Auto-Update: 2024-08-14T18:00:18.064379+00:00

This commit is contained in:
cad-safe-bot 2024-08-14 18:03:14 +00:00
parent 40b8b33f0e
commit 216df201c9
180 changed files with 4160 additions and 666 deletions

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-31366", "id": "CVE-2023-31366",
"sourceIdentifier": "psirt@amd.com", "sourceIdentifier": "psirt@amd.com",
"published": "2024-08-13T17:15:21.913", "published": "2024-08-13T17:15:21.913",
"lastModified": "2024-08-14T02:07:05.410", "lastModified": "2024-08-14T17:15:14.097",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Improper input validation in AMD ?Prof could allow an attacker to perform a write to an invalid address, potentially resulting in denial of service." "value": "Improper input validation in AMD \u03bcProf could allow an attacker to perform a write to an invalid address, potentially resulting in denial of service."
},
{
"lang": "es",
"value": "Una validaci\u00f3n de entrada incorrecta en AMD ?Prof podr\u00eda permitir que un atacante realice una escritura en una direcci\u00f3n no v\u00e1lida, lo que podr\u00eda resultar en una denegaci\u00f3n de servicio."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34424", "id": "CVE-2023-34424",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:12.763", "published": "2024-08-14T14:15:12.763",
"lastModified": "2024-08-14T14:15:12.763", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35123", "id": "CVE-2023-35123",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:13.273", "published": "2024-08-14T14:15:13.273",
"lastModified": "2024-08-14T14:15:13.273", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35860", "id": "CVE-2023-35860",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-13T16:15:10.387", "published": "2024-06-13T16:15:10.387",
"lastModified": "2024-08-01T13:43:58.613", "lastModified": "2024-08-14T16:05:00.640",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -40,6 +60,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -51,10 +81,30 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moderncampus:omni_cms:2023.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1A39D47E-A318-40AA-ADF1-3A8A925204EA"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://lp.constantcontactpages.com/cu/c2nSB5D/moderncampuscve", "url": "https://lp.constantcontactpages.com/cu/c2nSB5D/moderncampuscve",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38655", "id": "CVE-2023-38655",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:13.523", "published": "2024-08-14T14:15:13.523",
"lastModified": "2024-08-14T14:15:13.523", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40067", "id": "CVE-2023-40067",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:13.770", "published": "2024-08-14T14:15:13.770",
"lastModified": "2024-08-14T14:15:13.770", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-40261", "id": "CVE-2023-40261",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-08-08T18:15:09.670", "published": "2024-08-08T18:15:09.670",
"lastModified": "2024-08-09T16:35:01.330", "lastModified": "2024-08-14T16:15:10.437",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR17, 4.0.0 SR07, 4.1.0 SR04, 4.2.0 SR04, and 4.3.0 SR03 fails to validate file attributes during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk." "value": "Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR17, 4.0.0 SR07, 4.1.0 SR04, 4.2.0 SR04, and 4.3.0 SR02 fails to validate file attributes during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42667", "id": "CVE-2023-42667",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:14.033", "published": "2024-08-14T14:15:14.033",
"lastModified": "2024-08-14T14:15:14.033", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43489", "id": "CVE-2023-43489",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:14.283", "published": "2024-08-14T14:15:14.283",
"lastModified": "2024-08-14T14:15:14.283", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43747", "id": "CVE-2023-43747",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:14.513", "published": "2024-08-14T14:15:14.513",
"lastModified": "2024-08-14T14:15:14.513", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47246", "id": "CVE-2023-47246",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-11-10T06:15:30.510", "published": "2023-11-10T06:15:30.510",
"lastModified": "2024-07-08T14:16:40.760", "lastModified": "2024-08-14T17:02:12.370",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"cisaExploitAdd": "2023-11-13", "cisaExploitAdd": "2023-11-13",
"cisaActionDue": "2023-12-04", "cisaActionDue": "2023-12-04",
@ -94,9 +94,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:sysaid:sysaid_on-premises:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:on-premises:*:*:*",
"versionEndExcluding": "23.3.36", "versionEndExcluding": "23.3.36",
"matchCriteriaId": "E3857481-38B2-434A-9A80-D4DFFC838988" "matchCriteriaId": "239AAC8E-10BF-4280-8BEB-F85F71670F5B"
} }
] ]
} }
@ -115,7 +115,8 @@
"url": "https://documentation.sysaid.com/docs/on-premise-security-enhancements-2023", "url": "https://documentation.sysaid.com/docs/on-premise-security-enhancements-2023",
"source": "cve@mitre.org", "source": "cve@mitre.org",
"tags": [ "tags": [
"Release Notes" "Release Notes",
"Vendor Advisory"
] ]
}, },
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48361", "id": "CVE-2023-48361",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:14.747", "published": "2024-08-14T14:15:14.747",
"lastModified": "2024-08-14T14:15:14.747", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49141", "id": "CVE-2023-49141",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:14.990", "published": "2024-08-14T14:15:14.990",
"lastModified": "2024-08-14T14:15:14.990", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49144", "id": "CVE-2023-49144",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:15.207", "published": "2024-08-14T14:15:15.207",
"lastModified": "2024-08-14T14:15:15.207", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4966", "id": "CVE-2023-4966",
"sourceIdentifier": "secure@citrix.com", "sourceIdentifier": "secure@citrix.com",
"published": "2023-10-10T14:15:10.977", "published": "2023-10-10T14:15:10.977",
"lastModified": "2024-08-02T08:15:29.097", "lastModified": "2024-08-14T17:01:08.027",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"cisaExploitAdd": "2023-10-18", "cisaExploitAdd": "2023-10-18",
"cisaActionDue": "2023-11-08", "cisaActionDue": "2023-11-08",
@ -12,7 +12,7 @@
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Sensitive information disclosure\u00a0in NetScaler ADC and NetScaler Gateway when configured as a\u00a0Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy)\u00a0or\u00a0AAA \u202fvirtual\u202fserver.\u00a0\n\n\n\n" "value": "Sensitive information disclosure\u00a0in NetScaler ADC and NetScaler Gateway when configured as a\u00a0Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy)\u00a0or\u00a0AAA ?virtual?server.\u00a0\n\n\n\n"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-50094", "id": "CVE-2023-50094",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-01-01T18:15:09.130", "published": "2024-01-01T18:15:09.130",
"lastModified": "2024-01-09T20:48:00.660", "lastModified": "2024-08-14T17:15:14.267",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "reNgine through 2.0.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output." "value": "reNgine before 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output."
}, },
{ {
"lang": "es", "lang": "es",
@ -70,6 +70,10 @@
} }
], ],
"references": [ "references": [
{
"url": "https://github.com/yogeshojha/rengine/blob/53d9f505f04861a5040195ea71f20907ff90577a/web/api/views.py#L268-L275",
"source": "cve@mitre.org"
},
{ {
"url": "https://github.com/yogeshojha/rengine/blob/5e120bd5f9dfbd1da82a193e8c9702e483d38d22/web/api/views.py#L195", "url": "https://github.com/yogeshojha/rengine/blob/5e120bd5f9dfbd1da82a193e8c9702e483d38d22/web/api/views.py#L195",
"source": "cve@mitre.org", "source": "cve@mitre.org",
@ -77,6 +81,14 @@
"Product" "Product"
] ]
}, },
{
"url": "https://github.com/yogeshojha/rengine/commit/3d5f1724dd12cf9861443742e7d7c02ff8c75a6f",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yogeshojha/rengine/commit/edd3c85ee16f93804ad38dac5602549d2d30a93e",
"source": "cve@mitre.org"
},
{ {
"url": "https://github.com/yogeshojha/rengine/releases", "url": "https://github.com/yogeshojha/rengine/releases",
"source": "cve@mitre.org", "source": "cve@mitre.org",
@ -91,6 +103,10 @@
"Product" "Product"
] ]
}, },
{
"url": "https://github.com/yogeshojha/rengine/security/advisories/GHSA-fx7f-f735-vgh4",
"source": "cve@mitre.org"
},
{ {
"url": "https://www.mattz.io/posts/cve-2023-50094/", "url": "https://www.mattz.io/posts/cve-2023-50094/",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2023-50315",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-08-14T17:15:14.400",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM WebSphere Application Server 8.5 and 9.0 could allow an attacker with access to the network to conduct spoofing attacks. An attacker could exploit this vulnerability using a certificate issued by a trusted authority to obtain sensitive information. IBM X-Force ID: 274714."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/274714",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7165511",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52155", "id": "CVE-2023-52155",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T22:15:49.117", "published": "2024-02-21T22:15:49.117",
"lastModified": "2024-02-22T19:07:27.197", "lastModified": "2024-08-14T17:35:02.300",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en /admin/sauvegarde/run.php en PMB 7.4.7 y anteriores permite a atacantes remotos autenticados ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de la variable sauvegardes a trav\u00e9s del endpoint /admin/sauvegarde/run.php." "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /admin/sauvegarde/run.php en PMB 7.4.7 y anteriores permite a atacantes remotos autenticados ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de la variable sauvegardes a trav\u00e9s del endpoint /admin/sauvegarde/run.php."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html", "url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7028", "id": "CVE-2023-7028",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2024-01-12T14:15:49.420", "published": "2024-01-12T14:15:49.420",
"lastModified": "2024-07-24T05:15:12.537", "lastModified": "2024-08-14T17:00:51.773",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"cisaExploitAdd": "2024-05-01", "cisaExploitAdd": "2024-05-01",
"cisaActionDue": "2024-05-22", "cisaActionDue": "2024-05-22",
@ -200,7 +200,9 @@
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/436084", "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/436084",
"source": "cve@gitlab.com", "source": "cve@gitlab.com",
"tags": [ "tags": [
"Broken Link" "Exploit",
"Issue Tracking",
"Vendor Advisory"
] ]
}, },
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20789", "id": "CVE-2024-20789",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:17.263", "published": "2024-08-14T15:15:17.263",
"lastModified": "2024-08-14T15:15:17.263", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20790", "id": "CVE-2024-20790",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:17.580", "published": "2024-08-14T15:15:17.580",
"lastModified": "2024-08-14T15:15:17.580", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21766", "id": "CVE-2024-21766",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:15.503", "published": "2024-08-14T14:15:15.503",
"lastModified": "2024-08-14T14:15:15.503", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21769", "id": "CVE-2024-21769",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:15.730", "published": "2024-08-14T14:15:15.730",
"lastModified": "2024-08-14T14:15:15.730", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21784", "id": "CVE-2024-21784",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:15.977", "published": "2024-08-14T14:15:15.977",
"lastModified": "2024-08-14T14:15:15.977", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21787", "id": "CVE-2024-21787",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:16.203", "published": "2024-08-14T14:15:16.203",
"lastModified": "2024-08-14T14:15:16.203", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21801", "id": "CVE-2024-21801",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:16.447", "published": "2024-08-14T14:15:16.447",
"lastModified": "2024-08-14T14:15:16.447", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21806", "id": "CVE-2024-21806",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:16.700", "published": "2024-08-14T14:15:16.700",
"lastModified": "2024-08-14T14:15:16.700", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21807", "id": "CVE-2024-21807",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:16.937", "published": "2024-08-14T14:15:16.937",
"lastModified": "2024-08-14T14:15:16.937", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -89,6 +89,20 @@
"value": "CWE-665" "value": "CWE-665"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
},
{
"lang": "en",
"value": "CWE-665"
}
]
} }
], ],
"references": [ "references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21810", "id": "CVE-2024-21810",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:17.167", "published": "2024-08-14T14:15:17.167",
"lastModified": "2024-08-14T14:15:17.167", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21844", "id": "CVE-2024-21844",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:17.390", "published": "2024-08-14T14:15:17.390",
"lastModified": "2024-08-14T14:15:17.390", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21857", "id": "CVE-2024-21857",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:17.623", "published": "2024-08-14T14:15:17.623",
"lastModified": "2024-08-14T14:15:17.623", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22184", "id": "CVE-2024-22184",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:17.870", "published": "2024-08-14T14:15:17.870",
"lastModified": "2024-08-14T14:15:17.870", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22374", "id": "CVE-2024-22374",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:18.100", "published": "2024-08-14T14:15:18.100",
"lastModified": "2024-08-14T14:15:18.100", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22376", "id": "CVE-2024-22376",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:18.333", "published": "2024-08-14T14:15:18.333",
"lastModified": "2024-08-14T14:15:18.333", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22378", "id": "CVE-2024-22378",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:18.580", "published": "2024-08-14T14:15:18.580",
"lastModified": "2024-08-14T14:15:18.580", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -89,6 +89,16 @@
"value": "CWE-276" "value": "CWE-276"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
} }
], ],
"references": [ "references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22547", "id": "CVE-2024-22547",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-02-22T19:15:08.547", "published": "2024-02-22T19:15:08.547",
"lastModified": "2024-02-23T02:42:58.253", "lastModified": "2024-08-14T16:35:04.113",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "WayOS IBR-7150 <17.06.23 es vulnerable a Cross Site Scripting (XSS)." "value": "WayOS IBR-7150 <17.06.23 es vulnerable a Cross Site Scripting (XSS)."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/WarmBrew/web_vul/blob/main/wayos/wayos.md", "url": "https://github.com/WarmBrew/web_vul/blob/main/wayos/wayos.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22776", "id": "CVE-2024-22776",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-02-23T15:15:09.180", "published": "2024-02-23T15:15:09.180",
"lastModified": "2024-02-23T16:14:43.447", "lastModified": "2024-08-14T16:35:04.977",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Wallos 0.9 es vulnerable a Cross Site Scripting (XSS) en todos los campos de entrada basados en texto sin la validaci\u00f3n adecuada, excluyendo aquellos que requieren formatos espec\u00edficos como campos de fecha." "value": "Wallos 0.9 es vulnerable a Cross Site Scripting (XSS) en todos los campos de entrada basados en texto sin la validaci\u00f3n adecuada, excluyendo aquellos que requieren formatos espec\u00edficos como campos de fecha."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/ellite/Wallos", "url": "https://github.com/ellite/Wallos",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23222", "id": "CVE-2024-23222",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:11.500", "published": "2024-01-23T01:15:11.500",
"lastModified": "2024-06-12T10:15:30.200", "lastModified": "2024-08-14T17:00:37.360",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"cisaExploitAdd": "2024-01-23", "cisaExploitAdd": "2024-01-23",
"cisaActionDue": "2024-02-13", "cisaActionDue": "2024-02-13",
@ -146,16 +146,25 @@
}, },
{ {
"url": "https://support.apple.com/kb/HT214055", "url": "https://support.apple.com/kb/HT214055",
"source": "product-security@apple.com" "source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}, },
{ {
"url": "https://support.apple.com/kb/HT214056", "url": "https://support.apple.com/kb/HT214056",
"source": "product-security@apple.com" "source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}, },
{ {
"url": "https://support.apple.com/kb/HT214057", "url": "https://support.apple.com/kb/HT214057",
"source": "product-security@apple.com", "source": "product-security@apple.com",
"tags": [ "tags": [
"Release Notes",
"Vendor Advisory" "Vendor Advisory"
] ]
}, },
@ -163,17 +172,23 @@
"url": "https://support.apple.com/kb/HT214058", "url": "https://support.apple.com/kb/HT214058",
"source": "product-security@apple.com", "source": "product-security@apple.com",
"tags": [ "tags": [
"Release Notes",
"Vendor Advisory" "Vendor Advisory"
] ]
}, },
{ {
"url": "https://support.apple.com/kb/HT214059", "url": "https://support.apple.com/kb/HT214059",
"source": "product-security@apple.com" "source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}, },
{ {
"url": "https://support.apple.com/kb/HT214061", "url": "https://support.apple.com/kb/HT214061",
"source": "product-security@apple.com", "source": "product-security@apple.com",
"tags": [ "tags": [
"Release Notes",
"Vendor Advisory" "Vendor Advisory"
] ]
}, },
@ -181,6 +196,7 @@
"url": "https://support.apple.com/kb/HT214063", "url": "https://support.apple.com/kb/HT214063",
"source": "product-security@apple.com", "source": "product-security@apple.com",
"tags": [ "tags": [
"Release Notes",
"Vendor Advisory" "Vendor Advisory"
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23225", "id": "CVE-2024-23225",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2024-03-05T20:16:01.370", "published": "2024-03-05T20:16:01.370",
"lastModified": "2024-07-03T01:47:38.013", "lastModified": "2024-08-14T17:00:03.717",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"cisaExploitAdd": "2024-03-06", "cisaExploitAdd": "2024-03-06",
"cisaActionDue": "2024-03-27", "cisaActionDue": "2024-03-27",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23489", "id": "CVE-2024-23489",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:18.817", "published": "2024-08-14T14:15:18.817",
"lastModified": "2024-08-14T14:15:18.817", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23491", "id": "CVE-2024-23491",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:19.047", "published": "2024-08-14T14:15:19.047",
"lastModified": "2024-08-14T14:15:19.047", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23495", "id": "CVE-2024-23495",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:19.273", "published": "2024-08-14T14:15:19.273",
"lastModified": "2024-08-14T14:15:19.273", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23497", "id": "CVE-2024-23497",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:19.500", "published": "2024-08-14T14:15:19.500",
"lastModified": "2024-08-14T14:15:19.500", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23499", "id": "CVE-2024-23499",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:19.730", "published": "2024-08-14T14:15:19.730",
"lastModified": "2024-08-14T14:15:19.730", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23692", "id": "CVE-2024-23692",
"sourceIdentifier": "disclosure@vulncheck.com", "sourceIdentifier": "disclosure@vulncheck.com",
"published": "2024-05-31T10:15:09.330", "published": "2024-05-31T10:15:09.330",
"lastModified": "2024-08-01T23:15:46.867", "lastModified": "2024-08-14T16:59:39.767",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"cveTags": [ "cveTags": [
{ {
"sourceIdentifier": "disclosure@vulncheck.com", "sourceIdentifier": "disclosure@vulncheck.com",
@ -130,6 +130,7 @@
"url": "https://vulncheck.com/advisories/rejetto-unauth-rce", "url": "https://vulncheck.com/advisories/rejetto-unauth-rce",
"source": "disclosure@vulncheck.com", "source": "disclosure@vulncheck.com",
"tags": [ "tags": [
"Exploit",
"Third Party Advisory" "Third Party Advisory"
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23907", "id": "CVE-2024-23907",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:19.967", "published": "2024-08-14T14:15:19.967",
"lastModified": "2024-08-14T14:15:19.967", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23908", "id": "CVE-2024-23908",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:20.210", "published": "2024-08-14T14:15:20.210",
"lastModified": "2024-08-14T14:15:20.210", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23909", "id": "CVE-2024-23909",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:20.447", "published": "2024-08-14T14:15:20.447",
"lastModified": "2024-08-14T14:15:20.447", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23974", "id": "CVE-2024-23974",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:20.690", "published": "2024-08-14T14:15:20.690",
"lastModified": "2024-08-14T14:15:20.690", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -89,6 +89,16 @@
"value": "CWE-276" "value": "CWE-276"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
} }
], ],
"references": [ "references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23981", "id": "CVE-2024-23981",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:20.913", "published": "2024-08-14T14:15:20.913",
"lastModified": "2024-08-14T14:15:20.913", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24580", "id": "CVE-2024-24580",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:21.143", "published": "2024-08-14T14:15:21.143",
"lastModified": "2024-08-14T14:15:21.143", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24853", "id": "CVE-2024-24853",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:21.380", "published": "2024-08-14T14:15:21.380",
"lastModified": "2024-08-14T14:15:21.380", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24973", "id": "CVE-2024-24973",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:21.637", "published": "2024-08-14T14:15:21.637",
"lastModified": "2024-08-14T14:15:21.637", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24977", "id": "CVE-2024-24977",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:21.887", "published": "2024-08-14T14:15:21.887",
"lastModified": "2024-08-14T14:15:21.887", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24980", "id": "CVE-2024-24980",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:22.117", "published": "2024-08-14T14:15:22.117",
"lastModified": "2024-08-14T14:15:22.117", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24983", "id": "CVE-2024-24983",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:22.363", "published": "2024-08-14T14:15:22.363",
"lastModified": "2024-08-14T14:15:22.363", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -89,6 +89,16 @@
"value": "CWE-693" "value": "CWE-693"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-693"
}
]
} }
], ],
"references": [ "references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24986", "id": "CVE-2024-24986",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:22.593", "published": "2024-08-14T14:15:22.593",
"lastModified": "2024-08-14T14:15:22.593", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25157", "id": "CVE-2024-25157",
"sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
"published": "2024-08-14T15:15:18.023", "published": "2024-08-14T15:15:18.023",
"lastModified": "2024-08-14T15:15:18.023", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25561", "id": "CVE-2024-25561",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:22.827", "published": "2024-08-14T14:15:22.827",
"lastModified": "2024-08-14T14:15:22.827", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25562", "id": "CVE-2024-25562",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:23.047", "published": "2024-08-14T14:15:23.047",
"lastModified": "2024-08-14T14:15:23.047", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25576", "id": "CVE-2024-25576",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:23.280", "published": "2024-08-14T14:15:23.280",
"lastModified": "2024-08-14T14:15:23.280", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25939", "id": "CVE-2024-25939",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:23.523", "published": "2024-08-14T14:15:23.523",
"lastModified": "2024-08-14T14:15:23.523", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26022", "id": "CVE-2024-26022",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:23.753", "published": "2024-08-14T14:15:23.753",
"lastModified": "2024-08-14T14:15:23.753", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26025", "id": "CVE-2024-26025",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:23.983", "published": "2024-08-14T14:15:23.983",
"lastModified": "2024-08-14T14:15:23.983", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26027", "id": "CVE-2024-26027",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:24.197", "published": "2024-08-14T14:15:24.197",
"lastModified": "2024-08-14T14:15:24.197", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26349", "id": "CVE-2024-26349",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-02-22T14:15:47.080", "published": "2024-02-22T14:15:47.080",
"lastModified": "2024-02-22T19:07:27.197", "lastModified": "2024-08-14T16:35:09.343",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que flusity-CMS v2.33 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /core/tools/delete_translation.php" "value": "Se descubri\u00f3 que flusity-CMS v2.33 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /core/tools/delete_translation.php"
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/Icycu123/cms/blob/main/1.md", "url": "https://github.com/Icycu123/cms/blob/main/1.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26461", "id": "CVE-2024-26461",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-02-29T01:44:18.820", "published": "2024-02-29T01:44:18.820",
"lastModified": "2024-05-14T15:09:00.787", "lastModified": "2024-08-14T16:35:10.207",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Kerberos 5 (tambi\u00e9n conocido como krb5) 1.21.2 contiene una vulnerabilidad de p\u00e9rdida de memoria en /krb5/src/lib/gssapi/krb5/k5sealv3.c." "value": "Kerberos 5 (tambi\u00e9n conocido como krb5) 1.21.2 contiene una vulnerabilidad de p\u00e9rdida de memoria en /krb5/src/lib/gssapi/krb5/k5sealv3.c."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md", "url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-27267",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-08-14T16:15:10.950",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Object Request Broker (ORB) in IBM SDK, Java Technology Edition 7.1.0.0 through 7.1.5.18 and 8.0.0.0 through 8.0.8.26 is vulnerable to remote denial of service, caused by a race condition in the management of ORB listener threads. IBM X-Force ID: 284573."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-300"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284573",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7165421",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27461", "id": "CVE-2024-27461",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:24.603", "published": "2024-08-14T14:15:24.603",
"lastModified": "2024-08-14T14:15:24.603", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28046", "id": "CVE-2024-28046",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:24.830", "published": "2024-08-14T14:15:24.830",
"lastModified": "2024-08-14T14:15:24.830", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28050", "id": "CVE-2024-28050",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:25.050", "published": "2024-08-14T14:15:25.050",
"lastModified": "2024-08-14T14:15:25.050", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28172", "id": "CVE-2024-28172",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:25.280", "published": "2024-08-14T14:15:25.280",
"lastModified": "2024-08-14T14:15:25.280", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-28799",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-08-14T16:15:11.220",
"lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM QRadar Suite Software 1.10.12.0 through 1.10.23.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 displays sensitive data improperly during back-end commands which may result in the unexpected disclosure of this information. IBM X-Force ID: 287173."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.1,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-214"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287173",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7165488",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28876", "id": "CVE-2024-28876",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:25.560", "published": "2024-08-14T14:15:25.560",
"lastModified": "2024-08-14T14:15:25.560", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28887", "id": "CVE-2024-28887",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:25.790", "published": "2024-08-14T14:15:25.790",
"lastModified": "2024-08-14T14:15:25.790", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28947", "id": "CVE-2024-28947",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:26.017", "published": "2024-08-14T14:15:26.017",
"lastModified": "2024-08-14T14:15:26.017", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28953", "id": "CVE-2024-28953",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:26.237", "published": "2024-08-14T14:15:26.237",
"lastModified": "2024-08-14T14:15:26.237", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -89,6 +89,16 @@
"value": "CWE-427" "value": "CWE-427"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
} }
], ],
"references": [ "references": [

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-28986", "id": "CVE-2024-28986",
"sourceIdentifier": "psirt@solarwinds.com", "sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-08-13T23:15:16.627", "published": "2024-08-13T23:15:16.627",
"lastModified": "2024-08-14T12:15:23.987", "lastModified": "2024-08-14T17:15:14.747",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "SolarWinds Web Help Desk was susceptible to a Java Deserialization Remote Code Execution that would allow access to run commands on the host machine." "value": "SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. \n\nWhile it was reported as an unauthenticated\u00a0vulnerability, SolarWinds has been unable to reproduce it\u00a0without authentication\u00a0after thorough testing. \u00a0\n\nHowever, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29015", "id": "CVE-2024-29015",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:26.450", "published": "2024-08-14T14:15:26.450",
"lastModified": "2024-08-14T14:15:26.450", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29745", "id": "CVE-2024-29745",
"sourceIdentifier": "dsap-vuln-management@google.com", "sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.253", "published": "2024-04-05T20:15:08.253",
"lastModified": "2024-07-03T01:52:31.423", "lastModified": "2024-08-14T16:59:22.427",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"cisaExploitAdd": "2024-04-04", "cisaExploitAdd": "2024-04-04",
"cisaActionDue": "2024-04-25", "cisaActionDue": "2024-04-25",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29748", "id": "CVE-2024-29748",
"sourceIdentifier": "dsap-vuln-management@google.com", "sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.407", "published": "2024-04-05T20:15:08.407",
"lastModified": "2024-08-01T13:49:35.273", "lastModified": "2024-08-14T16:58:53.233",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"cisaExploitAdd": "2024-04-04", "cisaExploitAdd": "2024-04-04",
"cisaActionDue": "2024-04-25", "cisaActionDue": "2024-04-25",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "NVD-CWE-noinfo" "value": "CWE-755"
} }
] ]
}, },

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34117", "id": "CVE-2024-34117",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:18.420", "published": "2024-08-14T15:15:18.420",
"lastModified": "2024-08-14T15:15:18.420", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34118", "id": "CVE-2024-34118",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:18.657", "published": "2024-08-14T15:15:18.657",
"lastModified": "2024-08-14T15:15:18.657", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34124", "id": "CVE-2024-34124",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:18.910", "published": "2024-08-14T15:15:18.910",
"lastModified": "2024-08-14T15:15:18.910", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34125", "id": "CVE-2024-34125",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:19.163", "published": "2024-08-14T15:15:19.163",
"lastModified": "2024-08-14T15:15:19.163", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34126", "id": "CVE-2024-34126",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:19.397", "published": "2024-08-14T15:15:19.397",
"lastModified": "2024-08-14T15:15:19.397", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34127", "id": "CVE-2024-34127",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:19.623", "published": "2024-08-14T15:15:19.623",
"lastModified": "2024-08-14T15:15:19.623", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34133", "id": "CVE-2024-34133",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:19.867", "published": "2024-08-14T15:15:19.867",
"lastModified": "2024-08-14T15:15:19.867", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34134", "id": "CVE-2024-34134",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:20.107", "published": "2024-08-14T15:15:20.107",
"lastModified": "2024-08-14T15:15:20.107", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34135", "id": "CVE-2024-34135",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:20.347", "published": "2024-08-14T15:15:20.347",
"lastModified": "2024-08-14T15:15:20.347", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34136", "id": "CVE-2024-34136",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:20.570", "published": "2024-08-14T15:15:20.570",
"lastModified": "2024-08-14T15:15:20.570", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34137", "id": "CVE-2024-34137",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:20.793", "published": "2024-08-14T15:15:20.793",
"lastModified": "2024-08-14T15:15:20.793", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34138", "id": "CVE-2024-34138",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:21.040", "published": "2024-08-14T15:15:21.040",
"lastModified": "2024-08-14T15:15:21.040", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34163", "id": "CVE-2024-34163",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-08-14T14:15:26.713", "published": "2024-08-14T14:15:26.713",
"lastModified": "2024-08-14T14:15:26.713", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37028", "id": "CVE-2024-37028",
"sourceIdentifier": "f5sirt@f5.com", "sourceIdentifier": "f5sirt@f5.com",
"published": "2024-08-14T15:15:21.257", "published": "2024-08-14T15:15:21.257",
"lastModified": "2024-08-14T15:15:21.257", "lastModified": "2024-08-14T17:49:14.177",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37942", "id": "CVE-2024-37942",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-22T11:15:02.730", "published": "2024-07-22T11:15:02.730",
"lastModified": "2024-07-22T13:00:31.330", "lastModified": "2024-08-14T16:46:48.470",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -51,10 +71,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:berqier:berqwp:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.7.6",
"matchCriteriaId": "F36A15F6-8422-4663-A345-C77F2F92DC94"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://patchstack.com/database/vulnerability/searchpro/wordpress-berqwp-plugin-1-7-5-unauthenticated-non-blind-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/searchpro/wordpress-berqwp-plugin-1-7-5-unauthenticated-non-blind-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com" "source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38106", "id": "CVE-2024-38106",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:10.713", "published": "2024-08-13T18:15:10.713",
"lastModified": "2024-08-14T02:07:05.410", "lastModified": "2024-08-14T16:36:52.280",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"cisaExploitAdd": "2024-08-13", "cisaExploitAdd": "2024-08-13",
"cisaActionDue": "2024-09-03", "cisaActionDue": "2024-09-03",
@ -13,6 +13,10 @@
{ {
"lang": "en", "lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability" "value": "Windows Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios del kernel de Windows"
} }
], ],
"metrics": { "metrics": {
@ -40,6 +44,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{ {
"source": "secure@microsoft.com", "source": "secure@microsoft.com",
"type": "Secondary", "type": "Secondary",
@ -51,10 +65,104 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20751",
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4780",
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4780",
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.3147",
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4037",
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4037",
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.1457",
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2655",
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1085",
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38106", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38106",
"source": "secure@microsoft.com" "source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38107", "id": "CVE-2024-38107",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:10.963", "published": "2024-08-13T18:15:10.963",
"lastModified": "2024-08-14T02:07:05.410", "lastModified": "2024-08-14T16:29:43.833",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"cisaExploitAdd": "2024-08-13", "cisaExploitAdd": "2024-08-13",
"cisaActionDue": "2024-09-03", "cisaActionDue": "2024-09-03",
@ -13,6 +13,10 @@
{ {
"lang": "en", "lang": "en",
"value": "Windows Power Dependency Coordinator Elevation of Privilege Vulnerability" "value": "Windows Power Dependency Coordinator Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios del Coordinador de dependencia de energ\u00eda de Windows"
} }
], ],
"metrics": { "metrics": {
@ -41,8 +45,18 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "secure@microsoft.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -51,10 +65,115 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20751",
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4780",
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4780",
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.3147",
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4037",
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4037",
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.1457",
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2.9200.25031",
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2655",
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1085",
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38107", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38107",
"source": "secure@microsoft.com" "source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38112", "id": "CVE-2024-38112",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:47.860", "published": "2024-07-09T17:15:47.860",
"lastModified": "2024-07-13T00:15:04.950", "lastModified": "2024-08-14T16:56:54.473",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"cisaExploitAdd": "2024-07-09", "cisaExploitAdd": "2024-07-09",
"cisaActionDue": "2024-07-30", "cisaActionDue": "2024-07-30",
@ -45,22 +45,22 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "secure@microsoft.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-451" "value": "NVD-CWE-Other"
} }
] ]
}, },
{ {
"source": "nvd@nist.gov", "source": "secure@microsoft.com",
"type": "Secondary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "NVD-CWE-noinfo" "value": "CWE-451"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38178", "id": "CVE-2024-38178",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:26.220", "published": "2024-08-13T18:15:26.220",
"lastModified": "2024-08-14T02:07:05.410", "lastModified": "2024-08-14T16:34:46.337",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"cisaExploitAdd": "2024-08-13", "cisaExploitAdd": "2024-08-13",
"cisaActionDue": "2024-09-03", "cisaActionDue": "2024-09-03",
@ -13,6 +13,10 @@
{ {
"lang": "en", "lang": "en",
"value": "Scripting Engine Memory Corruption Vulnerability" "value": "Scripting Engine Memory Corruption Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de corrupci\u00f3n de memoria del motor de secuencias de comandos"
} }
], ],
"metrics": { "metrics": {
@ -41,8 +45,18 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "secure@microsoft.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -51,10 +65,109 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20751",
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4780",
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4780",
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.3147",
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4037",
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4037",
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.1457",
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2655",
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1085",
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38178", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38178",
"source": "secure@microsoft.com" "source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

Some files were not shown because too many files have changed in this diff Show More