Auto-Update: 2024-08-14T18:00:18.064379+00:00

This commit is contained in:
cad-safe-bot 2024-08-14 18:03:14 +00:00
parent 40b8b33f0e
commit 216df201c9
180 changed files with 4160 additions and 666 deletions

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-31366",
"sourceIdentifier": "psirt@amd.com",
"published": "2024-08-13T17:15:21.913",
"lastModified": "2024-08-14T02:07:05.410",
"lastModified": "2024-08-14T17:15:14.097",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in AMD ?Prof could allow an attacker to perform a write to an invalid address, potentially resulting in denial of service."
"value": "Improper input validation in AMD \u03bcProf could allow an attacker to perform a write to an invalid address, potentially resulting in denial of service."
},
{
"lang": "es",
"value": "Una validaci\u00f3n de entrada incorrecta en AMD ?Prof podr\u00eda permitir que un atacante realice una escritura en una direcci\u00f3n no v\u00e1lida, lo que podr\u00eda resultar en una denegaci\u00f3n de servicio."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34424",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:12.763",
"lastModified": "2024-08-14T14:15:12.763",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35123",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:13.273",
"lastModified": "2024-08-14T14:15:13.273",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35860",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-13T16:15:10.387",
"lastModified": "2024-08-01T13:43:58.613",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-14T16:05:00.640",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moderncampus:omni_cms:2023.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1A39D47E-A318-40AA-ADF1-3A8A925204EA"
}
]
}
]
}
],
"references": [
{
"url": "https://lp.constantcontactpages.com/cu/c2nSB5D/moderncampuscve",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38655",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:13.523",
"lastModified": "2024-08-14T14:15:13.523",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40067",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:13.770",
"lastModified": "2024-08-14T14:15:13.770",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-40261",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-08T18:15:09.670",
"lastModified": "2024-08-09T16:35:01.330",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-14T16:15:10.437",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR17, 4.0.0 SR07, 4.1.0 SR04, 4.2.0 SR04, and 4.3.0 SR03 fails to validate file attributes during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk."
"value": "Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR17, 4.0.0 SR07, 4.1.0 SR04, 4.2.0 SR04, and 4.3.0 SR02 fails to validate file attributes during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk."
},
{
"lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42667",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:14.033",
"lastModified": "2024-08-14T14:15:14.033",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43489",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:14.283",
"lastModified": "2024-08-14T14:15:14.283",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43747",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:14.513",
"lastModified": "2024-08-14T14:15:14.513",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47246",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-10T06:15:30.510",
"lastModified": "2024-07-08T14:16:40.760",
"vulnStatus": "Modified",
"lastModified": "2024-08-14T17:02:12.370",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2023-11-13",
"cisaActionDue": "2023-12-04",
@ -94,9 +94,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysaid:sysaid_on-premises:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:on-premises:*:*:*",
"versionEndExcluding": "23.3.36",
"matchCriteriaId": "E3857481-38B2-434A-9A80-D4DFFC838988"
"matchCriteriaId": "239AAC8E-10BF-4280-8BEB-F85F71670F5B"
}
]
}
@ -115,7 +115,8 @@
"url": "https://documentation.sysaid.com/docs/on-premise-security-enhancements-2023",
"source": "cve@mitre.org",
"tags": [
"Release Notes"
"Release Notes",
"Vendor Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48361",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:14.747",
"lastModified": "2024-08-14T14:15:14.747",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49141",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:14.990",
"lastModified": "2024-08-14T14:15:14.990",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49144",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:15.207",
"lastModified": "2024-08-14T14:15:15.207",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4966",
"sourceIdentifier": "secure@citrix.com",
"published": "2023-10-10T14:15:10.977",
"lastModified": "2024-08-02T08:15:29.097",
"vulnStatus": "Modified",
"lastModified": "2024-08-14T17:01:08.027",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2023-10-18",
"cisaActionDue": "2023-11-08",
@ -12,7 +12,7 @@
"descriptions": [
{
"lang": "en",
"value": "Sensitive information disclosure\u00a0in NetScaler ADC and NetScaler Gateway when configured as a\u00a0Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy)\u00a0or\u00a0AAA \u202fvirtual\u202fserver.\u00a0\n\n\n\n"
"value": "Sensitive information disclosure\u00a0in NetScaler ADC and NetScaler Gateway when configured as a\u00a0Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy)\u00a0or\u00a0AAA ?virtual?server.\u00a0\n\n\n\n"
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-50094",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-01T18:15:09.130",
"lastModified": "2024-01-09T20:48:00.660",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-14T17:15:14.267",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "reNgine through 2.0.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output."
"value": "reNgine before 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output."
},
{
"lang": "es",
@ -70,6 +70,10 @@
}
],
"references": [
{
"url": "https://github.com/yogeshojha/rengine/blob/53d9f505f04861a5040195ea71f20907ff90577a/web/api/views.py#L268-L275",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yogeshojha/rengine/blob/5e120bd5f9dfbd1da82a193e8c9702e483d38d22/web/api/views.py#L195",
"source": "cve@mitre.org",
@ -77,6 +81,14 @@
"Product"
]
},
{
"url": "https://github.com/yogeshojha/rengine/commit/3d5f1724dd12cf9861443742e7d7c02ff8c75a6f",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yogeshojha/rengine/commit/edd3c85ee16f93804ad38dac5602549d2d30a93e",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yogeshojha/rengine/releases",
"source": "cve@mitre.org",
@ -91,6 +103,10 @@
"Product"
]
},
{
"url": "https://github.com/yogeshojha/rengine/security/advisories/GHSA-fx7f-f735-vgh4",
"source": "cve@mitre.org"
},
{
"url": "https://www.mattz.io/posts/cve-2023-50094/",
"source": "cve@mitre.org",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2023-50315",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-08-14T17:15:14.400",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM WebSphere Application Server 8.5 and 9.0 could allow an attacker with access to the network to conduct spoofing attacks. An attacker could exploit this vulnerability using a certificate issued by a trusted authority to obtain sensitive information. IBM X-Force ID: 274714."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/274714",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7165511",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52155",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T22:15:49.117",
"lastModified": "2024-02-22T19:07:27.197",
"lastModified": "2024-08-14T17:35:02.300",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en /admin/sauvegarde/run.php en PMB 7.4.7 y anteriores permite a atacantes remotos autenticados ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de la variable sauvegardes a trav\u00e9s del endpoint /admin/sauvegarde/run.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7028",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-01-12T14:15:49.420",
"lastModified": "2024-07-24T05:15:12.537",
"vulnStatus": "Modified",
"lastModified": "2024-08-14T17:00:51.773",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-05-01",
"cisaActionDue": "2024-05-22",
@ -200,7 +200,9 @@
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/436084",
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20789",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:17.263",
"lastModified": "2024-08-14T15:15:17.263",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20790",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:17.580",
"lastModified": "2024-08-14T15:15:17.580",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21766",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:15.503",
"lastModified": "2024-08-14T14:15:15.503",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21769",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:15.730",
"lastModified": "2024-08-14T14:15:15.730",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21784",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:15.977",
"lastModified": "2024-08-14T14:15:15.977",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21787",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:16.203",
"lastModified": "2024-08-14T14:15:16.203",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21801",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:16.447",
"lastModified": "2024-08-14T14:15:16.447",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21806",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:16.700",
"lastModified": "2024-08-14T14:15:16.700",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21807",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:16.937",
"lastModified": "2024-08-14T14:15:16.937",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -89,6 +89,20 @@
"value": "CWE-665"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
},
{
"lang": "en",
"value": "CWE-665"
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21810",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:17.167",
"lastModified": "2024-08-14T14:15:17.167",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21844",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:17.390",
"lastModified": "2024-08-14T14:15:17.390",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21857",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:17.623",
"lastModified": "2024-08-14T14:15:17.623",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22184",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:17.870",
"lastModified": "2024-08-14T14:15:17.870",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22374",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:18.100",
"lastModified": "2024-08-14T14:15:18.100",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22376",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:18.333",
"lastModified": "2024-08-14T14:15:18.333",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22378",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:18.580",
"lastModified": "2024-08-14T14:15:18.580",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -89,6 +89,16 @@
"value": "CWE-276"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22547",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-22T19:15:08.547",
"lastModified": "2024-02-23T02:42:58.253",
"lastModified": "2024-08-14T16:35:04.113",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "WayOS IBR-7150 <17.06.23 es vulnerable a Cross Site Scripting (XSS)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/WarmBrew/web_vul/blob/main/wayos/wayos.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22776",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-23T15:15:09.180",
"lastModified": "2024-02-23T16:14:43.447",
"lastModified": "2024-08-14T16:35:04.977",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Wallos 0.9 es vulnerable a Cross Site Scripting (XSS) en todos los campos de entrada basados en texto sin la validaci\u00f3n adecuada, excluyendo aquellos que requieren formatos espec\u00edficos como campos de fecha."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/ellite/Wallos",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23222",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:11.500",
"lastModified": "2024-06-12T10:15:30.200",
"vulnStatus": "Modified",
"lastModified": "2024-08-14T17:00:37.360",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-01-23",
"cisaActionDue": "2024-02-13",
@ -146,16 +146,25 @@
},
{
"url": "https://support.apple.com/kb/HT214055",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214056",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214057",
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
@ -163,17 +172,23 @@
"url": "https://support.apple.com/kb/HT214058",
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214059",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214061",
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
@ -181,6 +196,7 @@
"url": "https://support.apple.com/kb/HT214063",
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23225",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-05T20:16:01.370",
"lastModified": "2024-07-03T01:47:38.013",
"vulnStatus": "Modified",
"lastModified": "2024-08-14T17:00:03.717",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-03-06",
"cisaActionDue": "2024-03-27",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23489",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:18.817",
"lastModified": "2024-08-14T14:15:18.817",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23491",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:19.047",
"lastModified": "2024-08-14T14:15:19.047",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23495",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:19.273",
"lastModified": "2024-08-14T14:15:19.273",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23497",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:19.500",
"lastModified": "2024-08-14T14:15:19.500",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23499",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:19.730",
"lastModified": "2024-08-14T14:15:19.730",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23692",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2024-05-31T10:15:09.330",
"lastModified": "2024-08-01T23:15:46.867",
"vulnStatus": "Modified",
"lastModified": "2024-08-14T16:59:39.767",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "disclosure@vulncheck.com",
@ -130,6 +130,7 @@
"url": "https://vulncheck.com/advisories/rejetto-unauth-rce",
"source": "disclosure@vulncheck.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23907",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:19.967",
"lastModified": "2024-08-14T14:15:19.967",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23908",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:20.210",
"lastModified": "2024-08-14T14:15:20.210",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23909",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:20.447",
"lastModified": "2024-08-14T14:15:20.447",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23974",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:20.690",
"lastModified": "2024-08-14T14:15:20.690",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -89,6 +89,16 @@
"value": "CWE-276"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23981",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:20.913",
"lastModified": "2024-08-14T14:15:20.913",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24580",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:21.143",
"lastModified": "2024-08-14T14:15:21.143",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24853",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:21.380",
"lastModified": "2024-08-14T14:15:21.380",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24973",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:21.637",
"lastModified": "2024-08-14T14:15:21.637",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24977",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:21.887",
"lastModified": "2024-08-14T14:15:21.887",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24980",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:22.117",
"lastModified": "2024-08-14T14:15:22.117",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24983",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:22.363",
"lastModified": "2024-08-14T14:15:22.363",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -89,6 +89,16 @@
"value": "CWE-693"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-693"
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24986",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:22.593",
"lastModified": "2024-08-14T14:15:22.593",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25157",
"sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
"published": "2024-08-14T15:15:18.023",
"lastModified": "2024-08-14T15:15:18.023",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25561",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:22.827",
"lastModified": "2024-08-14T14:15:22.827",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25562",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:23.047",
"lastModified": "2024-08-14T14:15:23.047",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25576",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:23.280",
"lastModified": "2024-08-14T14:15:23.280",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25939",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:23.523",
"lastModified": "2024-08-14T14:15:23.523",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26022",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:23.753",
"lastModified": "2024-08-14T14:15:23.753",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26025",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:23.983",
"lastModified": "2024-08-14T14:15:23.983",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26027",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:24.197",
"lastModified": "2024-08-14T14:15:24.197",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26349",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-22T14:15:47.080",
"lastModified": "2024-02-22T19:07:27.197",
"lastModified": "2024-08-14T16:35:09.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que flusity-CMS v2.33 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /core/tools/delete_translation.php"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/Icycu123/cms/blob/main/1.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26461",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-29T01:44:18.820",
"lastModified": "2024-05-14T15:09:00.787",
"lastModified": "2024-08-14T16:35:10.207",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Kerberos 5 (tambi\u00e9n conocido como krb5) 1.21.2 contiene una vulnerabilidad de p\u00e9rdida de memoria en /krb5/src/lib/gssapi/krb5/k5sealv3.c."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-27267",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-08-14T16:15:10.950",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Object Request Broker (ORB) in IBM SDK, Java Technology Edition 7.1.0.0 through 7.1.5.18 and 8.0.0.0 through 8.0.8.26 is vulnerable to remote denial of service, caused by a race condition in the management of ORB listener threads. IBM X-Force ID: 284573."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-300"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284573",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7165421",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27461",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:24.603",
"lastModified": "2024-08-14T14:15:24.603",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28046",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:24.830",
"lastModified": "2024-08-14T14:15:24.830",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28050",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:25.050",
"lastModified": "2024-08-14T14:15:25.050",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28172",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:25.280",
"lastModified": "2024-08-14T14:15:25.280",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-28799",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-08-14T16:15:11.220",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM QRadar Suite Software 1.10.12.0 through 1.10.23.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 displays sensitive data improperly during back-end commands which may result in the unexpected disclosure of this information. IBM X-Force ID: 287173."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.1,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-214"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287173",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7165488",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28876",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:25.560",
"lastModified": "2024-08-14T14:15:25.560",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28887",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:25.790",
"lastModified": "2024-08-14T14:15:25.790",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28947",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:26.017",
"lastModified": "2024-08-14T14:15:26.017",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28953",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:26.237",
"lastModified": "2024-08-14T14:15:26.237",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -89,6 +89,16 @@
"value": "CWE-427"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"references": [

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-28986",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-08-13T23:15:16.627",
"lastModified": "2024-08-14T12:15:23.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-14T17:15:14.747",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SolarWinds Web Help Desk was susceptible to a Java Deserialization Remote Code Execution that would allow access to run commands on the host machine."
"value": "SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. \n\nWhile it was reported as an unauthenticated\u00a0vulnerability, SolarWinds has been unable to reproduce it\u00a0without authentication\u00a0after thorough testing. \u00a0\n\nHowever, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available."
},
{
"lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29015",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:26.450",
"lastModified": "2024-08-14T14:15:26.450",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29745",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.253",
"lastModified": "2024-07-03T01:52:31.423",
"vulnStatus": "Modified",
"lastModified": "2024-08-14T16:59:22.427",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-04-04",
"cisaActionDue": "2024-04-25",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29748",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.407",
"lastModified": "2024-08-01T13:49:35.273",
"vulnStatus": "Modified",
"lastModified": "2024-08-14T16:58:53.233",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-04-04",
"cisaActionDue": "2024-04-25",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-755"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34117",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:18.420",
"lastModified": "2024-08-14T15:15:18.420",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34118",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:18.657",
"lastModified": "2024-08-14T15:15:18.657",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34124",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:18.910",
"lastModified": "2024-08-14T15:15:18.910",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34125",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:19.163",
"lastModified": "2024-08-14T15:15:19.163",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34126",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:19.397",
"lastModified": "2024-08-14T15:15:19.397",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34127",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:19.623",
"lastModified": "2024-08-14T15:15:19.623",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34133",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:19.867",
"lastModified": "2024-08-14T15:15:19.867",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34134",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:20.107",
"lastModified": "2024-08-14T15:15:20.107",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34135",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:20.347",
"lastModified": "2024-08-14T15:15:20.347",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34136",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:20.570",
"lastModified": "2024-08-14T15:15:20.570",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34137",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:20.793",
"lastModified": "2024-08-14T15:15:20.793",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34138",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:21.040",
"lastModified": "2024-08-14T15:15:21.040",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34163",
"sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:26.713",
"lastModified": "2024-08-14T14:15:26.713",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37028",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2024-08-14T15:15:21.257",
"lastModified": "2024-08-14T15:15:21.257",
"vulnStatus": "Received",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37942",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-22T11:15:02.730",
"lastModified": "2024-07-22T13:00:31.330",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-14T16:46:48.470",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:berqier:berqwp:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.7.6",
"matchCriteriaId": "F36A15F6-8422-4663-A345-C77F2F92DC94"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/searchpro/wordpress-berqwp-plugin-1-7-5-unauthenticated-non-blind-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38106",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:10.713",
"lastModified": "2024-08-14T02:07:05.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-14T16:36:52.280",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-08-13",
"cisaActionDue": "2024-09-03",
@ -13,6 +13,10 @@
{
"lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios del kernel de Windows"
}
],
"metrics": {
@ -40,6 +44,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +65,104 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20751",
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4780",
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4780",
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.3147",
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4037",
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4037",
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.1457",
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2655",
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1085",
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38106",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38107",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:10.963",
"lastModified": "2024-08-14T02:07:05.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-14T16:29:43.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-08-13",
"cisaActionDue": "2024-09-03",
@ -13,6 +13,10 @@
{
"lang": "en",
"value": "Windows Power Dependency Coordinator Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios del Coordinador de dependencia de energ\u00eda de Windows"
}
],
"metrics": {
@ -41,8 +45,18 @@
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +65,115 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20751",
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4780",
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4780",
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.3147",
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4037",
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4037",
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.1457",
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2.9200.25031",
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2655",
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1085",
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38107",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38112",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:47.860",
"lastModified": "2024-07-13T00:15:04.950",
"vulnStatus": "Modified",
"lastModified": "2024-08-14T16:56:54.473",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-07-09",
"cisaActionDue": "2024-07-30",
@ -45,22 +45,22 @@
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-451"
"value": "NVD-CWE-Other"
}
]
},
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-451"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38178",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:26.220",
"lastModified": "2024-08-14T02:07:05.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-14T16:34:46.337",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-08-13",
"cisaActionDue": "2024-09-03",
@ -13,6 +13,10 @@
{
"lang": "en",
"value": "Scripting Engine Memory Corruption Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de corrupci\u00f3n de memoria del motor de secuencias de comandos"
}
],
"metrics": {
@ -41,8 +45,18 @@
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +65,109 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20751",
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4780",
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4780",
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.3147",
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4037",
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4037",
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.1457",
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2655",
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1085",
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38178",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

Some files were not shown because too many files have changed in this diff Show More