diff --git a/2024/20xxx/CVE-2024-20667.json b/2024/20xxx/CVE-2024-20667.json index 872a509004e..b1ac2264958 100644 --- a/2024/20xxx/CVE-2024-20667.json +++ b/2024/20xxx/CVE-2024-20667.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')", + "cweId": "CWE-77" } ] } diff --git a/2024/20xxx/CVE-2024-20669.json b/2024/20xxx/CVE-2024-20669.json index 17ce1a4267f..5aaeee1a794 100644 --- a/2024/20xxx/CVE-2024-20669.json +++ b/2024/20xxx/CVE-2024-20669.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/20xxx/CVE-2024-20679.json b/2024/20xxx/CVE-2024-20679.json index 114ead6c139..05c7e2b23a4 100644 --- a/2024/20xxx/CVE-2024-20679.json +++ b/2024/20xxx/CVE-2024-20679.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Spoofing" + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" } ] } diff --git a/2024/20xxx/CVE-2024-20684.json b/2024/20xxx/CVE-2024-20684.json index 080258ee6a2..3cfb198725c 100644 --- a/2024/20xxx/CVE-2024-20684.json +++ b/2024/20xxx/CVE-2024-20684.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Denial of Service" + "value": "CWE-20: Improper Input Validation", + "cweId": "CWE-20" } ] } diff --git a/2024/20xxx/CVE-2024-20690.json b/2024/20xxx/CVE-2024-20690.json index 355eaecd375..2abde952d7a 100644 --- a/2024/20xxx/CVE-2024-20690.json +++ b/2024/20xxx/CVE-2024-20690.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Spoofing" + "value": "CWE-310: Cryptographic Issues", + "cweId": "CWE-310" } ] } diff --git a/2024/20xxx/CVE-2024-20691.json b/2024/20xxx/CVE-2024-20691.json index ced90e1445f..03f2de53e5f 100644 --- a/2024/20xxx/CVE-2024-20691.json +++ b/2024/20xxx/CVE-2024-20691.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Information Disclosure" + "value": "CWE-125: Out-of-bounds Read", + "cweId": "CWE-125" } ] } diff --git a/2024/20xxx/CVE-2024-20692.json b/2024/20xxx/CVE-2024-20692.json index c3b6bdd752e..4ef8a7c4b9a 100644 --- a/2024/20xxx/CVE-2024-20692.json +++ b/2024/20xxx/CVE-2024-20692.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Information Disclosure" + "value": "CWE-326: Inadequate Encryption Strength", + "cweId": "CWE-326" } ] } diff --git a/2024/20xxx/CVE-2024-20694.json b/2024/20xxx/CVE-2024-20694.json index e82fd1cbe57..8f43cff5c0a 100644 --- a/2024/20xxx/CVE-2024-20694.json +++ b/2024/20xxx/CVE-2024-20694.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Information Disclosure" + "value": "CWE-908: Use of Uninitialized Resource", + "cweId": "CWE-908" } ] } diff --git a/2024/20xxx/CVE-2024-20695.json b/2024/20xxx/CVE-2024-20695.json index 5864148e7b2..ba52369bdd5 100644 --- a/2024/20xxx/CVE-2024-20695.json +++ b/2024/20xxx/CVE-2024-20695.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Information Disclosure" + "value": "CWE-284: Improper Access Control", + "cweId": "CWE-284" } ] } diff --git a/2024/20xxx/CVE-2024-20696.json b/2024/20xxx/CVE-2024-20696.json index 824c3ab7494..6600d9b7141 100644 --- a/2024/20xxx/CVE-2024-20696.json +++ b/2024/20xxx/CVE-2024-20696.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Windows Libarchive Remote Code Execution Vulnerability" + "value": "Windows libarchive Remote Code Execution Vulnerability" } ] }, @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2024/20xxx/CVE-2024-20697.json b/2024/20xxx/CVE-2024-20697.json index c70ab151166..93c85d622ae 100644 --- a/2024/20xxx/CVE-2024-20697.json +++ b/2024/20xxx/CVE-2024-20697.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Windows Libarchive Remote Code Execution Vulnerability" + "value": "Windows libarchive Remote Code Execution Vulnerability" } ] }, @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2024/20xxx/CVE-2024-20698.json b/2024/20xxx/CVE-2024-20698.json index f399e62ba29..ab5079b5fd9 100644 --- a/2024/20xxx/CVE-2024-20698.json +++ b/2024/20xxx/CVE-2024-20698.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-190: Integer Overflow or Wraparound", + "cweId": "CWE-190" } ] } diff --git a/2024/20xxx/CVE-2024-20700.json b/2024/20xxx/CVE-2024-20700.json index 88daf64f9af..de6a73c0c16 100644 --- a/2024/20xxx/CVE-2024-20700.json +++ b/2024/20xxx/CVE-2024-20700.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "cweId": "CWE-362" } ] } diff --git a/2024/21xxx/CVE-2024-21307.json b/2024/21xxx/CVE-2024-21307.json index 90c5ad2eec2..b59f6e395a6 100644 --- a/2024/21xxx/CVE-2024-21307.json +++ b/2024/21xxx/CVE-2024-21307.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-416: Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2024/21xxx/CVE-2024-21309.json b/2024/21xxx/CVE-2024-21309.json index 7eda3c84454..5b1996432dd 100644 --- a/2024/21xxx/CVE-2024-21309.json +++ b/2024/21xxx/CVE-2024-21309.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-191: Integer Underflow (Wrap or Wraparound)", + "cweId": "CWE-191" } ] } diff --git a/2024/21xxx/CVE-2024-21310.json b/2024/21xxx/CVE-2024-21310.json index 23ff1f96040..0e24fd7b68a 100644 --- a/2024/21xxx/CVE-2024-21310.json +++ b/2024/21xxx/CVE-2024-21310.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-197: Numeric Truncation Error", + "cweId": "CWE-197" } ] } diff --git a/2024/21xxx/CVE-2024-21311.json b/2024/21xxx/CVE-2024-21311.json index fe88396c750..7f13988d4b8 100644 --- a/2024/21xxx/CVE-2024-21311.json +++ b/2024/21xxx/CVE-2024-21311.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Information Disclosure" + "value": "CWE-125: Out-of-bounds Read", + "cweId": "CWE-125" } ] } diff --git a/2024/21xxx/CVE-2024-21312.json b/2024/21xxx/CVE-2024-21312.json index 3ac5778db37..d3c5eea47d3 100644 --- a/2024/21xxx/CVE-2024-21312.json +++ b/2024/21xxx/CVE-2024-21312.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Denial of Service" + "value": "CWE-20: Improper Input Validation", + "cweId": "CWE-20" } ] } diff --git a/2024/21xxx/CVE-2024-21313.json b/2024/21xxx/CVE-2024-21313.json index 7b8416eb92a..13ea003c992 100644 --- a/2024/21xxx/CVE-2024-21313.json +++ b/2024/21xxx/CVE-2024-21313.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Information Disclosure" + "value": "CWE-209: Generation of Error Message Containing Sensitive Information", + "cweId": "CWE-209" } ] } diff --git a/2024/21xxx/CVE-2024-21314.json b/2024/21xxx/CVE-2024-21314.json index c914f587911..a150b9dc09e 100644 --- a/2024/21xxx/CVE-2024-21314.json +++ b/2024/21xxx/CVE-2024-21314.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Information Disclosure" + "value": "CWE-125: Out-of-bounds Read", + "cweId": "CWE-125" } ] } diff --git a/2024/21xxx/CVE-2024-21315.json b/2024/21xxx/CVE-2024-21315.json index 0defee1caf8..bfb397c5a8b 100644 --- a/2024/21xxx/CVE-2024-21315.json +++ b/2024/21xxx/CVE-2024-21315.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-20: Improper Input Validation", + "cweId": "CWE-20" } ] } diff --git a/2024/21xxx/CVE-2024-21316.json b/2024/21xxx/CVE-2024-21316.json index d074f60f173..2af0ec45837 100644 --- a/2024/21xxx/CVE-2024-21316.json +++ b/2024/21xxx/CVE-2024-21316.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Security Feature Bypass" + "value": "CWE-20: Improper Input Validation", + "cweId": "CWE-20" } ] } diff --git a/2024/21xxx/CVE-2024-21318.json b/2024/21xxx/CVE-2024-21318.json index 35fff00f9fb..22c24033361 100644 --- a/2024/21xxx/CVE-2024-21318.json +++ b/2024/21xxx/CVE-2024-21318.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-502: Deserialization of Untrusted Data", + "cweId": "CWE-502" } ] } diff --git a/2024/21xxx/CVE-2024-21319.json b/2024/21xxx/CVE-2024-21319.json index 208fde3b7a3..bc89ef90562 100644 --- a/2024/21xxx/CVE-2024-21319.json +++ b/2024/21xxx/CVE-2024-21319.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Denial of Service" + "value": "CWE-20: Improper Input Validation", + "cweId": "CWE-20" } ] } diff --git a/2024/21xxx/CVE-2024-21320.json b/2024/21xxx/CVE-2024-21320.json index df310d2ee6c..28bd032f285 100644 --- a/2024/21xxx/CVE-2024-21320.json +++ b/2024/21xxx/CVE-2024-21320.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Spoofing" + "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", + "cweId": "CWE-200" } ] } diff --git a/2024/21xxx/CVE-2024-21325.json b/2024/21xxx/CVE-2024-21325.json index f9157a60e49..1ce101f1264 100644 --- a/2024/21xxx/CVE-2024-21325.json +++ b/2024/21xxx/CVE-2024-21325.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-426: Untrusted Search Path", + "cweId": "CWE-426" } ] } diff --git a/2024/21xxx/CVE-2024-21327.json b/2024/21xxx/CVE-2024-21327.json index 5d8d719c560..e4c94b7002c 100644 --- a/2024/21xxx/CVE-2024-21327.json +++ b/2024/21xxx/CVE-2024-21327.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Spoofing" + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" } ] } diff --git a/2024/21xxx/CVE-2024-21328.json b/2024/21xxx/CVE-2024-21328.json index 7f2bbd57153..5c8181bc58c 100644 --- a/2024/21xxx/CVE-2024-21328.json +++ b/2024/21xxx/CVE-2024-21328.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Spoofing" + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" } ] } diff --git a/2024/21xxx/CVE-2024-21329.json b/2024/21xxx/CVE-2024-21329.json index bf329d33878..ab6faf621e3 100644 --- a/2024/21xxx/CVE-2024-21329.json +++ b/2024/21xxx/CVE-2024-21329.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-59: Improper Link Resolution Before File Access ('Link Following')", + "cweId": "CWE-59" } ] } diff --git a/2024/21xxx/CVE-2024-21330.json b/2024/21xxx/CVE-2024-21330.json index a3cd28b62db..25b0c2cbfe8 100644 --- a/2024/21xxx/CVE-2024-21330.json +++ b/2024/21xxx/CVE-2024-21330.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } @@ -106,6 +107,18 @@ ] } }, + { + "product_name": "Azure HDInsight", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.0", + "version_value": "omi-1.8.1-0" + } + ] + } + }, { "product_name": "Open Management Infrastructure", "version": { diff --git a/2024/21xxx/CVE-2024-21334.json b/2024/21xxx/CVE-2024-21334.json index 06c74aa7528..b4fa74a45cd 100644 --- a/2024/21xxx/CVE-2024-21334.json +++ b/2024/21xxx/CVE-2024-21334.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-416: Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2024/21xxx/CVE-2024-21337.json b/2024/21xxx/CVE-2024-21337.json index 976a1f78008..e20bc881e7c 100644 --- a/2024/21xxx/CVE-2024-21337.json +++ b/2024/21xxx/CVE-2024-21337.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2024/21xxx/CVE-2024-21338.json b/2024/21xxx/CVE-2024-21338.json index 31a3c60cc19..199ca771037 100644 --- a/2024/21xxx/CVE-2024-21338.json +++ b/2024/21xxx/CVE-2024-21338.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-822: Untrusted Pointer Dereference", + "cweId": "CWE-822" } ] } diff --git a/2024/21xxx/CVE-2024-21339.json b/2024/21xxx/CVE-2024-21339.json index 3b5e3ed786f..d1e70d39595 100644 --- a/2024/21xxx/CVE-2024-21339.json +++ b/2024/21xxx/CVE-2024-21339.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-416: Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2024/21xxx/CVE-2024-21340.json b/2024/21xxx/CVE-2024-21340.json index 6209dd3903e..24589b35980 100644 --- a/2024/21xxx/CVE-2024-21340.json +++ b/2024/21xxx/CVE-2024-21340.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Information Disclosure" + "value": "CWE-126: Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2024/21xxx/CVE-2024-21341.json b/2024/21xxx/CVE-2024-21341.json index f8fb58f2bf3..8cb0ce23a0f 100644 --- a/2024/21xxx/CVE-2024-21341.json +++ b/2024/21xxx/CVE-2024-21341.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2024/21xxx/CVE-2024-21342.json b/2024/21xxx/CVE-2024-21342.json index a9d600b8f27..7fbea09b497 100644 --- a/2024/21xxx/CVE-2024-21342.json +++ b/2024/21xxx/CVE-2024-21342.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Denial of Service" + "value": "CWE-400: Uncontrolled Resource Consumption", + "cweId": "CWE-400" } ] } diff --git a/2024/21xxx/CVE-2024-21343.json b/2024/21xxx/CVE-2024-21343.json index f15166a0394..860abf836fe 100644 --- a/2024/21xxx/CVE-2024-21343.json +++ b/2024/21xxx/CVE-2024-21343.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Denial of Service" + "value": "CWE-125: Out-of-bounds Read", + "cweId": "CWE-125" } ] } diff --git a/2024/21xxx/CVE-2024-21344.json b/2024/21xxx/CVE-2024-21344.json index 81b3df10f4f..d637e69825a 100644 --- a/2024/21xxx/CVE-2024-21344.json +++ b/2024/21xxx/CVE-2024-21344.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Denial of Service" + "value": "CWE-125: Out-of-bounds Read", + "cweId": "CWE-125" } ] } diff --git a/2024/21xxx/CVE-2024-21345.json b/2024/21xxx/CVE-2024-21345.json index 3da0985c0ee..ef830721cfa 100644 --- a/2024/21xxx/CVE-2024-21345.json +++ b/2024/21xxx/CVE-2024-21345.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2024/21xxx/CVE-2024-21346.json b/2024/21xxx/CVE-2024-21346.json index c6c23405e52..43a65eb1031 100644 --- a/2024/21xxx/CVE-2024-21346.json +++ b/2024/21xxx/CVE-2024-21346.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-822: Untrusted Pointer Dereference", + "cweId": "CWE-822" } ] } diff --git a/2024/21xxx/CVE-2024-21347.json b/2024/21xxx/CVE-2024-21347.json index 0fb172c33a1..98545d94975 100644 --- a/2024/21xxx/CVE-2024-21347.json +++ b/2024/21xxx/CVE-2024-21347.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2024/21xxx/CVE-2024-21348.json b/2024/21xxx/CVE-2024-21348.json index 6c21c80a31a..fe14cc93858 100644 --- a/2024/21xxx/CVE-2024-21348.json +++ b/2024/21xxx/CVE-2024-21348.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Denial of Service" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2024/21xxx/CVE-2024-21349.json b/2024/21xxx/CVE-2024-21349.json index c6f32478b91..07aee17b66e 100644 --- a/2024/21xxx/CVE-2024-21349.json +++ b/2024/21xxx/CVE-2024-21349.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2024/21xxx/CVE-2024-21350.json b/2024/21xxx/CVE-2024-21350.json index f9d137f119b..349eec7b398 100644 --- a/2024/21xxx/CVE-2024-21350.json +++ b/2024/21xxx/CVE-2024-21350.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-190: Integer Overflow or Wraparound", + "cweId": "CWE-190" } ] } diff --git a/2024/21xxx/CVE-2024-21352.json b/2024/21xxx/CVE-2024-21352.json index 56f27ceef9c..1e2c4809b79 100644 --- a/2024/21xxx/CVE-2024-21352.json +++ b/2024/21xxx/CVE-2024-21352.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-197: Numeric Truncation Error", + "cweId": "CWE-197" } ] } diff --git a/2024/21xxx/CVE-2024-21353.json b/2024/21xxx/CVE-2024-21353.json index 755e81e01e7..72290985353 100644 --- a/2024/21xxx/CVE-2024-21353.json +++ b/2024/21xxx/CVE-2024-21353.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2024/21xxx/CVE-2024-21354.json b/2024/21xxx/CVE-2024-21354.json index c701a5c3423..9f18c64d096 100644 --- a/2024/21xxx/CVE-2024-21354.json +++ b/2024/21xxx/CVE-2024-21354.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2024/21xxx/CVE-2024-21355.json b/2024/21xxx/CVE-2024-21355.json index f70513d2584..fdbe8e6140c 100644 --- a/2024/21xxx/CVE-2024-21355.json +++ b/2024/21xxx/CVE-2024-21355.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-591: Sensitive Data Storage in Improperly Locked Memory", + "cweId": "CWE-591" } ] } diff --git a/2024/21xxx/CVE-2024-21356.json b/2024/21xxx/CVE-2024-21356.json index 0c245d74a03..fd835a5e80b 100644 --- a/2024/21xxx/CVE-2024-21356.json +++ b/2024/21xxx/CVE-2024-21356.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Denial of Service" + "value": "CWE-476: NULL Pointer Dereference", + "cweId": "CWE-476" } ] } diff --git a/2024/21xxx/CVE-2024-21357.json b/2024/21xxx/CVE-2024-21357.json index 82099d24fd1..06b7cc715c2 100644 --- a/2024/21xxx/CVE-2024-21357.json +++ b/2024/21xxx/CVE-2024-21357.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')", + "cweId": "CWE-843" } ] } diff --git a/2024/21xxx/CVE-2024-21392.json b/2024/21xxx/CVE-2024-21392.json index 60021d06206..96405695918 100644 --- a/2024/21xxx/CVE-2024-21392.json +++ b/2024/21xxx/CVE-2024-21392.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Denial of Service" + "value": "CWE-400: Uncontrolled Resource Consumption", + "cweId": "CWE-400" } ] } @@ -46,6 +47,29 @@ ] } }, + { + "product_name": "PowerShell 7.3", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "7.3.0", + "version_value": "7.3.12" + } + ] + } + }, + { + "product_name": "PowerShell 7.4", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "N/A" + } + ] + } + }, { "product_name": ".NET 7.0", "version": { diff --git a/2024/21xxx/CVE-2024-21407.json b/2024/21xxx/CVE-2024-21407.json index e95d1fbab62..64ca1be15cc 100644 --- a/2024/21xxx/CVE-2024-21407.json +++ b/2024/21xxx/CVE-2024-21407.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-416: Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2024/21xxx/CVE-2024-21409.json b/2024/21xxx/CVE-2024-21409.json index b9215f45bd9..898fb417e15 100644 --- a/2024/21xxx/CVE-2024-21409.json +++ b/2024/21xxx/CVE-2024-21409.json @@ -83,6 +83,42 @@ ] } }, + { + "product_name": "PowerShell 7.3", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "7.3.0", + "version_value": "7.3.12" + } + ] + } + }, + { + "product_name": "PowerShell 7.4", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "7.4.0", + "version_value": "7.4.2" + } + ] + } + }, + { + "product_name": "PowerShell 7.2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "7.2.0", + "version_value": "7.2.19" + } + ] + } + }, { "product_name": ".NET 6.0", "version": { diff --git a/2024/21xxx/CVE-2024-21418.json b/2024/21xxx/CVE-2024-21418.json index af251c3d31e..2e7a8ea769a 100644 --- a/2024/21xxx/CVE-2024-21418.json +++ b/2024/21xxx/CVE-2024-21418.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-284: Improper Access Control", + "cweId": "CWE-284" } ] } diff --git a/2024/21xxx/CVE-2024-21426.json b/2024/21xxx/CVE-2024-21426.json index fd4d1bf4712..2d4eaa58389 100644 --- a/2024/21xxx/CVE-2024-21426.json +++ b/2024/21xxx/CVE-2024-21426.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-416: Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2024/21xxx/CVE-2024-21427.json b/2024/21xxx/CVE-2024-21427.json index 76830a1deaf..f20aa326c55 100644 --- a/2024/21xxx/CVE-2024-21427.json +++ b/2024/21xxx/CVE-2024-21427.json @@ -35,18 +35,6 @@ "vendor_name": "Microsoft", "product": { "product_data": [ - { - "product_name": "Windows 10 Version 1809", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "10.0.0", - "version_value": "10.0.17763.5576" - } - ] - } - }, { "product_name": "Windows Server 2019", "version": { @@ -54,7 +42,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.17763.5576" + "version_value": "10.0.17763.5696" } ] } @@ -66,7 +54,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.17763.5576" + "version_value": "10.0.17763.5696" } ] } @@ -78,79 +66,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.20348.2340" - } - ] - } - }, - { - "product_name": "Windows 11 version 21H2", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "10.0.0", - "version_value": "10.0.22000.2836" - } - ] - } - }, - { - "product_name": "Windows 10 Version 21H2", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "10.0.0", - "version_value": "10.0.19044.4170" - } - ] - } - }, - { - "product_name": "Windows 11 version 22H2", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "10.0.0", - "version_value": "10.0.22621.3296" - } - ] - } - }, - { - "product_name": "Windows 10 Version 22H2", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "10.0.0", - "version_value": "10.0.19045.4170" - } - ] - } - }, - { - "product_name": "Windows 11 version 22H3", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "10.0.0", - "version_value": "10.0.22631.3296" - } - ] - } - }, - { - "product_name": "Windows 11 Version 23H2", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "10.0.0", - "version_value": "10.0.22631.3296" + "version_value": "10.0.20348.2402" } ] } @@ -162,31 +78,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.25398.763" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1507", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "10.0.0", - "version_value": "10.0.10240.20526" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1607", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "10.0.0", - "version_value": "10.0.14393.6796" + "version_value": "10.0.25398.830" } ] } @@ -198,7 +90,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.14393.6796" + "version_value": "10.0.14393.6897" } ] } @@ -210,31 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.14393.6796" - } - ] - } - }, - { - "product_name": "Windows Server 2012", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "6.2.0", - "version_value": "6.2.9200.24768" - } - ] - } - }, - { - "product_name": "Windows Server 2012 (Server Core installation)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "6.2.0", - "version_value": "6.2.9200.24768" + "version_value": "10.0.14393.6897" } ] } @@ -246,7 +114,7 @@ { "version_affected": "<", "version_name": "6.3.0", - "version_value": "6.3.9600.21871" + "version_value": "6.3.9600.21924" } ] } @@ -258,7 +126,7 @@ { "version_affected": "<", "version_name": "6.3.0", - "version_value": "6.3.9600.21871" + "version_value": "6.3.9600.21924" } ] } diff --git a/2024/21xxx/CVE-2024-21432.json b/2024/21xxx/CVE-2024-21432.json index acf5ee0ce8f..3df014ea170 100644 --- a/2024/21xxx/CVE-2024-21432.json +++ b/2024/21xxx/CVE-2024-21432.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-59: Improper Link Resolution Before File Access ('Link Following')", + "cweId": "CWE-59" } ] } diff --git a/2024/21xxx/CVE-2024-21435.json b/2024/21xxx/CVE-2024-21435.json index d7d76c2cefb..18890fc95ea 100644 --- a/2024/21xxx/CVE-2024-21435.json +++ b/2024/21xxx/CVE-2024-21435.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-426: Untrusted Search Path", + "cweId": "CWE-426" } ] } diff --git a/2024/21xxx/CVE-2024-21436.json b/2024/21xxx/CVE-2024-21436.json index 3bf9dea089c..cbc75af2ca2 100644 --- a/2024/21xxx/CVE-2024-21436.json +++ b/2024/21xxx/CVE-2024-21436.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-284: Improper Access Control", + "cweId": "CWE-284" } ] } diff --git a/2024/21xxx/CVE-2024-21440.json b/2024/21xxx/CVE-2024-21440.json index 35e4e3fc688..4ef33b9b427 100644 --- a/2024/21xxx/CVE-2024-21440.json +++ b/2024/21xxx/CVE-2024-21440.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-197: Numeric Truncation Error", + "cweId": "CWE-197" } ] } diff --git a/2024/21xxx/CVE-2024-21444.json b/2024/21xxx/CVE-2024-21444.json index 2ef71061ce0..8cc234e4ae6 100644 --- a/2024/21xxx/CVE-2024-21444.json +++ b/2024/21xxx/CVE-2024-21444.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-190: Integer Overflow or Wraparound", + "cweId": "CWE-190" } ] } diff --git a/2024/21xxx/CVE-2024-21448.json b/2024/21xxx/CVE-2024-21448.json index 5e5e2c2db7e..8e580da3ee3 100644 --- a/2024/21xxx/CVE-2024-21448.json +++ b/2024/21xxx/CVE-2024-21448.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Information Disclosure" + "value": "CWE-20: Improper Input Validation", + "cweId": "CWE-20" } ] } diff --git a/2024/26xxx/CVE-2024-26158.json b/2024/26xxx/CVE-2024-26158.json index 3adb6be02fb..d507d14970b 100644 --- a/2024/26xxx/CVE-2024-26158.json +++ b/2024/26xxx/CVE-2024-26158.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/26xxx/CVE-2024-26169.json b/2024/26xxx/CVE-2024-26169.json index d66ed5cc46f..ee4bae28898 100644 --- a/2024/26xxx/CVE-2024-26169.json +++ b/2024/26xxx/CVE-2024-26169.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-269: Improper Privilege Management", + "cweId": "CWE-269" } ] } diff --git a/2024/26xxx/CVE-2024-26170.json b/2024/26xxx/CVE-2024-26170.json index 58a9491b03b..5149995fa36 100644 --- a/2024/26xxx/CVE-2024-26170.json +++ b/2024/26xxx/CVE-2024-26170.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-20: Improper Input Validation", + "cweId": "CWE-20" } ] } diff --git a/2024/26xxx/CVE-2024-26172.json b/2024/26xxx/CVE-2024-26172.json index a89347d8970..c8162f675fb 100644 --- a/2024/26xxx/CVE-2024-26172.json +++ b/2024/26xxx/CVE-2024-26172.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/26xxx/CVE-2024-26179.json b/2024/26xxx/CVE-2024-26179.json index d76a2873294..4ce12bfa929 100644 --- a/2024/26xxx/CVE-2024-26179.json +++ b/2024/26xxx/CVE-2024-26179.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/26xxx/CVE-2024-26185.json b/2024/26xxx/CVE-2024-26185.json index 164e526fb21..32f65c1a550 100644 --- a/2024/26xxx/CVE-2024-26185.json +++ b/2024/26xxx/CVE-2024-26185.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Tampering" + "value": "CWE-73: External Control of File Name or Path", + "cweId": "CWE-73" } ] } diff --git a/2024/26xxx/CVE-2024-26190.json b/2024/26xxx/CVE-2024-26190.json index 919c47b9b46..3f1cc2e0a33 100644 --- a/2024/26xxx/CVE-2024-26190.json +++ b/2024/26xxx/CVE-2024-26190.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Denial of Service" + "value": "CWE-400: Uncontrolled Resource Consumption", + "cweId": "CWE-400" } ] } @@ -118,6 +119,30 @@ ] } }, + { + "product_name": "PowerShell 7.3", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "7.3.0", + "version_value": "7.3.12" + } + ] + } + }, + { + "product_name": "PowerShell 7.4", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "7.4.0", + "version_value": "7.4.2" + } + ] + } + }, { "product_name": "Microsoft Visual Studio 2022 version 17.4", "version": { diff --git a/2024/26xxx/CVE-2024-26198.json b/2024/26xxx/CVE-2024-26198.json index d483ec8dc5e..879adb4e8bc 100644 --- a/2024/26xxx/CVE-2024-26198.json +++ b/2024/26xxx/CVE-2024-26198.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-426: Untrusted Search Path", + "cweId": "CWE-426" } ] } @@ -41,7 +42,7 @@ { "version_affected": "<", "version_name": "15.02.0", - "version_value": "15.02.1544.009" + "version_value": "15.02.1258.034" } ] } @@ -53,7 +54,7 @@ { "version_affected": "<", "version_name": "15.02.0", - "version_value": "15.02.1258.032" + "version_value": "15.02.1544.011" } ] } @@ -65,7 +66,7 @@ { "version_affected": "<", "version_name": "15.01.0", - "version_value": "15.01.2507.037" + "version_value": "15.01.2507.039" } ] } diff --git a/2024/26xxx/CVE-2024-26199.json b/2024/26xxx/CVE-2024-26199.json index ecee19a0a09..2cc919c6f76 100644 --- a/2024/26xxx/CVE-2024-26199.json +++ b/2024/26xxx/CVE-2024-26199.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-59: Improper Link Resolution Before File Access ('Link Following')", + "cweId": "CWE-59" } ] } diff --git a/2024/26xxx/CVE-2024-26200.json b/2024/26xxx/CVE-2024-26200.json index 8c63944b653..cb6030e3b62 100644 --- a/2024/26xxx/CVE-2024-26200.json +++ b/2024/26xxx/CVE-2024-26200.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/26xxx/CVE-2024-26205.json b/2024/26xxx/CVE-2024-26205.json index 6d5c22f4cc5..2ba0d4a23e4 100644 --- a/2024/26xxx/CVE-2024-26205.json +++ b/2024/26xxx/CVE-2024-26205.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/26xxx/CVE-2024-26232.json b/2024/26xxx/CVE-2024-26232.json index d79143cbc48..84a07d7c589 100644 --- a/2024/26xxx/CVE-2024-26232.json +++ b/2024/26xxx/CVE-2024-26232.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22631.3447" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/26xxx/CVE-2024-26250.json b/2024/26xxx/CVE-2024-26250.json index 2e00a2ad0ff..48194062694 100644 --- a/2024/26xxx/CVE-2024-26250.json +++ b/2024/26xxx/CVE-2024-26250.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/26xxx/CVE-2024-26252.json b/2024/26xxx/CVE-2024-26252.json index 5f63905714e..b8478b383e6 100644 --- a/2024/26xxx/CVE-2024-26252.json +++ b/2024/26xxx/CVE-2024-26252.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/26xxx/CVE-2024-26253.json b/2024/26xxx/CVE-2024-26253.json index a89bd8f2d75..e0aa1824aa8 100644 --- a/2024/26xxx/CVE-2024-26253.json +++ b/2024/26xxx/CVE-2024-26253.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/26xxx/CVE-2024-26254.json b/2024/26xxx/CVE-2024-26254.json index 1133d50d495..643cfe190f1 100644 --- a/2024/26xxx/CVE-2024-26254.json +++ b/2024/26xxx/CVE-2024-26254.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/26xxx/CVE-2024-26255.json b/2024/26xxx/CVE-2024-26255.json index ffc97f1a2bc..993658e7328 100644 --- a/2024/26xxx/CVE-2024-26255.json +++ b/2024/26xxx/CVE-2024-26255.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/26xxx/CVE-2024-26256.json b/2024/26xxx/CVE-2024-26256.json index 2a42a2b67b4..26fd5d18c27 100644 --- a/2024/26xxx/CVE-2024-26256.json +++ b/2024/26xxx/CVE-2024-26256.json @@ -42,7 +42,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/28xxx/CVE-2024-28896.json b/2024/28xxx/CVE-2024-28896.json index c6d0d011744..cae3a224af7 100644 --- a/2024/28xxx/CVE-2024-28896.json +++ b/2024/28xxx/CVE-2024-28896.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/28xxx/CVE-2024-28898.json b/2024/28xxx/CVE-2024-28898.json index a01bad148d9..a04910ee2e5 100644 --- a/2024/28xxx/CVE-2024-28898.json +++ b/2024/28xxx/CVE-2024-28898.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/28xxx/CVE-2024-28901.json b/2024/28xxx/CVE-2024-28901.json index f495347656d..a81f1bc592e 100644 --- a/2024/28xxx/CVE-2024-28901.json +++ b/2024/28xxx/CVE-2024-28901.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/28xxx/CVE-2024-28902.json b/2024/28xxx/CVE-2024-28902.json index 4d51420e6e7..0625c654c3c 100644 --- a/2024/28xxx/CVE-2024-28902.json +++ b/2024/28xxx/CVE-2024-28902.json @@ -42,7 +42,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.17763.5696" + "version_value": "10.0.17763.5820" } ] } @@ -54,7 +54,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.17763.5696" + "version_value": "10.0.17763.5820" } ] } @@ -66,7 +66,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.17763.5696" + "version_value": "10.0.17763.5820" } ] } @@ -78,7 +78,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.20348.2402" + "version_value": "10.0.20348.2461" } ] } @@ -102,7 +102,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19044.4291" + "version_value": "10.0.19044.4412" } ] } @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3593" } ] } @@ -126,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.19045.4291" + "version_value": "10.0.19045.4412" } ] } @@ -138,7 +138,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22631.3447" + "version_value": "10.0.22631.3593" } ] } @@ -150,7 +150,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22631.3447" + "version_value": "10.0.22631.3593" } ] } @@ -162,7 +162,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.25398.830" + "version_value": "10.0.25398.887" } ] } @@ -174,7 +174,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.10240.20596" + "version_value": "10.0.10240.20651" } ] } @@ -186,7 +186,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.14393.6897" + "version_value": "10.0.14393.6981" } ] } @@ -198,7 +198,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.14393.6897" + "version_value": "10.0.14393.6981" } ] } @@ -210,7 +210,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.14393.6897" + "version_value": "10.0.14393.6981" } ] } @@ -222,7 +222,7 @@ { "version_affected": "<", "version_name": "6.3.0", - "version_value": "6.3.9600.21924" + "version_value": "6.3.9600.21972" } ] } @@ -234,7 +234,7 @@ { "version_affected": "<", "version_name": "6.3.0", - "version_value": "6.3.9600.21924" + "version_value": "6.3.9600.21972" } ] } diff --git a/2024/28xxx/CVE-2024-28903.json b/2024/28xxx/CVE-2024-28903.json index 9fb9e23e471..1f683c43224 100644 --- a/2024/28xxx/CVE-2024-28903.json +++ b/2024/28xxx/CVE-2024-28903.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/28xxx/CVE-2024-28919.json b/2024/28xxx/CVE-2024-28919.json index 79fe9936644..82502eedf61 100644 --- a/2024/28xxx/CVE-2024-28919.json +++ b/2024/28xxx/CVE-2024-28919.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/28xxx/CVE-2024-28920.json b/2024/28xxx/CVE-2024-28920.json index 26169d4e0b8..f587967122e 100644 --- a/2024/28xxx/CVE-2024-28920.json +++ b/2024/28xxx/CVE-2024-28920.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/28xxx/CVE-2024-28921.json b/2024/28xxx/CVE-2024-28921.json index f18777c1a4b..ec4f59117d2 100644 --- a/2024/28xxx/CVE-2024-28921.json +++ b/2024/28xxx/CVE-2024-28921.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/28xxx/CVE-2024-28922.json b/2024/28xxx/CVE-2024-28922.json index a62d6ffd9b0..0678e49b55e 100644 --- a/2024/28xxx/CVE-2024-28922.json +++ b/2024/28xxx/CVE-2024-28922.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/28xxx/CVE-2024-28923.json b/2024/28xxx/CVE-2024-28923.json index de393d4d062..21f2fc5d8f2 100644 --- a/2024/28xxx/CVE-2024-28923.json +++ b/2024/28xxx/CVE-2024-28923.json @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.3435" + "version_value": "10.0.22621.3447" } ] } diff --git a/2024/29xxx/CVE-2024-29049.json b/2024/29xxx/CVE-2024-29049.json index dd5f7cb5b9c..573a24e0cae 100644 --- a/2024/29xxx/CVE-2024-29049.json +++ b/2024/29xxx/CVE-2024-29049.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Spoofing" + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" } ] } diff --git a/2024/29xxx/CVE-2024-29059.json b/2024/29xxx/CVE-2024-29059.json index ef8d89a2d87..d164fa88fe8 100644 --- a/2024/29xxx/CVE-2024-29059.json +++ b/2024/29xxx/CVE-2024-29059.json @@ -42,7 +42,7 @@ { "version_affected": "<", "version_name": "4.8.0", - "version_value": "4.8.4682.0" + "version_value": "4.8.04690.02" } ] } @@ -54,7 +54,7 @@ { "version_affected": "<", "version_name": "4.8.0", - "version_value": "4.8.4682.0" + "version_value": "4.8.04690.02" } ] } @@ -66,19 +66,7 @@ { "version_affected": "<", "version_name": "4.7.0", - "version_value": "4.7.4076.0" - } - ] - } - }, - { - "product_name": "Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "3.0.0.0", - "version_value": "10.0.14393.6614" + "version_value": "4.7.04081.03" } ] } @@ -90,7 +78,7 @@ { "version_affected": "<", "version_name": "4.7.0", - "version_value": "4.7.4076.0" + "version_value": "4.7.04081.03" } ] } @@ -102,7 +90,7 @@ { "version_affected": "<", "version_name": "4.8.1", - "version_value": "4.8.9206.0" + "version_value": "4.8.09214.01" } ] } @@ -114,7 +102,7 @@ { "version_affected": "<", "version_name": "4.7.0", - "version_value": "4.7.4076.0" + "version_value": "4.7.04081.03" } ] } @@ -138,7 +126,7 @@ { "version_affected": "<", "version_name": "2.0.0", - "version_value": "3.0.50727.8975" + "version_value": "3.0.50727.8976" } ] } @@ -150,7 +138,7 @@ { "version_affected": "<", "version_name": "3.0.0", - "version_value": "3.0.50727.8975" + "version_value": "3.0.50727.8976" } ] } @@ -162,7 +150,7 @@ { "version_affected": "<", "version_name": "3.5.0", - "version_value": "3.0.50727.8975" + "version_value": "3.0.50727.8976" } ] } @@ -174,7 +162,7 @@ { "version_affected": "<", "version_name": "3.5.0", - "version_value": "3.0.50727.8975" + "version_value": "3.0.30729.8959" } ] } diff --git a/2024/29xxx/CVE-2024-29981.json b/2024/29xxx/CVE-2024-29981.json index 0dbbe1c9030..13ae3392a60 100644 --- a/2024/29xxx/CVE-2024-29981.json +++ b/2024/29xxx/CVE-2024-29981.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Spoofing" + "value": "CWE-1021: Improper Restriction of Rendered UI Layers or Frames", + "cweId": "CWE-1021" } ] } diff --git a/2024/36xxx/CVE-2024-36473.json b/2024/36xxx/CVE-2024-36473.json new file mode 100644 index 00000000000..e879da45ece --- /dev/null +++ b/2024/36xxx/CVE-2024-36473.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36473", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/5xxx/CVE-2024-5437.json b/2024/5xxx/CVE-2024-5437.json index 967b8477123..653b40349d2 100644 --- a/2024/5xxx/CVE-2024-5437.json +++ b/2024/5xxx/CVE-2024-5437.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-5437", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in SourceCodester Simple Online Bidding System 1.0. It has been classified as problematic. Affected is the function save_category of the file /admin/index.php?page=categories. The manipulation of the argument name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-266442 is the identifier assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "Es wurde eine problematische Schwachstelle in SourceCodester Simple Online Bidding System 1.0 ausgemacht. Es geht dabei um die Funktion save_category der Datei /admin/index.php?page=categories. Dank der Manipulation des Arguments name mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross Site Scripting", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SourceCodester", + "product": { + "product_data": [ + { + "product_name": "Simple Online Bidding System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.266442", + "refsource": "MISC", + "name": "https://vuldb.com/?id.266442" + }, + { + "url": "https://vuldb.com/?ctiid.266442", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.266442" + }, + { + "url": "https://vuldb.com/?submit.345066", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.345066" + }, + { + "url": "https://github.com/pijiawei/CVE/blob/pijiawei-photo/SourceCodester%20Simple%20Online%20Bidding%20System%20XSS.md", + "refsource": "MISC", + "name": "https://github.com/pijiawei/CVE/blob/pijiawei-photo/SourceCodester%20Simple%20Online%20Bidding%20System%20XSS.md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "pijiawei (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 3.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 3.5, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N" } ] }