diff --git a/2020/11xxx/CVE-2020-11311.json b/2020/11xxx/CVE-2020-11311.json index 1db8d838631..61dc799a483 100644 --- a/2020/11xxx/CVE-2020-11311.json +++ b/2020/11xxx/CVE-2020-11311.json @@ -1,17 +1,91 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-11311", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@qualcomm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This record is rejected as duplicate. All references should point to CVE-2021-1904." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Child process can leak information from parent process due to numeric pids are getting compared and these pid can be reused in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Snapdragon", + "product": { + "product_data": [ + { + "product_name": "Mobile", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "SD205, SD210, SD429, SD439, SD450" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.cve.org/CVERecord?id=CVE-2021-1904", + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-2021-1904" + }, + { + "url": "https://nvd.nist.gov/vuln/detail/cve-2021-1904", + "refsource": "MISC", + "name": "https://nvd.nist.gov/vuln/detail/cve-2021-1904" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/11xxx/CVE-2024-11654.json b/2024/11xxx/CVE-2024-11654.json index c2f30f41639..41a8795c12c 100644 --- a/2024/11xxx/CVE-2024-11654.json +++ b/2024/11xxx/CVE-2024-11654.json @@ -1,17 +1,140 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-11654", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as critical has been found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118. This affects an unknown part of the file /admin/network/diag_traceroute6. The manipulation of the argument diag_traceroute6 leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Es wurde eine Schwachstelle in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT bis 20241118 entdeckt. Sie wurde als kritisch eingestuft. Es betrifft eine unbekannte Funktion der Datei /admin/network/diag_traceroute6. Durch Manipulieren des Arguments diag_traceroute6 mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Command Injection", + "cweId": "CWE-77" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Injection", + "cweId": "CWE-74" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "EnGenius", + "product": { + "product_data": [ + { + "product_name": "ENH1350EXT", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "20241118" + } + ] + } + }, + { + "product_name": "ENS500-AC", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "20241118" + } + ] + } + }, + { + "product_name": "ENS620EXT", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "20241118" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.285975", + "refsource": "MISC", + "name": "https://vuldb.com/?id.285975" + }, + { + "url": "https://vuldb.com/?ctiid.285975", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.285975" + }, + { + "url": "https://vuldb.com/?submit.446637", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.446637" + }, + { + "url": "https://k9u7kv33ub.feishu.cn/wiki/YrKfwHqLjijPeYkMTQfcdhrBnyg?from=from_copylink", + "refsource": "MISC", + "name": "https://k9u7kv33ub.feishu.cn/wiki/YrKfwHqLjijPeYkMTQfcdhrBnyg?from=from_copylink" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "liutong (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 4.7, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 4.7, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 5.8, + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P" } ] } diff --git a/2024/11xxx/CVE-2024-11655.json b/2024/11xxx/CVE-2024-11655.json index 9c0a853720e..84d9991893c 100644 --- a/2024/11xxx/CVE-2024-11655.json +++ b/2024/11xxx/CVE-2024-11655.json @@ -1,17 +1,140 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-11655", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as critical was found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118. This vulnerability affects unknown code of the file /admin/network/diag_pinginterface. The manipulation of the argument diag_ping leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "In EnGenius ENH1350EXT, ENS500-AC and ENS620EXT bis 20241118 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Das betrifft eine unbekannte Funktionalit\u00e4t der Datei /admin/network/diag_pinginterface. Durch das Beeinflussen des Arguments diag_ping mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Command Injection", + "cweId": "CWE-77" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Injection", + "cweId": "CWE-74" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "EnGenius", + "product": { + "product_data": [ + { + "product_name": "ENH1350EXT", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "20241118" + } + ] + } + }, + { + "product_name": "ENS500-AC", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "20241118" + } + ] + } + }, + { + "product_name": "ENS620EXT", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "20241118" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.285976", + "refsource": "MISC", + "name": "https://vuldb.com/?id.285976" + }, + { + "url": "https://vuldb.com/?ctiid.285976", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.285976" + }, + { + "url": "https://vuldb.com/?submit.446638", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.446638" + }, + { + "url": "https://k9u7kv33ub.feishu.cn/wiki/PpM6w3TF8ilK3Ek5RLqcLPUrn6c", + "refsource": "MISC", + "name": "https://k9u7kv33ub.feishu.cn/wiki/PpM6w3TF8ilK3Ek5RLqcLPUrn6c" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "liutong (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 4.7, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 4.7, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 5.8, + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P" } ] } diff --git a/2024/4xxx/CVE-2024-4840.json b/2024/4xxx/CVE-2024-4840.json index 9ac08f30de7..2bddb855ad3 100644 --- a/2024/4xxx/CVE-2024-4840.json +++ b/2024/4xxx/CVE-2024-4840.json @@ -36,12 +36,20 @@ "product": { "product_data": [ { - "product_name": "Red Hat OpenStack Platform 16.2", + "product_name": "Red Hat OpenStack Platform 17.1 for RHEL 9", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { + "versions": [ + { + "version": "0:14.3.1-17.1.20240919130756.el9ost", + "lessThan": "*", + "versionType": "rpm", + "status": "unaffected" + } + ], "defaultStatus": "affected" } } @@ -49,7 +57,7 @@ } }, { - "product_name": "Red Hat OpenStack Platform 17.1", + "product_name": "Red Hat OpenStack Platform 16.2", "version": { "version_data": [ { @@ -69,6 +77,11 @@ }, "references": { "reference_data": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:9978", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2024:9978" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-4840", "refsource": "MISC", diff --git a/2024/53xxx/CVE-2024-53931.json b/2024/53xxx/CVE-2024-53931.json new file mode 100644 index 00000000000..cdccd3c7efb --- /dev/null +++ b/2024/53xxx/CVE-2024-53931.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53931", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53932.json b/2024/53xxx/CVE-2024-53932.json new file mode 100644 index 00000000000..c4894b6f529 --- /dev/null +++ b/2024/53xxx/CVE-2024-53932.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53932", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53933.json b/2024/53xxx/CVE-2024-53933.json new file mode 100644 index 00000000000..69b3c14f6cc --- /dev/null +++ b/2024/53xxx/CVE-2024-53933.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53933", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53934.json b/2024/53xxx/CVE-2024-53934.json new file mode 100644 index 00000000000..438c19ea2e3 --- /dev/null +++ b/2024/53xxx/CVE-2024-53934.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53934", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53935.json b/2024/53xxx/CVE-2024-53935.json new file mode 100644 index 00000000000..68c59ce6d33 --- /dev/null +++ b/2024/53xxx/CVE-2024-53935.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53935", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53936.json b/2024/53xxx/CVE-2024-53936.json new file mode 100644 index 00000000000..4fbd5d3f0ca --- /dev/null +++ b/2024/53xxx/CVE-2024-53936.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53936", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53937.json b/2024/53xxx/CVE-2024-53937.json new file mode 100644 index 00000000000..ff1e0b3334f --- /dev/null +++ b/2024/53xxx/CVE-2024-53937.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53937", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53938.json b/2024/53xxx/CVE-2024-53938.json new file mode 100644 index 00000000000..dac6eea2d7e --- /dev/null +++ b/2024/53xxx/CVE-2024-53938.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53938", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53939.json b/2024/53xxx/CVE-2024-53939.json new file mode 100644 index 00000000000..5ec2b0186f8 --- /dev/null +++ b/2024/53xxx/CVE-2024-53939.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53939", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53940.json b/2024/53xxx/CVE-2024-53940.json new file mode 100644 index 00000000000..4be38f7c4a3 --- /dev/null +++ b/2024/53xxx/CVE-2024-53940.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53940", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53941.json b/2024/53xxx/CVE-2024-53941.json new file mode 100644 index 00000000000..672cc3c3f8d --- /dev/null +++ b/2024/53xxx/CVE-2024-53941.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53941", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53942.json b/2024/53xxx/CVE-2024-53942.json new file mode 100644 index 00000000000..12ab13fb408 --- /dev/null +++ b/2024/53xxx/CVE-2024-53942.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53942", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53943.json b/2024/53xxx/CVE-2024-53943.json new file mode 100644 index 00000000000..271380931ec --- /dev/null +++ b/2024/53xxx/CVE-2024-53943.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53943", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53944.json b/2024/53xxx/CVE-2024-53944.json new file mode 100644 index 00000000000..c44315a6954 --- /dev/null +++ b/2024/53xxx/CVE-2024-53944.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53944", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53945.json b/2024/53xxx/CVE-2024-53945.json new file mode 100644 index 00000000000..6a38e99e82e --- /dev/null +++ b/2024/53xxx/CVE-2024-53945.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53945", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53946.json b/2024/53xxx/CVE-2024-53946.json new file mode 100644 index 00000000000..66d0be408a2 --- /dev/null +++ b/2024/53xxx/CVE-2024-53946.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53946", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8007.json b/2024/8xxx/CVE-2024-8007.json index 2205799da12..dab5d091a87 100644 --- a/2024/8xxx/CVE-2024-8007.json +++ b/2024/8xxx/CVE-2024-8007.json @@ -35,6 +35,76 @@ "vendor_name": "Red Hat", "product": { "product_data": [ + { + "product_name": "Red Hat OpenStack Platform 17.1 for RHEL 8", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "0:15.4.1-17.1.20240911093743.e5b18f2.el8ost", + "lessThan": "*", + "versionType": "rpm", + "status": "unaffected" + } + ], + "defaultStatus": "affected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "0:16.5.1-17.1.20240913093745.f3599d0.el8ost", + "lessThan": "*", + "versionType": "rpm", + "status": "unaffected" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "Red Hat OpenStack Platform 17.1 for RHEL 9", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "0:15.4.1-17.1.20240911100820.e5b18f2.el9ost", + "lessThan": "*", + "versionType": "rpm", + "status": "unaffected" + } + ], + "defaultStatus": "affected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "0:16.5.1-17.1.20240913100806.f3599d0.el9ost", + "lessThan": "*", + "versionType": "rpm", + "status": "unaffected" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, { "product_name": "Red Hat OpenStack Platform 16.1", "version": { @@ -60,19 +130,6 @@ } ] } - }, - { - "product_name": "Red Hat OpenStack Platform 17.1", - "version": { - "version_data": [ - { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "defaultStatus": "affected" - } - } - ] - } } ] } @@ -82,6 +139,16 @@ }, "references": { "reference_data": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:9990", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2024:9990" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9991", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2024:9991" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-8007", "refsource": "MISC",