From e41f30e62dfda9f802c0b7234ec5ba27bda5513c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 15 Feb 2024 10:00:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/46xxx/CVE-2023-46596.json | 12 +++---- 2024/0xxx/CVE-2024-0390.json | 66 +++++++++++++++++++++++++++++++--- 2024/23xxx/CVE-2024-23855.json | 6 ++-- 2024/23xxx/CVE-2024-23856.json | 6 ++-- 2024/23xxx/CVE-2024-23857.json | 6 ++-- 2024/23xxx/CVE-2024-23858.json | 6 ++-- 2024/23xxx/CVE-2024-23859.json | 6 ++-- 2024/23xxx/CVE-2024-23860.json | 6 ++-- 2024/23xxx/CVE-2024-23861.json | 6 ++-- 2024/23xxx/CVE-2024-23862.json | 6 ++-- 2024/23xxx/CVE-2024-23863.json | 6 ++-- 2024/23xxx/CVE-2024-23864.json | 6 ++-- 2024/23xxx/CVE-2024-23865.json | 6 ++-- 2024/23xxx/CVE-2024-23866.json | 6 ++-- 2024/23xxx/CVE-2024-23867.json | 6 ++-- 2024/23xxx/CVE-2024-23868.json | 6 ++-- 2024/23xxx/CVE-2024-23869.json | 6 ++-- 2024/23xxx/CVE-2024-23870.json | 6 ++-- 2024/23xxx/CVE-2024-23871.json | 6 ++-- 2024/23xxx/CVE-2024-23872.json | 6 ++-- 2024/23xxx/CVE-2024-23873.json | 6 ++-- 2024/23xxx/CVE-2024-23874.json | 6 ++-- 2024/23xxx/CVE-2024-23875.json | 6 ++-- 2024/23xxx/CVE-2024-23876.json | 6 ++-- 2024/23xxx/CVE-2024-23877.json | 6 ++-- 2024/23xxx/CVE-2024-23878.json | 6 ++-- 2024/23xxx/CVE-2024-23879.json | 6 ++-- 2024/23xxx/CVE-2024-23880.json | 6 ++-- 2024/23xxx/CVE-2024-23881.json | 6 ++-- 2024/23xxx/CVE-2024-23882.json | 6 ++-- 2024/23xxx/CVE-2024-23883.json | 6 ++-- 2024/23xxx/CVE-2024-23884.json | 6 ++-- 2024/23xxx/CVE-2024-23885.json | 6 ++-- 2024/23xxx/CVE-2024-23886.json | 6 ++-- 2024/23xxx/CVE-2024-23887.json | 6 ++-- 2024/23xxx/CVE-2024-23888.json | 6 ++-- 2024/23xxx/CVE-2024-23889.json | 6 ++-- 2024/23xxx/CVE-2024-23890.json | 6 ++-- 2024/23xxx/CVE-2024-23891.json | 6 ++-- 2024/23xxx/CVE-2024-23892.json | 6 ++-- 2024/23xxx/CVE-2024-23893.json | 6 ++-- 2024/23xxx/CVE-2024-23894.json | 6 ++-- 2024/23xxx/CVE-2024-23895.json | 6 ++-- 2024/23xxx/CVE-2024-23896.json | 6 ++-- 44 files changed, 194 insertions(+), 136 deletions(-) diff --git a/2023/46xxx/CVE-2023-46596.json b/2023/46xxx/CVE-2023-46596.json index dfcb8af4ee0..b07023ebcca 100644 --- a/2023/46xxx/CVE-2023-46596.json +++ b/2023/46xxx/CVE-2023-46596.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Improper input validation in Algosec FireFlow VisualFlow workflow editor via Name, Description and Configuration File field in\u00a0version A32.20, A32.50, A32.60 permits an attacker to initiate an XSS attack by injecting malicious executable scripts into the application's code. Fixed in version\u00a0A32.20 (b600 and\nabove),\u00a0A32.50 (b430 and\nabove),\u00a0A32.60 (b250 and\nabove)" + "value": "\nImproper input validation in Algosec FireFlow VisualFlow workflow editor via Name, Description and Configuration File field in version A32.20, A32.50, A32.60 permits an attacker to initiate an XSS attack by injecting malicious executable scripts into the application's code. Fixed in version A32.20 (b600 and above), A32.50 (b430 and above), A32.60 (b250 and above)\n\n" } ] }, @@ -41,7 +41,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "A32.10, A32.20, A32.50" + "version_value": "A32.20, A32.50, A32.60" } ] } @@ -55,9 +55,9 @@ "references": { "reference_data": [ { - "url": "https://cwe.mitre.org/data/definitions/79.html", + "url": "https://www.algosec.com/docs/en/cves/Content/tech-notes/cves/cve-2023-46596.htm", "refsource": "MISC", - "name": "https://cwe.mitre.org/data/definitions/79.html" + "name": "https://www.algosec.com/docs/en/cves/Content/tech-notes/cves/cve-2023-46596.htm" } ] }, @@ -74,10 +74,10 @@ { "base64": false, "type": "text/html", - "value": "\n\nUpgrade ASMS suite to \n\nA32.20 (b600 and\nabove), A32.50 (b430 and\nabove), A32.60 (b250 and\nabove)\n\n\n\n
https://portal.algosec.com/en/downloads/hotfix_releases
" + "value": "\n\nUpgrade ASMS suite to A32.20 (b600 and above), A32.50 (b430 and above), A32.60 (b250 and above)\n\n
https://portal.algosec.com/en/downloads/hotfix_releases
" } ], - "value": "\nUpgrade ASMS suite to \n\nA32.20 (b600 and\nabove), A32.50 (b430 and\nabove), A32.60 (b250 and\nabove)\n\n\n\n\n https://portal.algosec.com/en/downloads/hotfix_releases https://portal.algosec.com/en/downloads/hotfix_releases \n" + "value": "\nUpgrade ASMS suite to\u00a0A32.20 (b600 and above), A32.50 (b430 and above), A32.60 (b250 and above)\n\n\n https://portal.algosec.com/en/downloads/hotfix_releases https://portal.algosec.com/en/downloads/hotfix_releases \n" } ], "credits": [ diff --git a/2024/0xxx/CVE-2024-0390.json b/2024/0xxx/CVE-2024-0390.json index ed1551417fe..38165aba765 100644 --- a/2024/0xxx/CVE-2024-0390.json +++ b/2024/0xxx/CVE-2024-0390.json @@ -1,18 +1,76 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-0390", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cvd@cert.pl", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "INPRAX \"iZZi connect\" application on Android contains hard-coded MQTT queue credentials. The same MQTT queue is used by corresponding physical recuperation devices. Exploiting this vulnerability could potentially allow unauthorized access to manage and read parameters of the recuperation unit \"reQnet iZZi\".This issue affects \"iZZi connect\" application versions before 2024010401.\n\n" } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-798 Use of Hard-coded Credentials", + "cweId": "CWE-798" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "INPRAX", + "product": { + "product_data": [ + { + "product_name": "iZZi connect", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "2024010401" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert.pl/en/posts/2024/02/CVE-2024-0390/", + "refsource": "MISC", + "name": "https://cert.pl/en/posts/2024/02/CVE-2024-0390/" + }, + { + "url": "https://cert.pl/posts/2024/02/CVE-2024-0390/", + "refsource": "MISC", + "name": "https://cert.pl/posts/2024/02/CVE-2024-0390/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23855.json b/2024/23xxx/CVE-2024-23855.json index 6c3de8521c2..fa02a2dea71 100644 --- a/2024/23xxx/CVE-2024-23855.json +++ b/2024/23xxx/CVE-2024-23855.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23856.json b/2024/23xxx/CVE-2024-23856.json index 5ef2199054b..902fb6a3a0a 100644 --- a/2024/23xxx/CVE-2024-23856.json +++ b/2024/23xxx/CVE-2024-23856.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23857.json b/2024/23xxx/CVE-2024-23857.json index b4530c793f0..bf6e23a6267 100644 --- a/2024/23xxx/CVE-2024-23857.json +++ b/2024/23xxx/CVE-2024-23857.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23858.json b/2024/23xxx/CVE-2024-23858.json index 69f97971047..8f37b5332f0 100644 --- a/2024/23xxx/CVE-2024-23858.json +++ b/2024/23xxx/CVE-2024-23858.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23859.json b/2024/23xxx/CVE-2024-23859.json index 91f229738dc..3639af31c92 100644 --- a/2024/23xxx/CVE-2024-23859.json +++ b/2024/23xxx/CVE-2024-23859.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23860.json b/2024/23xxx/CVE-2024-23860.json index 67952978cac..c9b9c91a19a 100644 --- a/2024/23xxx/CVE-2024-23860.json +++ b/2024/23xxx/CVE-2024-23860.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23861.json b/2024/23xxx/CVE-2024-23861.json index 4ae401eaa87..f3d9f5490c6 100644 --- a/2024/23xxx/CVE-2024-23861.json +++ b/2024/23xxx/CVE-2024-23861.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23862.json b/2024/23xxx/CVE-2024-23862.json index b178ee68803..52d44646dc5 100644 --- a/2024/23xxx/CVE-2024-23862.json +++ b/2024/23xxx/CVE-2024-23862.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23863.json b/2024/23xxx/CVE-2024-23863.json index b1f970aa724..467edc048dc 100644 --- a/2024/23xxx/CVE-2024-23863.json +++ b/2024/23xxx/CVE-2024-23863.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23864.json b/2024/23xxx/CVE-2024-23864.json index 190c6b4ff57..cb7ce09c9f2 100644 --- a/2024/23xxx/CVE-2024-23864.json +++ b/2024/23xxx/CVE-2024-23864.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23865.json b/2024/23xxx/CVE-2024-23865.json index 70bae4659e8..d592c4979a5 100644 --- a/2024/23xxx/CVE-2024-23865.json +++ b/2024/23xxx/CVE-2024-23865.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23866.json b/2024/23xxx/CVE-2024-23866.json index 7e6c44ad2ca..738f5969b92 100644 --- a/2024/23xxx/CVE-2024-23866.json +++ b/2024/23xxx/CVE-2024-23866.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23867.json b/2024/23xxx/CVE-2024-23867.json index 577d52580de..2ecbce43aef 100644 --- a/2024/23xxx/CVE-2024-23867.json +++ b/2024/23xxx/CVE-2024-23867.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23868.json b/2024/23xxx/CVE-2024-23868.json index 002c67378bc..94eb205a63a 100644 --- a/2024/23xxx/CVE-2024-23868.json +++ b/2024/23xxx/CVE-2024-23868.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23869.json b/2024/23xxx/CVE-2024-23869.json index 07b665e4e1b..c69e5466296 100644 --- a/2024/23xxx/CVE-2024-23869.json +++ b/2024/23xxx/CVE-2024-23869.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23870.json b/2024/23xxx/CVE-2024-23870.json index 0de3d5f13f0..48bf27fa15a 100644 --- a/2024/23xxx/CVE-2024-23870.json +++ b/2024/23xxx/CVE-2024-23870.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23871.json b/2024/23xxx/CVE-2024-23871.json index e32da34c2fd..c40d27f7849 100644 --- a/2024/23xxx/CVE-2024-23871.json +++ b/2024/23xxx/CVE-2024-23871.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23872.json b/2024/23xxx/CVE-2024-23872.json index 98af2bc6d0b..7021f61c5e5 100644 --- a/2024/23xxx/CVE-2024-23872.json +++ b/2024/23xxx/CVE-2024-23872.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23873.json b/2024/23xxx/CVE-2024-23873.json index 7ac66e0e702..16b6514b601 100644 --- a/2024/23xxx/CVE-2024-23873.json +++ b/2024/23xxx/CVE-2024-23873.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23874.json b/2024/23xxx/CVE-2024-23874.json index a6b69802a84..ce472431d27 100644 --- a/2024/23xxx/CVE-2024-23874.json +++ b/2024/23xxx/CVE-2024-23874.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23875.json b/2024/23xxx/CVE-2024-23875.json index 4ecfb5d0736..268ac0b8eb4 100644 --- a/2024/23xxx/CVE-2024-23875.json +++ b/2024/23xxx/CVE-2024-23875.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23876.json b/2024/23xxx/CVE-2024-23876.json index 41e8e7b8043..97ef7dda408 100644 --- a/2024/23xxx/CVE-2024-23876.json +++ b/2024/23xxx/CVE-2024-23876.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23877.json b/2024/23xxx/CVE-2024-23877.json index f807a3d20a2..c55b4c4c794 100644 --- a/2024/23xxx/CVE-2024-23877.json +++ b/2024/23xxx/CVE-2024-23877.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23878.json b/2024/23xxx/CVE-2024-23878.json index 7c6338261aa..7fc486a51de 100644 --- a/2024/23xxx/CVE-2024-23878.json +++ b/2024/23xxx/CVE-2024-23878.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23879.json b/2024/23xxx/CVE-2024-23879.json index 313bae00373..75c0d2bf828 100644 --- a/2024/23xxx/CVE-2024-23879.json +++ b/2024/23xxx/CVE-2024-23879.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23880.json b/2024/23xxx/CVE-2024-23880.json index eb5a5e23d68..26f14857632 100644 --- a/2024/23xxx/CVE-2024-23880.json +++ b/2024/23xxx/CVE-2024-23880.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23881.json b/2024/23xxx/CVE-2024-23881.json index 79178314b86..b2ac60461e6 100644 --- a/2024/23xxx/CVE-2024-23881.json +++ b/2024/23xxx/CVE-2024-23881.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23882.json b/2024/23xxx/CVE-2024-23882.json index 4ad7de9818e..23b4093e115 100644 --- a/2024/23xxx/CVE-2024-23882.json +++ b/2024/23xxx/CVE-2024-23882.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23883.json b/2024/23xxx/CVE-2024-23883.json index d1eb71d469a..2988ce1969d 100644 --- a/2024/23xxx/CVE-2024-23883.json +++ b/2024/23xxx/CVE-2024-23883.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23884.json b/2024/23xxx/CVE-2024-23884.json index 5132772344c..ac3ad3aa970 100644 --- a/2024/23xxx/CVE-2024-23884.json +++ b/2024/23xxx/CVE-2024-23884.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23885.json b/2024/23xxx/CVE-2024-23885.json index a6b9c3ea0dd..f495d1d52f0 100644 --- a/2024/23xxx/CVE-2024-23885.json +++ b/2024/23xxx/CVE-2024-23885.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23886.json b/2024/23xxx/CVE-2024-23886.json index f79d5c0ebff..c9e70338748 100644 --- a/2024/23xxx/CVE-2024-23886.json +++ b/2024/23xxx/CVE-2024-23886.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23887.json b/2024/23xxx/CVE-2024-23887.json index 818f64fc14a..b48f40ef6c1 100644 --- a/2024/23xxx/CVE-2024-23887.json +++ b/2024/23xxx/CVE-2024-23887.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23888.json b/2024/23xxx/CVE-2024-23888.json index ff04a6c1fcc..2d20a30e83c 100644 --- a/2024/23xxx/CVE-2024-23888.json +++ b/2024/23xxx/CVE-2024-23888.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23889.json b/2024/23xxx/CVE-2024-23889.json index c329f57227f..d8f95155554 100644 --- a/2024/23xxx/CVE-2024-23889.json +++ b/2024/23xxx/CVE-2024-23889.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23890.json b/2024/23xxx/CVE-2024-23890.json index 2394fd8b7dc..266b54ab0cb 100644 --- a/2024/23xxx/CVE-2024-23890.json +++ b/2024/23xxx/CVE-2024-23890.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23891.json b/2024/23xxx/CVE-2024-23891.json index 93ab08e0623..2ee90ea20cb 100644 --- a/2024/23xxx/CVE-2024-23891.json +++ b/2024/23xxx/CVE-2024-23891.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23892.json b/2024/23xxx/CVE-2024-23892.json index 205f3ad92ef..f4b3be04030 100644 --- a/2024/23xxx/CVE-2024-23892.json +++ b/2024/23xxx/CVE-2024-23892.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23893.json b/2024/23xxx/CVE-2024-23893.json index 92eb0d8ada0..3454e8a62ab 100644 --- a/2024/23xxx/CVE-2024-23893.json +++ b/2024/23xxx/CVE-2024-23893.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23894.json b/2024/23xxx/CVE-2024-23894.json index 056a1fff524..21e42ba8ca5 100644 --- a/2024/23xxx/CVE-2024-23894.json +++ b/2024/23xxx/CVE-2024-23894.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23895.json b/2024/23xxx/CVE-2024-23895.json index 1e4d28ca0a2..b3da630cb3a 100644 --- a/2024/23xxx/CVE-2024-23895.json +++ b/2024/23xxx/CVE-2024-23895.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ] diff --git a/2024/23xxx/CVE-2024-23896.json b/2024/23xxx/CVE-2024-23896.json index 578d4436f37..b8bdb939c2f 100644 --- a/2024/23xxx/CVE-2024-23896.json +++ b/2024/23xxx/CVE-2024-23896.json @@ -79,14 +79,14 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } ]