diff --git a/2024/1xxx/CVE-2024-1394.json b/2024/1xxx/CVE-2024-1394.json index 8ba3af59e5b..3b8d038dbeb 100644 --- a/2024/1xxx/CVE-2024-1394.json +++ b/2024/1xxx/CVE-2024-1394.json @@ -629,7 +629,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.12.0-202403251017.p0.gd4c9e3c.assembly.stream.el8", + "version": "0:4.12.0-202403251017.p0.gd4c9e3c.assembly.stream.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -643,7 +643,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-2.1.rhaos4.12.el8", + "version": "3:4.2.0-7.2.rhaos4.12.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -671,7 +671,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "2:1.9.4-3.2.rhaos4.12.el8", + "version": "2:1.9.4-3.2.rhaos4.12.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -762,7 +762,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.13.0-202404020737.p0.gd192e90.assembly.stream.el8", + "version": "0:4.13.0-202404020737.p0.gd192e90.assembly.stream.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -776,7 +776,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-5.2.rhaos4.13.el8", + "version": "3:4.4.1-6.2.rhaos4.13.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -790,7 +790,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "4:1.1.12-1.1.rhaos4.13.el8", + "version": "4:1.1.12-1.1.rhaos4.13.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -804,7 +804,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "2:1.11.2-2.2.rhaos4.13.el9", + "version": "2:1.11.2-2.2.rhaos4.13.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -867,7 +867,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.27.0-3.1.el8", + "version": "0:1.27.0-3.1.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -895,7 +895,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.14.0-202403261640.p0.gf7b14a9.assembly.stream.el8", + "version": "0:4.14.0-202403261640.p0.gf7b14a9.assembly.stream.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -909,7 +909,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.14.0-202403251040.p0.g607e2dd.assembly.stream.el9", + "version": "0:4.14.0-202403251040.p0.g607e2dd.assembly.stream.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -923,7 +923,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-11.3.rhaos4.14.el9", + "version": "3:4.4.1-11.3.rhaos4.14.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -937,7 +937,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "2:1.11.2-10.3.rhaos4.14.el8", + "version": "2:1.11.2-10.3.rhaos4.14.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -979,7 +979,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:2.1.7-3.4.rhaos4.14.el9", + "version": "3:2.1.7-3.4.rhaos4.14.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1021,7 +1021,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.27.0-3.2.el9", + "version": "0:1.27.0-3.2.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1091,7 +1091,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.14.0-202404151639.p0.gf7b14a9.assembly.stream.el8", + "version": "0:4.14.0-202404151639.p0.gf7b14a9.assembly.stream.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1119,7 +1119,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.14.0-202404151639.p0.g607e2dd.assembly.stream.el8", + "version": "0:4.14.0-202404151639.p0.g607e2dd.assembly.stream.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1210,7 +1210,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "1:1.29.1-20.3.rhaos4.15.el8", + "version": "1:1.29.1-20.3.rhaos4.15.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1252,7 +1252,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.28.4-8.rhaos4.15.git24f50b9.el9", + "version": "0:1.28.4-8.rhaos4.15.git24f50b9.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1266,7 +1266,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.28.0-3.1.el8", + "version": "0:1.28.0-3.1.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1308,7 +1308,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.15.0-202403211549.p0.g2e3cca1.assembly.stream.el9", + "version": "0:4.15.0-202403211549.p0.g2e3cca1.assembly.stream.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1322,7 +1322,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-21.1.rhaos4.15.el9", + "version": "3:4.4.1-21.1.rhaos4.15.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1350,7 +1350,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "2:1.11.2-21.2.rhaos4.15.el9", + "version": "2:1.11.2-21.2.rhaos4.15.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" diff --git a/2024/48xxx/CVE-2024-48342.json b/2024/48xxx/CVE-2024-48342.json index 71dc4c80e84..152142490be 100644 --- a/2024/48xxx/CVE-2024-48342.json +++ b/2024/48xxx/CVE-2024-48342.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2024-48342", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] } diff --git a/2024/51xxx/CVE-2024-51426.json b/2024/51xxx/CVE-2024-51426.json index 4d4c2b3bf7b..c0826a1e3bb 100644 --- a/2024/51xxx/CVE-2024-51426.json +++ b/2024/51xxx/CVE-2024-51426.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Insecure Permissions vulnerability in Ethereum v.1.12.2 allows a remote attacker to escalate privileges via the _transfer function." + "value": "** DISPUTED ** An issue in the PepeGxng smart contract (which can be run on the Ethereum blockchain) allows remote attackers to have an unspecified impact via the _transfer function. NOTE: this is disputed by third parties because the impact is limited to function calls." } ] },