"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-08-02 13:00:36 +00:00
parent 05935bb598
commit 12edcf47fc
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
20 changed files with 262 additions and 81 deletions

View File

@ -35,6 +35,27 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat build of Quarkus 2.13.9.Final",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "2.13.9.Final-redhat-00002",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat build of Quarkus", "product_name": "Red Hat build of Quarkus",
"version": { "version": {
@ -56,6 +77,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:7700",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:7700"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-6393", "url": "https://access.redhat.com/security/cve/CVE-2023-6393",
"refsource": "MISC", "refsource": "MISC",

View File

@ -35,6 +35,27 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat build of Quarkus 2.13.9.Final",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "2.13.9.Final-redhat-00002",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat build of Quarkus 3.2.9.Final", "product_name": "Red Hat build of Quarkus 3.2.9.Final",
"version": { "version": {
@ -55,19 +76,6 @@
} }
] ]
} }
},
{
"product_name": "Red Hat build of Quarkus",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
} }
] ]
} }
@ -82,6 +90,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:7612" "name": "https://access.redhat.com/errata/RHSA-2023:7612"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2023:7700",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:7700"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-6394", "url": "https://access.redhat.com/security/cve/CVE-2023-6394",
"refsource": "MISC", "refsource": "MISC",

View File

@ -170,6 +170,12 @@
], ],
"defaultStatus": "affected" "defaultStatus": "affected"
} }
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
} }
] ]
} }
@ -801,6 +807,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:4731" "name": "https://access.redhat.com/errata/RHSA-2024:4731"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2024:4970",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:4970"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-6546", "url": "https://access.redhat.com/security/cve/CVE-2023-6546",
"refsource": "MISC", "refsource": "MISC",

View File

@ -35,6 +35,27 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat OpenShift Container Platform 4.15",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "v4.15.0-202407230407.p0.g1326282.assembly.stream.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat OpenShift Container Platform 4.16", "product_name": "Red Hat OpenShift Container Platform 4.16",
"version": { "version": {
@ -95,6 +116,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:0041" "name": "https://access.redhat.com/errata/RHSA-2024:0041"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2024:4850",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:4850"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2024-0874", "url": "https://access.redhat.com/security/cve/CVE-2024-0874",
"refsource": "MISC", "refsource": "MISC",

View File

@ -259,19 +259,6 @@
] ]
} }
}, },
{
"product_name": "Red Hat build of Apache Camel 4.0 for Spring Boot",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat build of Apache Camel for Spring Boot", "product_name": "Red Hat build of Apache Camel for Spring Boot",
"version": { "version": {

View File

@ -309,19 +309,6 @@
] ]
} }
}, },
{
"product_name": "Red Hat build of Apache Camel 4.0 for Spring Boot",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat build of Apache Camel for Spring Boot", "product_name": "Red Hat build of Apache Camel for Spring Boot",
"version": { "version": {

View File

@ -607,7 +607,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "0:1.25.0-2.2.el8", "version": "0:1.25.0-2.2.el9",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -621,7 +621,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "0:2.14.0-7.1.rhaos4.12.el8", "version": "0:2.14.0-5.2.rhaos4.12.el9",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -635,7 +635,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "0:4.12.0-202403251017.p0.gd4c9e3c.assembly.stream.el9", "version": "0:4.12.0-202403251017.p0.gd4c9e3c.assembly.stream.el8",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -649,7 +649,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "3:4.4.1-2.1.rhaos4.12.el8", "version": "3:4.2.0-7.2.rhaos4.12.el9",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -698,7 +698,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "1:1.29.1-2.2.rhaos4.13.el8", "version": "1:1.29.1-2.2.rhaos4.13.el9",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -726,7 +726,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "0:1.26.5-11.1.rhaos4.13.git919cc6e.el8", "version": "0:1.26.5-11.1.rhaos4.13.git919cc6e.el9",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -768,7 +768,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "0:4.13.0-202404020737.p0.gd192e90.assembly.stream.el9", "version": "0:4.13.0-202404020737.p0.gd192e90.assembly.stream.el8",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -796,7 +796,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "4:1.1.12-1.1.rhaos4.13.el8", "version": "4:1.1.12-1.1.rhaos4.13.el9",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -943,7 +943,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "2:1.11.2-10.3.rhaos4.14.el8", "version": "2:1.11.2-10.3.rhaos4.14.el9",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -957,7 +957,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "1:1.29.1-10.4.rhaos4.14.el9", "version": "1:1.29.1-10.4.rhaos4.14.el8",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -985,7 +985,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "3:2.1.7-3.4.rhaos4.14.el8", "version": "3:2.1.7-3.4.rhaos4.14.el9",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -1027,7 +1027,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "0:1.27.0-3.2.el8", "version": "0:1.27.0-3.2.el9",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -1055,7 +1055,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "0:4.14.0-202404160939.p0.g7bee54d.assembly.stream.el9", "version": "0:4.14.0-202404160939.p0.g7bee54d.assembly.stream.el8",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -1083,7 +1083,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "0:4.14.0-202404151639.p0.g81558cc.assembly.stream.el8", "version": "0:4.14.0-202404151639.p0.g81558cc.assembly.stream.el9",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -1125,7 +1125,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "0:4.14.0-202404151639.p0.g607e2dd.assembly.stream.el9", "version": "0:4.14.0-202404151639.p0.g607e2dd.assembly.stream.el8",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -1153,7 +1153,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "4:1.1.12-1.2.rhaos4.14.el9", "version": "4:1.1.12-1.2.rhaos4.14.el8",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -1167,7 +1167,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "2:1.11.2-10.4.rhaos4.14.el8", "version": "2:1.11.2-10.4.rhaos4.14.el9",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -1244,7 +1244,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "0:1.28.4-8.rhaos4.15.git24f50b9.el9", "version": "0:1.28.4-8.rhaos4.15.git24f50b9.el8",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -1258,7 +1258,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "0:1.28.0-3.1.el8", "version": "0:1.28.0-3.1.el9",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -1286,7 +1286,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "0:4.15.0-202403211240.p0.g62c4d45.assembly.stream.el8", "version": "0:4.15.0-202403211240.p0.g62c4d45.assembly.stream.el9",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -1314,7 +1314,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "3:4.4.1-21.1.rhaos4.15.el9", "version": "3:4.4.1-21.1.rhaos4.15.el8",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -1342,7 +1342,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "2:1.11.2-21.2.rhaos4.15.el8", "version": "2:1.11.2-21.2.rhaos4.15.el9",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"

View File

@ -221,19 +221,6 @@
] ]
} }
}, },
{
"product_name": "Red Hat build of Apache Camel 4.0 for Spring Boot",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat build of Apache Camel for Quarkus", "product_name": "Red Hat build of Apache Camel for Quarkus",
"version": { "version": {

View File

@ -275,7 +275,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "3:4.4.1-6.3.rhaos4.13.el9", "version": "3:4.4.1-5.3.rhaos4.13.el8",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -289,7 +289,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "3:4.4.1-7.3.rhaos4.13.el8", "version": "3:4.4.1-8.3.rhaos4.13.el9",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -310,7 +310,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "3:4.4.1-13.4.rhaos4.14.el9", "version": "3:4.4.1-13.4.rhaos4.14.el8",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"
@ -331,7 +331,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "3:4.4.1-23.2.rhaos4.15.el8", "version": "3:4.4.1-23.2.rhaos4.15.el9",
"lessThan": "*", "lessThan": "*",
"versionType": "rpm", "versionType": "rpm",
"status": "unaffected" "status": "unaffected"

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "The 1E Platform\u2019s Identity Server was impacted by an open redirect vulnerability, allowing an attacker to dictate the redirection path of an end user.\n\nNote: The Identity Server on 1E Platform has been updated with the patch that includes the fix." "value": "The 1E Platform's component utilized the third-party Duende Identity Server, which suffered from an open redirect vulnerability, permitting an attacker to control the redirection path of end users.\n\nNote: 1E Platform's component utilizing the third-party Duende Identity Server has been updated with the patch that includes the fix."
} }
] ]
}, },

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-7409",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-7410",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-7411",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-7412",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-7413",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-7414",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-7415",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-7416",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}