mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-08 14:08:13 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
5ee27a1e34
commit
7f5401cd6e
@ -4,7 +4,7 @@
|
|||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-0521",
|
"ID": "CVE-2024-0521",
|
||||||
"ASSIGNER": "security@huntr.com",
|
"ASSIGNER": "paddle-security@baidu.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-0815",
|
"ID": "CVE-2024-0815",
|
||||||
"ASSIGNER": "security@huntr.com",
|
"ASSIGNER": "paddle-security@baidu.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-0817",
|
"ID": "CVE-2024-0817",
|
||||||
"ASSIGNER": "security@huntr.com",
|
"ASSIGNER": "paddle-security@baidu.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
|
@ -64,6 +64,11 @@
|
|||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVVYSTEVMPYGF6GDSOD44MUXZXAZHOHB/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVVYSTEVMPYGF6GDSOD44MUXZXAZHOHB/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVVYSTEVMPYGF6GDSOD44MUXZXAZHOHB/"
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVVYSTEVMPYGF6GDSOD44MUXZXAZHOHB/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSXNF4RLEFLH35BFUQGYXRRVHHUIVBAE/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSXNF4RLEFLH35BFUQGYXRRVHHUIVBAE/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -127,6 +127,11 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/23"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -128,6 +128,11 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/23"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/23"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/26"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -141,6 +141,11 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/24"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/24"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/26"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -78,6 +78,11 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/23"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -146,6 +146,11 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/24"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/24"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/26"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -146,6 +146,11 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/24"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/24"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/26"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -78,6 +78,11 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/23"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -163,6 +163,11 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/24"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/24"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/26"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -112,6 +112,16 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/23"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/26"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -80,6 +80,11 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/21"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/21"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/26"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -168,6 +168,11 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/24"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/24"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/26"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -139,6 +139,16 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/23"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/26"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -166,6 +166,11 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/23"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/23"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/26"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -78,6 +78,11 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/23"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -78,6 +78,11 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/23"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -78,6 +78,11 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/23"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -78,6 +78,11 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/23"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -95,6 +95,11 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/23"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -168,6 +168,11 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/24"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/24"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/26"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -166,6 +166,11 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/23"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/23"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/26"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -98,6 +98,11 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://seclists.org/fulldisclosure/2024/Mar/24"
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/24"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/26"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -142,6 +142,11 @@
|
|||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVVYSTEVMPYGF6GDSOD44MUXZXAZHOHB/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVVYSTEVMPYGF6GDSOD44MUXZXAZHOHB/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVVYSTEVMPYGF6GDSOD44MUXZXAZHOHB/"
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVVYSTEVMPYGF6GDSOD44MUXZXAZHOHB/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSXNF4RLEFLH35BFUQGYXRRVHHUIVBAE/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSXNF4RLEFLH35BFUQGYXRRVHHUIVBAE/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -61,6 +61,11 @@
|
|||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"name": "FEDORA-2024-34301311f8",
|
"name": "FEDORA-2024-34301311f8",
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WVOY7E2QWQRVXZTJGI7Z4KXGSU6BGEKH/"
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WVOY7E2QWQRVXZTJGI7Z4KXGSU6BGEKH/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"name": "FEDORA-2024-ef8c8a8b37",
|
||||||
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QRV2D4GYUZNZRJHVGFSYSOSZLCETI4E/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -132,7 +132,7 @@
|
|||||||
{
|
{
|
||||||
"version_value": "not down converted",
|
"version_value": "not down converted",
|
||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"defaultStatus": "unknown"
|
"defaultStatus": "affected"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -150,19 +150,19 @@
|
|||||||
{
|
{
|
||||||
"version_value": "not down converted",
|
"version_value": "not down converted",
|
||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"defaultStatus": "unknown"
|
"defaultStatus": "affected"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"version_value": "not down converted",
|
"version_value": "not down converted",
|
||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"defaultStatus": "unknown"
|
"defaultStatus": "affected"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"version_value": "not down converted",
|
"version_value": "not down converted",
|
||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"defaultStatus": "unknown"
|
"defaultStatus": "affected"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
@ -175,7 +175,13 @@
|
|||||||
{
|
{
|
||||||
"version_value": "not down converted",
|
"version_value": "not down converted",
|
||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"defaultStatus": "unknown"
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"defaultStatus": "affected"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -193,31 +199,25 @@
|
|||||||
{
|
{
|
||||||
"version_value": "not down converted",
|
"version_value": "not down converted",
|
||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"defaultStatus": "unknown"
|
"defaultStatus": "affected"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"version_value": "not down converted",
|
"version_value": "not down converted",
|
||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"defaultStatus": "unknown"
|
"defaultStatus": "affected"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"version_value": "not down converted",
|
"version_value": "not down converted",
|
||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"defaultStatus": "unknown"
|
"defaultStatus": "affected"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"version_value": "not down converted",
|
"version_value": "not down converted",
|
||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"defaultStatus": "unknown"
|
"defaultStatus": "affected"
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "unknown"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -1,17 +1,68 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-2400",
|
"ID": "CVE-2024-2400",
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||||
"STATE": "RESERVED"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "Use after free in Performance Manager in Google Chrome prior to 122.0.6261.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Use after free"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Google",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Chrome",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<",
|
||||||
|
"version_name": "122.0.6261.128",
|
||||||
|
"version_value": "122.0.6261.128"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_12.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_12.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://issues.chromium.org/issues/327696052",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://issues.chromium.org/issues/327696052"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,18 +1,70 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-2403",
|
"ID": "CVE-2024-2403",
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "security@devolutions.net",
|
||||||
"STATE": "RESERVED"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "\nImproper cleanup in temporary file handling component in Devolutions Remote Desktop Manager 2024.1.12 and\nearlier on Windows allows an attacker that compromised a user endpoint, under specific circumstances, to access sensitive information via residual files in the temporary directory.\n\n"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Devolutions",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Remote Desktop Manager",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<=",
|
||||||
|
"version_name": "0",
|
||||||
|
"version_value": "2024.1.12"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://devolutions.net/security/advisories/DEVO-2024-0004",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://devolutions.net/security/advisories/DEVO-2024-0004"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"generator": {
|
||||||
|
"engine": "Vulnogram 0.1.0-dev"
|
||||||
|
},
|
||||||
|
"source": {
|
||||||
|
"discovery": "UNKNOWN"
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -68,9 +68,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"url": "https://www.twcert.org.tw/tw/lp-132-1.html",
|
"url": "https://www.twcert.org.tw/tw/cp-132-7696-0951f-1.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://www.twcert.org.tw/tw/lp-132-1.html"
|
"name": "https://www.twcert.org.tw/tw/cp-132-7696-0951f-1.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -1,17 +1,102 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-2413",
|
"ID": "CVE-2024-2413",
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "cve@cert.org.tw",
|
||||||
"STATE": "RESERVED"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "Intumit SmartRobot uses a fixed encryption key for authentication. Remote attackers can use this key to encrypt a string composed of the user's name and timestamp to generate an authentication code. With this authentication code, they can obtain administrator privileges and subsequently execute arbitrary code on the remote server using built-in system functionality."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "CWE-321: Use of Hard-coded Cryptographic Key",
|
||||||
|
"cweId": "CWE-321"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Intumit",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "SmartRobot",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<=",
|
||||||
|
"version_name": "earlier version",
|
||||||
|
"version_value": "v6.1.2-202212tw"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://www.twcert.org.tw/tw/cp-132-7697-ecf10-1.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.twcert.org.tw/tw/cp-132-7697-ecf10-1.html"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"generator": {
|
||||||
|
"engine": "Vulnogram 0.1.0-dev"
|
||||||
|
},
|
||||||
|
"source": {
|
||||||
|
"advisory": "TVN-202403002",
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
},
|
||||||
|
"solution": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"supportingMedia": [
|
||||||
|
{
|
||||||
|
"base64": false,
|
||||||
|
"type": "text/html",
|
||||||
|
"value": "Update to v6.2.0-202303tw or later version or change current encryption key."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"value": "Update to v6.2.0-202303tw or later version or change current encryption key."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,17 +1,104 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-2418",
|
"ID": "CVE-2024-2418",
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "cna@vuldb.com",
|
||||||
"STATE": "RESERVED"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "A vulnerability was found in SourceCodester Best POS Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /view_order.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256705 was assigned to this vulnerability."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "deu",
|
||||||
|
"value": "In SourceCodester Best POS Management System 1.0 wurde eine kritische Schwachstelle ausgemacht. Es geht um eine nicht n\u00e4her bekannte Funktion der Datei /view_order.php. Durch das Beeinflussen des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "CWE-89 SQL Injection",
|
||||||
|
"cweId": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "SourceCodester",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Best POS Management System",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "1.0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.256705",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://vuldb.com/?id.256705"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.256705",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://vuldb.com/?ctiid.256705"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/ycxdzj/CVE_Hunter/blob/main/SQLi-6.md",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://github.com/ycxdzj/CVE_Hunter/blob/main/SQLi-6.md"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "hjhctzz (VulDB User)"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"version": "3.1",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version": "3.0",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version": "2.0",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,17 +1,204 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-2431",
|
"ID": "CVE-2024-2431",
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "psirt@paloaltonetworks.com",
|
||||||
"STATE": "RESERVED"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "An issue in the Palo Alto Networks GlobalProtect app enables a non-privileged user to disable the GlobalProtect app in configurations that allow a user to disable GlobalProtect with a passcode."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "CWE-269 Improper Privilege Management",
|
||||||
|
"cweId": "CWE-269"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Palo Alto Networks",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "GlobalProtect App",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"changes": [
|
||||||
|
{
|
||||||
|
"at": "6.0.4",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"lessThan": "6.0.4",
|
||||||
|
"status": "affected",
|
||||||
|
"version": "6.0",
|
||||||
|
"versionType": "custom"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"changes": [
|
||||||
|
{
|
||||||
|
"at": "5.1.12",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"lessThan": "5.1.12",
|
||||||
|
"status": "affected",
|
||||||
|
"version": "5.1",
|
||||||
|
"versionType": "custom"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"changes": [
|
||||||
|
{
|
||||||
|
"at": "5.2.13",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"lessThan": "5.2.13",
|
||||||
|
"status": "affected",
|
||||||
|
"version": "5.2",
|
||||||
|
"versionType": "custom"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"changes": [
|
||||||
|
{
|
||||||
|
"at": "6.1.1",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"lessThan": "6.1.1",
|
||||||
|
"status": "affected",
|
||||||
|
"version": "6.1",
|
||||||
|
"versionType": "custom"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"status": "unaffected",
|
||||||
|
"version": "6.2"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "unaffected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://security.paloaltonetworks.com/CVE-2024-2431",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://security.paloaltonetworks.com/CVE-2024-2431"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"generator": {
|
||||||
|
"engine": "Vulnogram 0.1.0-dev"
|
||||||
|
},
|
||||||
|
"source": {
|
||||||
|
"defect": [
|
||||||
|
"GPC-15349"
|
||||||
|
],
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
},
|
||||||
|
"configuration": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"supportingMedia": [
|
||||||
|
{
|
||||||
|
"base64": false,
|
||||||
|
"type": "text/html",
|
||||||
|
"value": "This is an issue only if \"Allow User to Disable GlobalProtect App\" is set to \"Allow with Passcode\". You should check this setting in your firewall web interface (Network > GlobalProtect > Portals > (portal-config) > Agent > (agent-config) > App) and take the appropriate actions as needed."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"value": "This is an issue only if \"Allow User to Disable GlobalProtect App\" is set to \"Allow with Passcode\". You should check this setting in your firewall web interface (Network > GlobalProtect > Portals > (portal-config) > Agent > (agent-config) > App) and take the appropriate actions as needed."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"work_around": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"supportingMedia": [
|
||||||
|
{
|
||||||
|
"base64": false,
|
||||||
|
"type": "text/html",
|
||||||
|
"value": "You can mitigate this issue by setting \"Allow User to Disable GlobalProtect App\" to \"Disallow\" or \"Allow with Ticket.\"<br>"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"value": "You can mitigate this issue by setting \"Allow User to Disable GlobalProtect App\" to \"Disallow\" or \"Allow with Ticket.\"\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"exploit": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"supportingMedia": [
|
||||||
|
{
|
||||||
|
"base64": false,
|
||||||
|
"type": "text/html",
|
||||||
|
"value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.<br>"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"solution": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"supportingMedia": [
|
||||||
|
{
|
||||||
|
"base64": false,
|
||||||
|
"type": "text/html",
|
||||||
|
"value": "This issue is fixed in GlobalProtect app 5.1.12, GlobalProtect app 5.2.13, GlobalProtect app 6.0.4, GlobalProtect app 6.1.1, and all later GlobalProtect app versions.<br>"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"value": "This issue is fixed in GlobalProtect app 5.1.12, GlobalProtect app 5.2.13, GlobalProtect app 6.0.4, GlobalProtect app 6.1.1, and all later GlobalProtect app versions.\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Palo Alto Networks thanks AIG Red Team and Stephen Collyer for discovering and reporting this issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,17 +1,174 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-2432",
|
"ID": "CVE-2024-2432",
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "psirt@paloaltonetworks.com",
|
||||||
"STATE": "RESERVED"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "A privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a local user to execute programs with elevated privileges. However, execution requires that the local user is able to successfully exploit a race condition."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "CWE-269 Improper Privilege Management",
|
||||||
|
"cweId": "CWE-269"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Palo Alto Networks",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "GlobalProtect App",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"changes": [
|
||||||
|
{
|
||||||
|
"at": "5.1.12",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"lessThan": "5.1.12",
|
||||||
|
"status": "affected",
|
||||||
|
"version": "5.1",
|
||||||
|
"versionType": "custom"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"changes": [
|
||||||
|
{
|
||||||
|
"at": "6.0.8",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"lessThan": "6.0.8",
|
||||||
|
"status": "affected",
|
||||||
|
"version": "6.0",
|
||||||
|
"versionType": "custom"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"changes": [
|
||||||
|
{
|
||||||
|
"at": "6.1.2",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"lessThan": "6.1.2",
|
||||||
|
"status": "affected",
|
||||||
|
"version": "6.1",
|
||||||
|
"versionType": "custom"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"changes": [
|
||||||
|
{
|
||||||
|
"at": "6.2.1",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"lessThan": "6.2.1",
|
||||||
|
"status": "affected",
|
||||||
|
"version": "6.2",
|
||||||
|
"versionType": "custom"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "unaffected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://security.paloaltonetworks.com/CVE-2024-2432",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://security.paloaltonetworks.com/CVE-2024-2432"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"generator": {
|
||||||
|
"engine": "Vulnogram 0.1.0-dev"
|
||||||
|
},
|
||||||
|
"source": {
|
||||||
|
"defect": [
|
||||||
|
"GPC-18129"
|
||||||
|
],
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
},
|
||||||
|
"exploit": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"supportingMedia": [
|
||||||
|
{
|
||||||
|
"base64": false,
|
||||||
|
"type": "text/html",
|
||||||
|
"value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.<br>"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"solution": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"supportingMedia": [
|
||||||
|
{
|
||||||
|
"base64": false,
|
||||||
|
"type": "text/html",
|
||||||
|
"value": "This issue is fixed in GlobalProtect app 5.1.12, GlobalProtect app 6.0.8, GlobalProtect app 6.1.2, GlobalProtect app 6.2.1, and all later GlobalProtect app versions on Windows.<br>"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"value": "This issue is fixed in GlobalProtect app 5.1.12, GlobalProtect app 6.0.8, GlobalProtect app 6.1.2, GlobalProtect app 6.2.1, and all later GlobalProtect app versions on Windows.\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Palo Alto Networks thanks Erwin Chan for discovering and reporting this issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 4.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,17 +1,242 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-2433",
|
"ID": "CVE-2024-2433",
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "psirt@paloaltonetworks.com",
|
||||||
"STATE": "RESERVED"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "An improper authorization vulnerability in Palo Alto Networks Panorama software enables an authenticated read-only administrator to upload files using the web interface and completely fill one of the disk partitions with those uploaded files, which prevents the ability to log into the web interface or to download PAN-OS, WildFire, and content images. \n\n\n\nThis issue affects only the web interface of the management plane; the dataplane is unaffected.\n"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "CWE-269 Improper Privilege Management",
|
||||||
|
"cweId": "CWE-269"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Palo Alto Networks",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "PAN-OS",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"changes": [
|
||||||
|
{
|
||||||
|
"at": "9.0.17-h4",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"lessThan": "9.0.17-h4",
|
||||||
|
"status": "affected",
|
||||||
|
"version": "9.0",
|
||||||
|
"versionType": "custom"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"changes": [
|
||||||
|
{
|
||||||
|
"at": "9.1.17",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"lessThan": "9.1.17",
|
||||||
|
"status": "affected",
|
||||||
|
"version": "9.1",
|
||||||
|
"versionType": "custom"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"changes": [
|
||||||
|
{
|
||||||
|
"at": "10.1.12",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"lessThan": "10.1.12",
|
||||||
|
"status": "affected",
|
||||||
|
"version": "10.1",
|
||||||
|
"versionType": "custom"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"changes": [
|
||||||
|
{
|
||||||
|
"at": "10.2.8",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"lessThan": "10.2.8",
|
||||||
|
"status": "affected",
|
||||||
|
"version": "10.2",
|
||||||
|
"versionType": "custom"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"changes": [
|
||||||
|
{
|
||||||
|
"at": "11.0.3",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"lessThan": "11.0.3",
|
||||||
|
"status": "affected",
|
||||||
|
"version": "11.0",
|
||||||
|
"versionType": "custom"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"status": "unaffected",
|
||||||
|
"version": "11.1"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "unaffected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Cloud NGFW",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"status": "unaffected",
|
||||||
|
"version": "All"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "unaffected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Prisma Access",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"status": "unaffected",
|
||||||
|
"version": "All"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "unaffected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://security.paloaltonetworks.com/CVE-2024-2433",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://security.paloaltonetworks.com/CVE-2024-2433"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"generator": {
|
||||||
|
"engine": "Vulnogram 0.1.0-dev"
|
||||||
|
},
|
||||||
|
"source": {
|
||||||
|
"defect": [
|
||||||
|
"PAN-181876",
|
||||||
|
"PAN-218663"
|
||||||
|
],
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
},
|
||||||
|
"work_around": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"supportingMedia": [
|
||||||
|
{
|
||||||
|
"base64": false,
|
||||||
|
"type": "text/html",
|
||||||
|
"value": "This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the effect of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at <a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices\">https://docs.paloaltonetworks.com/best-practices</a>.<br>"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"value": "This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the effect of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices .\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"exploit": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"supportingMedia": [
|
||||||
|
{
|
||||||
|
"base64": false,
|
||||||
|
"type": "text/html",
|
||||||
|
"value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.<br>"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"solution": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"supportingMedia": [
|
||||||
|
{
|
||||||
|
"base64": false,
|
||||||
|
"type": "text/html",
|
||||||
|
"value": "This issue is fixed in Panorama on PAN-OS 9.0.17-h4, PAN-OS 9.1.18, PAN-OS 10.1.12, PAN-OS 10.2.11, PAN-OS 11.0.4, and all later PAN-OS versions.<br>"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"value": "This issue is fixed in Panorama on PAN-OS 9.0.17-h4, PAN-OS 9.1.18, PAN-OS 10.1.12, PAN-OS 10.2.11, PAN-OS 11.0.4, and all later PAN-OS versions.\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Palo Alto Networks thanks Omar Eissa (https://de.linkedin.com/in/oeissa) for discovering and reporting this issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,17 +1,17 @@
|
|||||||
{
|
{
|
||||||
"data_version": "4.0",
|
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-2437",
|
"ID": "CVE-2024-2437",
|
||||||
"ASSIGNER": "security@wordfence.com",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "RESERVED"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-41728. Reason: This candidate is a reservation duplicate of CVE-2023-41728. Notes: All CVE users should reference CVE-2023-41728 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,17 +1,17 @@
|
|||||||
{
|
{
|
||||||
"data_version": "4.0",
|
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-2438",
|
"ID": "CVE-2024-2438",
|
||||||
"ASSIGNER": "security@wordfence.com",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "RESERVED"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-47851. Reason: This candidate is a reservation duplicate of CVE-2023-47851. Notes: All CVE users should reference CVE-2023-47851 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user