mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-10-21T16:00:31.606486+00:00
This commit is contained in:
parent
b53e92d86b
commit
3917ab0c68
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45802",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-05-01T15:15:08.943",
|
||||
"lastModified": "2023-06-26T11:15:09.653",
|
||||
"lastModified": "2024-10-21T15:35:01.227",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-24831",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-04-17T07:15:07.640",
|
||||
"lastModified": "2023-04-28T15:56:21.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-21T15:35:02.777",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30771",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-04-17T08:15:07.857",
|
||||
"lastModified": "2023-06-06T14:03:55.963",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-21T15:35:04.733",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38885",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-20T19:15:08.820",
|
||||
"lastModified": "2023-11-30T14:23:35.557",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-21T15:35:06.500",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-46380",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-04T23:15:07.910",
|
||||
"lastModified": "2024-09-19T20:15:06.353",
|
||||
"lastModified": "2024-10-21T15:35:07.737",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47213",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-11-16T08:15:32.840",
|
||||
"lastModified": "2023-12-05T19:13:43.543",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-21T15:35:08.740",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6057",
|
||||
"sourceIdentifier": "cve-requests@bitdefender.com",
|
||||
"published": "2024-10-18T08:15:03.627",
|
||||
"lastModified": "2024-10-18T12:52:33.507",
|
||||
"lastModified": "2024-10-21T15:35:09.613",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,6 +59,28 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21265",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-10-15T20:15:17.713",
|
||||
"lastModified": "2024-10-16T16:38:14.557",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-21T15:49:21.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +61,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.2.3",
|
||||
"versionEndIncluding": "12.2.13",
|
||||
"matchCriteriaId": "03EF06AB-699E-4F8E-8B6C-C4B17F3F4DC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21266",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-10-15T20:15:17.910",
|
||||
"lastModified": "2024-10-16T16:38:14.557",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-21T15:49:43.940",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +61,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.2.3",
|
||||
"versionEndIncluding": "12.2.13",
|
||||
"matchCriteriaId": "03EF06AB-699E-4F8E-8B6C-C4B17F3F4DC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21267",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-10-15T20:15:18.090",
|
||||
"lastModified": "2024-10-16T16:38:14.557",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-21T15:50:27.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +61,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.2.12",
|
||||
"versionEndIncluding": "12.2.13",
|
||||
"matchCriteriaId": "55CF1042-9EE6-4E5B-A09D-CF49A31FC4DE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21268",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-10-15T20:15:18.267",
|
||||
"lastModified": "2024-10-16T16:38:14.557",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-21T15:56:01.437",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +61,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.2.11",
|
||||
"versionEndIncluding": "12.2.13",
|
||||
"matchCriteriaId": "8B9A3A29-9F6C-4643-BAF8-7AF48E8DEEBB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21269",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-10-15T20:15:18.437",
|
||||
"lastModified": "2024-10-16T16:38:14.557",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-21T15:56:49.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +61,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.2.3",
|
||||
"versionEndIncluding": "12.2.13",
|
||||
"matchCriteriaId": "03EF06AB-699E-4F8E-8B6C-C4B17F3F4DC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21270",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-10-15T20:15:18.610",
|
||||
"lastModified": "2024-10-16T16:38:14.557",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-21T15:57:11.543",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +61,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.2.6",
|
||||
"versionEndIncluding": "12.2.13",
|
||||
"matchCriteriaId": "FB42948B-3DB4-4223-9E59-F97BC4C5C68A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21271",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-10-15T20:15:18.787",
|
||||
"lastModified": "2024-10-16T16:38:14.557",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-21T15:57:44.370",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +61,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.2.3",
|
||||
"versionEndIncluding": "12.2.13",
|
||||
"matchCriteriaId": "03EF06AB-699E-4F8E-8B6C-C4B17F3F4DC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4184",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-10-16T17:15:17.370",
|
||||
"lastModified": "2024-10-18T12:53:04.627",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-21T14:09:02.020",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:application_automation_tools:*:*:*:*:*:jenkins:*:*",
|
||||
"versionEndIncluding": "24.1.0",
|
||||
"matchCriteriaId": "81346F30-B1A1-4A05-8706-ACED99564F09"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.microfocus.com/s/article/KM000033540?language=en_US",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4189",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-10-16T17:15:17.493",
|
||||
"lastModified": "2024-10-18T12:53:04.627",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-21T14:08:57.430",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:application_automation_tools:*:*:*:*:*:jenkins:*:*",
|
||||
"versionEndIncluding": "24.1.0",
|
||||
"matchCriteriaId": "81346F30-B1A1-4A05-8706-ACED99564F09"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.microfocus.com/s/article/KM000033547?language=en_US",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-43689",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-10-21T02:15:02.680",
|
||||
"lastModified": "2024-10-21T02:15:02.680",
|
||||
"lastModified": "2024-10-21T14:35:08.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Stack-based buffer overflow vulnerability exists in WAB-I1750-PS and WAB-S1167-PS. By processing a specially crafted HTTP request, arbitrary code may be executed."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer basado en pila en WAB-I1750-PS y WAB-S1167-PS. Al procesar una solicitud HTTP especialmente manipulada, se puede ejecutar c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
|
82
CVE-2024/CVE-2024-453xx/CVE-2024-45309.json
Normal file
82
CVE-2024/CVE-2024-453xx/CVE-2024-45309.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2024-45309",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-21T15:15:03.463",
|
||||
"lastModified": "2024-10-21T15:15:03.463",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OneDev is a Git server with CI/CD, kanban, and packages. A vulnerability in versions prior to 11.0.9 allows unauthenticated users to read arbitrary files accessible by the OneDev server process. This issue has been fixed in version 11.0.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/theonedev/onedev/commit/4637aaac8c70d41aa789b7fce208b75c6a7b711f",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/theonedev/onedev/security/advisories/GHSA-7wg5-6864-v489",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4690",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-10-16T17:15:17.740",
|
||||
"lastModified": "2024-10-18T12:53:04.627",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-21T15:51:10.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:application_automation_tools:*:*:*:*:*:jenkins:*:*",
|
||||
"versionEndIncluding": "24.1.0",
|
||||
"matchCriteriaId": "81346F30-B1A1-4A05-8706-ACED99564F09"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.microfocus.com/s/article/KM000033548?language=en_US",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-65xx/CVE-2024-6519.json
Normal file
64
CVE-2024/CVE-2024-65xx/CVE-2024-6519.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-6519",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2024-10-21T15:15:03.727",
|
||||
"lastModified": "2024-10-21T15:15:03.727",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use-after-free vulnerability was found in the QEMU LSI53C895A SCSI Host Bus Adapter emulation. This issue can lead to a crash or VM escape."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.5,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-6519",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292089",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1382/",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-83xx/CVE-2024-8305.json
Normal file
56
CVE-2024/CVE-2024-83xx/CVE-2024-8305.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-8305",
|
||||
"sourceIdentifier": "cna@mongodb.com",
|
||||
"published": "2024-10-21T15:15:04.030",
|
||||
"lastModified": "2024-10-21T15:15:04.030",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "prepareUnique index may cause secondaries to crash due to incorrect enforcement of index constraints on secondaries, where in extreme cases may cause multiple secondaries crashing leading to no primaries. This issue affects MongoDB Server v6.0 versions prior to 6.0.17, MongoDB Server v7.0 versions prior to 7.0.13 and MongoDB Server v7.3 versions prior to 7.3.4"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@mongodb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@mongodb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1288"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jira.mongodb.org/browse/SERVER-92382",
|
||||
"source": "cna@mongodb.com"
|
||||
}
|
||||
]
|
||||
}
|
81
README.md
81
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-10-21T14:00:53.794372+00:00
|
||||
2024-10-21T16:00:31.606486+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-10-21T13:55:03.510000+00:00
|
||||
2024-10-21T15:57:44.370000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,40 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
266352
|
||||
266355
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `101`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2024-47750](CVE-2024/CVE-2024-477xx/CVE-2024-47750.json) (`2024-10-21T13:15:05.037`)
|
||||
- [CVE-2024-47751](CVE-2024/CVE-2024-477xx/CVE-2024-47751.json) (`2024-10-21T13:15:05.123`)
|
||||
- [CVE-2024-47752](CVE-2024/CVE-2024-477xx/CVE-2024-47752.json) (`2024-10-21T13:15:05.203`)
|
||||
- [CVE-2024-47753](CVE-2024/CVE-2024-477xx/CVE-2024-47753.json) (`2024-10-21T13:15:05.283`)
|
||||
- [CVE-2024-47754](CVE-2024/CVE-2024-477xx/CVE-2024-47754.json) (`2024-10-21T13:15:05.377`)
|
||||
- [CVE-2024-47755](CVE-2024/CVE-2024-477xx/CVE-2024-47755.json) (`2024-10-21T13:15:05.467`)
|
||||
- [CVE-2024-47756](CVE-2024/CVE-2024-477xx/CVE-2024-47756.json) (`2024-10-21T13:15:05.550`)
|
||||
- [CVE-2024-47757](CVE-2024/CVE-2024-477xx/CVE-2024-47757.json) (`2024-10-21T13:15:05.640`)
|
||||
- [CVE-2024-48231](CVE-2024/CVE-2024-482xx/CVE-2024-48231.json) (`2024-10-21T12:15:08.380`)
|
||||
- [CVE-2024-49273](CVE-2024/CVE-2024-492xx/CVE-2024-49273.json) (`2024-10-21T12:15:08.450`)
|
||||
- [CVE-2024-49293](CVE-2024/CVE-2024-492xx/CVE-2024-49293.json) (`2024-10-21T12:15:08.683`)
|
||||
- [CVE-2024-49321](CVE-2024/CVE-2024-493xx/CVE-2024-49321.json) (`2024-10-21T12:15:08.893`)
|
||||
- [CVE-2024-49850](CVE-2024/CVE-2024-498xx/CVE-2024-49850.json) (`2024-10-21T13:15:05.797`)
|
||||
- [CVE-2024-49851](CVE-2024/CVE-2024-498xx/CVE-2024-49851.json) (`2024-10-21T13:15:05.883`)
|
||||
- [CVE-2024-49852](CVE-2024/CVE-2024-498xx/CVE-2024-49852.json) (`2024-10-21T13:15:05.977`)
|
||||
- [CVE-2024-49853](CVE-2024/CVE-2024-498xx/CVE-2024-49853.json) (`2024-10-21T13:15:06.083`)
|
||||
- [CVE-2024-49854](CVE-2024/CVE-2024-498xx/CVE-2024-49854.json) (`2024-10-21T13:15:06.203`)
|
||||
- [CVE-2024-49855](CVE-2024/CVE-2024-498xx/CVE-2024-49855.json) (`2024-10-21T13:15:06.270`)
|
||||
- [CVE-2024-49856](CVE-2024/CVE-2024-498xx/CVE-2024-49856.json) (`2024-10-21T13:15:06.353`)
|
||||
- [CVE-2024-49857](CVE-2024/CVE-2024-498xx/CVE-2024-49857.json) (`2024-10-21T13:15:06.447`)
|
||||
- [CVE-2024-49858](CVE-2024/CVE-2024-498xx/CVE-2024-49858.json) (`2024-10-21T13:15:06.543`)
|
||||
- [CVE-2024-49859](CVE-2024/CVE-2024-498xx/CVE-2024-49859.json) (`2024-10-21T13:15:06.627`)
|
||||
- [CVE-2024-49860](CVE-2024/CVE-2024-498xx/CVE-2024-49860.json) (`2024-10-21T13:15:06.723`)
|
||||
- [CVE-2024-49861](CVE-2024/CVE-2024-498xx/CVE-2024-49861.json) (`2024-10-21T13:15:06.800`)
|
||||
- [CVE-2024-49862](CVE-2024/CVE-2024-498xx/CVE-2024-49862.json) (`2024-10-21T13:15:06.893`)
|
||||
- [CVE-2024-45309](CVE-2024/CVE-2024-453xx/CVE-2024-45309.json) (`2024-10-21T15:15:03.463`)
|
||||
- [CVE-2024-6519](CVE-2024/CVE-2024-65xx/CVE-2024-6519.json) (`2024-10-21T15:15:03.727`)
|
||||
- [CVE-2024-8305](CVE-2024/CVE-2024-83xx/CVE-2024-8305.json) (`2024-10-21T15:15:04.030`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `431`
|
||||
Recently modified CVEs: `18`
|
||||
|
||||
- [CVE-2023-4049](CVE-2023/CVE-2023-40xx/CVE-2023-4049.json) (`2024-10-21T13:55:03.510`)
|
||||
- [CVE-2023-4050](CVE-2023/CVE-2023-40xx/CVE-2023-4050.json) (`2024-10-21T13:55:03.510`)
|
||||
- [CVE-2023-4054](CVE-2023/CVE-2023-40xx/CVE-2023-4054.json) (`2024-10-21T13:55:03.510`)
|
||||
- [CVE-2023-4055](CVE-2023/CVE-2023-40xx/CVE-2023-4055.json) (`2024-10-21T13:55:03.510`)
|
||||
- [CVE-2023-4056](CVE-2023/CVE-2023-40xx/CVE-2023-4056.json) (`2024-10-21T13:55:03.510`)
|
||||
- [CVE-2023-4573](CVE-2023/CVE-2023-45xx/CVE-2023-4573.json) (`2024-10-21T13:55:03.510`)
|
||||
- [CVE-2023-4574](CVE-2023/CVE-2023-45xx/CVE-2023-4574.json) (`2024-10-21T13:55:03.510`)
|
||||
- [CVE-2023-4575](CVE-2023/CVE-2023-45xx/CVE-2023-4575.json) (`2024-10-21T13:55:03.510`)
|
||||
- [CVE-2023-4576](CVE-2023/CVE-2023-45xx/CVE-2023-4576.json) (`2024-10-21T13:55:03.510`)
|
||||
- [CVE-2023-4581](CVE-2023/CVE-2023-45xx/CVE-2023-4581.json) (`2024-10-21T13:55:03.510`)
|
||||
- [CVE-2023-4584](CVE-2023/CVE-2023-45xx/CVE-2023-4584.json) (`2024-10-21T13:55:03.510`)
|
||||
- [CVE-2023-6450](CVE-2023/CVE-2023-64xx/CVE-2023-6450.json) (`2024-10-21T12:35:05.010`)
|
||||
- [CVE-2024-0716](CVE-2024/CVE-2024-07xx/CVE-2024-0716.json) (`2024-10-21T12:35:06.143`)
|
||||
- [CVE-2024-10021](CVE-2024/CVE-2024-100xx/CVE-2024-10021.json) (`2024-10-21T13:13:25.677`)
|
||||
- [CVE-2024-10022](CVE-2024/CVE-2024-100xx/CVE-2024-10022.json) (`2024-10-21T13:14:02.203`)
|
||||
- [CVE-2024-10023](CVE-2024/CVE-2024-100xx/CVE-2024-10023.json) (`2024-10-21T13:14:37.300`)
|
||||
- [CVE-2024-10024](CVE-2024/CVE-2024-100xx/CVE-2024-10024.json) (`2024-10-21T13:15:01.730`)
|
||||
- [CVE-2024-21172](CVE-2024/CVE-2024-211xx/CVE-2024-21172.json) (`2024-10-21T12:59:49.070`)
|
||||
- [CVE-2024-43167](CVE-2024/CVE-2024-431xx/CVE-2024-43167.json) (`2024-10-21T12:15:03.837`)
|
||||
- [CVE-2024-43168](CVE-2024/CVE-2024-431xx/CVE-2024-43168.json) (`2024-10-21T12:15:04.327`)
|
||||
- [CVE-2024-45071](CVE-2024/CVE-2024-450xx/CVE-2024-45071.json) (`2024-10-21T13:41:29.383`)
|
||||
- [CVE-2024-45072](CVE-2024/CVE-2024-450xx/CVE-2024-45072.json) (`2024-10-21T13:41:20.463`)
|
||||
- [CVE-2024-47669](CVE-2024/CVE-2024-476xx/CVE-2024-47669.json) (`2024-10-21T13:28:34.330`)
|
||||
- [CVE-2024-6207](CVE-2024/CVE-2024-62xx/CVE-2024-6207.json) (`2024-10-21T13:20:45.617`)
|
||||
- [CVE-2024-9986](CVE-2024/CVE-2024-99xx/CVE-2024-9986.json) (`2024-10-21T13:07:47.700`)
|
||||
- [CVE-2022-45802](CVE-2022/CVE-2022-458xx/CVE-2022-45802.json) (`2024-10-21T15:35:01.227`)
|
||||
- [CVE-2023-24831](CVE-2023/CVE-2023-248xx/CVE-2023-24831.json) (`2024-10-21T15:35:02.777`)
|
||||
- [CVE-2023-30771](CVE-2023/CVE-2023-307xx/CVE-2023-30771.json) (`2024-10-21T15:35:04.733`)
|
||||
- [CVE-2023-38885](CVE-2023/CVE-2023-388xx/CVE-2023-38885.json) (`2024-10-21T15:35:06.500`)
|
||||
- [CVE-2023-46380](CVE-2023/CVE-2023-463xx/CVE-2023-46380.json) (`2024-10-21T15:35:07.737`)
|
||||
- [CVE-2023-47213](CVE-2023/CVE-2023-472xx/CVE-2023-47213.json) (`2024-10-21T15:35:08.740`)
|
||||
- [CVE-2023-6057](CVE-2023/CVE-2023-60xx/CVE-2023-6057.json) (`2024-10-21T15:35:09.613`)
|
||||
- [CVE-2024-21265](CVE-2024/CVE-2024-212xx/CVE-2024-21265.json) (`2024-10-21T15:49:21.027`)
|
||||
- [CVE-2024-21266](CVE-2024/CVE-2024-212xx/CVE-2024-21266.json) (`2024-10-21T15:49:43.940`)
|
||||
- [CVE-2024-21267](CVE-2024/CVE-2024-212xx/CVE-2024-21267.json) (`2024-10-21T15:50:27.217`)
|
||||
- [CVE-2024-21268](CVE-2024/CVE-2024-212xx/CVE-2024-21268.json) (`2024-10-21T15:56:01.437`)
|
||||
- [CVE-2024-21269](CVE-2024/CVE-2024-212xx/CVE-2024-21269.json) (`2024-10-21T15:56:49.217`)
|
||||
- [CVE-2024-21270](CVE-2024/CVE-2024-212xx/CVE-2024-21270.json) (`2024-10-21T15:57:11.543`)
|
||||
- [CVE-2024-21271](CVE-2024/CVE-2024-212xx/CVE-2024-21271.json) (`2024-10-21T15:57:44.370`)
|
||||
- [CVE-2024-4184](CVE-2024/CVE-2024-41xx/CVE-2024-4184.json) (`2024-10-21T14:09:02.020`)
|
||||
- [CVE-2024-4189](CVE-2024/CVE-2024-41xx/CVE-2024-4189.json) (`2024-10-21T14:08:57.430`)
|
||||
- [CVE-2024-43689](CVE-2024/CVE-2024-436xx/CVE-2024-43689.json) (`2024-10-21T14:35:08.110`)
|
||||
- [CVE-2024-4690](CVE-2024/CVE-2024-46xx/CVE-2024-4690.json) (`2024-10-21T15:51:10.467`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
1103
_state.csv
1103
_state.csv
File diff suppressed because it is too large
Load Diff
Loading…
x
Reference in New Issue
Block a user