diff --git a/2024/1xxx/CVE-2024-1394.json b/2024/1xxx/CVE-2024-1394.json index 3a6f0db5211..295f3df1c87 100644 --- a/2024/1xxx/CVE-2024-1394.json +++ b/2024/1xxx/CVE-2024-1394.json @@ -531,7 +531,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.2.0-7.2.rhaos4.12.el9", + "version": "3:4.4.1-2.1.rhaos4.12.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -580,7 +580,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "1:1.29.1-2.2.rhaos4.13.el9", + "version": "1:1.29.1-2.2.rhaos4.13.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -650,7 +650,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.13.0-202404020737.p0.gd192e90.assembly.stream.el8", + "version": "0:4.13.0-202404020737.p0.gd192e90.assembly.stream.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -755,7 +755,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.27.0-3.1.el9", + "version": "0:1.27.0-3.1.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -811,7 +811,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-11.3.rhaos4.14.el9", + "version": "3:4.4.1-11.3.rhaos4.14.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -839,7 +839,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "1:1.29.1-10.4.rhaos4.14.el8", + "version": "1:1.29.1-10.4.rhaos4.14.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -895,7 +895,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.27.4-7.2.rhaos4.14.git082c52f.el9", + "version": "0:1.27.4-7.2.rhaos4.14.git082c52f.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -965,7 +965,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.14.0-202404151639.p0.g81558cc.assembly.stream.el8", + "version": "0:4.14.0-202404151639.p0.g81558cc.assembly.stream.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1007,7 +1007,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.14.0-202404151639.p0.g607e2dd.assembly.stream.el8", + "version": "0:4.14.0-202404151639.p0.g607e2dd.assembly.stream.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1021,7 +1021,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-11.4.rhaos4.14.el8", + "version": "3:4.4.1-11.4.rhaos4.14.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1035,7 +1035,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "4:1.1.12-1.2.rhaos4.14.el9", + "version": "4:1.1.12-1.2.rhaos4.14.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1084,7 +1084,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "1:1.29.1-20.3.rhaos4.15.el9", + "version": "1:1.29.1-20.3.rhaos4.15.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1196,7 +1196,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-21.1.rhaos4.15.el8", + "version": "3:4.4.1-21.1.rhaos4.15.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1210,7 +1210,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "4:1.1.12-1.1.rhaos4.15.el8", + "version": "4:1.1.12-1.1.rhaos4.15.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1224,7 +1224,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "2:1.11.2-21.2.rhaos4.15.el9", + "version": "2:1.11.2-21.2.rhaos4.15.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" diff --git a/2024/27xxx/CVE-2024-27410.json b/2024/27xxx/CVE-2024-27410.json index 285ad6c3ab0..ac41a49eb15 100644 --- a/2024/27xxx/CVE-2024-27410.json +++ b/2024/27xxx/CVE-2024-27410.json @@ -40,7 +40,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "29cbe68c516a", + "version_name": "7b0a0e3c3a88", "version_value": "d38d31bbbb9d" }, { @@ -48,12 +48,12 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "2.6.38", + "version": "6.0", "status": "affected" }, { "version": "0", - "lessThan": "2.6.38", + "lessThan": "6.0", "status": "unaffected", "versionType": "custom" }, diff --git a/2024/4xxx/CVE-2024-4067.json b/2024/4xxx/CVE-2024-4067.json index c5109ea2e4e..950d792bc82 100644 --- a/2024/4xxx/CVE-2024-4067.json +++ b/2024/4xxx/CVE-2024-4067.json @@ -40,18 +40,9 @@ "version": { "version_data": [ { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "versions": [ - { - "lessThanOrEqual": "4.05", - "status": "unknown", - "version": "0", - "versionType": "git" - } - ], - "defaultStatus": "unaffected" - } + "version_affected": "<=", + "version_name": "0", + "version_value": "4.05" } ] } diff --git a/2024/4xxx/CVE-2024-4068.json b/2024/4xxx/CVE-2024-4068.json index 82be33459eb..9056f2db04e 100644 --- a/2024/4xxx/CVE-2024-4068.json +++ b/2024/4xxx/CVE-2024-4068.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "The NPM package `braces` fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. In `lib/parse.js,` if a malicious user sends \"imbalanced braces\" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.\n" + "value": "The NPM package `braces`, versions prior to 3.0.3, fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. In `lib/parse.js,` if a malicious user sends \"imbalanced braces\" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash." } ] }, @@ -40,9 +40,24 @@ "version": { "version_data": [ { - "version_affected": "<=", - "version_name": "0", - "version_value": "3.0.2" + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "3.0.3", + "status": "unaffected" + } + ], + "lessThanOrEqual": "3.0.2", + "status": "affected", + "version": "0", + "versionType": "git" + } + ], + "defaultStatus": "unknown" + } } ] } @@ -55,11 +70,6 @@ }, "references": { "reference_data": [ - { - "url": "https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308", - "refsource": "MISC", - "name": "https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308" - }, { "url": "https://github.com/micromatch/braces/issues/35", "refsource": "MISC", @@ -69,6 +79,21 @@ "url": "https://devhub.checkmarx.com/cve-details/CVE-2024-4068/", "refsource": "MISC", "name": "https://devhub.checkmarx.com/cve-details/CVE-2024-4068/" + }, + { + "url": "https://github.com/micromatch/braces/pull/37", + "refsource": "MISC", + "name": "https://github.com/micromatch/braces/pull/37" + }, + { + "url": "https://github.com/micromatch/braces/pull/40", + "refsource": "MISC", + "name": "https://github.com/micromatch/braces/pull/40" + }, + { + "url": "https://github.com/micromatch/braces/commit/415d660c3002d1ab7e63dbf490c9851da80596ff", + "refsource": "MISC", + "name": "https://github.com/micromatch/braces/commit/415d660c3002d1ab7e63dbf490c9851da80596ff" } ] }, @@ -78,6 +103,19 @@ "source": { "discovery": "UNKNOWN" }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to version 3.0.3 to mitigate the issue." + } + ], + "value": "Update to version\u00a03.0.3 to mitigate the issue." + } + ], "credits": [ { "lang": "en", diff --git a/2024/4xxx/CVE-2024-4261.json b/2024/4xxx/CVE-2024-4261.json index e3c369da57a..0cd463b43e3 100644 --- a/2024/4xxx/CVE-2024-4261.json +++ b/2024/4xxx/CVE-2024-4261.json @@ -1,17 +1,84 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-4261", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Responsive Contact Form Builder & Lead Generation Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.9.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with subscriber-level access and above, to execute arbitrary shortcodes." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-94 Improper Control of Generation of Code ('Code Injection')" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "themehunk", + "product": { + "product_data": [ + { + "product_name": "Responsive Contact Form Builder & Lead Generation Plugin", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "1.9.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/858d8641-7455-47c2-9639-480ce4ec3540?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/858d8641-7455-47c2-9639-480ce4ec3540?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/lead-form-builder/trunk/block/app.php#L24", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/lead-form-builder/trunk/block/app.php#L24" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Matthew Rollings" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" } ] }