"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-07-03 00:00:37 +00:00
parent 55955f7473
commit 21c3685e24
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
7 changed files with 308 additions and 82 deletions

View File

@ -56,6 +56,27 @@
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:10.5.18-32.el7_9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
"version": {
@ -208,19 +229,6 @@
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
@ -267,6 +275,11 @@
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:4179"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:4222",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:4222"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-4727",
"refsource": "MISC",

View File

@ -35,6 +35,27 @@
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:3.5-10.el8_10",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
@ -48,19 +69,6 @@
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
@ -82,6 +90,11 @@
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:4241",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:4241"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-7250",
"refsource": "MISC",

View File

@ -119,6 +119,27 @@
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "8100020240613122040.25e700aa",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
@ -152,19 +173,6 @@
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
}
]
}
@ -199,6 +207,11 @@
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:4210"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:4235",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:4235"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-2199",
"refsource": "MISC",

View File

@ -119,6 +119,27 @@
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "8100020240613122040.25e700aa",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
@ -152,19 +173,6 @@
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
}
]
}
@ -199,6 +207,11 @@
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:4210"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:4235",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:4235"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-3657",
"refsource": "MISC",

View File

@ -35,6 +35,69 @@
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "17:8.2.0-11.el9_4.4",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "17:6.2.0-11.el9_0.9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "17:7.2.0-14.el9_2.11",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
@ -93,19 +156,6 @@
]
}
},
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Red Hat OpenShift Virtualization 4",
"version": {
@ -127,6 +177,21 @@
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:4276",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:4276"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:4277",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:4277"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:4278",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:4278"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-4467",
"refsource": "MISC",

View File

@ -1,17 +1,113 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-4708",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "mySCADA myPRO \n\nuses a hard-coded password which could allow an attacker to remotely execute code on the affected device."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-259 Use of Hard-coded Password",
"cweId": "CWE-259"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "mySCADA",
"product": {
"product_data": [
{
"product_name": "myPRO",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "8.31.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-02",
"refsource": "MISC",
"name": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-02"
},
{
"url": "https://www.myscada.org/mypro/",
"refsource": "MISC",
"name": "https://www.myscada.org/mypro/"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"advisory": "ICSA-24-184-02",
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<span style=\"background-color: rgb(255, 255, 255);\">mySCADA recommends updating myPRO to </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.myscada.org/mypro/\">v8.31.0</a><span style=\"background-color: rgb(255, 255, 255);\">.</span>\n\n<br>"
}
],
"value": "mySCADA recommends updating myPRO to v8.31.0 https://www.myscada.org/mypro/ ."
}
],
"credits": [
{
"lang": "en",
"value": "Nassim Asrir working with Trend Micro Zero Day Initiative reported this vulnerability to CISA."
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -35,6 +35,27 @@
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat OpenShift Container Platform 4.15",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "v4.15.0-202406200537.p0.g14489f7.assembly.stream.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Logging Subsystem for Red Hat OpenShift",
"version": {
@ -48,19 +69,6 @@
]
}
},
{
"product_name": "Red Hat OpenShift Container Platform 4",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Red Hat OpenShift distributed tracing 2",
"version": {
@ -82,6 +90,11 @@
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:4151",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:4151"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-5037",
"refsource": "MISC",