mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-07 19:17:10 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
0c8f9c121d
commit
8a5b6fbb60
@ -629,7 +629,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "0:4.12.0-202403251017.p0.gd4c9e3c.assembly.stream.el8",
|
"version": "0:4.12.0-202403251017.p0.gd4c9e3c.assembly.stream.el9",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -643,7 +643,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "3:4.4.1-2.1.rhaos4.12.el8",
|
"version": "3:4.2.0-7.2.rhaos4.12.el9",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -671,7 +671,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "2:1.9.4-3.2.rhaos4.12.el8",
|
"version": "2:1.9.4-3.2.rhaos4.12.el9",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -762,7 +762,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "0:4.13.0-202404020737.p0.gd192e90.assembly.stream.el8",
|
"version": "0:4.13.0-202404020737.p0.gd192e90.assembly.stream.el9",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -776,7 +776,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "3:4.4.1-5.2.rhaos4.13.el8",
|
"version": "3:4.4.1-6.2.rhaos4.13.el9",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -790,7 +790,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "4:1.1.12-1.1.rhaos4.13.el8",
|
"version": "4:1.1.12-1.1.rhaos4.13.el9",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -804,7 +804,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "2:1.11.2-2.2.rhaos4.13.el9",
|
"version": "2:1.11.2-2.2.rhaos4.13.el8",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -867,7 +867,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "0:1.27.0-3.1.el8",
|
"version": "0:1.27.0-3.1.el9",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -895,7 +895,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "0:4.14.0-202403261640.p0.gf7b14a9.assembly.stream.el8",
|
"version": "0:4.14.0-202403261640.p0.gf7b14a9.assembly.stream.el9",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -909,7 +909,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "0:4.14.0-202403251040.p0.g607e2dd.assembly.stream.el9",
|
"version": "0:4.14.0-202403251040.p0.g607e2dd.assembly.stream.el8",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -923,7 +923,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "3:4.4.1-11.3.rhaos4.14.el9",
|
"version": "3:4.4.1-11.3.rhaos4.14.el8",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -937,7 +937,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "2:1.11.2-10.3.rhaos4.14.el8",
|
"version": "2:1.11.2-10.3.rhaos4.14.el9",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -979,7 +979,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "3:2.1.7-3.4.rhaos4.14.el9",
|
"version": "3:2.1.7-3.4.rhaos4.14.el8",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -1021,7 +1021,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "0:1.27.0-3.2.el9",
|
"version": "0:1.27.0-3.2.el8",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -1091,7 +1091,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "0:4.14.0-202404151639.p0.gf7b14a9.assembly.stream.el8",
|
"version": "0:4.14.0-202404151639.p0.gf7b14a9.assembly.stream.el9",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -1119,7 +1119,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "0:4.14.0-202404151639.p0.g607e2dd.assembly.stream.el8",
|
"version": "0:4.14.0-202404151639.p0.g607e2dd.assembly.stream.el9",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -1210,7 +1210,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "1:1.29.1-20.3.rhaos4.15.el8",
|
"version": "1:1.29.1-20.3.rhaos4.15.el9",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -1252,7 +1252,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "0:1.28.4-8.rhaos4.15.git24f50b9.el9",
|
"version": "0:1.28.4-8.rhaos4.15.git24f50b9.el8",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -1266,7 +1266,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "0:1.28.0-3.1.el8",
|
"version": "0:1.28.0-3.1.el9",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -1308,7 +1308,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "0:4.15.0-202403211549.p0.g2e3cca1.assembly.stream.el9",
|
"version": "0:4.15.0-202403211549.p0.g2e3cca1.assembly.stream.el8",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -1322,7 +1322,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "3:4.4.1-21.1.rhaos4.15.el9",
|
"version": "3:4.4.1-21.1.rhaos4.15.el8",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -1350,7 +1350,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "2:1.11.2-21.2.rhaos4.15.el9",
|
"version": "2:1.11.2-21.2.rhaos4.15.el8",
|
||||||
"lessThan": "*",
|
"lessThan": "*",
|
||||||
"versionType": "rpm",
|
"versionType": "rpm",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
|
@ -5,13 +5,13 @@
|
|||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-48342",
|
"ID": "CVE-2024-48342",
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "RESERVED"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -34,7 +34,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Insecure Permissions vulnerability in Ethereum v.1.12.2 allows a remote attacker to escalate privileges via the _transfer function."
|
"value": "** DISPUTED ** An issue in the PepeGxng smart contract (which can be run on the Ethereum blockchain) allows remote attackers to have an unspecified impact via the _transfer function. NOTE: this is disputed by third parties because the impact is limited to function calls."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
Loading…
x
Reference in New Issue
Block a user