "0:4.15.0-202403211240.p0.g62c4d45.assembly.stream.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1314,7 +1314,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-21.1.rhaos4.15.el9", + "version": "3:4.4.1-21.1.rhaos4.15.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1342,7 +1342,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "2:1.11.2-21.2.rhaos4.15.el8", + "version": "2:1.11.2-21.2.rhaos4.15.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" diff --git a/2024/1xxx/CVE-2024-1635.json b/2024/1xxx/CVE-2024-1635.json index ed73801b199..88e14615ed1 100644 --- a/2024/1xxx/CVE-2024-1635.json +++ b/2024/1xxx/CVE-2024-1635.json @@ -221,19 +221,6 @@ ] } }, - { - "product_name": "Red Hat build of Apache Camel 4.0 for Spring Boot", - "version": { - "version_data": [ - { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "defaultStatus": "affected" - } - } - ] - } - }, { "product_name": "Red Hat build of Apache Camel for Quarkus", "version": { diff --git a/2024/1xxx/CVE-2024-1753.json b/2024/1xxx/CVE-2024-1753.json index 23788170021..75cad9f50d3 100644 --- a/2024/1xxx/CVE-2024-1753.json +++ b/2024/1xxx/CVE-2024-1753.json @@ -275,7 +275,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-6.3.rhaos4.13.el9", + "version": "3:4.4.1-5.3.rhaos4.13.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -289,7 +289,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-7.3.rhaos4.13.el8", + "version": "3:4.4.1-8.3.rhaos4.13.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -310,7 +310,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-13.4.rhaos4.14.el9", + "version": "3:4.4.1-13.4.rhaos4.14.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -331,7 +331,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-23.2.rhaos4.15.el8", + "version": "3:4.4.1-23.2.rhaos4.15.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" diff --git a/2024/7xxx/CVE-2024-7211.json b/2024/7xxx/CVE-2024-7211.json index a7a1fc49d19..2c0644633f5 100644 --- a/2024/7xxx/CVE-2024-7211.json +++ b/2024/7xxx/CVE-2024-7211.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "The 1E Platform\u2019s Identity Server was impacted by an open redirect vulnerability, allowing an attacker to dictate the redirection path of an end user.\n\nNote: The Identity Server on 1E Platform has been updated with the patch that includes the fix." + "value": "The 1E Platform's component utilized the third-party Duende Identity Server, which suffered from an open redirect vulnerability, permitting an attacker to control the redirection path of end users.\n\nNote: 1E Platform's component utilizing the third-party Duende Identity Server has been updated with the patch that includes the fix." } ] }, diff --git a/2024/7xxx/CVE-2024-7409.json b/2024/7xxx/CVE-2024-7409.json new file mode 100644 index 00000000000..ed4e86e1bbb --- /dev/null +++ b/2024/7xxx/CVE-2024-7409.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7409", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7410.json b/2024/7xxx/CVE-2024-7410.json new file mode 100644 index 00000000000..3f174c0c7ca --- /dev/null +++ b/2024/7xxx/CVE-2024-7410.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7410", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7411.json b/2024/7xxx/CVE-2024-7411.json new file mode 100644 index 00000000000..7b8785f375b --- /dev/null +++ b/2024/7xxx/CVE-2024-7411.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7411", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7412.json b/2024/7xxx/CVE-2024-7412.json new file mode 100644 index 00000000000..f28a5ce12a0 --- /dev/null +++ b/2024/7xxx/CVE-2024-7412.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7412", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7413.json b/2024/7xxx/CVE-2024-7413.json new file mode 100644 index 00000000000..f449015714b --- /dev/null +++ b/2024/7xxx/CVE-2024-7413.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7413", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7414.json b/2024/7xxx/CVE-2024-7414.json new file mode 100644 index 00000000000..a9156b78d78 --- /dev/null +++ b/2024/7xxx/CVE-2024-7414.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7414", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7415.json b/2024/7xxx/CVE-2024-7415.json new file mode 100644 index 00000000000..526ddd47ad3 --- /dev/null +++ b/2024/7xxx/CVE-2024-7415.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7415", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7416.json b/2024/7xxx/CVE-2024-7416.json new file mode 100644 index 00000000000..e8f746ce5fb --- /dev/null +++ b/2024/7xxx/CVE-2024-7416.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7416", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file