From c9b4b15070aaa3634870ca83d9f81b826ba6ac26 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 1 Feb 2024 18:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/28xxx/CVE-2023-28484.json | 5 +++++ 2023/2xxx/CVE-2023-2283.json | 5 +++++ 2023/31xxx/CVE-2023-31248.json | 5 +++++ 2023/38xxx/CVE-2023-38545.json | 5 +++++ 2023/39xxx/CVE-2023-39975.json | 10 ++++++++++ 2023/5xxx/CVE-2023-5363.json | 10 ++++++++++ 2023/7xxx/CVE-2023-7242.json | 18 ++++++++++++++++++ 2023/7xxx/CVE-2023-7243.json | 18 ++++++++++++++++++ 2023/7xxx/CVE-2023-7244.json | 18 ++++++++++++++++++ 2024/1xxx/CVE-2024-1163.json | 18 ++++++++++++++++++ 2024/1xxx/CVE-2024-1164.json | 18 ++++++++++++++++++ 2024/1xxx/CVE-2024-1165.json | 18 ++++++++++++++++++ 2024/1xxx/CVE-2024-1166.json | 18 ++++++++++++++++++ 2024/1xxx/CVE-2024-1167.json | 18 ++++++++++++++++++ 2024/20xxx/CVE-2024-20918.json | 5 +++++ 2024/20xxx/CVE-2024-20922.json | 5 +++++ 2024/20xxx/CVE-2024-20926.json | 5 +++++ 2024/20xxx/CVE-2024-20932.json | 5 +++++ 2024/20xxx/CVE-2024-20952.json | 5 +++++ 2024/20xxx/CVE-2024-20961.json | 5 +++++ 2024/20xxx/CVE-2024-20963.json | 5 +++++ 2024/20xxx/CVE-2024-20965.json | 10 ++++++++++ 2024/20xxx/CVE-2024-20967.json | 5 +++++ 2024/20xxx/CVE-2024-20969.json | 5 +++++ 2024/20xxx/CVE-2024-20971.json | 5 +++++ 2024/20xxx/CVE-2024-20973.json | 5 +++++ 2024/20xxx/CVE-2024-20975.json | 5 +++++ 2024/20xxx/CVE-2024-20977.json | 5 +++++ 2024/20xxx/CVE-2024-20981.json | 5 +++++ 2024/20xxx/CVE-2024-20983.json | 5 +++++ 2024/20xxx/CVE-2024-20985.json | 5 +++++ 2024/21xxx/CVE-2024-21733.json | 5 +++++ 2024/23xxx/CVE-2024-23645.json | 4 ++-- 2024/24xxx/CVE-2024-24557.json | 2 +- 2024/24xxx/CVE-2024-24561.json | 2 +- 2024/24xxx/CVE-2024-24570.json | 4 ++-- 36 files changed, 285 insertions(+), 6 deletions(-) create mode 100644 2023/7xxx/CVE-2023-7242.json create mode 100644 2023/7xxx/CVE-2023-7243.json create mode 100644 2023/7xxx/CVE-2023-7244.json create mode 100644 2024/1xxx/CVE-2024-1163.json create mode 100644 2024/1xxx/CVE-2024-1164.json create mode 100644 2024/1xxx/CVE-2024-1165.json create mode 100644 2024/1xxx/CVE-2024-1166.json create mode 100644 2024/1xxx/CVE-2024-1167.json diff --git a/2023/28xxx/CVE-2023-28484.json b/2023/28xxx/CVE-2023-28484.json index abc653e59b2..cffd3596f92 100644 --- a/2023/28xxx/CVE-2023-28484.json +++ b/2023/28xxx/CVE-2023-28484.json @@ -71,6 +71,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230601-0006/", "url": "https://security.netapp.com/advisory/ntap-20230601-0006/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20240201-0005/", + "url": "https://security.netapp.com/advisory/ntap-20240201-0005/" } ] } diff --git a/2023/2xxx/CVE-2023-2283.json b/2023/2xxx/CVE-2023-2283.json index d6b4a53e4cd..6e3abd1ec5b 100644 --- a/2023/2xxx/CVE-2023-2283.json +++ b/2023/2xxx/CVE-2023-2283.json @@ -73,6 +73,11 @@ "refsource": "GENTOO", "name": "GLSA-202312-05", "url": "https://security.gentoo.org/glsa/202312-05" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20240201-0005/", + "url": "https://security.netapp.com/advisory/ntap-20240201-0005/" } ] }, diff --git a/2023/31xxx/CVE-2023-31248.json b/2023/31xxx/CVE-2023-31248.json index 7edfdf57348..8dcdcabed0e 100644 --- a/2023/31xxx/CVE-2023-31248.json +++ b/2023/31xxx/CVE-2023-31248.json @@ -98,6 +98,11 @@ "url": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html", "refsource": "MISC", "name": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0001/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0001/" } ] }, diff --git a/2023/38xxx/CVE-2023-38545.json b/2023/38xxx/CVE-2023-38545.json index bdb2f352fa2..9a47607b203 100644 --- a/2023/38xxx/CVE-2023-38545.json +++ b/2023/38xxx/CVE-2023-38545.json @@ -122,6 +122,11 @@ "url": "http://seclists.org/fulldisclosure/2024/Jan/38", "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2024/Jan/38" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0005/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0005/" } ] } diff --git a/2023/39xxx/CVE-2023-39975.json b/2023/39xxx/CVE-2023-39975.json index 06f8f7b0d5a..3e84bdb21de 100644 --- a/2023/39xxx/CVE-2023-39975.json +++ b/2023/39xxx/CVE-2023-39975.json @@ -71,6 +71,16 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230915-0014/", "url": "https://security.netapp.com/advisory/ntap-20230915-0014/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20240201-0008/", + "url": "https://security.netapp.com/advisory/ntap-20240201-0008/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20240201-0005/", + "url": "https://security.netapp.com/advisory/ntap-20240201-0005/" } ] } diff --git a/2023/5xxx/CVE-2023-5363.json b/2023/5xxx/CVE-2023-5363.json index 7d1cdccb54f..2954f5a5b1f 100644 --- a/2023/5xxx/CVE-2023-5363.json +++ b/2023/5xxx/CVE-2023-5363.json @@ -88,6 +88,16 @@ "url": "https://security.netapp.com/advisory/ntap-20231027-0010/", "refsource": "MISC", "name": "https://security.netapp.com/advisory/ntap-20231027-0010/" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0003/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0003/" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0004/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0004/" } ] }, diff --git a/2023/7xxx/CVE-2023-7242.json b/2023/7xxx/CVE-2023-7242.json new file mode 100644 index 00000000000..dfdf496be67 --- /dev/null +++ b/2023/7xxx/CVE-2023-7242.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-7242", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/7xxx/CVE-2023-7243.json b/2023/7xxx/CVE-2023-7243.json new file mode 100644 index 00000000000..36ae6dcfc91 --- /dev/null +++ b/2023/7xxx/CVE-2023-7243.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-7243", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/7xxx/CVE-2023-7244.json b/2023/7xxx/CVE-2023-7244.json new file mode 100644 index 00000000000..35fc3d0b1d0 --- /dev/null +++ b/2023/7xxx/CVE-2023-7244.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-7244", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1163.json b/2024/1xxx/CVE-2024-1163.json new file mode 100644 index 00000000000..378ca79111c --- /dev/null +++ b/2024/1xxx/CVE-2024-1163.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1163", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1164.json b/2024/1xxx/CVE-2024-1164.json new file mode 100644 index 00000000000..c1822259a9b --- /dev/null +++ b/2024/1xxx/CVE-2024-1164.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1164", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1165.json b/2024/1xxx/CVE-2024-1165.json new file mode 100644 index 00000000000..c93ce236fa8 --- /dev/null +++ b/2024/1xxx/CVE-2024-1165.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1165", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1166.json b/2024/1xxx/CVE-2024-1166.json new file mode 100644 index 00000000000..e1c0782d687 --- /dev/null +++ b/2024/1xxx/CVE-2024-1166.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1166", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1167.json b/2024/1xxx/CVE-2024-1167.json new file mode 100644 index 00000000000..8e31d688484 --- /dev/null +++ b/2024/1xxx/CVE-2024-1167.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1167", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/20xxx/CVE-2024-20918.json b/2024/20xxx/CVE-2024-20918.json index 14654a11bf2..de5b36db560 100644 --- a/2024/20xxx/CVE-2024-20918.json +++ b/2024/20xxx/CVE-2024-20918.json @@ -98,6 +98,11 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html", "refsource": "MISC", "name": "https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0002/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0002/" } ] }, diff --git a/2024/20xxx/CVE-2024-20922.json b/2024/20xxx/CVE-2024-20922.json index 3b8603057ed..87eab2a48bb 100644 --- a/2024/20xxx/CVE-2024-20922.json +++ b/2024/20xxx/CVE-2024-20922.json @@ -65,6 +65,11 @@ "url": "https://www.oracle.com/security-alerts/cpujan2024.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2024.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0002/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0002/" } ] }, diff --git a/2024/20xxx/CVE-2024-20926.json b/2024/20xxx/CVE-2024-20926.json index 5d823aabfac..08e73acb51f 100644 --- a/2024/20xxx/CVE-2024-20926.json +++ b/2024/20xxx/CVE-2024-20926.json @@ -86,6 +86,11 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html", "refsource": "MISC", "name": "https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0002/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0002/" } ] }, diff --git a/2024/20xxx/CVE-2024-20932.json b/2024/20xxx/CVE-2024-20932.json index c0d3fe91b0f..d84436ce34a 100644 --- a/2024/20xxx/CVE-2024-20932.json +++ b/2024/20xxx/CVE-2024-20932.json @@ -69,6 +69,11 @@ "url": "https://www.oracle.com/security-alerts/cpujan2024.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2024.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0002/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0002/" } ] }, diff --git a/2024/20xxx/CVE-2024-20952.json b/2024/20xxx/CVE-2024-20952.json index c51a9548295..96147ad927a 100644 --- a/2024/20xxx/CVE-2024-20952.json +++ b/2024/20xxx/CVE-2024-20952.json @@ -98,6 +98,11 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html", "refsource": "MISC", "name": "https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0002/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0002/" } ] }, diff --git a/2024/20xxx/CVE-2024-20961.json b/2024/20xxx/CVE-2024-20961.json index e6cc585d70e..b33e559cb7b 100644 --- a/2024/20xxx/CVE-2024-20961.json +++ b/2024/20xxx/CVE-2024-20961.json @@ -58,6 +58,11 @@ "url": "https://www.oracle.com/security-alerts/cpujan2024.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2024.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0003/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0003/" } ] }, diff --git a/2024/20xxx/CVE-2024-20963.json b/2024/20xxx/CVE-2024-20963.json index ec749330645..ef903fe47bd 100644 --- a/2024/20xxx/CVE-2024-20963.json +++ b/2024/20xxx/CVE-2024-20963.json @@ -58,6 +58,11 @@ "url": "https://www.oracle.com/security-alerts/cpujan2024.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2024.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0003/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0003/" } ] }, diff --git a/2024/20xxx/CVE-2024-20965.json b/2024/20xxx/CVE-2024-20965.json index cb02987ea4a..30da869cee4 100644 --- a/2024/20xxx/CVE-2024-20965.json +++ b/2024/20xxx/CVE-2024-20965.json @@ -70,6 +70,16 @@ "url": "https://www.oracle.com/security-alerts/cpujan2024.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2024.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0003/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0003/" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0006/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0006/" } ] }, diff --git a/2024/20xxx/CVE-2024-20967.json b/2024/20xxx/CVE-2024-20967.json index 1ab7b8bb7de..5a0fa3b87cf 100644 --- a/2024/20xxx/CVE-2024-20967.json +++ b/2024/20xxx/CVE-2024-20967.json @@ -58,6 +58,11 @@ "url": "https://www.oracle.com/security-alerts/cpujan2024.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2024.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0003/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0003/" } ] }, diff --git a/2024/20xxx/CVE-2024-20969.json b/2024/20xxx/CVE-2024-20969.json index d1aefec0f5b..649421b04b1 100644 --- a/2024/20xxx/CVE-2024-20969.json +++ b/2024/20xxx/CVE-2024-20969.json @@ -58,6 +58,11 @@ "url": "https://www.oracle.com/security-alerts/cpujan2024.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2024.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0003/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0003/" } ] }, diff --git a/2024/20xxx/CVE-2024-20971.json b/2024/20xxx/CVE-2024-20971.json index bce6d6fa552..6e774f36850 100644 --- a/2024/20xxx/CVE-2024-20971.json +++ b/2024/20xxx/CVE-2024-20971.json @@ -58,6 +58,11 @@ "url": "https://www.oracle.com/security-alerts/cpujan2024.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2024.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0003/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0003/" } ] }, diff --git a/2024/20xxx/CVE-2024-20973.json b/2024/20xxx/CVE-2024-20973.json index 08868ff8d0c..1613aefacbd 100644 --- a/2024/20xxx/CVE-2024-20973.json +++ b/2024/20xxx/CVE-2024-20973.json @@ -58,6 +58,11 @@ "url": "https://www.oracle.com/security-alerts/cpujan2024.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2024.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0003/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0003/" } ] }, diff --git a/2024/20xxx/CVE-2024-20975.json b/2024/20xxx/CVE-2024-20975.json index 0dc21a83b1c..ee43378d410 100644 --- a/2024/20xxx/CVE-2024-20975.json +++ b/2024/20xxx/CVE-2024-20975.json @@ -58,6 +58,11 @@ "url": "https://www.oracle.com/security-alerts/cpujan2024.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2024.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0007/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0007/" } ] }, diff --git a/2024/20xxx/CVE-2024-20977.json b/2024/20xxx/CVE-2024-20977.json index 302333e859b..da7f93ad760 100644 --- a/2024/20xxx/CVE-2024-20977.json +++ b/2024/20xxx/CVE-2024-20977.json @@ -58,6 +58,11 @@ "url": "https://www.oracle.com/security-alerts/cpujan2024.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2024.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0003/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0003/" } ] }, diff --git a/2024/20xxx/CVE-2024-20981.json b/2024/20xxx/CVE-2024-20981.json index 63cc689cf26..d004066f331 100644 --- a/2024/20xxx/CVE-2024-20981.json +++ b/2024/20xxx/CVE-2024-20981.json @@ -58,6 +58,11 @@ "url": "https://www.oracle.com/security-alerts/cpujan2024.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2024.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0003/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0003/" } ] }, diff --git a/2024/20xxx/CVE-2024-20983.json b/2024/20xxx/CVE-2024-20983.json index 82e9db9db97..bbb1bd83ab7 100644 --- a/2024/20xxx/CVE-2024-20983.json +++ b/2024/20xxx/CVE-2024-20983.json @@ -58,6 +58,11 @@ "url": "https://www.oracle.com/security-alerts/cpujan2024.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2024.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0009/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0009/" } ] }, diff --git a/2024/20xxx/CVE-2024-20985.json b/2024/20xxx/CVE-2024-20985.json index cbfeae0c378..023b2bc4a65 100644 --- a/2024/20xxx/CVE-2024-20985.json +++ b/2024/20xxx/CVE-2024-20985.json @@ -58,6 +58,11 @@ "url": "https://www.oracle.com/security-alerts/cpujan2024.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2024.html" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240201-0003/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20240201-0003/" } ] }, diff --git a/2024/21xxx/CVE-2024-21733.json b/2024/21xxx/CVE-2024-21733.json index 6d24eb37fef..24cd367187a 100644 --- a/2024/21xxx/CVE-2024-21733.json +++ b/2024/21xxx/CVE-2024-21733.json @@ -69,6 +69,11 @@ "url": "http://www.openwall.com/lists/oss-security/2024/01/19/2", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2024/01/19/2" + }, + { + "url": "http://packetstormsecurity.com/files/176951/Apache-Tomcat-8.5.63-9.0.43-HTTP-Response-Smuggling.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/176951/Apache-Tomcat-8.5.63-9.0.43-HTTP-Response-Smuggling.html" } ] }, diff --git a/2024/23xxx/CVE-2024-23645.json b/2024/23xxx/CVE-2024-23645.json index fd926c1c6bd..39e84dd4adc 100644 --- a/2024/23xxx/CVE-2024-23645.json +++ b/2024/23xxx/CVE-2024-23645.json @@ -21,8 +21,8 @@ "description": [ { "lang": "eng", - "value": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", - "cweId": "CWE-80" + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" } ] } diff --git a/2024/24xxx/CVE-2024-24557.json b/2024/24xxx/CVE-2024-24557.json index c4cb8a6a873..755ac27d8f7 100644 --- a/2024/24xxx/CVE-2024-24557.json +++ b/2024/24xxx/CVE-2024-24557.json @@ -54,7 +54,7 @@ }, { "version_affected": "=", - "version_value": " < v24.0.9" + "version_value": " < 24.0.9" } ] } diff --git a/2024/24xxx/CVE-2024-24561.json b/2024/24xxx/CVE-2024-24561.json index 5f3da0e2171..d35ffb54dec 100644 --- a/2024/24xxx/CVE-2024-24561.json +++ b/2024/24xxx/CVE-2024-24561.json @@ -41,7 +41,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "<=0.3.10" + "version_value": "<= 0.3.10" } ] } diff --git a/2024/24xxx/CVE-2024-24570.json b/2024/24xxx/CVE-2024-24570.json index 3f1b30ec6a6..0c1ed798740 100644 --- a/2024/24xxx/CVE-2024-24570.json +++ b/2024/24xxx/CVE-2024-24570.json @@ -21,8 +21,8 @@ "description": [ { "lang": "eng", - "value": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", - "cweId": "CWE-80" + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" } ] }