diff --git a/2024/3xxx/CVE-2024-3056.json b/2024/3xxx/CVE-2024-3056.json index b9ca92e0025..eb69820bbb3 100644 --- a/2024/3xxx/CVE-2024-3056.json +++ b/2024/3xxx/CVE-2024-3056.json @@ -45,6 +45,12 @@ "defaultStatus": "unknown" } }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "unknown" + } + }, { "version_value": "not down converted", "x_cve_json_5_version_data": { @@ -64,6 +70,18 @@ "defaultStatus": "unaffected" } }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + }, { "version_value": "not down converted", "x_cve_json_5_version_data": { @@ -77,6 +95,18 @@ "product_name": "Red Hat Enterprise Linux 9", "version": { "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + }, { "version_value": "not down converted", "x_cve_json_5_version_data": { @@ -144,14 +174,14 @@ "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", - "baseScore": 4.8, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:H", "version": "3.1" } ]