From 3e7778a0ca159a51d99da847e95cf2adfd6c0f08 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 13 Jun 2024 14:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/47xxx/CVE-2021-47543.json | 100 +-------------------------- 2021/47xxx/CVE-2021-47545.json | 122 +-------------------------------- 2024/22xxx/CVE-2024-22333.json | 99 ++++++++++++++++++++++++-- 2024/25xxx/CVE-2024-25052.json | 83 ++++++++++++++++++++-- 2024/32xxx/CVE-2024-32860.json | 85 +++++++++++++++++++++-- 2024/36xxx/CVE-2024-36647.json | 56 +++++++++++++-- 2024/36xxx/CVE-2024-36966.json | 12 +++- 2024/37xxx/CVE-2024-37308.json | 81 ++++++++++++++++++++-- 2024/37xxx/CVE-2024-37309.json | 86 +++++++++++++++++++++-- 2024/5xxx/CVE-2024-5656.json | 71 +------------------ 2024/5xxx/CVE-2024-5970.json | 18 +++++ 2024/5xxx/CVE-2024-5971.json | 18 +++++ 12 files changed, 517 insertions(+), 314 deletions(-) create mode 100644 2024/5xxx/CVE-2024-5970.json create mode 100644 2024/5xxx/CVE-2024-5971.json diff --git a/2021/47xxx/CVE-2021-47543.json b/2021/47xxx/CVE-2021-47543.json index f42201b5e29..7719b545831 100644 --- a/2021/47xxx/CVE-2021-47543.json +++ b/2021/47xxx/CVE-2021-47543.json @@ -5,110 +5,14 @@ "CVE_data_meta": { "ID": "CVE-2021-47543", "ASSIGNER": "cve@kernel.org", - "STATE": "PUBLIC" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf report: Fix memory leaks around perf_tip()\n\nperf_tip() may allocate memory or use a literal, this means memory\nwasn't freed if allocated. Change the API so that literals aren't used.\n\nAt the same time add missing frees for system_path. These issues were\nspotted using leak sanitizer." + "value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Linux", - "product": { - "product_data": [ - { - "product_name": "Linux", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "1da177e4c3f4", - "version_value": "df5990db088d" - }, - { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "versions": [ - { - "version": "5.4.164", - "lessThanOrEqual": "5.4.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "5.10.84", - "lessThanOrEqual": "5.10.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "5.15.7", - "lessThanOrEqual": "5.15.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "5.16", - "lessThanOrEqual": "*", - "status": "unaffected", - "versionType": "original_commit_for_fix" - } - ], - "defaultStatus": "affected" - } - } - ] - } - } - ] - } - } - ] - } - }, - "references": { - "reference_data": [ - { - "url": "https://git.kernel.org/stable/c/df5990db088d4c7fea9a2f9b8195a7859e1768c4", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/df5990db088d4c7fea9a2f9b8195a7859e1768c4" - }, - { - "url": "https://git.kernel.org/stable/c/ff061b5bda73c4f785b4703eeb0848fd99e5608a", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/ff061b5bda73c4f785b4703eeb0848fd99e5608a" - }, - { - "url": "https://git.kernel.org/stable/c/71e284dcebecb9fd204ff11097469cc547723ad1", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/71e284dcebecb9fd204ff11097469cc547723ad1" - }, - { - "url": "https://git.kernel.org/stable/c/d9fc706108c15f8bc2d4ccccf8e50f74830fabd9", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/d9fc706108c15f8bc2d4ccccf8e50f74830fabd9" - } - ] - }, - "generator": { - "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47545.json b/2021/47xxx/CVE-2021-47545.json index 65d452850e0..15718bcb51d 100644 --- a/2021/47xxx/CVE-2021-47545.json +++ b/2021/47xxx/CVE-2021-47545.json @@ -5,132 +5,14 @@ "CVE_data_meta": { "ID": "CVE-2021-47545", "ASSIGNER": "cve@kernel.org", - "STATE": "PUBLIC" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf hist: Fix memory leak of a perf_hpp_fmt\n\nperf_hpp__column_unregister() removes an entry from a list but doesn't\nfree the memory causing a memory leak spotted by leak sanitizer.\n\nAdd the free while at the same time reducing the scope of the function\nto static." + "value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Linux", - "product": { - "product_data": [ - { - "product_name": "Linux", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "1da177e4c3f4", - "version_value": "c5c8a26c0dc6" - }, - { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "versions": [ - { - "version": "4.14.257", - "lessThanOrEqual": "4.14.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "4.19.220", - "lessThanOrEqual": "4.19.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "5.4.164", - "lessThanOrEqual": "5.4.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "5.10.84", - "lessThanOrEqual": "5.10.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "5.15.7", - "lessThanOrEqual": "5.15.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "5.16", - "lessThanOrEqual": "*", - "status": "unaffected", - "versionType": "original_commit_for_fix" - } - ], - "defaultStatus": "affected" - } - } - ] - } - } - ] - } - } - ] - } - }, - "references": { - "reference_data": [ - { - "url": "https://git.kernel.org/stable/c/c5c8a26c0dc69a400553245e92d741fe55f91095", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/c5c8a26c0dc69a400553245e92d741fe55f91095" - }, - { - "url": "https://git.kernel.org/stable/c/24a139c105fa0f7f99888cf328bf6a02fc841675", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/24a139c105fa0f7f99888cf328bf6a02fc841675" - }, - { - "url": "https://git.kernel.org/stable/c/b380d09e44e8479e71e3ae8446b515a5b3166244", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/b380d09e44e8479e71e3ae8446b515a5b3166244" - }, - { - "url": "https://git.kernel.org/stable/c/a4c17ebdd6249cb4e061358d3693383f6628e069", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/a4c17ebdd6249cb4e061358d3693383f6628e069" - }, - { - "url": "https://git.kernel.org/stable/c/5b5c6f57a1f81499db4c8ea597898cb1b87de0b6", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/5b5c6f57a1f81499db4c8ea597898cb1b87de0b6" - }, - { - "url": "https://git.kernel.org/stable/c/0ca1f534a776cc7d42f2c33da4732b74ec2790cd", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/0ca1f534a776cc7d42f2c33da4732b74ec2790cd" - } - ] - }, - "generator": { - "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2024/22xxx/CVE-2024-22333.json b/2024/22xxx/CVE-2024-22333.json index 9554f0fe66e..1456e67a8f9 100644 --- a/2024/22xxx/CVE-2024-22333.json +++ b/2024/22xxx/CVE-2024-22333.json @@ -1,17 +1,108 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-22333", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Maximo Asset Management 7.6.1.3 and IBM Maximo Application Suite 8.10 and 8.11 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 279973." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-525 Information Exposure Through Browser Caching", + "cweId": "CWE-525" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Maximo Application Suite", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "8.10, 8.11" + } + ] + } + }, + { + "product_name": "Maximo Asset Management", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.6.1.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/7157256", + "refsource": "MISC", + "name": "https://www.ibm.com/support/pages/node/7157256" + }, + { + "url": "https://www.ibm.com/support/pages/node/7157257", + "refsource": "MISC", + "name": "https://www.ibm.com/support/pages/node/7157257" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279973", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279973" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/25xxx/CVE-2024-25052.json b/2024/25xxx/CVE-2024-25052.json index 8bf3f348c91..2842dff444c 100644 --- a/2024/25xxx/CVE-2024-25052.json +++ b/2024/25xxx/CVE-2024-25052.json @@ -1,17 +1,92 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-25052", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Jazz Reporting Service 7.0.3 stores user credentials in plain clear text which can be read by an admin user. IBM X-Force ID: 283363." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-256 Plaintext Storage of a Password", + "cweId": "CWE-256" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Jazz Reporting Service", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.0.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://https://www.ibm.com/support/pages/node/7157232", + "refsource": "MISC", + "name": "https://https://www.ibm.com/support/pages/node/7157232" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/283363", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/283363" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/32xxx/CVE-2024-32860.json b/2024/32xxx/CVE-2024-32860.json index 9184c9fb3cf..d82db5d20f8 100644 --- a/2024/32xxx/CVE-2024-32860.json +++ b/2024/32xxx/CVE-2024-32860.json @@ -1,17 +1,94 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-32860", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secure@dell.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20: Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Dell", + "product": { + "product_data": [ + { + "product_name": "CPG BIOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "N/A", + "version_value": "1.0.24" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000223440/dsa-2024-125", + "refsource": "MISC", + "name": "https://www.dell.com/support/kbdoc/en-us/000223440/dsa-2024-125" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Dell Technologies would like to thank Eason for reporting this issue." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/36xxx/CVE-2024-36647.json b/2024/36xxx/CVE-2024-36647.json index 9b01da0fcb7..75ca645372d 100644 --- a/2024/36xxx/CVE-2024-36647.json +++ b/2024/36xxx/CVE-2024-36647.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-36647", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-36647", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A stored cross-site scripting (XSS) vulnerability in Church CRM v5.8.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Family Name parameter under the Register a New Family page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ChurchCRM/CRM/issues/7029", + "refsource": "MISC", + "name": "https://github.com/ChurchCRM/CRM/issues/7029" } ] } diff --git a/2024/36xxx/CVE-2024-36966.json b/2024/36xxx/CVE-2024-36966.json index 8beec65b304..6807613e7fc 100644 --- a/2024/36xxx/CVE-2024-36966.json +++ b/2024/36xxx/CVE-2024-36966.json @@ -40,13 +40,23 @@ "version_data": [ { "version_affected": "<", - "version_name": "1da177e4c3f4", + "version_name": "aca740cecbe5", "version_value": "f9b877a7ee31" }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "versions": [ + { + "version": "6.6", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.6", + "status": "unaffected", + "versionType": "custom" + }, { "version": "6.6.32", "lessThanOrEqual": "6.6.*", diff --git a/2024/37xxx/CVE-2024-37308.json b/2024/37xxx/CVE-2024-37308.json index 443a57c0c6e..9cc547bd58a 100644 --- a/2024/37xxx/CVE-2024-37308.json +++ b/2024/37xxx/CVE-2024-37308.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-37308", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Cooked Pro recipe plugin for WordPress is vulnerable to Persistent Cross-Site Scripting (XSS) via the `_recipe_settings[post_title]` parameter in versions up to, and including, 1.7.15.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses a compromised page. A patch is available at commit 8cf88f334ccbf11134080bbb655c66f1cfe77026 and will be part of version 1.8.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "XjSv", + "product": { + "product_data": [ + { + "product_name": "Cooked", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 1.8.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/XjSv/Cooked/security/advisories/GHSA-9vfv-c966-jwrv", + "refsource": "MISC", + "name": "https://github.com/XjSv/Cooked/security/advisories/GHSA-9vfv-c966-jwrv" + }, + { + "url": "https://github.com/XjSv/Cooked/commit/8cf88f334ccbf11134080bbb655c66f1cfe77026", + "refsource": "MISC", + "name": "https://github.com/XjSv/Cooked/commit/8cf88f334ccbf11134080bbb655c66f1cfe77026" + } + ] + }, + "source": { + "advisory": "GHSA-9vfv-c966-jwrv", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/37xxx/CVE-2024-37309.json b/2024/37xxx/CVE-2024-37309.json index ccb7486b8c9..54d5ec7f3b7 100644 --- a/2024/37xxx/CVE-2024-37309.json +++ b/2024/37xxx/CVE-2024-37309.json @@ -1,17 +1,95 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-37309", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CrateDB is a distributed SQL database. A high-risk vulnerability has been identified in versions prior to 5.7.2 where the TLS endpoint (port 4200) permits client-initiated renegotiation. In this scenario, an attacker can exploit this feature to repeatedly request renegotiation of security parameters during an ongoing TLS session. This flaw could lead to excessive consumption of CPU resources, resulting in potential server overload and service disruption. The vulnerability was confirmed using an openssl client where the command `R` initiates renegotiation, followed by the server confirming with `RENEGOTIATING`. This vulnerability allows an attacker to perform a denial of service attack by exhausting server CPU resources through repeated TLS renegotiations. This impacts the availability of services running on the affected server, posing a significant risk to operational stability and security. TLS 1.3 explicitly forbids renegotiation, since it closes a window of opportunity for an attack. Version 5.7.2 of CrateDB contains the fix for the issue.\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-770: Allocation of Resources Without Limits or Throttling", + "cweId": "CWE-770" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "crate", + "product": { + "product_data": [ + { + "product_name": "crate", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 5.7.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/crate/crate/security/advisories/GHSA-x268-qpg6-w9g2", + "refsource": "MISC", + "name": "https://github.com/crate/crate/security/advisories/GHSA-x268-qpg6-w9g2" + }, + { + "url": "https://github.com/crate/crate/commit/1dde03bdf031a20886065195527e368e4a3218b3", + "refsource": "MISC", + "name": "https://github.com/crate/crate/commit/1dde03bdf031a20886065195527e368e4a3218b3" + }, + { + "url": "https://cratedb.com/docs/crate/reference/en/latest/appendices/release-notes/5.7.2.html", + "refsource": "MISC", + "name": "https://cratedb.com/docs/crate/reference/en/latest/appendices/release-notes/5.7.2.html" + } + ] + }, + "source": { + "advisory": "GHSA-x268-qpg6-w9g2", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" } ] } diff --git a/2024/5xxx/CVE-2024-5656.json b/2024/5xxx/CVE-2024-5656.json index 4c0c039ed5d..87b25bfc6eb 100644 --- a/2024/5xxx/CVE-2024-5656.json +++ b/2024/5xxx/CVE-2024-5656.json @@ -5,80 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2024-5656", "ASSIGNER": "security@wordfence.com", - "STATE": "PUBLIC" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "The Google CSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" - } - ] - } - ] - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "ptz0n", - "product": { - "product_data": [ - { - "product_name": "Google CSE", - "version": { - "version_data": [ - { - "version_affected": "<=", - "version_name": "*", - "version_value": "1.0.7" - } - ] - } - } - ] - } - } - ] - } - }, - "references": { - "reference_data": [ - { - "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/37cf63e3-9301-441d-9852-b2de83078b51?source=cve", - "refsource": "MISC", - "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/37cf63e3-9301-441d-9852-b2de83078b51?source=cve" - }, - { - "url": "https://wpscan.com/vulnerability/adc6ea6d-29d8-4ad0-b0db-2540e8b3f9a9/", - "refsource": "MISC", - "name": "https://wpscan.com/vulnerability/adc6ea6d-29d8-4ad0-b0db-2540e8b3f9a9/" - } - ] - }, - "credits": [ - { - "lang": "en", - "value": "Bob Matyas" - } - ], - "impact": { - "cvss": [ - { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", - "baseScore": 4.4, - "baseSeverity": "MEDIUM" + "value": "** REJECT ** Accidental duplicate assignment of CVE-2024-4755. Please use CVE-2024-4755." } ] } diff --git a/2024/5xxx/CVE-2024-5970.json b/2024/5xxx/CVE-2024-5970.json new file mode 100644 index 00000000000..755b7f38c48 --- /dev/null +++ b/2024/5xxx/CVE-2024-5970.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-5970", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/5xxx/CVE-2024-5971.json b/2024/5xxx/CVE-2024-5971.json new file mode 100644 index 00000000000..514ce41cd5f --- /dev/null +++ b/2024/5xxx/CVE-2024-5971.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-5971", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file