Skip to content

Commit

Permalink
Show file tree
Hide file tree
Showing 11 changed files with 290 additions and 10 deletions.
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-pmjc-mxf4-8qwx",
"modified": "2024-09-04T18:30:57Z",
"modified": "2024-11-24T21:30:46Z",
"published": "2024-09-04T15:30:35Z",
"aliases": [
"CVE-2024-7923"
Expand Down Expand Up @@ -33,6 +33,10 @@
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:6337"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:8906"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2024-7923"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-wq2p-5pc6-wpgf",
"modified": "2024-11-13T09:30:56Z",
"modified": "2024-11-24T21:30:46Z",
"published": "2024-10-15T18:30:50Z",
"aliases": [
"CVE-2024-9676"
Expand Down Expand Up @@ -65,6 +65,10 @@
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:9459"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:9926"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2024-9676"
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"schema_version": "1.4.0",
"id": "GHSA-34jr-r2pr-95hh",
"modified": "2024-11-24T21:30:46Z",
"published": "2024-11-24T21:30:46Z",
"aliases": [
"CVE-2024-53912"
],
"details": "An issue was discovered in the server in Veritas Enterprise Vault before 15.2, ZDI-CAN-24341. It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53912"
},
{
"type": "WEB",
"url": "https://www.veritas.com/content/support/en_US/security/VTS24-014"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": "CRITICAL",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-11-24T21:15:04Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"schema_version": "1.4.0",
"id": "GHSA-5m9p-9w9f-5c87",
"modified": "2024-11-24T21:30:46Z",
"published": "2024-11-24T21:30:46Z",
"aliases": [
"CVE-2024-53911"
],
"details": "An issue was discovered in the server in Veritas Enterprise Vault before 15.2, ZDI-CAN-24339. It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53911"
},
{
"type": "WEB",
"url": "https://www.veritas.com/content/support/en_US/security/VTS24-014"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": "CRITICAL",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-11-24T21:15:04Z"
}
}
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
{
"schema_version": "1.4.0",
"id": "GHSA-cwgj-pq49-6x66",
"modified": "2024-11-24T18:31:39Z",
"modified": "2024-11-24T21:30:46Z",
"published": "2024-11-24T18:31:39Z",
"aliases": [
"CVE-2024-53901"
],
"details": "The Imager package before 1.025 for Perl has a heap-based buffer overflow leading to denial of service, or possibly unspecified other impact, when the trim() method is called on a crafted input image.",
"severity": [

{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
}
],
"affected": [

Expand Down Expand Up @@ -37,9 +40,9 @@
],
"database_specific": {
"cwe_ids": [

"CWE-120"
],
"severity": null,
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-11-24T17:15:04Z"
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"schema_version": "1.4.0",
"id": "GHSA-fqhc-grp9-76ch",
"modified": "2024-11-24T21:30:46Z",
"published": "2024-11-24T21:30:46Z",
"aliases": [
"CVE-2024-53913"
],
"details": "An issue was discovered in the server in Veritas Enterprise Vault before 15.2, ZDI-CAN-24343. It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53913"
},
{
"type": "WEB",
"url": "https://www.veritas.com/content/support/en_US/security/VTS24-014"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": "CRITICAL",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-11-24T21:15:04Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"schema_version": "1.4.0",
"id": "GHSA-r2xg-c3rj-xj8r",
"modified": "2024-11-24T21:30:46Z",
"published": "2024-11-24T21:30:46Z",
"aliases": [
"CVE-2024-53914"
],
"details": "An issue was discovered in the server in Veritas Enterprise Vault before 15.2, ZDI-CAN-24344. It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53914"
},
{
"type": "WEB",
"url": "https://www.veritas.com/content/support/en_US/security/VTS24-014"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": "CRITICAL",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-11-24T21:15:04Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"schema_version": "1.4.0",
"id": "GHSA-rj48-23jv-5ph5",
"modified": "2024-11-24T21:30:46Z",
"published": "2024-11-24T21:30:46Z",
"aliases": [
"CVE-2024-53910"
],
"details": "An issue was discovered in the server in Veritas Enterprise Vault before 15.2, ZDI-CAN-24336. It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53910"
},
{
"type": "WEB",
"url": "https://www.veritas.com/content/support/en_US/security/VTS24-014"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": "CRITICAL",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-11-24T21:15:03Z"
}
}
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
{
"schema_version": "1.4.0",
"id": "GHSA-rqc4-2hc7-8c8v",
"modified": "2024-11-24T18:31:39Z",
"modified": "2024-11-24T21:30:46Z",
"published": "2024-11-24T18:31:39Z",
"aliases": [
"CVE-2024-53899"
],
"details": "virtualenv before 20.26.6 allows command injection through the activation scripts for a virtual environment. Magic template strings are not quoted correctly when replacing. NOTE: this is not the same as CVE-2024-9287.",
"severity": [

{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"affected": [

Expand All @@ -33,9 +36,9 @@
],
"database_specific": {
"cwe_ids": [

"CWE-78"
],
"severity": null,
"severity": "HIGH",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-11-24T16:15:06Z"
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"schema_version": "1.4.0",
"id": "GHSA-vcg2-wj7m-5j2m",
"modified": "2024-11-24T21:30:46Z",
"published": "2024-11-24T21:30:46Z",
"aliases": [
"CVE-2024-53915"
],
"details": "An issue was discovered in the server in Veritas Enterprise Vault before 15.2, ZDI-CAN-24405. It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53915"
},
{
"type": "WEB",
"url": "https://www.veritas.com/content/support/en_US/security/VTS24-014"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": "CRITICAL",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-11-24T21:15:04Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"schema_version": "1.4.0",
"id": "GHSA-vq3g-vjx5-h9p5",
"modified": "2024-11-24T21:30:46Z",
"published": "2024-11-24T21:30:46Z",
"aliases": [
"CVE-2024-53909"
],
"details": "An issue was discovered in the server in Veritas Enterprise Vault before 15.2, ZDI-CAN-24334. It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53909"
},
{
"type": "WEB",
"url": "https://www.veritas.com/content/support/en_US/security/VTS24-014"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": "CRITICAL",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-11-24T21:15:03Z"
}
}

0 comments on commit 8ee6bd1

Please sign in to comment.