Skip to content

File tree

11 files changed

+130
-29
lines changed

11 files changed

+130
-29
lines changed

advisories/unreviewed/2024/07/GHSA-38cc-8h76-38hf/GHSA-38cc-8h76-38hf.json

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-38cc-8h76-38hf",
4-
"modified": "2024-07-17T00:32:56Z",
4+
"modified": "2024-07-18T15:31:19Z",
55
"published": "2024-07-17T00:32:56Z",
66
"aliases": [
77
"CVE-2024-3175"
88
],
99
"details": "Insufficient data validation in Extensions in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to perform privilege escalation via a crafted Chrome Extension. (Chromium security severity: Low)",
1010
"severity": [
11-
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
14+
}
1215
],
1316
"affected": [
1417

@@ -31,7 +34,7 @@
3134
"cwe_ids": [
3235

3336
],
34-
"severity": null,
37+
"severity": "MODERATE",
3538
"github_reviewed": false,
3639
"github_reviewed_at": null,
3740
"nvd_published_at": "2024-07-16T23:15:24Z"

advisories/unreviewed/2024/07/GHSA-5pv6-mmq6-6w3p/GHSA-5pv6-mmq6-6w3p.json

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5pv6-mmq6-6w3p",
4-
"modified": "2024-07-17T00:32:56Z",
4+
"modified": "2024-07-18T15:31:19Z",
55
"published": "2024-07-17T00:32:56Z",
66
"aliases": [
77
"CVE-2024-3172"
88
],
99
"details": "Insufficient data validation in DevTools in Google Chrome prior to 121.0.6167.85 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)",
1010
"severity": [
11-
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
1215
],
1316
"affected": [
1417

@@ -31,7 +34,7 @@
3134
"cwe_ids": [
3235

3336
],
34-
"severity": null,
37+
"severity": "HIGH",
3538
"github_reviewed": false,
3639
"github_reviewed_at": null,
3740
"nvd_published_at": "2024-07-16T23:15:23Z"

advisories/unreviewed/2024/07/GHSA-7jr6-fvm5-h86m/GHSA-7jr6-fvm5-h86m.json

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7jr6-fvm5-h86m",
4-
"modified": "2024-07-17T00:32:56Z",
4+
"modified": "2024-07-18T15:31:19Z",
55
"published": "2024-07-17T00:32:56Z",
66
"aliases": [
77
"CVE-2024-5500"
88
],
99
"details": "Inappropriate implementation in Sign-In in Google Chrome prior to 1.3.36.351 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)",
1010
"severity": [
11-
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
14+
}
1215
],
1316
"affected": [
1417

@@ -31,7 +34,7 @@
3134
"cwe_ids": [
3235

3336
],
34-
"severity": null,
37+
"severity": "MODERATE",
3538
"github_reviewed": false,
3639
"github_reviewed_at": null,
3740
"nvd_published_at": "2024-07-16T23:15:24Z"
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-cjq8-723f-8fmv",
4+
"modified": "2024-07-18T15:31:19Z",
5+
"published": "2024-07-18T15:31:19Z",
6+
"aliases": [
7+
"CVE-2024-31143"
8+
],
9+
"details": "An optional feature of PCI MSI called \"Multiple Message\" allows a\ndevice to use multiple consecutive interrupt vectors. Unlike for MSI-X,\nthe setting up of these consecutive vectors needs to happen all in one\ngo. In this handling an error path could be taken in different\nsituations, with or without a particular lock held. This error path\nwrongly releases the lock even when it is not currently held.\n",
10+
"severity": [
11+
12+
],
13+
"affected": [
14+
15+
],
16+
"references": [
17+
{
18+
"type": "ADVISORY",
19+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31143"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://xenbits.xenproject.org/xsa/advisory-458.html"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [
28+
29+
],
30+
"severity": null,
31+
"github_reviewed": false,
32+
"github_reviewed_at": null,
33+
"nvd_published_at": "2024-07-18T14:15:04Z"
34+
}
35+
}

advisories/unreviewed/2024/07/GHSA-f2wx-vcrf-76pc/GHSA-f2wx-vcrf-76pc.json

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f2wx-vcrf-76pc",
4-
"modified": "2024-07-17T00:32:56Z",
4+
"modified": "2024-07-18T15:31:19Z",
55
"published": "2024-07-17T00:32:56Z",
66
"aliases": [
77
"CVE-2024-3171"
88
],
99
"details": "Use after free in Accessibility in Google Chrome prior to 122.0.6261.57 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)",
1010
"severity": [
11-
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
1215
],
1316
"affected": [
1417

@@ -29,9 +32,9 @@
2932
],
3033
"database_specific": {
3134
"cwe_ids": [
32-
35+
"CWE-416"
3336
],
34-
"severity": null,
37+
"severity": "HIGH",
3538
"github_reviewed": false,
3639
"github_reviewed_at": null,
3740
"nvd_published_at": "2024-07-16T23:15:23Z"

advisories/unreviewed/2024/07/GHSA-h2v6-2834-235m/GHSA-h2v6-2834-235m.json

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-h2v6-2834-235m",
4-
"modified": "2024-07-17T00:32:56Z",
4+
"modified": "2024-07-18T15:31:19Z",
55
"published": "2024-07-17T00:32:56Z",
66
"aliases": [
77
"CVE-2024-3176"
88
],
99
"details": "Out of bounds write in SwiftShader in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)",
1010
"severity": [
11-
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
1215
],
1316
"affected": [
1417

@@ -29,9 +32,9 @@
2932
],
3033
"database_specific": {
3134
"cwe_ids": [
32-
35+
"CWE-787"
3336
],
34-
"severity": null,
37+
"severity": "HIGH",
3538
"github_reviewed": false,
3639
"github_reviewed_at": null,
3740
"nvd_published_at": "2024-07-16T23:15:24Z"

advisories/unreviewed/2024/07/GHSA-jh2w-8chx-3fxj/GHSA-jh2w-8chx-3fxj.json

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jh2w-8chx-3fxj",
4-
"modified": "2024-07-17T00:32:56Z",
4+
"modified": "2024-07-18T15:31:19Z",
55
"published": "2024-07-17T00:32:55Z",
66
"aliases": [
77
"CVE-2024-3170"
88
],
99
"details": "Use after free in WebRTC in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
1010
"severity": [
11-
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
1215
],
1316
"affected": [
1417

@@ -29,9 +32,9 @@
2932
],
3033
"database_specific": {
3134
"cwe_ids": [
32-
35+
"CWE-416"
3336
],
34-
"severity": null,
37+
"severity": "HIGH",
3538
"github_reviewed": false,
3639
"github_reviewed_at": null,
3740
"nvd_published_at": "2024-07-16T23:15:23Z"

advisories/unreviewed/2024/07/GHSA-m2vv-g52m-x3qw/GHSA-m2vv-g52m-x3qw.json

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m2vv-g52m-x3qw",
4-
"modified": "2024-07-17T00:32:56Z",
4+
"modified": "2024-07-18T15:31:19Z",
55
"published": "2024-07-17T00:32:56Z",
66
"aliases": [
77
"CVE-2024-3173"
88
],
99
"details": "Insufficient data validation in Updater in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to perform OS-level privilege escalation via a malicious file. (Chromium security severity: High)",
1010
"severity": [
11-
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
1215
],
1316
"affected": [
1417

@@ -29,9 +32,9 @@
2932
],
3033
"database_specific": {
3134
"cwe_ids": [
32-
35+
"CWE-345"
3336
],
34-
"severity": null,
37+
"severity": "HIGH",
3538
"github_reviewed": false,
3639
"github_reviewed_at": null,
3740
"nvd_published_at": "2024-07-16T23:15:24Z"

advisories/unreviewed/2024/07/GHSA-qw4m-qq5c-43c6/GHSA-qw4m-qq5c-43c6.json

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qw4m-qq5c-43c6",
4-
"modified": "2024-07-17T00:32:56Z",
4+
"modified": "2024-07-18T15:31:19Z",
55
"published": "2024-07-17T00:32:56Z",
66
"aliases": [
77
"CVE-2024-3174"
88
],
99
"details": "Inappropriate implementation in V8 in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)",
1010
"severity": [
11-
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
1215
],
1316
"affected": [
1417

@@ -31,7 +34,7 @@
3134
"cwe_ids": [
3235

3336
],
34-
"severity": null,
37+
"severity": "HIGH",
3538
"github_reviewed": false,
3639
"github_reviewed_at": null,
3740
"nvd_published_at": "2024-07-16T23:15:24Z"
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-rgcv-cq58-fv8p",
4+
"modified": "2024-07-18T15:31:19Z",
5+
"published": "2024-07-18T15:31:19Z",
6+
"aliases": [
7+
"CVE-2024-34013"
8+
],
9+
"details": "Local privilege escalation due to OS command injection vulnerability. The following products are affected: Acronis True Image (macOS) before build 41396.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [
17+
18+
],
19+
"references": [
20+
{
21+
"type": "ADVISORY",
22+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34013"
23+
},
24+
{
25+
"type": "WEB",
26+
"url": "https://security-advisory.acronis.com/advisories/SEC-7035"
27+
}
28+
],
29+
"database_specific": {
30+
"cwe_ids": [
31+
"CWE-78"
32+
],
33+
"severity": "HIGH",
34+
"github_reviewed": false,
35+
"github_reviewed_at": null,
36+
"nvd_published_at": "2024-07-18T14:15:04Z"
37+
}
38+
}

0 commit comments

Comments
 (0)