diff --git a/2024/10xxx/CVE-2024-10917.json b/2024/10xxx/CVE-2024-10917.json index 929a204fcfb..af613f2509b 100644 --- a/2024/10xxx/CVE-2024-10917.json +++ b/2024/10xxx/CVE-2024-10917.json @@ -1,17 +1,98 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10917", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@eclipse.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Eclipse OpenJ9 versions up to 0.47, the JNI function GetStringUTFLength may return an incorrect value which has wrapped around. From 0.48 the value is correct but may be truncated to include a smaller number of characters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-190 Integer Overflow or Wraparound", + "cweId": "CWE-190" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Eclipse Foundation", + "product": { + "product_data": [ + { + "product_name": "Open J9", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "0.8.0", + "version_value": "0.47.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/47", + "refsource": "MISC", + "name": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/47" + }, + { + "url": "https://github.com/eclipse-openj9/openj9/pull/20362", + "refsource": "MISC", + "name": "https://github.com/eclipse-openj9/openj9/pull/20362" + }, + { + "url": "https://github.com/eclipse-openj9/openj9/releases/tag/openj9-0.48.0", + "refsource": "MISC", + "name": "https://github.com/eclipse-openj9/openj9/releases/tag/openj9-0.48.0" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/11xxx/CVE-2024-11080.json b/2024/11xxx/CVE-2024-11080.json new file mode 100644 index 00000000000..2ae300ba64a --- /dev/null +++ b/2024/11xxx/CVE-2024-11080.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-11080", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/43xxx/CVE-2024-43439.json b/2024/43xxx/CVE-2024-43439.json index 4836939dcfa..c3b8d41294f 100644 --- a/2024/43xxx/CVE-2024-43439.json +++ b/2024/43xxx/CVE-2024-43439.json @@ -1,17 +1,84 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-43439", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "patrick@puiterwijk.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in moodle. H5P error messages require additional sanitizing to prevent a reflected cross-site scripting (XSS) risk." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304268", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2304268" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=461209", + "refsource": "MISC", + "name": "https://moodle.org/mod/forum/discuss.php?d=461209" + } + ] + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/45xxx/CVE-2024-45088.json b/2024/45xxx/CVE-2024-45088.json index d20d771e7c7..c553d07efbf 100644 --- a/2024/45xxx/CVE-2024-45088.json +++ b/2024/45xxx/CVE-2024-45088.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-45088", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Maximo Asset Management 7.6.1.3 is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Maximo Asset Management", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.6.1.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/7174818", + "refsource": "MISC", + "name": "https://www.ibm.com/support/pages/node/7174818" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/9xxx/CVE-2024-9355.json b/2024/9xxx/CVE-2024-9355.json index 79a7f27de02..74f6758f86e 100644 --- a/2024/9xxx/CVE-2024-9355.json +++ b/2024/9xxx/CVE-2024-9355.json @@ -580,6 +580,12 @@ "defaultStatus": "affected" } }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + }, { "version_value": "not down converted", "x_cve_json_5_version_data": { diff --git a/2024/9xxx/CVE-2024-9407.json b/2024/9xxx/CVE-2024-9407.json index 8c3e53d346a..cd589342bc4 100644 --- a/2024/9xxx/CVE-2024-9407.json +++ b/2024/9xxx/CVE-2024-9407.json @@ -63,6 +63,14 @@ { "version_value": "not down converted", "x_cve_json_5_version_data": { + "versions": [ + { + "version": "4:4.9.4-16.el9_4", + "lessThan": "*", + "versionType": "rpm", + "status": "unaffected" + } + ], "defaultStatus": "affected" } }, @@ -113,6 +121,11 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2024:8846" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9051", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2024:9051" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-9407", "refsource": "MISC", diff --git a/2024/9xxx/CVE-2024-9675.json b/2024/9xxx/CVE-2024-9675.json index e90301b749c..13c246f4669 100644 --- a/2024/9xxx/CVE-2024-9675.json +++ b/2024/9xxx/CVE-2024-9675.json @@ -161,13 +161,21 @@ { "version_value": "not down converted", "x_cve_json_5_version_data": { - "defaultStatus": "unaffected" + "versions": [ + { + "version": "4:4.9.4-16.el9_4", + "lessThan": "*", + "versionType": "rpm", + "status": "unaffected" + } + ], + "defaultStatus": "affected" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { - "defaultStatus": "affected" + "defaultStatus": "unaffected" } } ] @@ -252,7 +260,28 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-16.rhaos4.13.el9", + "version": "3:4.4.1-15.rhaos4.13.el8", + "lessThan": "*", + "versionType": "rpm", + "status": "unaffected" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "Red Hat OpenShift Container Platform 4.14", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "3:4.4.1-21.rhaos4.14.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -273,7 +302,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "4:4.9.4-14.rhaos4.16.el9", + "version": "4:4.9.4-12.rhaos4.16.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -394,6 +423,11 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2024:8690" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:8700", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2024:8700" + }, { "url": "https://access.redhat.com/errata/RHSA-2024:8703", "refsource": "MISC", @@ -419,6 +453,11 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2024:8846" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9051", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2024:9051" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-9675", "refsource": "MISC",