diff --git a/2023/26xxx/CVE-2023-26531.json b/2023/26xxx/CVE-2023-26531.json index 0cc7f01e914..6bbaf394284 100644 --- a/2023/26xxx/CVE-2023-26531.json +++ b/2023/26xxx/CVE-2023-26531.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Cross-Site Request Forgery (CSRF) vulnerability in \u95ea\u7535\u535a \u591a\u5408\u4e00\u641c\u7d22\u81ea\u52a8\u63a8\u9001\u7ba1\u7406\u63d2\u4ef6-\u652f\u6301Baidu/Google/Bing/IndexNow/Yandex/\u5934\u6761 plugin <=\u00a04.2.7 versions." + "value": "Cross-Site Request Forgery (CSRF) vulnerability in \u95ea\u7535\u535a \u591a\u5408\u4e00\u641c\u7d22\u81ea\u52a8\u63a8\u9001\u7ba1\u7406\u63d2\u4ef6-\u652f\u6301Baidu/Google/Bing/IndexNow/Yandex/\u5934\u6761 allows Cross Site Request Forgery.This issue affects \u591a\u5408\u4e00\u641c\u7d22\u81ea\u52a8\u63a8\u9001\u7ba1\u7406\u63d2\u4ef6-\u652f\u6301Baidu/Google/Bing/IndexNow/Yandex/\u5934\u6761: from n/a through 4.2.7." } ] }, @@ -40,9 +40,24 @@ "version": { "version_data": [ { - "version_affected": "<=", - "version_name": "n/a", - "version_value": "4.2.7" + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "4.2.8", + "status": "unaffected" + } + ], + "lessThanOrEqual": "4.2.7", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } } ] } @@ -68,6 +83,19 @@ "source": { "discovery": "EXTERNAL" }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 4.2.8 or a higher version." + } + ], + "value": "Update to\u00a04.2.8 or a higher version." + } + ], "credits": [ { "lang": "en", diff --git a/2024/35xxx/CVE-2024-35781.json b/2024/35xxx/CVE-2024-35781.json index 8ecb59e99d8..96321163a00 100644 --- a/2024/35xxx/CVE-2024-35781.json +++ b/2024/35xxx/CVE-2024-35781.json @@ -40,9 +40,24 @@ "version": { "version_data": [ { - "version_affected": "<=", - "version_name": "n/a", - "version_value": "4.21.1" + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "4.22.0", + "status": "unaffected" + } + ], + "lessThanOrEqual": "4.21.1", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } } ] } @@ -68,6 +83,19 @@ "source": { "discovery": "EXTERNAL" }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 4.22.0 or a higher version." + } + ], + "value": "Update to\u00a04.22.0 or a higher version." + } + ], "credits": [ { "lang": "en", diff --git a/2024/3xxx/CVE-2024-3727.json b/2024/3xxx/CVE-2024-3727.json index a4513065952..1d9182af3d1 100644 --- a/2024/3xxx/CVE-2024-3727.json +++ b/2024/3xxx/CVE-2024-3727.json @@ -58,7 +58,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "2:1.14.4-1.rhaos4.16.el9", + "version": "2:1.14.4-1.rhaos4.16.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -72,7 +72,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.29.5-7.rhaos4.16.git7db4ada.el9", + "version": "0:1.29.5-7.rhaos4.16.git7db4ada.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -273,7 +273,7 @@ { "version_value": "not down converted", "x_cve_json_5_version_data": { - "defaultStatus": "affected" + "defaultStatus": "unaffected" } }, { @@ -297,13 +297,13 @@ { "version_value": "not down converted", "x_cve_json_5_version_data": { - "defaultStatus": "affected" + "defaultStatus": "unaffected" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { - "defaultStatus": "affected" + "defaultStatus": "unaffected" } }, {