mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-08-14T18:00:18.064379+00:00
This commit is contained in:
parent
40b8b33f0e
commit
216df201c9
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2023-31366",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2024-08-13T17:15:21.913",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"lastModified": "2024-08-14T17:15:14.097",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation in AMD ?Prof could allow an attacker to perform a write to an invalid address, potentially resulting in denial of service."
|
||||
"value": "Improper input validation in AMD \u03bcProf could allow an attacker to perform a write to an invalid address, potentially resulting in denial of service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una validaci\u00f3n de entrada incorrecta en AMD ?Prof podr\u00eda permitir que un atacante realice una escritura en una direcci\u00f3n no v\u00e1lida, lo que podr\u00eda resultar en una denegaci\u00f3n de servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-34424",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:12.763",
|
||||
"lastModified": "2024-08-14T14:15:12.763",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-35123",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:13.273",
|
||||
"lastModified": "2024-08-14T14:15:13.273",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-35860",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-13T16:15:10.387",
|
||||
"lastModified": "2024-08-01T13:43:58.613",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-14T16:05:00.640",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moderncampus:omni_cms:2023.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A39D47E-A318-40AA-ADF1-3A8A925204EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lp.constantcontactpages.com/cu/c2nSB5D/moderncampuscve",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38655",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:13.523",
|
||||
"lastModified": "2024-08-14T14:15:13.523",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40067",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:13.770",
|
||||
"lastModified": "2024-08-14T14:15:13.770",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-40261",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-08T18:15:09.670",
|
||||
"lastModified": "2024-08-09T16:35:01.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-14T16:15:10.437",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR17, 4.0.0 SR07, 4.1.0 SR04, 4.2.0 SR04, and 4.3.0 SR03 fails to validate file attributes during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk."
|
||||
"value": "Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR17, 4.0.0 SR07, 4.1.0 SR04, 4.2.0 SR04, and 4.3.0 SR02 fails to validate file attributes during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42667",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:14.033",
|
||||
"lastModified": "2024-08-14T14:15:14.033",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43489",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:14.283",
|
||||
"lastModified": "2024-08-14T14:15:14.283",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43747",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:14.513",
|
||||
"lastModified": "2024-08-14T14:15:14.513",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47246",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-10T06:15:30.510",
|
||||
"lastModified": "2024-07-08T14:16:40.760",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-08-14T17:02:12.370",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2023-11-13",
|
||||
"cisaActionDue": "2023-12-04",
|
||||
@ -94,9 +94,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sysaid:sysaid_on-premises:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:on-premises:*:*:*",
|
||||
"versionEndExcluding": "23.3.36",
|
||||
"matchCriteriaId": "E3857481-38B2-434A-9A80-D4DFFC838988"
|
||||
"matchCriteriaId": "239AAC8E-10BF-4280-8BEB-F85F71670F5B"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -115,7 +115,8 @@
|
||||
"url": "https://documentation.sysaid.com/docs/on-premise-security-enhancements-2023",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-48361",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:14.747",
|
||||
"lastModified": "2024-08-14T14:15:14.747",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-49141",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:14.990",
|
||||
"lastModified": "2024-08-14T14:15:14.990",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-49144",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:15.207",
|
||||
"lastModified": "2024-08-14T14:15:15.207",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4966",
|
||||
"sourceIdentifier": "secure@citrix.com",
|
||||
"published": "2023-10-10T14:15:10.977",
|
||||
"lastModified": "2024-08-02T08:15:29.097",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-08-14T17:01:08.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2023-10-18",
|
||||
"cisaActionDue": "2023-11-08",
|
||||
@ -12,7 +12,7 @@
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Sensitive information disclosure\u00a0in NetScaler ADC and NetScaler Gateway when configured as a\u00a0Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy)\u00a0or\u00a0AAA \u202fvirtual\u202fserver.\u00a0\n\n\n\n"
|
||||
"value": "Sensitive information disclosure\u00a0in NetScaler ADC and NetScaler Gateway when configured as a\u00a0Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy)\u00a0or\u00a0AAA ?virtual?server.\u00a0\n\n\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-50094",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-01T18:15:09.130",
|
||||
"lastModified": "2024-01-09T20:48:00.660",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-14T17:15:14.267",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "reNgine through 2.0.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output."
|
||||
"value": "reNgine before 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,6 +70,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yogeshojha/rengine/blob/53d9f505f04861a5040195ea71f20907ff90577a/web/api/views.py#L268-L275",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yogeshojha/rengine/blob/5e120bd5f9dfbd1da82a193e8c9702e483d38d22/web/api/views.py#L195",
|
||||
"source": "cve@mitre.org",
|
||||
@ -77,6 +81,14 @@
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yogeshojha/rengine/commit/3d5f1724dd12cf9861443742e7d7c02ff8c75a6f",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yogeshojha/rengine/commit/edd3c85ee16f93804ad38dac5602549d2d30a93e",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yogeshojha/rengine/releases",
|
||||
"source": "cve@mitre.org",
|
||||
@ -91,6 +103,10 @@
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yogeshojha/rengine/security/advisories/GHSA-fx7f-f735-vgh4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mattz.io/posts/cve-2023-50094/",
|
||||
"source": "cve@mitre.org",
|
||||
|
60
CVE-2023/CVE-2023-503xx/CVE-2023-50315.json
Normal file
60
CVE-2023/CVE-2023-503xx/CVE-2023-50315.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2023-50315",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-08-14T17:15:14.400",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM WebSphere Application Server 8.5 and 9.0 could allow an attacker with access to the network to conduct spoofing attacks. An attacker could exploit this vulnerability using a certificate issued by a trusted authority to obtain sensitive information. IBM X-Force ID: 274714."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/274714",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7165511",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52155",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T22:15:49.117",
|
||||
"lastModified": "2024-02-22T19:07:27.197",
|
||||
"lastModified": "2024-08-14T17:35:02.300",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en /admin/sauvegarde/run.php en PMB 7.4.7 y anteriores permite a atacantes remotos autenticados ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de la variable sauvegardes a trav\u00e9s del endpoint /admin/sauvegarde/run.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7028",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-01-12T14:15:49.420",
|
||||
"lastModified": "2024-07-24T05:15:12.537",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-08-14T17:00:51.773",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-05-01",
|
||||
"cisaActionDue": "2024-05-22",
|
||||
@ -200,7 +200,9 @@
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/436084",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20789",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T15:15:17.263",
|
||||
"lastModified": "2024-08-14T15:15:17.263",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20790",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T15:15:17.580",
|
||||
"lastModified": "2024-08-14T15:15:17.580",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21766",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:15.503",
|
||||
"lastModified": "2024-08-14T14:15:15.503",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21769",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:15.730",
|
||||
"lastModified": "2024-08-14T14:15:15.730",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21784",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:15.977",
|
||||
"lastModified": "2024-08-14T14:15:15.977",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21787",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:16.203",
|
||||
"lastModified": "2024-08-14T14:15:16.203",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21801",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:16.447",
|
||||
"lastModified": "2024-08-14T14:15:16.447",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21806",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:16.700",
|
||||
"lastModified": "2024-08-14T14:15:16.700",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21807",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:16.937",
|
||||
"lastModified": "2024-08-14T14:15:16.937",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -89,6 +89,20 @@
|
||||
"value": "CWE-665"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-665"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21810",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:17.167",
|
||||
"lastModified": "2024-08-14T14:15:17.167",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21844",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:17.390",
|
||||
"lastModified": "2024-08-14T14:15:17.390",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21857",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:17.623",
|
||||
"lastModified": "2024-08-14T14:15:17.623",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22184",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:17.870",
|
||||
"lastModified": "2024-08-14T14:15:17.870",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22374",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:18.100",
|
||||
"lastModified": "2024-08-14T14:15:18.100",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22376",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:18.333",
|
||||
"lastModified": "2024-08-14T14:15:18.333",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22378",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:18.580",
|
||||
"lastModified": "2024-08-14T14:15:18.580",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -89,6 +89,16 @@
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-22547",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-22T19:15:08.547",
|
||||
"lastModified": "2024-02-23T02:42:58.253",
|
||||
"lastModified": "2024-08-14T16:35:04.113",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "WayOS IBR-7150 <17.06.23 es vulnerable a Cross Site Scripting (XSS)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/WarmBrew/web_vul/blob/main/wayos/wayos.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-22776",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-23T15:15:09.180",
|
||||
"lastModified": "2024-02-23T16:14:43.447",
|
||||
"lastModified": "2024-08-14T16:35:04.977",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Wallos 0.9 es vulnerable a Cross Site Scripting (XSS) en todos los campos de entrada basados en texto sin la validaci\u00f3n adecuada, excluyendo aquellos que requieren formatos espec\u00edficos como campos de fecha."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ellite/Wallos",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23222",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-01-23T01:15:11.500",
|
||||
"lastModified": "2024-06-12T10:15:30.200",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-08-14T17:00:37.360",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-01-23",
|
||||
"cisaActionDue": "2024-02-13",
|
||||
@ -146,16 +146,25 @@
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214055",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214056",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214057",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -163,17 +172,23 @@
|
||||
"url": "https://support.apple.com/kb/HT214058",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214059",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214061",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -181,6 +196,7 @@
|
||||
"url": "https://support.apple.com/kb/HT214063",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23225",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-05T20:16:01.370",
|
||||
"lastModified": "2024-07-03T01:47:38.013",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-08-14T17:00:03.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-03-06",
|
||||
"cisaActionDue": "2024-03-27",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23489",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:18.817",
|
||||
"lastModified": "2024-08-14T14:15:18.817",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23491",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:19.047",
|
||||
"lastModified": "2024-08-14T14:15:19.047",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23495",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:19.273",
|
||||
"lastModified": "2024-08-14T14:15:19.273",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23497",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:19.500",
|
||||
"lastModified": "2024-08-14T14:15:19.500",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23499",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:19.730",
|
||||
"lastModified": "2024-08-14T14:15:19.730",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23692",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2024-05-31T10:15:09.330",
|
||||
"lastModified": "2024-08-01T23:15:46.867",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-08-14T16:59:39.767",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
@ -130,6 +130,7 @@
|
||||
"url": "https://vulncheck.com/advisories/rejetto-unauth-rce",
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23907",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:19.967",
|
||||
"lastModified": "2024-08-14T14:15:19.967",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23908",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:20.210",
|
||||
"lastModified": "2024-08-14T14:15:20.210",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23909",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:20.447",
|
||||
"lastModified": "2024-08-14T14:15:20.447",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23974",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:20.690",
|
||||
"lastModified": "2024-08-14T14:15:20.690",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -89,6 +89,16 @@
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23981",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:20.913",
|
||||
"lastModified": "2024-08-14T14:15:20.913",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24580",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:21.143",
|
||||
"lastModified": "2024-08-14T14:15:21.143",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24853",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:21.380",
|
||||
"lastModified": "2024-08-14T14:15:21.380",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24973",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:21.637",
|
||||
"lastModified": "2024-08-14T14:15:21.637",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24977",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:21.887",
|
||||
"lastModified": "2024-08-14T14:15:21.887",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24980",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:22.117",
|
||||
"lastModified": "2024-08-14T14:15:22.117",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24983",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:22.363",
|
||||
"lastModified": "2024-08-14T14:15:22.363",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -89,6 +89,16 @@
|
||||
"value": "CWE-693"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-693"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24986",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:22.593",
|
||||
"lastModified": "2024-08-14T14:15:22.593",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25157",
|
||||
"sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
|
||||
"published": "2024-08-14T15:15:18.023",
|
||||
"lastModified": "2024-08-14T15:15:18.023",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25561",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:22.827",
|
||||
"lastModified": "2024-08-14T14:15:22.827",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25562",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:23.047",
|
||||
"lastModified": "2024-08-14T14:15:23.047",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25576",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:23.280",
|
||||
"lastModified": "2024-08-14T14:15:23.280",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25939",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:23.523",
|
||||
"lastModified": "2024-08-14T14:15:23.523",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26022",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:23.753",
|
||||
"lastModified": "2024-08-14T14:15:23.753",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26025",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:23.983",
|
||||
"lastModified": "2024-08-14T14:15:23.983",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26027",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:24.197",
|
||||
"lastModified": "2024-08-14T14:15:24.197",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26349",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-22T14:15:47.080",
|
||||
"lastModified": "2024-02-22T19:07:27.197",
|
||||
"lastModified": "2024-08-14T16:35:09.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que flusity-CMS v2.33 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /core/tools/delete_translation.php"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Icycu123/cms/blob/main/1.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26461",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-29T01:44:18.820",
|
||||
"lastModified": "2024-05-14T15:09:00.787",
|
||||
"lastModified": "2024-08-14T16:35:10.207",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Kerberos 5 (tambi\u00e9n conocido como krb5) 1.21.2 contiene una vulnerabilidad de p\u00e9rdida de memoria en /krb5/src/lib/gssapi/krb5/k5sealv3.c."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md",
|
||||
|
60
CVE-2024/CVE-2024-272xx/CVE-2024-27267.json
Normal file
60
CVE-2024/CVE-2024-272xx/CVE-2024-27267.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-27267",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-08-14T16:15:10.950",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Object Request Broker (ORB) in IBM SDK, Java Technology Edition 7.1.0.0 through 7.1.5.18 and 8.0.0.0 through 8.0.8.26 is vulnerable to remote denial of service, caused by a race condition in the management of ORB listener threads. IBM X-Force ID: 284573."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-300"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284573",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7165421",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27461",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:24.603",
|
||||
"lastModified": "2024-08-14T14:15:24.603",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28046",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:24.830",
|
||||
"lastModified": "2024-08-14T14:15:24.830",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28050",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:25.050",
|
||||
"lastModified": "2024-08-14T14:15:25.050",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28172",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:25.280",
|
||||
"lastModified": "2024-08-14T14:15:25.280",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
60
CVE-2024/CVE-2024-287xx/CVE-2024-28799.json
Normal file
60
CVE-2024/CVE-2024-287xx/CVE-2024-28799.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-28799",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-08-14T16:15:11.220",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM QRadar Suite Software 1.10.12.0 through 1.10.23.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 displays sensitive data improperly during back-end commands which may result in the unexpected disclosure of this information. IBM X-Force ID: 287173."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.1,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-214"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287173",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7165488",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28876",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:25.560",
|
||||
"lastModified": "2024-08-14T14:15:25.560",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28887",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:25.790",
|
||||
"lastModified": "2024-08-14T14:15:25.790",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28947",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:26.017",
|
||||
"lastModified": "2024-08-14T14:15:26.017",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28953",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:26.237",
|
||||
"lastModified": "2024-08-14T14:15:26.237",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -89,6 +89,16 @@
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-28986",
|
||||
"sourceIdentifier": "psirt@solarwinds.com",
|
||||
"published": "2024-08-13T23:15:16.627",
|
||||
"lastModified": "2024-08-14T12:15:23.987",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-14T17:15:14.747",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SolarWinds Web Help Desk was susceptible to a Java Deserialization Remote Code Execution that would allow access to run commands on the host machine."
|
||||
"value": "SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. \n\nWhile it was reported as an unauthenticated\u00a0vulnerability, SolarWinds has been unable to reproduce it\u00a0without authentication\u00a0after thorough testing. \u00a0\n\nHowever, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29015",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:26.450",
|
||||
"lastModified": "2024-08-14T14:15:26.450",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29745",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.253",
|
||||
"lastModified": "2024-07-03T01:52:31.423",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-08-14T16:59:22.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-04-04",
|
||||
"cisaActionDue": "2024-04-25",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29748",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.407",
|
||||
"lastModified": "2024-08-01T13:49:35.273",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-08-14T16:58:53.233",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-04-04",
|
||||
"cisaActionDue": "2024-04-25",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34117",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T15:15:18.420",
|
||||
"lastModified": "2024-08-14T15:15:18.420",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34118",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T15:15:18.657",
|
||||
"lastModified": "2024-08-14T15:15:18.657",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34124",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T15:15:18.910",
|
||||
"lastModified": "2024-08-14T15:15:18.910",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34125",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T15:15:19.163",
|
||||
"lastModified": "2024-08-14T15:15:19.163",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34126",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T15:15:19.397",
|
||||
"lastModified": "2024-08-14T15:15:19.397",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34127",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T15:15:19.623",
|
||||
"lastModified": "2024-08-14T15:15:19.623",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34133",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T15:15:19.867",
|
||||
"lastModified": "2024-08-14T15:15:19.867",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34134",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T15:15:20.107",
|
||||
"lastModified": "2024-08-14T15:15:20.107",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34135",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T15:15:20.347",
|
||||
"lastModified": "2024-08-14T15:15:20.347",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34136",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T15:15:20.570",
|
||||
"lastModified": "2024-08-14T15:15:20.570",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34137",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T15:15:20.793",
|
||||
"lastModified": "2024-08-14T15:15:20.793",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34138",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T15:15:21.040",
|
||||
"lastModified": "2024-08-14T15:15:21.040",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34163",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-08-14T14:15:26.713",
|
||||
"lastModified": "2024-08-14T14:15:26.713",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37028",
|
||||
"sourceIdentifier": "f5sirt@f5.com",
|
||||
"published": "2024-08-14T15:15:21.257",
|
||||
"lastModified": "2024-08-14T15:15:21.257",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-14T17:49:14.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37942",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-22T11:15:02.730",
|
||||
"lastModified": "2024-07-22T13:00:31.330",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-14T16:46:48.470",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:berqier:berqwp:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.7.6",
|
||||
"matchCriteriaId": "F36A15F6-8422-4663-A345-C77F2F92DC94"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/searchpro/wordpress-berqwp-plugin-1-7-5-unauthenticated-non-blind-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38106",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:10.713",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-14T16:36:52.280",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-08-13",
|
||||
"cisaActionDue": "2024-09-03",
|
||||
@ -13,6 +13,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios del kernel de Windows"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -40,6 +44,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +65,104 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.10240.20751",
|
||||
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4780",
|
||||
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4780",
|
||||
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3147",
|
||||
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4037",
|
||||
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4037",
|
||||
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.1457",
|
||||
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2655",
|
||||
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1085",
|
||||
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38106",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38107",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:10.963",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-14T16:29:43.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-08-13",
|
||||
"cisaActionDue": "2024-09-03",
|
||||
@ -13,6 +13,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Power Dependency Coordinator Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios del Coordinador de dependencia de energ\u00eda de Windows"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -41,8 +45,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +65,115 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.10240.20751",
|
||||
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4780",
|
||||
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4780",
|
||||
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3147",
|
||||
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4037",
|
||||
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4037",
|
||||
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.1457",
|
||||
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2.9200.25031",
|
||||
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2655",
|
||||
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1085",
|
||||
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38107",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38112",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-07-09T17:15:47.860",
|
||||
"lastModified": "2024-07-13T00:15:04.950",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-08-14T16:56:54.473",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-07-09",
|
||||
"cisaActionDue": "2024-07-30",
|
||||
@ -45,22 +45,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-451"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
"value": "CWE-451"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38178",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:26.220",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-14T16:34:46.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-08-13",
|
||||
"cisaActionDue": "2024-09-03",
|
||||
@ -13,6 +13,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Scripting Engine Memory Corruption Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de corrupci\u00f3n de memoria del motor de secuencias de comandos"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -41,8 +45,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +65,109 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.10240.20751",
|
||||
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4780",
|
||||
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4780",
|
||||
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3147",
|
||||
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4037",
|
||||
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4037",
|
||||
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.1457",
|
||||
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2655",
|
||||
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1085",
|
||||
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38178",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user