Skip to content

36 files changed

+1634
-111
lines changed

cves/2001/0xxx/CVE-2001-0331.json

+2-15
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@
3232
}
3333
],
3434
"providerMetadata": {
35-
"dateUpdated": "2005-11-02T10:00:00",
35+
"dateUpdated": "2024-08-08T16:14:00.000Z",
3636
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
3737
"shortName": "mitre"
3838
},
@@ -84,14 +84,6 @@
8484
"x_refsource_BID"
8585
],
8686
"url": "http://www.securityfocus.com/bid/2714"
87-
},
88-
{
89-
"name": "20010509 Remote Buffer Overflow Vulnerability in IRIX Embedded Support Partner Infrastructure\t",
90-
"tags": [
91-
"third-party-advisory",
92-
"x_refsource_ISS"
93-
],
94-
"url": "http://xforce.iss.net/alerts/advise76.php"
9587
}
9688
],
9789
"x_legacyV4Record": {
@@ -177,11 +169,6 @@
177169
"name": "2714",
178170
"refsource": "BID",
179171
"url": "http://www.securityfocus.com/bid/2714"
180-
},
181-
{
182-
"name": "20010509 Remote Buffer Overflow Vulnerability in IRIX Embedded Support Partner Infrastructure\t",
183-
"refsource": "ISS",
184-
"url": "http://xforce.iss.net/alerts/advise76.php"
185172
}
186173
]
187174
}
@@ -194,7 +181,7 @@
194181
"cveId": "CVE-2001-0331",
195182
"datePublished": "2001-09-18T04:00:00",
196183
"dateReserved": "2001-05-08T00:00:00",
197-
"dateUpdated": "2005-11-02T10:00:00",
184+
"dateUpdated": "2024-08-08T16:14:00.000Z",
198185
"state": "PUBLISHED"
199186
},
200187
"dataType": "CVE_RECORD",

cves/2022/47xxx/CVE-2022-47153.json

+33-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
"assignerShortName": "Patchstack",
99
"dateReserved": "2022-12-12T11:41:44.114Z",
1010
"datePublished": "2024-03-29T13:09:36.401Z",
11-
"dateUpdated": "2024-08-03T14:47:29.393Z"
11+
"dateUpdated": "2024-08-08T16:12:32.950Z"
1212
},
1313
"containers": {
1414
"cna": {
@@ -153,6 +153,38 @@
153153
"url": "https://patchstack.com/database/vulnerability/jobeleon-wpjobboard/wordpress-jobeleon-theme-1-9-1-cross-site-scripting-xss?_s_id=cve"
154154
}
155155
]
156+
},
157+
{
158+
"metrics": [
159+
{
160+
"other": {
161+
"type": "ssvc",
162+
"content": {
163+
"timestamp": "2024-08-08T16:02:46.612960Z",
164+
"id": "CVE-2022-47153",
165+
"options": [
166+
{
167+
"Exploitation": "none"
168+
},
169+
{
170+
"Automatable": "no"
171+
},
172+
{
173+
"Technical Impact": "partial"
174+
}
175+
],
176+
"role": "CISA Coordinator",
177+
"version": "2.0.3"
178+
}
179+
}
180+
}
181+
],
182+
"title": "CISA ADP Vulnrichment",
183+
"providerMetadata": {
184+
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
185+
"shortName": "CISA-ADP",
186+
"dateUpdated": "2024-08-08T16:12:32.950Z"
187+
}
156188
}
157189
]
158190
}

cves/2023/51xxx/CVE-2023-51369.json

+33-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
"assignerShortName": "Patchstack",
99
"dateReserved": "2023-12-18T15:51:57.413Z",
1010
"datePublished": "2024-03-15T14:19:51.395Z",
11-
"dateUpdated": "2024-08-02T22:32:09.933Z"
11+
"dateUpdated": "2024-08-08T16:12:42.775Z"
1212
},
1313
"containers": {
1414
"cna": {
@@ -144,6 +144,38 @@
144144
"url": "https://patchstack.com/database/vulnerability/customize-my-account-for-woocommerce/wordpress-customize-my-account-for-woocommerce-plugin-1-8-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve"
145145
}
146146
]
147+
},
148+
{
149+
"metrics": [
150+
{
151+
"other": {
152+
"type": "ssvc",
153+
"content": {
154+
"timestamp": "2024-08-08T16:03:10.980865Z",
155+
"id": "CVE-2023-51369",
156+
"options": [
157+
{
158+
"Exploitation": "none"
159+
},
160+
{
161+
"Automatable": "no"
162+
},
163+
{
164+
"Technical Impact": "partial"
165+
}
166+
],
167+
"role": "CISA Coordinator",
168+
"version": "2.0.3"
169+
}
170+
}
171+
}
172+
],
173+
"title": "CISA ADP Vulnrichment",
174+
"providerMetadata": {
175+
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
176+
"shortName": "CISA-ADP",
177+
"dateUpdated": "2024-08-08T16:12:42.775Z"
178+
}
147179
}
148180
]
149181
}

cves/2024/0xxx/CVE-2024-0102.json

+117
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,117 @@
1+
{
2+
"dataType": "CVE_RECORD",
3+
"dataVersion": "5.1",
4+
"cveMetadata": {
5+
"cveId": "CVE-2024-0102",
6+
"assignerOrgId": "9576f279-3576-44b5-a4af-b9a8644b2de6",
7+
"state": "PUBLISHED",
8+
"assignerShortName": "nvidia",
9+
"dateReserved": "2023-12-02T00:42:11.461Z",
10+
"datePublished": "2024-08-08T16:12:57.693Z",
11+
"dateUpdated": "2024-08-08T16:12:57.693Z"
12+
},
13+
"containers": {
14+
"cna": {
15+
"affected": [
16+
{
17+
"defaultStatus": "unaffected",
18+
"platforms": [
19+
"Windows",
20+
"Linux"
21+
],
22+
"product": "NVIDIA CUDA Toolkit",
23+
"vendor": "NVIDIA",
24+
"versions": [
25+
{
26+
"status": "affected",
27+
"version": "All versions up to and including CUDA Toolkit 12.5U1"
28+
}
29+
]
30+
}
31+
],
32+
"credits": [
33+
{
34+
"lang": "en",
35+
"type": "finder",
36+
"value": "Matteo Marini and Daniele Cono D'Elia"
37+
}
38+
],
39+
"descriptions": [
40+
{
41+
"lang": "en",
42+
"supportingMedia": [
43+
{
44+
"base64": false,
45+
"type": "text/html",
46+
"value": "<span style=\"background-color: transparent;\">NVIDIA CUDA Toolkit for all platforms contains a vulnerability in nvdisasm, where an attacker can cause an out-of-bounds read issue by deceiving a user into reading a malformed ELF file. A successful exploit of this vulnerability might lead to denial of service</span><span style=\"background-color: rgb(255, 255, 255);\">.</span>"
47+
}
48+
],
49+
"value": "NVIDIA CUDA Toolkit for all platforms contains a vulnerability in nvdisasm, where an attacker can cause an out-of-bounds read issue by deceiving a user into reading a malformed ELF file. A successful exploit of this vulnerability might lead to denial of service."
50+
}
51+
],
52+
"impacts": [
53+
{
54+
"descriptions": [
55+
{
56+
"lang": "en",
57+
"value": "Denial of service"
58+
}
59+
]
60+
}
61+
],
62+
"metrics": [
63+
{
64+
"cvssV3_1": {
65+
"attackComplexity": "LOW",
66+
"attackVector": "LOCAL",
67+
"availabilityImpact": "LOW",
68+
"baseScore": 3.3,
69+
"baseSeverity": "LOW",
70+
"confidentialityImpact": "NONE",
71+
"integrityImpact": "NONE",
72+
"privilegesRequired": "NONE",
73+
"scope": "UNCHANGED",
74+
"userInteraction": "REQUIRED",
75+
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
76+
"version": "3.1"
77+
},
78+
"format": "CVSS",
79+
"scenarios": [
80+
{
81+
"lang": "en",
82+
"value": "GENERAL"
83+
}
84+
]
85+
}
86+
],
87+
"problemTypes": [
88+
{
89+
"descriptions": [
90+
{
91+
"cweId": "CWE-125",
92+
"description": "CWE-125 Out-of-bounds Read",
93+
"lang": "en",
94+
"type": "CWE"
95+
}
96+
]
97+
}
98+
],
99+
"providerMetadata": {
100+
"orgId": "9576f279-3576-44b5-a4af-b9a8644b2de6",
101+
"shortName": "nvidia",
102+
"dateUpdated": "2024-08-08T16:12:57.693Z"
103+
},
104+
"references": [
105+
{
106+
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5548"
107+
}
108+
],
109+
"source": {
110+
"discovery": "UNKNOWN"
111+
},
112+
"x_generator": {
113+
"engine": "Vulnogram 0.2.0"
114+
}
115+
}
116+
}
117+
}

cves/2024/24xxx/CVE-2024-24876.json

+33-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
"assignerShortName": "Patchstack",
99
"dateReserved": "2024-02-01T10:26:29.010Z",
1010
"datePublished": "2024-02-21T06:54:42.013Z",
11-
"dateUpdated": "2024-08-01T23:28:12.902Z"
11+
"dateUpdated": "2024-08-08T16:12:51.172Z"
1212
},
1313
"containers": {
1414
"cna": {
@@ -144,6 +144,38 @@
144144
"url": "https://patchstack.com/database/vulnerability/admin-menu-editor/wordpress-admin-menu-editor-plugin-1-12-cross-site-request-forgery-csrf-vulnerability?_s_id=cve"
145145
}
146146
]
147+
},
148+
{
149+
"metrics": [
150+
{
151+
"other": {
152+
"type": "ssvc",
153+
"content": {
154+
"timestamp": "2024-08-08T16:03:28.026610Z",
155+
"id": "CVE-2024-24876",
156+
"options": [
157+
{
158+
"Exploitation": "none"
159+
},
160+
{
161+
"Automatable": "no"
162+
},
163+
{
164+
"Technical Impact": "partial"
165+
}
166+
],
167+
"role": "CISA Coordinator",
168+
"version": "2.0.3"
169+
}
170+
}
171+
}
172+
],
173+
"title": "CISA ADP Vulnrichment",
174+
"providerMetadata": {
175+
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
176+
"shortName": "CISA-ADP",
177+
"dateUpdated": "2024-08-08T16:12:51.172Z"
178+
}
147179
}
148180
]
149181
}

cves/2024/27xxx/CVE-2024-27194.json

+33-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
"assignerShortName": "Patchstack",
99
"dateReserved": "2024-02-21T07:35:09.494Z",
1010
"datePublished": "2024-03-16T01:22:52.438Z",
11-
"dateUpdated": "2024-08-02T00:27:59.738Z"
11+
"dateUpdated": "2024-08-08T16:12:39.196Z"
1212
},
1313
"containers": {
1414
"cna": {
@@ -136,6 +136,38 @@
136136
"url": "https://patchstack.com/database/vulnerability/fontific/wordpress-fontific-plugin-0-1-6-csrf-to-xss-vulnerability?_s_id=cve"
137137
}
138138
]
139+
},
140+
{
141+
"metrics": [
142+
{
143+
"other": {
144+
"type": "ssvc",
145+
"content": {
146+
"timestamp": "2024-08-08T16:03:02.601041Z",
147+
"id": "CVE-2024-27194",
148+
"options": [
149+
{
150+
"Exploitation": "none"
151+
},
152+
{
153+
"Automatable": "no"
154+
},
155+
{
156+
"Technical Impact": "partial"
157+
}
158+
],
159+
"role": "CISA Coordinator",
160+
"version": "2.0.3"
161+
}
162+
}
163+
}
164+
],
165+
"title": "CISA ADP Vulnrichment",
166+
"providerMetadata": {
167+
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
168+
"shortName": "CISA-ADP",
169+
"dateUpdated": "2024-08-08T16:12:39.196Z"
170+
}
139171
}
140172
]
141173
}

0 commit comments

Comments
 (0)