Auto-Update: 2024-05-08T14:00:37.732351+00:00

This commit is contained in:
cad-safe-bot 2024-05-08 14:03:28 +00:00
parent ec658b4a2c
commit 2fd93a3436
123 changed files with 1858 additions and 333 deletions

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34947",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:07.653",
"lastModified": "2024-05-07T23:15:07.653",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "NETGEAR R7800 net-cgi Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R7800 routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of the soap_block_table file. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of root.\n. Was ZDI-CAN-13055."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de escritura fuera de los l\u00edmites en NETGEAR R7800 net-cgi. Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en instalaciones afectadas de enrutadores NETGEAR R7800. No se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe en el an\u00e1lisis del archivo Soap_block_table. El problema se debe a la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una escritura m\u00e1s all\u00e1 del final de una estructura de datos asignada. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de la ra\u00edz. Era ZDI-CAN-13055."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34948",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:07.920",
"lastModified": "2024-05-07T23:15:07.920",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader Square Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Square annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14272."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Foxit PDF Reader Square Annotation Use-After-Free. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Reader. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n Square. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14272."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34949",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:08.103",
"lastModified": "2024-05-07T23:15:08.103",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader Annotation Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14273."
},
{
"lang": "es",
"value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de lectura fuera de los l\u00edmites de anotaci\u00f3n de Foxit PDF Reader. Esta vulnerabilidad permite a atacantes remotos revelar informaci\u00f3n confidencial sobre las instalaciones afectadas de Foxit PDF Reader. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema se debe a la falta de validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una lectura m\u00e1s all\u00e1 del final de un objeto asignado. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual. Era ZDI-CAN-14273."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34950",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:08.343",
"lastModified": "2024-05-07T23:15:08.343",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader Annotation Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14396."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de lectura fuera de los l\u00edmites de anotaci\u00f3n de Foxit PDF Reader. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Reader. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema se debe a la falta de validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una lectura m\u00e1s all\u00e1 del final de un objeto asignado. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14396."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34951",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:08.523",
"lastModified": "2024-05-07T23:15:08.523",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader Annotation Use of Uninitialized Variable Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14395."
},
{
"lang": "es",
"value": "Anotaci\u00f3n de Foxit PDF Reader Uso de vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n variable no inicializada. Esta vulnerabilidad permite a atacantes remotos revelar informaci\u00f3n confidencial sobre las instalaciones afectadas de Foxit PDF Reader. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema se debe a la falta de una inicializaci\u00f3n adecuada de un puntero antes de acceder a \u00e9l. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual. Era ZDI-CAN-14395."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34952",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:08.690",
"lastModified": "2024-05-07T23:15:08.690",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14729."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Use-After-Free en anotaci\u00f3n del lector de PDF de Foxit. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Reader. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14729."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34953",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:08.857",
"lastModified": "2024-05-07T23:15:08.857",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader Annotation Use of Uninitialized Variable Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14658."
},
{
"lang": "es",
"value": "Anotaci\u00f3n de Foxit PDF Reader Uso de vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo variable no inicializado. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Reader. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema se debe a la falta de una inicializaci\u00f3n adecuada de un puntero antes de acceder a \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14658."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34954",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:09.033",
"lastModified": "2024-05-07T23:15:09.033",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Editor StrikeOut Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14355."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Use-After-Free en anotaci\u00f3n StrikeOut del editor PDF de Foxit. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Editor. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14355."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34955",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:09.213",
"lastModified": "2024-05-07T23:15:09.213",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Editor Stamp Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14356."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Use-After-Free de anotaciones de sello de Foxit PDF Editor. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Editor. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14356."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34956",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:09.380",
"lastModified": "2024-05-07T23:15:09.380",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Editor Underline Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14357."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Use-After-Free en anotaciones subrayadas del editor PDF de Foxit. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Editor. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14357."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34957",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:09.547",
"lastModified": "2024-05-07T23:15:09.547",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Editor Highlight Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14358."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Use-After-Free de anotaciones destacadas de Foxit PDF Editor. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Editor. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14358."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34958",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:09.717",
"lastModified": "2024-05-07T23:15:09.717",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Editor Text Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14359."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Use-After-Free en anotaci\u00f3n de texto del editor PDF de Foxit. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Editor. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14359."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34959",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:09.880",
"lastModified": "2024-05-07T23:15:09.880",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Editor Square Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14360."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Use-After-Free en anotaci\u00f3n cuadrada de Foxit PDF Editor. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Editor. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14360."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34960",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:10.063",
"lastModified": "2024-05-07T23:15:10.063",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Editor Circle Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14362."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Use-After-Free en anotaci\u00f3n circular de Foxit PDF Editor. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Editor. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14362."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34961",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:10.240",
"lastModified": "2024-05-07T23:15:10.240",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Editor Ink Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14363."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Use-After-Free de anotaciones de tinta de Foxit PDF Editor. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Editor. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14363."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34962",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:10.410",
"lastModified": "2024-05-07T23:15:10.410",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Editor Caret Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14364."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Use-After-Free en anotaci\u00f3n Caret del editor PDF de Foxit. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Editor. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14364."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34963",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:10.580",
"lastModified": "2024-05-07T23:15:10.580",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Editor PolyLine Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14365."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Use-After-Free en anotaci\u00f3n PolyLine del editor PDF de Foxit. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Editor. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14365."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34964",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:10.783",
"lastModified": "2024-05-07T23:15:10.783",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Editor Polygon Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14366."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Use-After-Free en anotaci\u00f3n de pol\u00edgonos de Foxit PDF Editor. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Editor. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14366."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34965",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:10.960",
"lastModified": "2024-05-07T23:15:10.960",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Editor Squiggly Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14361."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Use-After-Free en anotaci\u00f3n ondulada del editor PDF de Foxit. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Editor. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14361."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34966",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:11.127",
"lastModified": "2024-05-07T23:15:11.127",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Editor FileAttachment Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14367."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Use-After-Free en anotaci\u00f3n de archivo adjunto de Foxit PDF Editor. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Editor. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14367."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34967",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:11.293",
"lastModified": "2024-05-07T23:15:11.293",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Editor Line Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14368."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Use-After-Free en anotaci\u00f3n de l\u00ednea del editor PDF de Foxit. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Editor. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14368."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34968",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:11.463",
"lastModified": "2024-05-07T23:15:11.463",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Editor transitionToState Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the implementation of the transitionToState method. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14370."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Use-After-Free de Foxit PDF Editor TransitionToState. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Editor. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en la implementaci\u00f3n del m\u00e9todo TransitionToState. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14370."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34969",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:11.627",
"lastModified": "2024-05-07T23:15:11.627",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader Annotation Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14622."
},
{
"lang": "es",
"value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de Use-After-Free de anotaciones de Foxit PDF Reader. Esta vulnerabilidad permite a atacantes remotos revelar informaci\u00f3n confidencial sobre las instalaciones afectadas de Foxit PDF Reader. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual. Era ZDI-CAN-14622."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34970",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:11.797",
"lastModified": "2024-05-07T23:15:11.797",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader print Method Use of Externally-Controlled Format String Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the implementation of the print method. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14849."
},
{
"lang": "es",
"value": "M\u00e9todo de impresi\u00f3n de Foxit PDF Reader uso de vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de cadenas de formato controladas externamente. Esta vulnerabilidad permite a atacantes remotos revelar informaci\u00f3n confidencial sobre las instalaciones afectadas de Foxit PDF Reader. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. El defecto espec\u00edfico existe en la implementaci\u00f3n del m\u00e9todo de impresi\u00f3n. El problema se debe a la falta de validaci\u00f3n adecuada de una cadena proporcionada por el usuario antes de usarla como especificador de formato. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual. Era ZDI-CAN-14849."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34971",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:12.013",
"lastModified": "2024-05-07T23:15:12.013",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader JPG2000 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14812."
},
{
"lang": "es",
"value": "Foxit PDF Reader JPG2000 Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico de an\u00e1lisis de archivos. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Reader. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos PDF. El problema se debe a la falta de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos en un b\u00fafer basado en mont\u00f3n. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-14812."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34972",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:12.193",
"lastModified": "2024-05-07T23:15:12.193",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader AcroForm Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the processing of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14975."
},
{
"lang": "es",
"value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de Use-After-Free de Foxit PDF Reader AcroForm. Esta vulnerabilidad permite a atacantes remotos revelar informaci\u00f3n confidencial sobre las instalaciones afectadas de Foxit PDF Reader. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el procesamiento de AcroForms. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual. Era ZDI-CAN-14975."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34973",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:12.370",
"lastModified": "2024-05-07T23:15:12.370",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader PDF File Parsing Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14968."
},
{
"lang": "es",
"value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de use-after-free de archivos PDF de Foxit PDF Reader. Esta vulnerabilidad permite a atacantes remotos revelar informaci\u00f3n confidencial sobre las instalaciones afectadas de Foxit PDF Reader. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos PDF. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual. Era ZDI-CAN-14968."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34974",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:12.587",
"lastModified": "2024-05-07T23:15:12.587",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15167."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Use-After-Free en anotaci\u00f3n del lector de PDF de Foxit. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Reader. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de objetos de anotaci\u00f3n. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-15167."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34975",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:12.783",
"lastModified": "2024-05-07T23:15:12.783",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader transitionToState Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the implementation of the transitionToState method. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15218."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Use-After-Free de Foxit PDF Reader TransitionToState. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Foxit PDF Reader. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en la implementaci\u00f3n del m\u00e9todo TransitionToState. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-15218."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34976",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:13.007",
"lastModified": "2024-05-07T23:15:13.007",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader PDF File Parsing Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14659."
},
{
"lang": "es",
"value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de use-after-free de archivos PDF de Foxit PDF Reader. Esta vulnerabilidad permite a atacantes remotos revelar informaci\u00f3n confidencial sobre las instalaciones afectadas de Foxit PDF Reader. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el manejo de archivos PDF. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual. Era ZDI-CAN-14659."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34981",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:13.173",
"lastModified": "2024-05-07T23:15:13.173",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977."
},
{
"lang": "es",
"value": "Vulnerabilidad de escalada de privilegios gratuita doble del m\u00f3dulo CMTP Bluetooth del kernel de Linux. Esta vulnerabilidad permite a atacantes locales escalar privilegios en las instalaciones afectadas del kernel de Linux. Un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con altos privilegios en el sistema de destino para poder explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro del m\u00f3dulo CMTP. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar m\u00e1s operaciones libres sobre el objeto. Un atacante puede aprovechar esta vulnerabilidad para escalar privilegios y ejecutar c\u00f3digo en el contexto del kernel. Era ZDI-CAN-11977."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34982",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:13.400",
"lastModified": "2024-05-07T23:15:13.400",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "NETGEAR Multiple Routers httpd Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of multiple NETGEAR routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the httpd service, which listens on TCP port 80 by default. When parsing the strings file, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.\n\n\n\n\n. Was ZDI-CAN-13709."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria httpd de m\u00faltiples enrutadores de NETGEAR. Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en instalaciones afectadas de m\u00faltiples enrutadores NETGEAR. No se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe dentro del servicio httpd, que escucha en el puerto TCP 80 de forma predeterminada. Al analizar el archivo de cadenas, el proceso no valida correctamente la longitud de los datos proporcionados por el usuario antes de copiarlos en un b\u00fafer basado en pila de longitud fija. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de la ra\u00edz. Era ZDI-CAN-13709."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34983",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:13.573",
"lastModified": "2024-05-07T23:15:13.573",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "NETGEAR Multiple Routers httpd Missing Authentication for Critical Function Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of multiple NETGEAR routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from the lack of authentication prior to allowing access to system configuration information. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-13708."
},
{
"lang": "es",
"value": "Falta autenticaci\u00f3n httpd de varios enrutadores de NETGEAR para vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de funciones cr\u00edticas. Esta vulnerabilidad permite a atacantes adyacentes a la red revelar informaci\u00f3n confidencial sobre instalaciones afectadas de m\u00faltiples enrutadores NETGEAR. No se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe dentro del servicio httpd, que escucha en el puerto TCP 80 de forma predeterminada. El problema se debe a la falta de autenticaci\u00f3n antes de permitir el acceso a la informaci\u00f3n de configuraci\u00f3n del sistema. Un atacante puede aprovechar esta vulnerabilidad para revelar las credenciales almacenadas, lo que provocar\u00eda un mayor compromiso. Era ZDI-CAN-13708."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-34999",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:13.750",
"lastModified": "2024-05-07T23:15:13.750",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "OpenBSD Kernel Multicast Routing Uninitialized Memory Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of OpenBSD Kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of multicast routing. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-14540."
},
{
"lang": "es",
"value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de memoria no inicializada de enrutamiento de multidifusi\u00f3n del kernel de OpenBSD. Esta vulnerabilidad permite a atacantes locales revelar informaci\u00f3n confidencial sobre las instalaciones afectadas de OpenBSD Kernel. Un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad. La falla espec\u00edfica existe en la implementaci\u00f3n del enrutamiento de multidifusi\u00f3n. El problema se debe a la falta de una inicializaci\u00f3n adecuada de la memoria antes de acceder a ella. Un atacante puede aprovechar esto junto con otras vulnerabilidades para escalar privilegios y ejecutar c\u00f3digo arbitrario en el contexto del kernel. Era ZDI-CAN-14540."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-35000",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:13.937",
"lastModified": "2024-05-07T23:15:13.937",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "OpenBSD Kernel Multicast Routing Uninitialized Memory Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of OpenBSD Kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of multicast routing. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-16112."
},
{
"lang": "es",
"value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de memoria no inicializada de enrutamiento de multidifusi\u00f3n del kernel de OpenBSD. Esta vulnerabilidad permite a atacantes locales revelar informaci\u00f3n confidencial sobre las instalaciones afectadas de OpenBSD Kernel. Un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad. La falla espec\u00edfica existe en la implementaci\u00f3n del enrutamiento de multidifusi\u00f3n. El problema se debe a la falta de una inicializaci\u00f3n adecuada de la memoria antes de acceder a ella. Un atacante puede aprovechar esto junto con otras vulnerabilidades para escalar privilegios y ejecutar c\u00f3digo arbitrario en el contexto del kernel. Era ZDI-CAN-16112."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-35001",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:14.120",
"lastModified": "2024-05-07T23:15:14.120",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "BMC Track-It! GetData Missing Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of BMC Track-It!. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the GetData endpoint. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-14527."
},
{
"lang": "es",
"value": "\u00a1BMC Track-It! Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de autorizaci\u00f3n faltante de GetData. Esta vulnerabilidad permite a atacantes remotos revelar informaci\u00f3n confidencial sobre las instalaciones afectadas de BMC Track-It!. Se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe dentro del endpoint GetData. El problema se debe a la falta de autorizaci\u00f3n antes de permitir el acceso a la funcionalidad. Un atacante puede aprovechar esta vulnerabilidad para revelar las credenciales almacenadas, lo que provocar\u00eda un mayor compromiso. Era ZDI-CAN-14527."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-35002",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:14.313",
"lastModified": "2024-05-07T23:15:14.313",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "BMC Track-It! Unrestricted File Upload Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of BMC Track-It!. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the processing of email attachments. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-14122."
},
{
"lang": "es",
"value": "\u00a1BMC Track-It! Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de carga de archivos sin restricciones. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de BMC Track-It!. Se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe en el procesamiento de archivos adjuntos de correo electr\u00f3nico. El problema se debe a la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede permitir la carga de archivos arbitrarios. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de la cuenta de servicio. Era ZDI-CAN-14122."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-0369",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:14.490",
"lastModified": "2024-05-07T23:15:14.490",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Triangle MicroWorks SCADA Data Gateway Restore Workspace Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Triangle MicroWorks SCADA Data Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the Restore Workspace feature. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-17227."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Directory Traversal de espacio de trabajo de restauraci\u00f3n de puerta de enlace de datos SCADA de Triangle MicroWorks. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Triangle MicroWorks SCADA Data Gateway. Aunque se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad, se puede omitir el mecanismo de autenticaci\u00f3n existente. La falla espec\u00edfica existe dentro de la funci\u00f3n Restaurar espacio de trabajo. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones de archivos. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de SYSTEM. Era ZDI-CAN-17227."
}
],
"metrics": {

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2022-40218",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T12:15:07.650",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in ThemeHunk Advance WordPress Search Plugin.This issue affects Advance WordPress Search Plugin: from n/a through 1.1.4.\n\n"
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en ThemeHunk Advance WordPress Search Plugin. Este problema afecta al complemento de b\u00fasqueda avanzada de WordPress: desde n/a hasta 1.1.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/th-advance-product-search/wordpress-th-advance-product-search-plugin-1-1-4-unauthenticated-plugin-settings-change-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-43651",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:14.687",
"lastModified": "2024-05-07T23:15:14.687",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Bentley View SKP File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of SKP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18960."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo despu\u00e9s de liberar el an\u00e1lisis de archivos SKP de Bentley View. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Bentley View. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos SKP. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-18960."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-43652",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:14.857",
"lastModified": "2024-05-07T23:15:14.857",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Bentley View SKP File Parsing Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of SKP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18981."
},
{
"lang": "es",
"value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de use-after-free del an\u00e1lisis de archivos SKP de Bentley View. Esta vulnerabilidad permite a atacantes remotos revelar informaci\u00f3n confidencial sobre las instalaciones afectadas de Bentley View. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos SKP. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual. Era ZDI-CAN-18981."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-43653",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:15.040",
"lastModified": "2024-05-07T23:15:15.040",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Bentley View SKP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of SKP files. Crafted data in an SKP file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-19084."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de escritura fuera de los l\u00edmites en el an\u00e1lisis de archivos SKP de Bentley View. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Bentley View. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos SKP. Los datos elaborados en un archivo SKP pueden desencadenar una escritura m\u00e1s all\u00e1 del final de un b\u00fafer asignado. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-19084."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-43654",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:15.223",
"lastModified": "2024-05-07T23:15:15.223",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "NETGEAR CAX30S SSO Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR CAX30S routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of the token parameter provided to the sso.php endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18227."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de inyecci\u00f3n de comando SSO de NETGEAR CAX30S. Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en instalaciones afectadas de enrutadores NETGEAR CAX30S. No se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe en el manejo del par\u00e1metro token proporcionado al endpoint sso.php. El problema se debe a la falta de validaci\u00f3n adecuada de una cadena proporcionada por el usuario antes de usarla para ejecutar una llamada al sistema. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de la ra\u00edz. Era ZDI-CAN-18227."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-43655",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:15.413",
"lastModified": "2024-05-07T23:15:15.413",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Bentley View FBX File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of FBX files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18491."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en el an\u00e1lisis de archivos FBX de Bentley View. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Bentley View. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos FBX. El problema se debe a la falta de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos en un b\u00fafer basado en mont\u00f3n de longitud fija. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-18491."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-43656",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:15.583",
"lastModified": "2024-05-07T23:15:15.583",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Bentley View FBX File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of FBX files. Crafted data in an FBX file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18492."
},
{
"lang": "es",
"value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de lectura fuera de los l\u00edmites en el an\u00e1lisis de archivos FBX de Bentley View. Esta vulnerabilidad permite a atacantes remotos revelar informaci\u00f3n confidencial sobre las instalaciones afectadas de Bentley View. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos FBX. Los datos elaborados en un archivo FBX pueden desencadenar una lectura m\u00e1s all\u00e1 del final de un b\u00fafer asignado. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual. Era ZDI-CAN-18492."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-27321",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:15.760",
"lastModified": "2024-05-07T23:15:15.760",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "OPC Foundation UA .NET Standard ConditionRefresh Resource Exhaustion Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of OPC UA ConditionRefresh requests. By sending a large number of requests, an attacker can consume all available resources on the server. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-20505."
},
{
"lang": "es",
"value": "Vulnerabilidad de denegaci\u00f3n de servicio por agotamiento de recursos en OPC Foundation UA .NET Standard ConditionRefresh. Esta vulnerabilidad permite a atacantes remotos crear una condici\u00f3n de denegaci\u00f3n de servicio en las instalaciones afectadas de OPC Foundation UA .NET Standard. No se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe en el manejo de solicitudes OPC UA ConditionRefresh. Al enviar una gran cantidad de solicitudes, un atacante puede consumir todos los recursos disponibles en el servidor. Un atacante puede aprovechar esta vulnerabilidad para crear una condici\u00f3n de denegaci\u00f3n de servicio en el sistema. Era ZDI-CAN-20505."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-35748",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:15.947",
"lastModified": "2024-05-07T23:15:15.947",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "D-Link DAP-2622 DDP Firmware Upgrade Server IPv6 Address Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20076."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria de direcci\u00f3n IPv6 del servidor de actualizaci\u00f3n de firmware D-Link DAP-2622 DDP. Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en instalaciones afectadas de enrutadores D-Link DAP-2622. No se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe dentro del servicio DDP. El problema se debe a la falta de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos en un b\u00fafer basado en pila de longitud fija. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de la ra\u00edz. Fue ZDI-CAN-20076."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-35749",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:16.120",
"lastModified": "2024-05-07T23:15:16.120",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "D-Link DAP-2622 DDP Firmware Upgrade Filename Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20077."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria de nombre de archivo de actualizaci\u00f3n de firmware D-Link DAP-2622 DDP. Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en instalaciones afectadas de enrutadores D-Link DAP-2622. No se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe dentro del servicio DDP. El problema se debe a la falta de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos en un b\u00fafer basado en pila de longitud fija. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de la ra\u00edz. Fue ZDI-CAN-20077."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-35757",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:16.290",
"lastModified": "2024-05-07T23:15:16.290",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "D-Link DAP-2622 DDP Set Date-Time NTP Server Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20085."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria D-Link DAP-2622 DDP Set Date-Time NTP Server. Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en instalaciones afectadas de enrutadores D-Link DAP-2622. No se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe dentro del servicio DDP. El problema se debe a la falta de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos en un b\u00fafer basado en pila de longitud fija. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de la ra\u00edz. Fue ZDI-CAN-20085."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-37325",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:16.497",
"lastModified": "2024-05-07T23:15:16.497",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "D-Link DAP-2622 DDP Set SSID List Missing Authentication Vulnerability. This vulnerability allows network-adjacent attackers to make unauthorized changes to device configuration on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the DDP service. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to manipulate wireless authentication settings. Was ZDI-CAN-20104."
},
{
"lang": "es",
"value": "Vulnerabilidad de autenticaci\u00f3n faltante en la lista SSID del conjunto DDP de D-Link DAP-2622. Esta vulnerabilidad permite a atacantes adyacentes a la red realizar cambios no autorizados en la configuraci\u00f3n del dispositivo en las instalaciones afectadas de los enrutadores D-Link DAP-2622. No se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe dentro del servicio DDP. El problema se debe a la falta de autenticaci\u00f3n antes de permitir el acceso a la funcionalidad. Un atacante puede aprovechar esta vulnerabilidad para manipular la configuraci\u00f3n de autenticaci\u00f3n inal\u00e1mbrica. Fue ZDI-CAN-20104."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-40490",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:16.680",
"lastModified": "2024-05-07T23:15:16.680",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Maxon Cinema 4D SKP File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Maxon Cinema 4D. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of SKP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21438."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de use-after-free del an\u00e1lisis de archivos SKP de Maxon Cinema 4D. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Maxon Cinema 4D. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos SKP. El problema surge de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones sobre \u00e9l. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-21438."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-40694",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-05-07T21:15:08.097",
"lastModified": "2024-05-07T21:15:08.097",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM Watson CP4D Data Stores 4.0.0 through 4.8.4 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 264838."
},
{
"lang": "es",
"value": "IBM Watson CP4D Data Stores 4.0.0 a 4.8.4 almacena informaci\u00f3n potencialmente confidencial en archivos de registro que un usuario local podr\u00eda leer. ID de IBM X-Force: 264838."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-41651",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T09:15:07.927",
"lastModified": "2024-05-08T09:15:07.927",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Multi-column Tag Map.This issue affects Multi-column Tag Map: from n/a through 17.0.26.\n\n"
},
{
"lang": "es",
"value": "Vulnerabilidad de falta de autorizaci\u00f3n en Multi-column Tag Map. Este problema afecta al mapa de etiquetas de varias columnas: desde n/a hasta 17.0.26."
}
],
"metrics": {

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6240",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-02-04T14:15:47.787",
"lastModified": "2024-04-18T04:15:09.903",
"lastModified": "2024-05-08T13:15:07.470",
"vulnStatus": "Modified",
"descriptions": [
{
@ -131,6 +131,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:1882",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2758",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-6240",
"source": "secalert@redhat.com",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-0022",
"sourceIdentifier": "security@android.com",
"published": "2024-05-07T21:15:08.330",
"lastModified": "2024-05-07T21:15:08.330",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In multiple functions of CompanionDeviceManagerService.java, there is a possible launch NotificationAccessConfirmationActivity of another user profile due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En m\u00faltiples funciones de CompanionDeviceManagerService.java, existe un posible lanzamiento de NotificationAccessConfirmationActivity de otro perfil de usuario debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-0024",
"sourceIdentifier": "security@android.com",
"published": "2024-05-07T21:15:08.367",
"lastModified": "2024-05-07T21:15:08.367",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In multiple methods of UserManagerService.java, there is a possible failure to persist or enforce user restrictions due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
},
{
"lang": "es",
"value": "En varios m\u00e9todos de UserManagerService.java, existe la posibilidad de que no se persistan o no se apliquen restricciones de usuario debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-0025",
"sourceIdentifier": "security@android.com",
"published": "2024-05-07T21:15:08.410",
"lastModified": "2024-05-07T21:15:08.410",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In sendIntentSender of ActivityManagerService.java, there is a possible background activity launch due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En sendIntentSender de ActivityManagerService.java, existe un posible inicio de actividad en segundo plano debido a un error l\u00f3gico. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-0026",
"sourceIdentifier": "security@android.com",
"published": "2024-05-07T21:15:08.460",
"lastModified": "2024-05-07T21:15:08.460",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In multiple functions of SnoozeHelper.java, there is a possible persistent denial of service due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En m\u00faltiples funciones de SnoozeHelper.java, existe una posible denegaci\u00f3n de servicio persistente debido al agotamiento de los recursos. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-0027",
"sourceIdentifier": "security@android.com",
"published": "2024-05-07T21:15:08.500",
"lastModified": "2024-05-07T21:15:08.500",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In multiple functions of SnoozeHelper.java, there is a possible way to cause a boot loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En m\u00faltiples funciones de SnoozeHelper.java, existe una forma posible de provocar un bucle de arranque debido al agotamiento de los recursos. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-0042",
"sourceIdentifier": "security@android.com",
"published": "2024-05-07T21:15:08.540",
"lastModified": "2024-05-07T21:15:08.540",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In TBD of TBD, there is a possible confusion of OEM and DRM certificates due to improperly used crypto. This could lead to local bypass of DRM content protection with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En TBD de TBD, existe una posible confusi\u00f3n entre los certificados OEM y DRM debido a un uso incorrecto de las criptomonedas. Esto podr\u00eda provocar una omisi\u00f3n local de la protecci\u00f3n de contenido DRM sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-0043",
"sourceIdentifier": "security@android.com",
"published": "2024-05-07T21:15:08.583",
"lastModified": "2024-05-07T21:15:08.583",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In multiple locations, there is a possible notification listener grant to an app running in the work profile due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
},
{
"lang": "es",
"value": "En varias ubicaciones, existe una posible concesi\u00f3n de escucha de notificaciones a una aplicaci\u00f3n que se ejecuta en el perfil de trabajo debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-1076",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-08T06:15:06.877",
"lastModified": "2024-05-08T06:15:06.877",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The SSL Zen WordPress plugin before 4.6.0 only relies on the use of .htaccess to prevent visitors from accessing the site's generated private keys, which allows an attacker to read them if the site runs on a server who doesn't support .htaccess files, like NGINX."
},
{
"lang": "es",
"value": "El complemento SSL Zen WordPress anterior a 4.6.0 solo se basa en el uso de .htaccess para evitar que los visitantes accedan a las claves privadas generadas por el sitio, lo que permite a un atacante leerlas si el sitio se ejecuta en un servidor que no admite archivos .htaccess, como NGINX."
}
],
"metrics": {},

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-1438",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T13:15:07.733",
"lastModified": "2024-05-08T13:15:17.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in PressFore Rolo Slider.This issue affects Rolo Slider: from n/a through 1.0.9.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/rolo-slider/wordpress-rolo-slider-plugin-1-0-9-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-1929",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-05-08T02:15:09.300",
"lastModified": "2024-05-08T02:15:09.300",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Local Root Exploit via Configuration Dictionary in dnf5daemon-server\u00a0before 5.1.17 allows a malicious user to impact Confidentiality and Integrity via Configuration Dictionary.\n\nThere are issues with the D-Bus interface long before Polkit is invoked. The `org.rpm.dnf.v0.SessionManager.open_session` method takes a key/value map of configuration entries. A sub-entry in this map, placed under the \"config\" key, is another key/value map. The configuration values found in it will be forwarded as configuration overrides to the `libdnf5::Base` configuration.\u00a0\n\nPractically all libdnf5 configuration aspects can be influenced here. Already when opening the session via D-Bus, the libdnf5 will be initialized using these override configuration values. There is no sanity checking of the content of this \"config\" map, which is untrusted data.\u00a0It is possible to make the library loading a plug-in shared library under control of an unprivileged user, hence achieving root access.\u00a0\n\n"
},
{
"lang": "es",
"value": "El exploit de ra\u00edz local a trav\u00e9s del diccionario de configuraci\u00f3n en dnf5daemon-server anterior a 5.1.17 permite que un usuario malintencionado afecte la confidencialidad y la integridad a trav\u00e9s del diccionario de configuraci\u00f3n. Hay problemas con la interfaz D-Bus mucho antes de que se invoque Polkit. El m\u00e9todo `org.rpm.dnf.v0.SessionManager.open_session` toma un mapa clave/valor de las entradas de configuraci\u00f3n. Una subentrada en este mapa, ubicada debajo de la clave \"config\", es otro mapa de clave/valor. Los valores de configuraci\u00f3n que se encuentran en \u00e9l se reenviar\u00e1n como anulaciones de configuraci\u00f3n a la configuraci\u00f3n `libdnf5::Base`. Aqu\u00ed se pueden influir pr\u00e1cticamente todos los aspectos de configuraci\u00f3n de libdnf5. Ya al abrir la sesi\u00f3n a trav\u00e9s de D-Bus, libdnf5 se inicializar\u00e1 utilizando estos valores de configuraci\u00f3n de anulaci\u00f3n. No hay ninguna verificaci\u00f3n de cordura del contenido de este mapa de \"configuraci\u00f3n\", que son datos que no son de confianza. Es posible hacer que la librer\u00eda cargue una librer\u00eda compartida de complemento bajo el control de un usuario sin privilegios, logrando as\u00ed acceso de root."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-1930",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-05-08T02:15:09.503",
"lastModified": "2024-05-08T02:15:09.503",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "No Limit on Number of Open Sessions / Bad Session Close Behaviour in dnf5daemon-server before 5.1.17 allows a malicious user to impact Availability via\u00a0No Limit on Number of Open Sessions.\n\nThere is no limit on how many sessions D-Bus clients may create using the `open_session()` D-Bus method.\u00a0For each session a thread is created in dnf5daemon-server. This spends a couple of hundred megabytes of memory in the process. Further connections will become impossible, likely because no more threads can be spawned by the D-Bus service.\n\n"
},
{
"lang": "es",
"value": "Sin l\u00edmite en el n\u00famero de sesiones abiertas / mal comportamiento de cierre de sesi\u00f3n en dnf5daemon-server anterior a 5.1.17 permite que un usuario malintencionado afecte la disponibilidad mediante Sin l\u00edmite en el n\u00famero de sesiones abiertas. No hay l\u00edmite en la cantidad de sesiones que los clientes D-Bus pueden crear usando el m\u00e9todo D-Bus `open_session()`. Para cada sesi\u00f3n se crea un hilo en dnf5daemon-server. Esto gasta un par de cientos de megabytes de memoria en el proceso. Ser\u00e1 imposible realizar m\u00e1s conexiones, probablemente porque el servicio D-Bus no puede generar m\u00e1s subprocesos."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-22264",
"sourceIdentifier": "security@vmware.com",
"published": "2024-05-08T04:15:08.900",
"lastModified": "2024-05-08T04:15:08.900",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "VMware Avi Load Balancer contains a privilege escalation vulnerability.\u00a0A malicious actor with admin privileges on VMware Avi Load Balancer can create, modify, execute and delete files as a root user on the host system."
},
{
"lang": "es",
"value": "VMware Avi Load Balancer contiene una vulnerabilidad de escalada de privilegios. Un actor malintencionado con privilegios de administrador en VMware Avi Load Balancer puede crear, modificar, ejecutar y eliminar archivos como usuario root en el sistema host."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-22266",
"sourceIdentifier": "security@vmware.com",
"published": "2024-05-08T04:15:09.460",
"lastModified": "2024-05-08T04:15:09.460",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "\u00a0VMware Avi Load Balancer contains an information disclosure vulnerability.\u00a0A malicious actor with access to the system logs can view cloud connection\u00a0credentials in plaintext."
},
{
"lang": "es",
"value": "VMware Avi Load Balancer contiene una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n. Un actor malintencionado con acceso a los registros del sistema puede ver las credenciales de conexi\u00f3n a la nube en texto sin formato."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23551",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-05-07T22:15:07.560",
"lastModified": "2024-05-07T22:15:07.560",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Database scanning using username and password stores the credentials in\u00a0plaintext or encoded format within files at the endpoint. This has been identified as a significant\u00a0security risk. This will lead to exposure of sensitive information for unauthorized access,\u00a0potentially leading to severe consequences such as data breaches, unauthorized data\u00a0manipulation, and compromised system integrity."
},
{
"lang": "es",
"value": "El escaneo de la base de datos mediante nombre de usuario y contrase\u00f1a almacena las credenciales en texto sin formato o en formato codificado dentro de archivos en el endpoint. Esto ha sido identificado como un riesgo de seguridad importante. Esto dar\u00e1 lugar a la exposici\u00f3n de informaci\u00f3n confidencial para acceso no autorizado, lo que podr\u00eda tener consecuencias graves, como violaciones de datos, manipulaci\u00f3n de datos no autorizada y compromiso de la integridad del sistema."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23704",
"sourceIdentifier": "security@android.com",
"published": "2024-05-07T21:15:08.630",
"lastModified": "2024-05-07T21:15:08.630",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In onCreate of WifiDialogActivity.java, there is a possible way to bypass the DISALLOW_ADD_WIFI_CONFIG restriction due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En onCreate de WifiDialogActivity.java, existe una forma posible de evitar la restricci\u00f3n DISALLOW_ADD_WIFI_CONFIG debido a una falta de verificaci\u00f3n de permiso. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23705",
"sourceIdentifier": "security@android.com",
"published": "2024-05-07T21:15:08.680",
"lastModified": "2024-05-07T21:15:08.680",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In multiple locations, there is a possible failure to persist or enforce user restrictions due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
},
{
"lang": "es",
"value": "En varias ubicaciones, es posible que no se persistan o no se apliquen restricciones de usuario debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23706",
"sourceIdentifier": "security@android.com",
"published": "2024-05-07T21:15:08.737",
"lastModified": "2024-05-07T21:15:08.737",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In multiple locations, there is a possible bypass of health data permissions due to an improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En varias ubicaciones, existe una posible omisi\u00f3n de los permisos de datos de salud debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23707",
"sourceIdentifier": "security@android.com",
"published": "2024-05-07T21:15:08.787",
"lastModified": "2024-05-07T21:15:08.787",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In multiple locations, there is a possible permissions bypass due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
},
{
"lang": "es",
"value": "En varias ubicaciones, existe una posible omisi\u00f3n de permisos debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23708",
"sourceIdentifier": "security@android.com",
"published": "2024-05-07T21:15:08.830",
"lastModified": "2024-05-07T21:15:08.830",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In multiple functions of NotificationManagerService.java, there is a possible way to not show a toast message when a clipboard message has been accessed. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En m\u00faltiples funciones de NotificationManagerService.java, existe una manera posible de no mostrar un mensaje de brindis cuando se ha accedido a un mensaje del portapapeles. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23709",
"sourceIdentifier": "security@android.com",
"published": "2024-05-07T21:15:08.877",
"lastModified": "2024-05-07T21:15:08.877",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In multiple locations, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation."
},
{
"lang": "es",
"value": "En varias ubicaciones, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23710",
"sourceIdentifier": "security@android.com",
"published": "2024-05-07T21:15:08.930",
"lastModified": "2024-05-07T21:15:08.930",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In assertPackageWithSharedUserIdIsPrivileged of InstallPackageHelper.java, there is a possible execution of arbitrary app code as a privileged app due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En afirmarPackageWithSharedUserIdIsPrivileged de InstallPackageHelper.java, existe una posible ejecuci\u00f3n de c\u00f3digo de aplicaci\u00f3n arbitrario como una aplicaci\u00f3n privilegiada debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23712",
"sourceIdentifier": "security@android.com",
"published": "2024-05-07T21:15:08.977",
"lastModified": "2024-05-07T21:15:08.977",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In multiple functions of AppOpsService.java, there is a possible way to saturate the content of /data/system/appops_accesses.xml due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En m\u00faltiples funciones de AppOpsService.java, existe una forma posible de saturar el contenido de /data/system/appops_accesses.xml debido al agotamiento de los recursos. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23713",
"sourceIdentifier": "security@android.com",
"published": "2024-05-07T21:15:09.017",
"lastModified": "2024-05-07T21:15:09.017",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In migrateNotificationFilter of NotificationManagerService.java, there is a possible failure to persist notifications settings due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En migrarNotificationFilter de NotificationManagerService.java, existe una posible falla al persistir la configuraci\u00f3n de notificaciones debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-27273",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-05-07T21:15:09.060",
"lastModified": "2024-05-07T21:15:09.060",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM AIX's Unix domain (AIX 7.2, 7.3, VIOS 3.1, and VIOS 4.1) datagram socket implementation could potentially expose applications using Unix domain datagram sockets with SO_PEERID operation and may lead to privilege escalation. IBM X-Force ID: 284903."
},
{
"lang": "es",
"value": "La implementaci\u00f3n de sockets de datagramas de dominio Unix de IBM AIX (AIX 7.2, 7.3, VIOS 3.1 y VIOS 4.1) podr\u00eda exponer potencialmente aplicaciones que utilizan sockets de datagramas de dominio Unix con operaci\u00f3n SO_PEERID y puede conducir a una escalada de privilegios. ID de IBM X-Force: 284903."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-2746",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-05-08T02:15:09.677",
"lastModified": "2024-05-08T02:15:09.677",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Incomplete fix for CVE-2024-1929\n\nThe problem with CVE-2024-1929 was that the dnf5 D-Bus daemon accepted arbitrary configuration parameters from unprivileged users, which allowed a\nlocal root exploit by tricking the daemon into loading a user controlled \"plugin\". All of this happened before Polkit authentication was even started.\n\nThe dnf5 library code does not check whether non-root users control the directory in question.\u00a0\n\nOn one hand, this poses a Denial-of-Service attack vector by making the daemonoperate on a blocking file (e.g. named FIFO special file) or a very large file\nthat causes an out-of-memory situation (e.g. /dev/zero). On the other hand, this can be used to let the daemon process privileged files like /etc/shadow.\nThe file in question is parsed as an INI file. Error diagnostics resulting from parsing privileged files could cause information leaks, if these diagnostics\nare accessible to unprivileged users. In the case of libdnf5, no such user accessible diagnostics should exist, though.\n\nAlso, a local attacker can place a valid repository configuration file in this directory. This configuration file allows to specify\na plethora of additional configuration options. This makes various\u00a0additional code paths in libdnf5 accessible to the attacker.\u00a0\n"
},
{
"lang": "es",
"value": "Soluci\u00f3n incompleta para CVE-2024-1929 El problema con CVE-2024-1929 era que el daemon dnf5 D-Bus aceptaba par\u00e1metros de configuraci\u00f3n arbitrarios de usuarios sin privilegios, lo que permit\u00eda un exploit de ra\u00edz local enga\u00f1ando al daemon para que cargara un \"complemento\" controlado por el usuario. Todo esto sucedi\u00f3 incluso antes de que se iniciara la autenticaci\u00f3n Polkit. El c\u00f3digo de la librer\u00eda dnf5 no comprueba si los usuarios no root controlan el directorio en cuesti\u00f3n. Por un lado, esto plantea un vector de ataque de denegaci\u00f3n de servicio al hacer que el daemon opere en un archivo de bloqueo (por ejemplo, un archivo especial llamado FIFO) o un archivo muy grande que causa una situaci\u00f3n de falta de memoria (por ejemplo, /dev/zero). Por otro lado, esto se puede utilizar para permitir que el daemon procese archivos privilegiados como /etc/shadow. El archivo en cuesti\u00f3n se analiza como un archivo INI. Los diagn\u00f3sticos de errores resultantes del an\u00e1lisis de archivos privilegiados podr\u00edan causar fugas de informaci\u00f3n, si estos diagn\u00f3sticos son accesibles para usuarios sin privilegios. Sin embargo, en el caso de libdnf5, no deber\u00eda existir ning\u00fan diagn\u00f3stico accesible para el usuario. Adem\u00e1s, un atacante local puede colocar un archivo de configuraci\u00f3n de repositorio v\u00e1lido en este directorio. Este archivo de configuraci\u00f3n permite especificar una gran cantidad de opciones de configuraci\u00f3n adicionales. Esto hace que el atacante pueda acceder a varias rutas de c\u00f3digo adicionales en libdnf5."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-2860",
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-05-08T02:15:09.873",
"lastModified": "2024-05-08T02:15:09.873",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The PostgreSQL implementation in Brocade SANnav versions before 2.3.0a is vulnerable to an incorrect local authentication flaw. An attacker accessing the VM where the Brocade SANnav is installed can gain access to sensitive data inside the PostgreSQL database.\n "
},
{
"lang": "es",
"value": "La implementaci\u00f3n de PostgreSQL en las versiones de Brocade SANnav anteriores a la 2.3.0a es vulnerable a una falla de autenticaci\u00f3n local incorrecta. Un atacante que acceda a la m\u00e1quina virtual donde est\u00e1 instalado Brocade SANnav puede obtener acceso a datos confidenciales dentro de la base de datos PostgreSQL."
}
],
"metrics": {

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-31115",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-31T18:15:48.013",
"lastModified": "2024-04-01T01:12:59.077",
"lastModified": "2024-05-08T13:15:07.937",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in QuanticaLabs Chauffeur Taxi Booking System for WordPress.This issue affects Chauffeur Taxi Booking System for WordPress: from n/a through 6.9.\n\n"
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in QuanticaLabs Chauffeur Taxi Booking System for WordPress.This issue affects Chauffeur Taxi Booking System for WordPress: from n/a through 7.2.\n\n"
},
{
"lang": "es",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-32674",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-05-08T04:15:09.840",
"lastModified": "2024-05-08T04:15:09.840",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Heateor Social Login WordPress prior to 1.1.32 contains a cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product."
},
{
"lang": "es",
"value": "Heator Social Login WordPress anterior a 1.1.32 contiene una vulnerabilidad de Cross-site scripting. Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en el navegador web del usuario que accedi\u00f3 al sitio web utilizando el producto."
}
],
"metrics": {},

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-34255",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-08T13:15:08.033",
"lastModified": "2024-05-08T13:15:17.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "jizhicms v2.5.1 contains a Cross-Site Scripting(XSS) vulnerability in the message function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Cherry-toto/jizhicms/issues/93",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-34346",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-07T21:15:09.270",
"lastModified": "2024-05-07T21:15:09.270",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. The Deno sandbox may be unexpectedly weakened by allowing file read/write access to privileged files in various locations on Unix and Windows platforms. For example, reading `/proc/self/environ` may provide access equivalent to `--allow-env`, and writing `/proc/self/mem` may provide access equivalent to `--allow-all`. Users who grant read and write access to the entire filesystem may not realize that these access to these files may have additional, unintended consequences. The documentation did not reflect that this practice should be undertaken to increase the strength of the security sandbox. Users who run code with `--allow-read` or `--allow-write` may unexpectedly end up granting additional permissions via file-system operations. Deno 1.43 and above require explicit `--allow-all` access to read or write `/etc`, `/dev` on unix platform (as well as `/proc` and `/sys` on linux platforms), and any path starting with `\\\\` on Windows.\n"
},
{
"lang": "es",
"value": "Deno es un tiempo de ejecuci\u00f3n de JavaScript, TypeScript y WebAssembly con valores predeterminados seguros. La sandbox de Deno puede verse debilitado inesperadamente al permitir el acceso de lectura/escritura de archivos privilegiados en varias ubicaciones en plataformas Unix y Windows. Por ejemplo, leer `/proc/self/environ` puede proporcionar un acceso equivalente a `--allow-env`, y escribir `/proc/self/mem` puede proporcionar un acceso equivalente a `--allow-all`. Es posible que los usuarios que otorgan acceso de lectura y escritura a todo el sistema de archivos no se den cuenta de que este acceso a estos archivos puede tener consecuencias adicionales no deseadas. La documentaci\u00f3n no refleja que esta pr\u00e1ctica deba llevarse a cabo para aumentar la solidez del entorno limitado de seguridad. Los usuarios que ejecutan c\u00f3digo con `--allow-read` o `--allow-write` pueden terminar inesperadamente otorgando permisos adicionales a trav\u00e9s de operaciones del sistema de archivos. Deno 1.43 y superiores requieren acceso expl\u00edcito `--allow-all` para leer o escribir `/etc`, `/dev` en plataformas Unix (as\u00ed como `/proc` y `/sys` en plataformas Linux), y cualquier ruta que comienza con `\\\\` en Windows."
}
],
"metrics": {

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-34414",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T12:15:07.990",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nobita allows Stored XSS.This issue affects raindrops: from n/a through 1.600.\n\n"
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Nobita permite almacenar XSS. Este problema afecta a las gotas de lluvia: desde n/a hasta 1.600."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/raindrops/wordpress-raindrops-theme-1-600-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-34546",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T12:15:08.180",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HabibCoder Sticky Social Link allows Stored XSS.This issue affects Sticky Social Link: from n/a through 1.0.0.\n\n"
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en HabibCoder Sticky Social Link permite almacenar XSS. Este problema afecta a Sticky Social Link: desde n/a hasta 1.0.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/sticky-social-link/wordpress-sticky-social-link-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-34547",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T12:15:08.370",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Noor alam Magical Addons For Elementor allows Stored XSS.This issue affects Magical Addons For Elementor: from n/a through 1.1.34.\n\n"
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Noor alam Magical Addons For Elementor permite almacenar XSS. Este problema afecta a Magical Addons For Elementor: desde n/a hasta 1.1.34."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/magical-addons-for-elementor/wordpress-magical-addons-for-elementor-header-footer-builder-free-elementor-widgets-elementor-templates-library-plugin-1-1-34-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-34548",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T12:15:08.560",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themesgrove WidgetKit allows Stored XSS.This issue affects WidgetKit: from n/a through 2.4.8.\n\n"
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Themesgrove WidgetKit permite almacenar XSS. Este problema afecta a WidgetKit: desde n/a hasta 2.4.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/widgetkit-for-elementor/wordpress-all-in-one-addons-for-elementor-widgetkit-plugin-2-4-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-34553",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T12:15:08.747",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Select-Themes Stockholm Core allows Reflected XSS.This issue affects Stockholm Core: from n/a through 2.4.1.\n\n"
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Select-Themes Stockholm Core permite Reflected XSS. Este problema afecta a Stockholm Core: desde n/a hasta 2.4.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/stockholm-core/wordpress-stockholm-core-plugin-2-4-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-34558",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T12:15:08.933",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in realmag777 WOLF allows Stored XSS.This issue affects WOLF: from n/a through 1.0.8.2.\n\n"
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en realmag777 WOLF permite almacenar XSS. Este problema afecta a WOLF: desde n/a hasta 1.0.8.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/bulk-editor/wordpress-wolf-wordpress-posts-bulk-editor-and-manager-professional-plugin-1-0-8-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-34560",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T12:15:09.133",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GOMO gee Search Plus allows Stored XSS.This issue affects gee Search Plus: from n/a through 1.4.4.\n\n"
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en GOMO gee Search Plus permite almacenar XSS. Este problema afecta a gee Search Plus: desde n/a hasta 1.4.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/gsearch-plus/wordpress-gee-search-plus-plugin-1-4-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-34561",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T12:15:09.330",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Creative interactive media 3D FlipBook, PDF Viewer, PDF Embedder \u2013 Real 3D FlipBook WordPress Plugin allows Stored XSS.This issue affects 3D FlipBook, PDF Viewer, PDF Embedder \u2013 Real 3D FlipBook WordPress Plugin: from n/a through 3.71.\n\n"
},
{
"lang": "es",
"value": "Neutralizaci\u00f3n inadecuada de la entrada durante la vulnerabilidad de generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Creative interactive media 3D FlipBook, PDF Viewer, PDF Embedder \u2013 Real 3D FlipBook WordPress Plugin permite almacenar XSS. Este problema afecta a 3D FlipBook, visor de PDF y incrustador de PDF \u2013 Complemento de WordPress Real 3D FlipBook: desde n/a hasta 3.71."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/real3d-flipbook-lite/wordpress-real3d-flipbook-pdf-viewer-lite-plugin-3-71-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-34562",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T11:15:24.193",
"lastModified": "2024-05-08T11:15:24.193",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Moveaddons Move Addons for Elementor allows Stored XSS.This issue affects Move Addons for Elementor: from n/a through 1.3.0.\n\n"
},
{
"lang": "es",
"value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Moveaddons Move Addons para Elementor permite almacenar XSS. Este problema afecta a Move Addons para Elementor: desde n/a hasta 1.3.0."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-34563",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T11:15:24.390",
"lastModified": "2024-05-08T11:15:24.390",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GoldAddons Gold Addons for Elementor allows Stored XSS.This issue affects Gold Addons for Elementor: from n/a through 1.2.9.\n\n"
},
{
"lang": "es",
"value": "Neutralizaci\u00f3n inadecuada de la entrada durante la vulnerabilidad de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en GoldAddons Gold Addons para Elementor permite almacenar XSS. Este problema afecta a Gold Addons para Elementor: desde n/a hasta 1.2.9."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-34564",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T11:15:24.570",
"lastModified": "2024-05-08T11:15:24.570",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LogicHunt Inc. Counter Up allows Stored XSS.This issue affects Counter Up: from n/a through 2.2.1.\n\n"
},
{
"lang": "es",
"value": "Neutralizaci\u00f3n inadecuada de la entrada durante la vulnerabilidad de generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en LogicHunt Inc. Counter Up permite almacenar XSS. Este problema afecta a Counter Up: desde n/a hasta 2.2.1."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-34565",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T11:15:24.747",
"lastModified": "2024-05-08T11:15:24.747",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Debug Info allows Stored XSS.This issue affects Debug Info: from n/a through 1.3.10.\n\n"
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Debug Info permite almacenar XSS. Este problema afecta a la informaci\u00f3n de depuraci\u00f3n: desde n/a hasta 1.3.10."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-34566",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T11:15:24.930",
"lastModified": "2024-05-08T11:15:24.930",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Johan van der Wijk Content Blocks (Custom Post Widget) allows Stored XSS.This issue affects Content Blocks (Custom Post Widget): from n/a through 3.3.0.\n\n"
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Johan van der Wijk Content Blocks (Custom Post Widget) permite almacenar XSS. Este problema afecta a los bloques de contenido (widget de publicaci\u00f3n personalizado): desde n/a hasta 3.3 .0."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-34568",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T11:15:25.117",
"lastModified": "2024-05-08T11:15:25.117",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeqx LetterPress allows Stored XSS.This issue affects LetterPress: from n/a through 1.2.1.\n\n"
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Themeqx LetterPress permite almacenar XSS. Este problema afecta a LetterPress: desde n/a hasta 1.2.1."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-34569",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T11:15:25.297",
"lastModified": "2024-05-08T11:15:25.297",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Katie Seaborn Zotpress allows Stored XSS.This issue affects Zotpress: from n/a through 7.3.9.\n\n"
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Katie Seaborn Zotpress permite almacenar XSS. Este problema afecta a Zotpress: desde n/a hasta 7.3.9."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-34570",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T11:15:25.480",
"lastModified": "2024-05-08T11:15:25.480",
"vulnStatus": "Received",
"lastModified": "2024-05-08T13:15:00.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Xpro Xpro Elementor Addons allows Stored XSS.This issue affects Xpro Elementor Addons: from n/a through 1.4.3.\n\n"
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Xpro Xpro Elementor Addons permite almacenar XSS. Este problema afecta a Xpro Elementor Addons: desde n/a hasta 1.4.3."
}
],
"metrics": {

Some files were not shown because too many files have changed in this diff Show More