diff --git a/2019/17xxx/CVE-2019-17069.json b/2019/17xxx/CVE-2019-17069.json index 9d755733bbc..f037dda5c9b 100644 --- a/2019/17xxx/CVE-2019-17069.json +++ b/2019/17xxx/CVE-2019-17069.json @@ -76,6 +76,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20191127-0003/", "url": "https://security.netapp.com/advisory/ntap-20191127-0003/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20240425 [SECURITY] [DLA 3794-1] putty security update", + "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html" } ] } diff --git a/2020/14xxx/CVE-2020-14002.json b/2020/14xxx/CVE-2020-14002.json index f8675b3b5ea..1d5594fa2ad 100644 --- a/2020/14xxx/CVE-2020-14002.json +++ b/2020/14xxx/CVE-2020-14002.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200717-0003/", "url": "https://security.netapp.com/advisory/ntap-20200717-0003/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20240425 [SECURITY] [DLA 3794-1] putty security update", + "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html" } ] } diff --git a/2021/36xxx/CVE-2021-36367.json b/2021/36xxx/CVE-2021-36367.json index 3d2ce19b053..e906e3d87d0 100644 --- a/2021/36xxx/CVE-2021-36367.json +++ b/2021/36xxx/CVE-2021-36367.json @@ -66,6 +66,11 @@ "refsource": "DEBIAN", "name": "DSA-5588", "url": "https://www.debian.org/security/2023/dsa-5588" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20240425 [SECURITY] [DLA 3794-1] putty security update", + "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html" } ] } diff --git a/2023/48xxx/CVE-2023-48795.json b/2023/48xxx/CVE-2023-48795.json index 7f7477bbb2d..68f8edea6d3 100644 --- a/2023/48xxx/CVE-2023-48795.json +++ b/2023/48xxx/CVE-2023-48795.json @@ -626,6 +626,11 @@ "refsource": "FULLDISC", "name": "20240313 APPLE-SA-03-07-2024-2 macOS Sonoma 14.4", "url": "http://seclists.org/fulldisclosure/2024/Mar/21" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20240425 [SECURITY] [DLA 3794-1] putty security update", + "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html" } ] } diff --git a/2024/4xxx/CVE-2024-4159.json b/2024/4xxx/CVE-2024-4159.json index cfb96128451..f86ae4c9339 100644 --- a/2024/4xxx/CVE-2024-4159.json +++ b/2024/4xxx/CVE-2024-4159.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "\nBrocade SANnav before Brocade SANnav v2.3.1 lacks protection mechanisms on port 2377/TCP and 7946/TCP, which could allow an unauthenticated, remote attacker to reach Kafka APIs and send malicious data.\n\n" + "value": "\nBrocade SANnav before v2.3.0a lacks protection mechanisms on port 2377/TCP and 7946/TCP, which could allow an unauthenticated attacker to sniff the SANnav Docker information.\n\n" } ] }, @@ -45,7 +45,7 @@ "versions": [ { "status": "affected", - "version": "before v2.3.1" + "version": "before v2.3.0a" } ], "defaultStatus": "affected" @@ -79,16 +79,16 @@ "cvss": [ { "attackComplexity": "LOW", - "attackVector": "NETWORK", + "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "confidentialityImpact": "HIGH", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } ] diff --git a/2024/4xxx/CVE-2024-4173.json b/2024/4xxx/CVE-2024-4173.json index f0a32cf7348..b00b2ffc5bb 100644 --- a/2024/4xxx/CVE-2024-4173.json +++ b/2024/4xxx/CVE-2024-4173.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "\nA vulnerability in Brocade SANnav ova versions before Brocade SANnav v2.3.1 and v2.3.0a exposes Kafka in the wan interface.\n\nThe vulnerability could allow an unauthenticated attacker to perform various attacks, including DOS, the Brocade SANnav appliance.\n\n" + "value": "\nA vulnerability in Brocade SANnav exposes Kafka in the wan interface.\n\nThe vulnerability could allow an unauthenticated attacker to perform various attacks, including DOS against the Brocade SANnav.\n\n" } ] }, @@ -41,7 +41,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "before v2.3.1 and v2.3.0a" + "version_value": "All Versions" } ] } @@ -71,16 +71,16 @@ "cvss": [ { "attackComplexity": "LOW", - "attackVector": "NETWORK", + "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", - "baseScore": 9.4, - "baseSeverity": "CRITICAL", - "confidentialityImpact": "HIGH", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" } ]