Auto-Update: 2024-06-10T22:00:18.377626+00:00

This commit is contained in:
cad-safe-bot 2024-06-10 22:03:12 +00:00
parent f60acbd06c
commit 0623276c50
73 changed files with 2777 additions and 367 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-16310",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-09-06T23:29:01.350",
"lastModified": "2024-05-17T01:24:42.330",
"lastModified": "2024-06-10T21:15:48.783",
"vulnStatus": "Modified",
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-18290",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-10-14T21:29:00.823",
"lastModified": "2024-05-17T01:25:31.347",
"lastModified": "2024-06-10T21:15:48.900",
"vulnStatus": "Modified",
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-35204",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-01-11T03:15:13.567",
"lastModified": "2024-05-17T01:48:13.620",
"lastModified": "2024-06-10T21:15:49.030",
"vulnStatus": "Modified",
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-35726",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-01-11T03:15:14.067",
"lastModified": "2024-05-17T01:48:26.200",
"lastModified": "2024-06-10T21:15:49.150",
"vulnStatus": "Modified",
"descriptions": [
{

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-32897",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T20:15:12.440",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.5. Processing a maliciously crafted tiff file may lead to arbitrary code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213345",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-32933",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T20:15:12.533",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in macOS Monterey 12.5. A website may be able to track the websites a user visited in Safari private browsing mode."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213345",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48578",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T20:15:12.600",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.5. Processing an AppleScript may result in unexpected termination or disclosure of process memory."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213345",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48683",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T20:15:12.677",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13. An app may be able to break out of its sandbox."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213488",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40389",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T20:15:12.753",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved restriction of data container access. This issue is fixed in macOS Ventura 13.6.5, macOS Monterey 12.7.4. An app may be able to access sensitive user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214083",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214085",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-45922",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-27T05:15:47.203",
"lastModified": "2024-05-17T02:29:56.887",
"lastModified": "2024-06-10T21:15:49.337",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-22279",
"sourceIdentifier": "security@vmware.com",
"published": "2024-06-10T20:15:12.880",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper handling of requests in Routing Release > v0.273.0 and <= v0.297.0 allows an unauthenticated attacker to degrade\n the service availability of the Cloud Foundry deployment if performed at scale."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@vmware.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-444"
}
]
}
],
"references": [
{
"url": "https://www.cloudfoundry.org/blog/cve-2024-22279-gorouter-denial-of-service-attack/",
"source": "security@vmware.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-23251",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:49.430",
"lastModified": "2024-06-10T21:15:49.430",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An authentication issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.5, watchOS 10.5, iOS 17.5 and iPadOS 17.5, iOS 16.7.8 and iPadOS 16.7.8. An attacker with physical access may be able to leak Mail account credentials."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-23282",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:49.503",
"lastModified": "2024-06-10T21:15:49.503",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5, watchOS 10.5, iOS 17.5 and iPadOS 17.5, iOS 16.7.8 and iPadOS 16.7.8. A maliciously crafted email may be able to initiate FaceTime calls without user authorization."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-23299",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T20:15:13.107",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.4, macOS Ventura 13.6.5, macOS Monterey 12.7.4. An app may be able to break out of its sandbox."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214083",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214085",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-27792",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T20:15:13.210",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Sonoma 14.4. An app may be able to access user-sensitive data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-27799",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:49.607",
"lastModified": "2024-06-10T21:15:49.607",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with additional entitlement checks. This issue is fixed in macOS Sonoma 14.5, macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8. An unprivileged app may be able to log keystrokes in other apps including those using secure input mode."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214107",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,52 @@
{
"id": "CVE-2024-27800",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:49.683",
"lastModified": "2024-06-10T21:15:49.683",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing a maliciously crafted message may lead to a denial-of-service."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214107",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2024-27801",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:49.770",
"lastModified": "2024-06-10T21:15:49.770",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to elevate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-27802",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:49.860",
"lastModified": "2024-06-10T21:15:49.860",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5. Processing a maliciously crafted file may lead to unexpected app termination or arbitrary code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214107",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-27805",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:49.943",
"lastModified": "2024-06-10T21:15:49.943",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was addressed with improved validation of environment variables. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to access sensitive user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214107",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-27806",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.020",
"lastModified": "2024-06-10T21:15:50.020",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved environment sanitization. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to access sensitive user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214107",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-27807",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.093",
"lastModified": "2024-06-10T21:15:50.093",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in iOS 17.5 and iPadOS 17.5, iOS 16.7.8 and iPadOS 16.7.8. An app may be able to circumvent App Privacy Report logging."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2024-27808",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.160",
"lastModified": "2024-06-10T21:15:50.160",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in tvOS 17.5, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing web content may lead to arbitrary code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214103",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2024-27811",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.230",
"lastModified": "2024-06-10T21:15:50.230",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to elevate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-27812",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.300",
"lastModified": "2024-06-10T21:15:50.300",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improvements to the file handling protocol. This issue is fixed in visionOS 1.2. Processing web content may lead to a denial-of-service."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-27814",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.373",
"lastModified": "2024-06-10T21:15:50.373",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed through improved state management. This issue is fixed in watchOS 10.5. A person with physical access to a device may be able to view contact information from the lock screen."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2024-27815",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.440",
"lastModified": "2024-06-10T21:15:50.440",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to execute arbitrary code with kernel privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-27817",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.547",
"lastModified": "2024-06-10T21:15:50.547",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5. An app may be able to execute arbitrary code with kernel privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214107",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-27819",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.623",
"lastModified": "2024-06-10T21:15:50.623",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 17.5 and iPadOS 17.5. An attacker with physical access may be able to access contacts from the lock screen."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-27820",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.693",
"lastModified": "2024-06-10T21:15:50.693",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing web content may lead to arbitrary code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214103",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2024-27828",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.773",
"lastModified": "2024-06-10T21:15:50.773",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 1.2, watchOS 10.5, tvOS 17.5, iOS 17.5 and iPadOS 17.5. An app may be able to execute arbitrary code with kernel privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2024-27830",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.843",
"lastModified": "2024-06-10T21:15:50.843",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed through improved state management. This issue is fixed in tvOS 17.5, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. A maliciously crafted webpage may be able to fingerprint the user."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214103",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-27831",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.927",
"lastModified": "2024-06-10T21:15:50.927",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5. Processing a file may lead to unexpected app termination or arbitrary code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214107",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2024-27832",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.007",
"lastModified": "2024-06-10T21:15:51.007",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to elevate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2024-27833",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.090",
"lastModified": "2024-06-10T21:15:51.090",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5. Processing maliciously crafted web content may lead to arbitrary code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214103",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-27836",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.167",
"lastModified": "2024-06-10T21:15:51.167",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in visionOS 1.2, macOS Sonoma 14.5, iOS 17.5 and iPadOS 17.5. Processing a maliciously crafted image may lead to arbitrary code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-27838",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.240",
"lastModified": "2024-06-10T21:15:51.240",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed by adding additional logic. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. A maliciously crafted webpage may be able to fingerprint the user."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214103",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-27840",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.313",
"lastModified": "2024-06-10T21:15:51.313",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5. An attacker that has already achieved kernel code execution may be able to bypass kernel memory protections."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214107",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-27844",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.390",
"lastModified": "2024-06-10T21:15:51.390",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in visionOS 1.2, macOS Sonoma 14.5, Safari 17.5. A website's permission dialog may persist after navigation away from the site."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214103",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-27845",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.467",
"lastModified": "2024-06-10T21:15:51.467",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A privacy issue was addressed with improved handling of temporary files. This issue is fixed in iOS 17.5 and iPadOS 17.5. An app may be able to access Notes attachments."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-27848",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.530",
"lastModified": "2024-06-10T21:15:51.530",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved permissions checking. This issue is fixed in macOS Sonoma 14.5, iOS 17.5 and iPadOS 17.5. A malicious app may be able to gain root privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-27850",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.607",
"lastModified": "2024-06-10T21:15:51.607",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improvements to the noise injection algorithm. This issue is fixed in visionOS 1.2, macOS Sonoma 14.5, Safari 17.5, iOS 17.5 and iPadOS 17.5. A maliciously crafted webpage may be able to fingerprint the user."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214103",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2024-27851",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.680",
"lastModified": "2024-06-10T21:15:51.680",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved bounds checks. This issue is fixed in tvOS 17.5, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing maliciously crafted web content may lead to arbitrary code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214103",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-27855",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.753",
"lastModified": "2024-06-10T21:15:51.753",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5, macOS Ventura 13.6.7, iOS 17.5 and iPadOS 17.5, iOS 16.7.8 and iPadOS 16.7.8. A shortcut may be able to use sensitive data with certain actions without prompting the user."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214107",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2024-27857",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.833",
"lastModified": "2024-06-10T21:15:51.833",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in visionOS 1.2, macOS Sonoma 14.5, tvOS 17.5, iOS 17.5 and iPadOS 17.5. A remote attacker may be able to cause unexpected app termination or arbitrary code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-27885",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.903",
"lastModified": "2024-06-10T21:15:51.903",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Sonoma 14.5, macOS Ventura 13.6.7, macOS Monterey 12.7.5. An app may be able to modify protected parts of the file system."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214107",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31612",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-10T18:15:31.513",
"lastModified": "2024-06-10T18:15:31.513",
"vulnStatus": "Received",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-32167",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-10T20:15:13.367",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Sourcecodester Online Medicine Ordering System 1.0 is vulnerable to Arbitrary file deletion vulnerability as the backend settings have the function of deleting pictures to delete any files."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ss122-0ss/cms/blob/main/omos.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32871",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-04T15:15:45.757",
"lastModified": "2024-06-04T16:57:41.053",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-10T21:07:12.030",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -50,18 +80,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0",
"versionEndExcluding": "11.2.4",
"matchCriteriaId": "47F9DB6E-D290-472C-A1D0-1616F7871111"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/pimcore/pimcore/commit/38af70b3130f16fc27f2aea34e2943d7bdaaba06",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/pimcore/pimcore/commit/a6821a16ea38086bf6012e682e1743488244bd85",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-277c-5vvj-9pwx",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-33850",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-10T21:15:51.997",
"lastModified": "2024-06-10T21:15:51.997",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Pexip Infinity before 34.1 has Improper Access Control for persons in a waiting room. They can see the conference roster list, and perform certain actions that should not be allowed before they are admitted to the meeting."
}
],
"metrics": {},
"references": [
{
"url": "https://docs.pexip.com/admin/security_bulletins.htm",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34384",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T14:15:10.940",
"lastModified": "2024-06-04T16:57:41.053",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-10T20:53:28.927",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sinaextra:sina_extension_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.5.2",
"matchCriteriaId": "6F556E37-283D-4D7E-9DC0-CDA15D521A97"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/sina-extension-for-elementor/wordpress-sina-extension-for-elementor-plugin-3-5-1-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34551",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T14:15:11.223",
"lastModified": "2024-06-04T16:57:41.053",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-10T20:53:11.237",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +80,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:select-themes:stockholm:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "9.7",
"matchCriteriaId": "74E5B8C3-9830-4425-997D-47116DE2A4BF"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/stockholm/wordpress-stockholm-theme-9-6-unauthenticated-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34552",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T14:15:11.500",
"lastModified": "2024-06-04T16:57:41.053",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-10T20:52:46.383",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:select-themes:stockholm:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "9.7",
"matchCriteriaId": "74E5B8C3-9830-4425-997D-47116DE2A4BF"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/stockholm/wordpress-stockholm-theme-9-6-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-34554",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T14:15:11.767",
"lastModified": "2024-06-04T16:57:41.053",
"lastModified": "2024-06-10T20:52:25.590",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:select-themes:stockholm_core:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.4.2",
"matchCriteriaId": "35FF816B-4B36-405A-ABA4-6CA48968F14C"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/stockholm-core/wordpress-stockholm-core-plugin-2-4-1-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34792",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T14:15:11.993",
"lastModified": "2024-06-04T16:57:41.053",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-10T20:59:01.097",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dextaz_ping_project:dextaz_ping:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "0.65",
"matchCriteriaId": "7D7D0FB3-C8E3-48B0-80F0-251600E47921"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/dextaz-ping/wordpress-dextaz-ping-plugin-0-65-remote-code-execution-rce-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35629",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T14:15:12.230",
"lastModified": "2024-06-04T16:57:41.053",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-10T21:06:02.157",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -40,8 +60,18 @@
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-829"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -50,10 +80,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wow-company:easy_digital_downloads:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.2",
"matchCriteriaId": "2DE58D35-21A0-4892-BD46-19A3EBAB4F2D"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/edd-recent-purchases/wordpress-easy-digital-downloads-recent-purchases-plugin-1-0-2-remote-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35634",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T14:15:12.600",
"lastModified": "2024-06-04T16:57:41.053",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-10T20:23:58.577",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wow-company:woocommerce_-_recent_purchases:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.1",
"matchCriteriaId": "A7A6B4C5-A156-4C33-BB15-A38C241625B8"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woo-recent-purchases/woocommerce-recent-purchases-plugin-1-0-1-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35654",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T14:15:12.837",
"lastModified": "2024-06-04T16:57:41.053",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-10T20:24:17.467",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cyberchimps:responsive:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.0.3.1",
"matchCriteriaId": "CA1DFE73-A79E-40D4-8F42-F3DC5EC14F30"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/responsive/wordpress-responsive-theme-5-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36409",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T18:15:35.620",
"lastModified": "2024-06-10T18:15:35.620",
"vulnStatus": "Received",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36410",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T18:15:35.830",
"lastModified": "2024-06-10T18:15:35.830",
"vulnStatus": "Received",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-36411",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T20:15:13.593",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in EmailUIAjax displayView controller. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-9rvr-mcrf-p4p7",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-36412",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T20:15:13.820",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in events response entry point allows for a SQL injection attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-xjx2-38hv-5hh8",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-36413",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T20:15:14.057",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in the import module error view allows for a cross-site scripting attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.9,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-ph2c-hvvf-r273",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-36414",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T20:15:14.277",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in the connectors file verification allows for a server-side request forgery attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-wg74-772c-8gr7",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-36415",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T20:15:14.503",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in uploaded file verification in products allows for remote code execution. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
},
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-c82f-58jv-jfrh",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-36416",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T20:15:14.730",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a deprecated v4 API example with no log rotation allows denial of service by logging excessive data. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-779"
}
]
}
],
"references": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-jrpp-22g3-2j77",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-36417",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T20:15:14.960",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, an unverified IFrame can be added some some inputs, which could allow for a cross-site scripting attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-3www-6rqc-rm7j",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-36418",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T21:15:52.120",
"lastModified": "2024-06-10T21:15:52.120",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in connectors allows an authenticated user to perform a remote code execution attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-mfj5-37v4-vh5w",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-37014",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-10T20:15:15.213",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach the \"POST /api/v1/custom_component\" endpoint and provide a Python script."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/langflow-ai/langflow/issues/1973",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-37393",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-10T20:15:15.293",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Multiple LDAP injections vulnerabilities exist in SecurEnvoy MFA before 9.4.514 due to improper validation of user-supplied input. An unauthenticated remote attacker could exfiltrate data from Active Directory through blind LDAP injection attacks against the DESKTOP service exposed on the /secserver HTTP endpoint. This may include ms-Mcs-AdmPwd, which has a cleartext password for the Local Administrator Password Solution (LAPS) feature."
}
],
"metrics": {},
"references": [
{
"url": "https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-ada2/ad2ce8fa-42a0-4371-ad18-5d1d1c488b22",
"source": "cve@mitre.org"
},
{
"url": "https://securenvoy.com/support/",
"source": "cve@mitre.org"
},
{
"url": "https://www.optistream.io/blogs/tech/securenvoy-cve-2024-37393",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5773",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-09T03:15:55.633",
"lastModified": "2024-06-10T02:52:08.267",
"lastModified": "2024-06-10T20:15:15.387",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. Affected is an unknown function of the file /protocol/firewall/deletemacbind.php. The manipulation of the argument messagecontent leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-267456. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Netentsec NS-ASG Application Security Gateway 6.3 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /protocol/firewall/deletemacbind.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento contenido del mensaje conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-267456. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-10T20:00:19.607625+00:00
2024-06-10T22:00:18.377626+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-10T19:39:21.660000+00:00
2024-06-10T21:15:52.120000+00:00
```
### Last Data Feed Release
@ -33,47 +33,62 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
253276
253329
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `53`
- [CVE-2024-31612](CVE-2024/CVE-2024-316xx/CVE-2024-31612.json) (`2024-06-10T18:15:31.513`)
- [CVE-2024-36409](CVE-2024/CVE-2024-364xx/CVE-2024-36409.json) (`2024-06-10T18:15:35.620`)
- [CVE-2024-36410](CVE-2024/CVE-2024-364xx/CVE-2024-36410.json) (`2024-06-10T18:15:35.830`)
- [CVE-2024-27832](CVE-2024/CVE-2024-278xx/CVE-2024-27832.json) (`2024-06-10T21:15:51.007`)
- [CVE-2024-27833](CVE-2024/CVE-2024-278xx/CVE-2024-27833.json) (`2024-06-10T21:15:51.090`)
- [CVE-2024-27836](CVE-2024/CVE-2024-278xx/CVE-2024-27836.json) (`2024-06-10T21:15:51.167`)
- [CVE-2024-27838](CVE-2024/CVE-2024-278xx/CVE-2024-27838.json) (`2024-06-10T21:15:51.240`)
- [CVE-2024-27840](CVE-2024/CVE-2024-278xx/CVE-2024-27840.json) (`2024-06-10T21:15:51.313`)
- [CVE-2024-27844](CVE-2024/CVE-2024-278xx/CVE-2024-27844.json) (`2024-06-10T21:15:51.390`)
- [CVE-2024-27845](CVE-2024/CVE-2024-278xx/CVE-2024-27845.json) (`2024-06-10T21:15:51.467`)
- [CVE-2024-27848](CVE-2024/CVE-2024-278xx/CVE-2024-27848.json) (`2024-06-10T21:15:51.530`)
- [CVE-2024-27850](CVE-2024/CVE-2024-278xx/CVE-2024-27850.json) (`2024-06-10T21:15:51.607`)
- [CVE-2024-27851](CVE-2024/CVE-2024-278xx/CVE-2024-27851.json) (`2024-06-10T21:15:51.680`)
- [CVE-2024-27855](CVE-2024/CVE-2024-278xx/CVE-2024-27855.json) (`2024-06-10T21:15:51.753`)
- [CVE-2024-27857](CVE-2024/CVE-2024-278xx/CVE-2024-27857.json) (`2024-06-10T21:15:51.833`)
- [CVE-2024-27885](CVE-2024/CVE-2024-278xx/CVE-2024-27885.json) (`2024-06-10T21:15:51.903`)
- [CVE-2024-32167](CVE-2024/CVE-2024-321xx/CVE-2024-32167.json) (`2024-06-10T20:15:13.367`)
- [CVE-2024-33850](CVE-2024/CVE-2024-338xx/CVE-2024-33850.json) (`2024-06-10T21:15:51.997`)
- [CVE-2024-36411](CVE-2024/CVE-2024-364xx/CVE-2024-36411.json) (`2024-06-10T20:15:13.593`)
- [CVE-2024-36412](CVE-2024/CVE-2024-364xx/CVE-2024-36412.json) (`2024-06-10T20:15:13.820`)
- [CVE-2024-36413](CVE-2024/CVE-2024-364xx/CVE-2024-36413.json) (`2024-06-10T20:15:14.057`)
- [CVE-2024-36414](CVE-2024/CVE-2024-364xx/CVE-2024-36414.json) (`2024-06-10T20:15:14.277`)
- [CVE-2024-36415](CVE-2024/CVE-2024-364xx/CVE-2024-36415.json) (`2024-06-10T20:15:14.503`)
- [CVE-2024-36416](CVE-2024/CVE-2024-364xx/CVE-2024-36416.json) (`2024-06-10T20:15:14.730`)
- [CVE-2024-36417](CVE-2024/CVE-2024-364xx/CVE-2024-36417.json) (`2024-06-10T20:15:14.960`)
- [CVE-2024-36418](CVE-2024/CVE-2024-364xx/CVE-2024-36418.json) (`2024-06-10T21:15:52.120`)
- [CVE-2024-37014](CVE-2024/CVE-2024-370xx/CVE-2024-37014.json) (`2024-06-10T20:15:15.213`)
- [CVE-2024-37393](CVE-2024/CVE-2024-373xx/CVE-2024-37393.json) (`2024-06-10T20:15:15.293`)
### CVEs modified in the last Commit
Recently modified CVEs: `275`
Recently modified CVEs: `18`
- [CVE-2024-4403](CVE-2024/CVE-2024-44xx/CVE-2024-4403.json) (`2024-06-10T18:06:22.600`)
- [CVE-2024-4558](CVE-2024/CVE-2024-45xx/CVE-2024-4558.json) (`2024-06-10T18:15:36.760`)
- [CVE-2024-4559](CVE-2024/CVE-2024-45xx/CVE-2024-4559.json) (`2024-06-10T18:15:36.837`)
- [CVE-2024-4671](CVE-2024/CVE-2024-46xx/CVE-2024-4671.json) (`2024-06-10T18:15:36.890`)
- [CVE-2024-4761](CVE-2024/CVE-2024-47xx/CVE-2024-4761.json) (`2024-06-10T18:15:36.997`)
- [CVE-2024-4853](CVE-2024/CVE-2024-48xx/CVE-2024-4853.json) (`2024-06-10T18:15:37.097`)
- [CVE-2024-4854](CVE-2024/CVE-2024-48xx/CVE-2024-4854.json) (`2024-06-10T18:15:37.230`)
- [CVE-2024-4855](CVE-2024/CVE-2024-48xx/CVE-2024-4855.json) (`2024-06-10T18:15:37.337`)
- [CVE-2024-4947](CVE-2024/CVE-2024-49xx/CVE-2024-4947.json) (`2024-06-10T18:15:37.447`)
- [CVE-2024-4948](CVE-2024/CVE-2024-49xx/CVE-2024-4948.json) (`2024-06-10T18:15:37.577`)
- [CVE-2024-4949](CVE-2024/CVE-2024-49xx/CVE-2024-4949.json) (`2024-06-10T18:15:37.743`)
- [CVE-2024-4950](CVE-2024/CVE-2024-49xx/CVE-2024-4950.json) (`2024-06-10T18:15:37.830`)
- [CVE-2024-5102](CVE-2024/CVE-2024-51xx/CVE-2024-5102.json) (`2024-06-10T18:06:22.600`)
- [CVE-2024-5157](CVE-2024/CVE-2024-51xx/CVE-2024-5157.json) (`2024-06-10T18:15:37.893`)
- [CVE-2024-5158](CVE-2024/CVE-2024-51xx/CVE-2024-5158.json) (`2024-06-10T18:15:37.953`)
- [CVE-2024-5159](CVE-2024/CVE-2024-51xx/CVE-2024-5159.json) (`2024-06-10T18:15:38.010`)
- [CVE-2024-5160](CVE-2024/CVE-2024-51xx/CVE-2024-5160.json) (`2024-06-10T18:15:38.067`)
- [CVE-2024-5273](CVE-2024/CVE-2024-52xx/CVE-2024-5273.json) (`2024-06-10T18:15:38.157`)
- [CVE-2024-5420](CVE-2024/CVE-2024-54xx/CVE-2024-5420.json) (`2024-06-10T18:15:38.367`)
- [CVE-2024-5421](CVE-2024/CVE-2024-54xx/CVE-2024-5421.json) (`2024-06-10T18:15:38.447`)
- [CVE-2024-5422](CVE-2024/CVE-2024-54xx/CVE-2024-5422.json) (`2024-06-10T18:15:38.520`)
- [CVE-2024-5597](CVE-2024/CVE-2024-55xx/CVE-2024-5597.json) (`2024-06-10T18:06:22.600`)
- [CVE-2024-5658](CVE-2024/CVE-2024-56xx/CVE-2024-5658.json) (`2024-06-10T18:15:38.597`)
- [CVE-2024-5785](CVE-2024/CVE-2024-57xx/CVE-2024-5785.json) (`2024-06-10T18:06:22.600`)
- [CVE-2024-5786](CVE-2024/CVE-2024-57xx/CVE-2024-5786.json) (`2024-06-10T18:06:22.600`)
- [CVE-2018-16310](CVE-2018/CVE-2018-163xx/CVE-2018-16310.json) (`2024-06-10T21:15:48.783`)
- [CVE-2018-18290](CVE-2018/CVE-2018-182xx/CVE-2018-18290.json) (`2024-06-10T21:15:48.900`)
- [CVE-2020-35204](CVE-2020/CVE-2020-352xx/CVE-2020-35204.json) (`2024-06-10T21:15:49.030`)
- [CVE-2020-35726](CVE-2020/CVE-2020-357xx/CVE-2020-35726.json) (`2024-06-10T21:15:49.150`)
- [CVE-2023-45922](CVE-2023/CVE-2023-459xx/CVE-2023-45922.json) (`2024-06-10T21:15:49.337`)
- [CVE-2024-31612](CVE-2024/CVE-2024-316xx/CVE-2024-31612.json) (`2024-06-10T20:54:18.443`)
- [CVE-2024-32871](CVE-2024/CVE-2024-328xx/CVE-2024-32871.json) (`2024-06-10T21:07:12.030`)
- [CVE-2024-34384](CVE-2024/CVE-2024-343xx/CVE-2024-34384.json) (`2024-06-10T20:53:28.927`)
- [CVE-2024-34551](CVE-2024/CVE-2024-345xx/CVE-2024-34551.json) (`2024-06-10T20:53:11.237`)
- [CVE-2024-34552](CVE-2024/CVE-2024-345xx/CVE-2024-34552.json) (`2024-06-10T20:52:46.383`)
- [CVE-2024-34554](CVE-2024/CVE-2024-345xx/CVE-2024-34554.json) (`2024-06-10T20:52:25.590`)
- [CVE-2024-34792](CVE-2024/CVE-2024-347xx/CVE-2024-34792.json) (`2024-06-10T20:59:01.097`)
- [CVE-2024-35629](CVE-2024/CVE-2024-356xx/CVE-2024-35629.json) (`2024-06-10T21:06:02.157`)
- [CVE-2024-35634](CVE-2024/CVE-2024-356xx/CVE-2024-35634.json) (`2024-06-10T20:23:58.577`)
- [CVE-2024-35654](CVE-2024/CVE-2024-356xx/CVE-2024-35654.json) (`2024-06-10T20:24:17.467`)
- [CVE-2024-36409](CVE-2024/CVE-2024-364xx/CVE-2024-36409.json) (`2024-06-10T20:54:18.443`)
- [CVE-2024-36410](CVE-2024/CVE-2024-364xx/CVE-2024-36410.json) (`2024-06-10T20:54:18.443`)
- [CVE-2024-5773](CVE-2024/CVE-2024-57xx/CVE-2024-5773.json) (`2024-06-10T20:15:15.387`)
## Download and Usage

File diff suppressed because it is too large Load Diff