Auto-Update: 2024-11-13T19:00:34.158694+00:00

This commit is contained in:
cad-safe-bot 2024-11-13 19:03:36 +00:00
parent 46fdbbb820
commit 427567f934
429 changed files with 7471 additions and 1467 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-26086",
"sourceIdentifier": "security@atlassian.com",
"published": "2021-08-16T01:15:06.353",
"lastModified": "2024-11-13T02:00:01.323",
"vulnStatus": "Modified",
"lastModified": "2024-11-13T17:39:36.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-11-12",
"cisaActionDue": "2024-12-03",

View File

@ -2,13 +2,17 @@
"id": "CVE-2021-27700",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-12T23:15:03.580",
"lastModified": "2024-11-12T23:15:03.580",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SOCIFI Socifi Guest wifi as SAAS wifi portal is affected by Insecure Permissions. Any authorized customer with partner mode can switch to another customer dashboard and perform actions like modify user, delete user, etc."
},
{
"lang": "es",
"value": "SOCIFI Socifi Guest wifi como portal wifi SAAS, se ve afectado por permisos inseguros. Cualquier cliente autorizado con modo de socio puede cambiar al panel de control de otro cliente y realizar acciones como modificar usuarios, eliminar usuarios, etc."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2021-27701",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-12T23:15:03.700",
"lastModified": "2024-11-12T23:15:03.700",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SOCIFI Socifi Guest wifi as SAAS is affected by Cross Site Request Forgery (CSRF) via the Socifi wifi portal. The application does not contain a CSRF token and request validation. An attacker can Add/Modify any random user data by sending a crafted CSRF request."
},
{
"lang": "es",
"value": "SOCIFI Socifi Guest wifi como SAAS se ve afectado por Cross Site Request Forgery (CSRF) a trav\u00e9s del portal de wifi de Socifi. La aplicaci\u00f3n no contiene un token CSRF ni validaci\u00f3n de solicitud. Un atacante puede agregar o modificar cualquier dato de usuario aleatorio enviando una solicitud CSRF manipulada."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2021-27702",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-12T23:15:03.797",
"lastModified": "2024-11-12T23:15:03.797",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sercomm Router Etisalat Model S3- AC2100 is affected by Incorrect Access Control via the diagnostic utility in the router dashboard."
},
{
"lang": "es",
"value": "El enrutador Sercomm Etisalat modelo S3-AC2100 se ve afectado por un control de acceso incorrecto a trav\u00e9s de la utilidad de diagn\u00f3stico en el panel del enrutador."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2021-27703",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-12T23:15:03.897",
"lastModified": "2024-11-12T23:15:03.897",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sercomm Model Etisalat Model S3- AC2100 is affected by Cross Site Scripting (XSS) via the firmware update page."
},
{
"lang": "es",
"value": "El modelo Sercomm Etisalat modelo S3-AC2100 se ve afectado por Cross Site Scripting (XSS) a trav\u00e9s de la p\u00e1gina de actualizaci\u00f3n de firmware."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2021-27704",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-12T23:15:03.993",
"lastModified": "2024-11-12T23:15:03.993",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Appspace 6.2.4 is affected by Incorrect Access Control via the Appspace Web Portal password reset page."
},
{
"lang": "es",
"value": "Appspace 6.2.4 se ve afectado por un control de acceso incorrecto a trav\u00e9s de la p\u00e1gina de restablecimiento de contrase\u00f1a del portal web de Appspace."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-45157",
"sourceIdentifier": "meissner@suse.de",
"published": "2024-11-13T14:15:14.990",
"lastModified": "2024-11-13T14:15:14.990",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26015",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-03T13:15:08.647",
"lastModified": "2023-11-13T18:47:00.590",
"lastModified": "2024-11-13T17:43:02.557",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -60,9 +60,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mappresspro:mappress_maps_for_wordpress:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:mappresspro:mappress:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.85.4",
"matchCriteriaId": "9D411BF1-00F5-4E94-8E51-A98A7B9DE79A"
"matchCriteriaId": "96FE545B-ED47-4254-B314-1748726AE353"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-34437",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-10-19T00:15:16.053",
"lastModified": "2023-10-25T14:04:18.780",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-13T17:15:06.153",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\n\n\nBaker Hughes \u2013 Bently Nevada 3500 System TDI Firmware version 5.05\n\n contains\u00a0a vulnerability in their password retrieval functionality which could allow an attacker to access passwords stored on the device."
"value": "Baker Hughes \u2013 Bently Nevada 3500 System TDI Firmware version 5.05\n\n contains\u00a0a vulnerability in their password retrieval functionality which could allow an attacker to access passwords stored on the device."
},
{
"lang": "es",
@ -61,17 +61,17 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-732"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2023-35659",
"sourceIdentifier": "security@android.com",
"published": "2024-11-13T18:15:19.763",
"lastModified": "2024-11-13T18:15:19.763",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In DevmemIntChangeSparse of devicemem_server.c, there is a possible arbitrary code execution due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2024-11-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2023-35686",
"sourceIdentifier": "security@android.com",
"published": "2024-11-13T18:15:19.860",
"lastModified": "2024-11-13T18:15:19.860",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In PVRSRVRGXKickTA3DKM of rgxta3d.c, there is a possible arbitrary code execution due to improper input validation. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2024-11-01",
"source": "security@android.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-44255",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-11-12T19:15:06.850",
"lastModified": "2024-11-12T19:15:06.850",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An exposure of sensitive information to an unauthorized actor [CWE-200] in Fortinet FortiManager before 7.4.2, FortiAnalyzer before 7.4.2 and FortiAnalyzer-BigData before 7.2.5 may allow a privileged attacker with administrative read permissions to read event logs of another adom via crafted HTTP or HTTPs requests."
},
{
"lang": "es",
"value": "Una exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado [CWE-200] en Fortinet FortiManager anterior a 7.4.2, FortiAnalyzer anterior a 7.4.2 y FortiAnalyzer-BigData anterior a 7.2.5 puede permitir que un atacante privilegiado con permisos de lectura administrativos lea registros de eventos de otro adom a trav\u00e9s de solicitudes HTTP o HTTPS manipuladas."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-47543",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-11-12T19:15:07.110",
"lastModified": "2024-11-12T19:15:07.110",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authorization bypass through user-controlled key vulnerability [CWE-639] in Fortinet FortiPortal version 7.0.0 through 7.0.3 allows an authenticated attacker to interact with ressources of other organizations via HTTP or HTTPS requests."
},
{
"lang": "es",
"value": "Una vulnerabilidad de omisi\u00f3n de autorizaci\u00f3n a trav\u00e9s de una clave controlada por el usuario [CWE-639] en Fortinet FortiPortal versi\u00f3n 7.0.0 a 7.0.3 permite que un atacante autenticado interact\u00fae con recursos de otras organizaciones a trav\u00e9s de solicitudes HTTP o HTTPS."
}
],
"metrics": {

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4840",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-09-12T02:15:13.360",
"lastModified": "2023-11-07T04:23:01.510",
"lastModified": "2024-11-13T17:43:02.557",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -68,9 +68,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mappresspro:mappress_maps_for_wordpress:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:mappresspro:mappress:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.88.4",
"matchCriteriaId": "5D355EC2-5AA4-45A9-AF7D-495859D8A347"
"matchCriteriaId": "8B8CB438-6C9C-4D65-9FD6-0E794E2542D6"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-50176",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-11-12T19:15:07.360",
"lastModified": "2024-11-12T19:15:07.360",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A session fixation in Fortinet FortiOS version 7.4.0 through 7.4.3 and 7.2.0 through 7.2.7 and 7.0.0 through 7.0.13 allows attacker to execute unauthorized code or commands via phishing SAML authentication link."
},
{
"lang": "es",
"value": "Una fijaci\u00f3n de sesi\u00f3n en Fortinet FortiOS versi\u00f3n 7.4.0 a 7.4.3 y 7.2.0 a 7.2.7 y 7.0.0 a 7.0.13 permite a un atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de un enlace de autenticaci\u00f3n SAML de phishing."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-52268",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-12T19:15:07.580",
"lastModified": "2024-11-12T19:15:07.580",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The End-User Portal module before 1.0.65 for FreeScout sometimes allows an attacker to authenticate as an arbitrary user because a session token can be sent to the /auth endpoint. NOTE: this module is not part of freescout-helpdesk/freescout on GitHub."
},
{
"lang": "es",
"value": "El m\u00f3dulo Portal del usuario final anterior a la versi\u00f3n 1.0.65 para FreeScout a veces permite que un atacante se autentique como un usuario arbitrario porque se puede enviar un token de sesi\u00f3n al endpoint /auth. NOTA: este m\u00f3dulo no forma parte de freescout-helpdesk/freescout en GitHub."
}
],
"metrics": {},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-7225",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-01-30T08:15:40.090",
"lastModified": "2024-02-06T19:12:27.730",
"lastModified": "2024-11-13T17:43:02.557",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -80,9 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mappresspro:mappress_maps_for_wordpress:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:mappresspro:mappress:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.88.16",
"matchCriteriaId": "BE254911-09FD-4E7D-BA0F-A0EDE608C52E"
"matchCriteriaId": "C544F4BE-0227-4AEF-A6A9-F9C0970AE265"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10012",
"sourceIdentifier": "security@progress.com",
"published": "2024-11-13T16:15:17.143",
"lastModified": "2024-11-13T16:15:17.143",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10013",
"sourceIdentifier": "security@progress.com",
"published": "2024-11-13T16:15:17.387",
"lastModified": "2024-11-13T16:15:17.387",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10038",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T02:15:13.570",
"lastModified": "2024-11-13T02:15:13.570",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP-Strava plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.12.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
},
{
"lang": "es",
"value": "El complemento WP-Strava para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de la configuraci\u00f3n de administrador en todas las versiones hasta la 2.12.1 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con permisos de nivel de administrador o superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a instalaciones multisitio e instalaciones en las que se ha deshabilitado unfiltered_html."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10174",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T04:15:03.553",
"lastModified": "2024-11-13T04:15:03.553",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP Project Manager \u2013 Task, team, and project management plugin featuring kanban board and gantt charts plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.6.13 via the 'Abstract_Permission' class due to missing validation on the 'user_id' user controlled key. This makes it possible for unauthenticated attackers to spoof their identity to that of an administrator and access all of the plugins REST routes."
},
{
"lang": "es",
"value": "El complemento WP Project Manager \u2013 Task, team, and project management plugin featuring kanban board and Gantt diagrams para WordPress es vulnerable a Insecure Direct Object Reference en todas las versiones hasta la 2.6.13 incluida a trav\u00e9s de la clase 'Abstract_Permission' debido a la falta de validaci\u00f3n en la clave controlada por el usuario 'user_id'. Esto permite que atacantes no autenticados suplanten su identidad a la de un administrador y accedan a todas las rutas REST del complemento."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10217",
"sourceIdentifier": "security@tibco.com",
"published": "2024-11-12T20:15:05.807",
"lastModified": "2024-11-12T21:35:14.400",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "XSS Attack in mar.jar, Monitoring Archive Utility (MAR Utility),\u00a0monitoringconsolecommon.jar\u00a0in TIBCO Software Inc\u00a0TIBCO Hawk and\u00a0TIBCO Operational Intelligence"
},
{
"lang": "es",
"value": "Ataque XSS en mar.jar, utilidad de archivo de monitoreo (utilidad MAR), monitoringconsolecommon.jar en TIBCO Software Inc TIBCO Hawk y TIBCO Operational Intelligence"
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10218",
"sourceIdentifier": "security@tibco.com",
"published": "2024-11-12T20:15:05.913",
"lastModified": "2024-11-12T21:35:15.190",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "XSS Attack in mar.jar, Monitoring Archive Utility (MAR Utility),\u00a0monitoringconsolecommon.jar\u00a0in TIBCO Software Inc\u00a0TIBCO Hawk and\u00a0TIBCO Operational Intelligence"
},
{
"lang": "es",
"value": "Ataque XSS en mar.jar, utilidad de archivo de monitoreo (utilidad MAR), monitoringconsolecommon.jar en TIBCO Software Inc TIBCO Hawk y TIBCO Operational Intelligence"
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10269",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-08T07:15:05.487",
"lastModified": "2024-11-08T19:01:03.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-13T17:59:27.717",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -51,18 +81,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:benjaminzekavica:easy_svg_support:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.8",
"matchCriteriaId": "77B1DDB0-5A05-48D5-BE94-01934AEA1CC0"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3181757/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://wordpress.org/plugins/easy-svg/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product",
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5fbc0866-1e9d-457a-8ef3-fb046c89c1dd?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10428",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-27T21:15:02.333",
"lastModified": "2024-10-28T13:58:09.230",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-13T17:57:51.100",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,124 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:wavlink:wn530h4_firmware:20220721:*:*:*:*:*:*:*",
"matchCriteriaId": "85ED923F-4EFA-447C-99E5-B48D1251B66C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:wavlink:wn530h4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EA1D9AB-9DD2-42A8-BE96-6A07CB232C48"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:wavlink:wn530hg4_firmware:20220809:*:*:*:*:*:*:*",
"matchCriteriaId": "AA2EABC3-DB43-428A-B229-A003B31184D7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:wavlink:wn530hg4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9ACAF792-450A-4C0D-81DF-CC61EBCA7305"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:wavlink:wn572hg3_firmware:20221028:*:*:*:*:*:*:*",
"matchCriteriaId": "1F22D66E-063D-4954-AAF8-70C3E5D50EE3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:wavlink:wn572hg3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D85484EB-22F0-4140-9B9F-AC5EB24159DA"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.google.com/document/d/11NGSJBOZzbgm_qanDno6SyucWyso7Em6/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.281969",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.281969",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.427272",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10429",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-27T21:15:02.603",
"lastModified": "2024-10-28T13:58:09.230",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-13T17:58:18.040",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,124 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:wavlink:wn530h4_firmware:20220721:*:*:*:*:*:*:*",
"matchCriteriaId": "85ED923F-4EFA-447C-99E5-B48D1251B66C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:wavlink:wn530h4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EA1D9AB-9DD2-42A8-BE96-6A07CB232C48"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:wavlink:wn530hg4_firmware:20220809:*:*:*:*:*:*:*",
"matchCriteriaId": "AA2EABC3-DB43-428A-B229-A003B31184D7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:wavlink:wn530hg4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9ACAF792-450A-4C0D-81DF-CC61EBCA7305"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:wavlink:wn572hg3_firmware:20221028:*:*:*:*:*:*:*",
"matchCriteriaId": "1F22D66E-063D-4954-AAF8-70C3E5D50EE3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:wavlink:wn572hg3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D85484EB-22F0-4140-9B9F-AC5EB24159DA"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.google.com/document/d/1ktuys5jr7MKwz503QBbEfxZ5mZbXlbvl/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.281970",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.281970",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.427274",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10529",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T03:15:03.700",
"lastModified": "2024-11-13T03:15:03.700",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Kognetiks Chatbot for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the delete_assistant() function in all versions up to, and including, 2.1.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete GTP assistants."
},
{
"lang": "es",
"value": "El complemento Kognetiks Chatbot for WordPress para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a la falta de una comprobaci\u00f3n de capacidad en la funci\u00f3n delete_assistant() en todas las versiones hasta la 2.1.7 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, eliminen asistentes GTP."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10530",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T03:15:03.923",
"lastModified": "2024-11-13T03:15:03.923",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Kognetiks Chatbot for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the add_new_assistant() function in all versions up to, and including, 2.1.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to create new GTP assistants."
},
{
"lang": "es",
"value": "El complemento Kognetiks Chatbot para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a la falta de una comprobaci\u00f3n de capacidad en la funci\u00f3n add_new_assistant() en todas las versiones hasta la 2.1.7 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, creen nuevos asistentes GTP."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10531",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T03:15:04.153",
"lastModified": "2024-11-13T03:15:04.153",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Kognetiks Chatbot for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_assistant() function in all versions up to, and including, 2.1.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to update GTP assistants."
},
{
"lang": "es",
"value": "El complemento Kognetiks Chatbot for WordPress para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a la falta de una comprobaci\u00f3n de capacidad en la funci\u00f3n update_assistant() en todas las versiones hasta la 2.1.7 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen los asistentes GTP."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10575",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-11-13T05:15:11.233",
"lastModified": "2024-11-13T05:15:11.233",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CWE-862: Missing Authorization vulnerability exists that could cause unauthorized access when enabled on\nthe network and potentially impacting connected devices."
},
{
"lang": "es",
"value": "CWE-862: Existe una vulnerabilidad de autorizaci\u00f3n faltante que podr\u00eda causar acceso no autorizado cuando se habilita en la red y potencialmente afectar los dispositivos conectados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10577",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T02:15:13.807",
"lastModified": "2024-11-13T02:15:13.807",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The \u80d6\u9f20\u91c7\u96c6(Fat Rat Collect) \u5fae\u4fe1\u77e5\u4e4e\u7b80\u4e66\u817e\u8baf\u65b0\u95fb\u5217\u8868\u5206\u9875\u91c7\u96c6, \u8fd8\u6709\u81ea\u52a8\u91c7\u96c6\u3001\u81ea\u52a8\u53d1\u5e03\u3001\u81ea\u52a8\u6807\u7b7e\u3001\u7b49\u591a\u9879\u529f\u80fd\u3002\u5f00\u6e90\u63d2\u4ef6 plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to missing escaping on a URL in all versions up to, and including, 2.7.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
"value": "The ????(Fat Rat Collect) ????????????????, ??????????????????????????? plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to missing escaping on a URL in all versions up to, and including, 2.7.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento ????(Fat Rat Collect) ????????????????, ??????????????????????????? para WordPress es vulnerable a Cross-Site Scripting reflejado debido a que falta un escape en una URL en todas las versiones hasta la 2.7.3 incluida. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10593",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T03:15:04.370",
"lastModified": "2024-11-13T03:15:04.370",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WPForms \u2013 Easy Form Builder for WordPress \u2013 Contact Forms, Payment Forms, Surveys, & More plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.9.1.6. This is due to missing or incorrect nonce validation on the process_admin_ui function. This makes it possible for unauthenticated attackers to delete WPForm logs via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento WPForms \u2013 Easy Form Builder for WordPress \u2013 Contact Forms, Payment Forms, Surveys, & More para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.9.1.6 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la funci\u00f3n process_admin_ui. Esto hace posible que atacantes no autenticados eliminen los registros de WPForm a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10629",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T02:15:14.027",
"lastModified": "2024-11-13T02:15:14.027",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The GPX Viewer plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check and file type validation in the gpxv_file_upload() function in all versions up to, and including, 2.2.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to create arbitrary files on the affected site's server which may make remote code execution possible."
},
{
"lang": "es",
"value": "El complemento GPX Viewer para WordPress es vulnerable a la creaci\u00f3n de archivos arbitrarios debido a la falta de una comprobaci\u00f3n de capacidad y validaci\u00f3n de tipo de archivo en la funci\u00f3n gpxv_file_upload() en todas las versiones hasta la 2.2.8 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor o superior, creen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10684",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T03:15:04.600",
"lastModified": "2024-11-13T03:15:04.600",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Kognetiks Chatbot for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'dir' parameter in all versions up to, and including, 2.1.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento Kognetiks Chatbot para WordPress es vulnerable a ataques de Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'dir' en todas las versiones hasta la 2.1.7 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10686",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T02:15:14.243",
"lastModified": "2024-11-13T02:15:14.243",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10717",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T02:15:14.450",
"lastModified": "2024-11-13T02:15:14.450",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Styler for Ninja Forms plugin for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the deactivate_license function in all versions up to, and including, 3.3.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary option values on the WordPress site. This can be leveraged to delete an option that would create an error on the site and deny service to legitimate users. Note: This issue can also be used to add arbitrary options with an empty value."
},
{
"lang": "es",
"value": "El complemento Styler for Ninja Forms para WordPress es vulnerable a modificaciones no autorizadas de datos que pueden provocar una denegaci\u00f3n de servicio debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n deactivate_license en todas las versiones hasta la 3.3.4 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, eliminen valores de opciones arbitrarios en el sitio de WordPress. Esto se puede aprovechar para eliminar una opci\u00f3n que crear\u00eda un error en el sitio y denegar\u00eda el servicio a usuarios leg\u00edtimos. Nota: Este problema tambi\u00e9n se puede utilizar para agregar opciones arbitrarias con un valor vac\u00edo."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10778",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T02:15:14.663",
"lastModified": "2024-11-13T02:15:14.663",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The BuddyPress Builder for Elementor \u2013 BuddyBuilder plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.7.4 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts crated by Elementor that they should not have access to."
},
{
"lang": "es",
"value": "El complemento BuddyPress Builder para Elementor \u2013 BuddyBuilder para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n en todas las versiones hasta la 1.7.4 incluida a trav\u00e9s del c\u00f3digo abreviado 'elementor-template' debido a restricciones insuficientes sobre qu\u00e9 publicaciones se pueden incluir. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos de publicaciones privadas o borradores creadas por Elementor a las que no deber\u00edan tener acceso."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10794",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T04:15:03.850",
"lastModified": "2024-11-13T04:15:03.850",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Boostify Header Footer Builder for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.3.6 via the 'bhf' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created via Elementor that they should not have access to."
},
{
"lang": "es",
"value": "El complemento Boostify Header Footer Builder para Elementor para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n en todas las versiones hasta la 1.3.6 incluida a trav\u00e9s del c\u00f3digo corto 'bhf' debido a restricciones insuficientes sobre qu\u00e9 publicaciones se pueden incluir. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos de publicaciones privadas o borradores creadas a trav\u00e9s de Elementor a las que no deber\u00edan tener acceso."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10800",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T05:15:11.680",
"lastModified": "2024-11-13T05:15:11.680",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WordPress User Extra Fields plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the ajax_save_fields() function in all versions up to, and including, 16.6. This makes it possible for authenticated attackers, with subscriber-level access and above, to add custom fields that can be updated and then use the check_and_overwrite_wp_or_woocommerce_fields function to update the wp_capabilities field to have administrator privileges."
},
{
"lang": "es",
"value": "El complemento User Extra Fields de WordPress es vulnerable a la escalada de privilegios debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n ajax_save_fields() en todas las versiones hasta la 16.6 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, agreguen campos personalizados que se puedan actualizar y luego usen la funci\u00f3n check_and_overwrite_wp_or_woocommerce_fields para actualizar el campo wp_capabilities para que tenga privilegios de administrador."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10802",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T04:15:04.087",
"lastModified": "2024-11-13T04:15:04.087",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Hash Elements plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the hash_elements_get_posts_title_by_id() function in all versions up to, and including, 1.4.7. This makes it possible for unauthenticated attackers to retrieve draft post titles that should not be accessible to unauthenticated users."
},
{
"lang": "es",
"value": "El complemento Hash Elements para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n hash_elements_get_posts_title_by_id() en todas las versiones hasta la 1.4.7 incluida. Esto permite que atacantes no autenticados recuperen borradores de t\u00edtulos de publicaciones que no deber\u00edan ser accesibles para usuarios no autenticados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10816",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T04:15:04.300",
"lastModified": "2024-11-13T04:15:04.300",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The LUNA RADIO PLAYER plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 6.24.01.24 via the js/fallback.php file. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information."
},
{
"lang": "es",
"value": "El complemento LUNA RADIO PLAYER para WordPress es vulnerable a Directory Traversal en todas las versiones hasta la 6.24.01.24 incluida a trav\u00e9s del archivo js/fallback.php. Esto permite que atacantes no autenticados lean el contenido de archivos arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10820",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T04:15:04.510",
"lastModified": "2024-11-13T04:15:04.510",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WooCommerce Upload Files plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload_files() function in all versions up to, and including, 84.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible."
},
{
"lang": "es",
"value": "El complemento WooCommerce Upload Files para WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validaci\u00f3n del tipo de archivo en la funci\u00f3n upload_files() en todas las versiones hasta la 84.3 incluida. Esto hace posible que atacantes no autenticados carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10828",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T04:15:04.727",
"lastModified": "2024-11-13T04:15:04.727",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Advanced Order Export For WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.5.5 via deserialization of untrusted input during Order export when the \"Try to convert serialized values\" option is enabled. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)."
},
{
"lang": "es",
"value": "El complemento Advanced Order Export For WooCommerce para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 3.5.5 incluida, a trav\u00e9s de la deserializaci\u00f3n de entradas no confiables durante la exportaci\u00f3n de pedidos cuando la opci\u00f3n \"Intentar convertir valores serializados\" est\u00e1 habilitada. Esto hace posible que atacantes no autenticados inyecten un objeto PHP. La presencia adicional de una cadena POP permite a los atacantes eliminar archivos arbitrarios en el servidor, lo que puede conducir f\u00e1cilmente a la ejecuci\u00f3n remota de c\u00f3digo cuando se elimina el archivo correcto (como wp-config.php)."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10850",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T02:15:14.873",
"lastModified": "2024-11-13T02:15:14.873",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Razorpay Payment Button Elementor Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento Razorpay Payment Button Elementor Plugin para WordPress es vulnerable a Cross-Site Scripting Reflejado debido al uso de add_query_arg y remove_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 1.2.5 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10851",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T02:15:15.090",
"lastModified": "2024-11-13T02:15:15.090",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Razorpay Payment Button Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.4.6. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento Razorpay Payment Button Plugin para WordPress es vulnerable a Cross-Site Scripting Reflejado debido al uso de add_query_arg y remove_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 2.4.6 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10852",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T02:15:15.303",
"lastModified": "2024-11-13T02:15:15.303",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Buy one click WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the buy_one_click_export_options AJAX action in all versions up to, and including, 2.2.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to export plugin settings."
},
{
"lang": "es",
"value": "El complemento Buy one click WooCommerce para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la acci\u00f3n AJAX buy_one_click_export_options en todas las versiones hasta la 2.2.9 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, exporten la configuraci\u00f3n del complemento."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10853",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T02:15:15.503",
"lastModified": "2024-11-13T02:15:15.503",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Buy one click WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the removeorder AJAX action in all versions up to, and including, 2.2.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete Buy one click WooCommerce orders."
},
{
"lang": "es",
"value": "El complemento Buy one click WooCommerce para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la acci\u00f3n AJAX removeorder en todas las versiones hasta la 2.2.9 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, eliminen pedidos de Buy one click WooCommerce."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10854",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T02:15:15.717",
"lastModified": "2024-11-13T02:15:15.717",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Buy one click WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the buy_one_click_import_options AJAX action in all versions up to, and including, 2.2.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to import plugin settings."
},
{
"lang": "es",
"value": "El complemento Buy one click WooCommerce para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la acci\u00f3n AJAX buy_one_click_import_options en todas las versiones hasta la 2.2.9 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, importen configuraciones del complemento."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10877",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T07:15:06.197",
"lastModified": "2024-11-13T07:15:06.197",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The AFI \u2013 The Easiest Integration Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.92.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento AFI \u2013 The Easiest Integration Plugin para WordPress es vulnerable a ataques de Cross Site Scripting reflejado debido al uso de add_query_arg y remove_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 1.92.0 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10882",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T03:15:04.833",
"lastModified": "2024-11-13T03:15:04.833",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Product Delivery Date for WooCommerce \u2013 Lite plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.8.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento Product Delivery Date for WooCommerce \u2013 Lite para WordPress es vulnerable a ataques Cross-Site Scripting reflejado debido al uso de add_query_arg y remove_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 2.8.0 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10887",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T02:15:15.930",
"lastModified": "2024-11-13T02:15:15.930",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The NiceJob plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several of the plugin's shortcodes (nicejob-lead, nicejob-review, nicejob-engage, nicejob-badge, nicejob-stories) in all versions up to, and including, 3.6.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento NiceJob para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de varios de los c\u00f3digos cortos del complemento (nicejob-lead, nicejob-review, nicejob-engage, nicejob-badge, nicejob-stories) en todas las versiones hasta la 3.6.5 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10923",
"sourceIdentifier": "security@opentext.com",
"published": "2024-11-12T17:15:05.947",
"lastModified": "2024-11-12T17:15:05.947",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in OpenText\u2122 ALM Octane Management allows Stored XSS.\u00a0The vulnerability could result in a remote code execution attack. \n\nThis issue affects ALM Octane Management: from 16.2.100 through 24.4."
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o \"Cross-site Scripting\") en OpenText\u2122 ALM Octane Management permite XSS almacenado. La vulnerabilidad podr\u00eda dar lugar a un ataque de ejecuci\u00f3n de c\u00f3digo remoto. Este problema afecta a ALM Octane Management: desde la versi\u00f3n 16.2.100 hasta la versi\u00f3n 24.4."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10943",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-11-12T17:15:06.147",
"lastModified": "2024-11-12T17:15:06.147",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An\nauthentication bypass vulnerability exists in the affected product. The\nvulnerability exists due to shared secrets across accounts and could allow a threat\nactor to impersonate a user if the threat actor is able to enumerate additional\ninformation required during authentication."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n en el producto afectado. La vulnerabilidad existe debido a secretos compartidos entre cuentas y podr\u00eda permitir que un actor de amenazas se haga pasar por un usuario si puede enumerar informaci\u00f3n adicional requerida durante la autenticaci\u00f3n."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10944",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-11-12T17:15:06.397",
"lastModified": "2024-11-12T17:15:06.397",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Remote\nCode Execution vulnerability exists in the affected product. The vulnerability requires\na high level of permissions and exists due to improper input validation resulting\nin the possibility of a malicious Updated Agent being deployed."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el producto afectado. La vulnerabilidad requiere un alto nivel de permisos y existe debido a una validaci\u00f3n de entrada incorrecta que da como resultado la posibilidad de que se implemente un agente actualizado malicioso."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10945",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-11-12T17:15:06.640",
"lastModified": "2024-11-12T17:15:06.640",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Local Privilege Escalation vulnerability exists in the affected product. The vulnerability requires a local, low privileged threat actor to replace certain files during update and exists due to a failure to perform proper security checks before installation."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de escalada de privilegios locales en el producto afectado. La vulnerabilidad requiere que un agente de amenazas local con pocos privilegios reemplace determinados archivos durante la actualizaci\u00f3n y existe debido a una falla en la realizaci\u00f3n de las comprobaciones de seguridad adecuadas antes de la instalaci\u00f3n."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10971",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-11-12T16:15:19.930",
"lastModified": "2024-11-12T17:15:06.870",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in the Password History feature in Devolutions DVLS 2024.3.6 and earlier allows a malicious authenticated user to obtain sensitive data via faulty permission."
},
{
"lang": "es",
"value": "El control de acceso inadecuado en la funci\u00f3n Historial de contrase\u00f1as en Devolutions DVLS 2024.3.6 y versiones anteriores permite que un usuario autenticado malintencionado obtenga datos confidenciales a trav\u00e9s de un permiso defectuoso."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11004",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-11-12T17:15:06.943",
"lastModified": "2024-11-12T17:15:06.943",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Reflected XSS in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote unauthenticated attacker to obtain admin privileges. User interaction is required."
},
{
"lang": "es",
"value": "El XSS reflejado en Ivanti Connect Secure anterior a la versi\u00f3n 22.7R2.1 y en Ivanti Policy Secure anterior a la versi\u00f3n 22.7R1.1 permite que un atacante remoto no autenticado obtenga privilegios de administrador. Se requiere la interacci\u00f3n del usuario."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11005",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-11-12T17:15:07.130",
"lastModified": "2024-11-12T17:15:07.130",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Command injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution."
},
{
"lang": "es",
"value": "La inyecci\u00f3n de comandos en Ivanti Connect Secure anterior a la versi\u00f3n 22.7R2.1 y en Ivanti Policy Secure anterior a la versi\u00f3n 22.7R1.1 permite que un atacante remoto autenticado con privilegios de administrador logre la ejecuci\u00f3n remota de c\u00f3digo."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11006",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-11-12T17:15:07.333",
"lastModified": "2024-11-12T17:15:07.333",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Command injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution."
},
{
"lang": "es",
"value": "La inyecci\u00f3n de comandos en Ivanti Connect Secure anterior a la versi\u00f3n 22.7R2.1 y en Ivanti Policy Secure anterior a la versi\u00f3n 22.7R1.1 permite que un atacante remoto autenticado con privilegios de administrador logre la ejecuci\u00f3n remota de c\u00f3digo."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11007",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-11-12T16:15:20.050",
"lastModified": "2024-11-12T16:15:20.050",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Command injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution."
},
{
"lang": "es",
"value": "La inyecci\u00f3n de comandos en Ivanti Connect Secure anterior a la versi\u00f3n 22.7R2.1 y en Ivanti Policy Secure anterior a la versi\u00f3n 22.7R1.1 permite que un atacante remoto autenticado con privilegios de administrador logre la ejecuci\u00f3n remota de c\u00f3digo."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11028",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T10:15:04.237",
"lastModified": "2024-11-13T10:15:04.237",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11110",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-11-12T21:15:10.920",
"lastModified": "2024-11-13T16:35:04.523",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11111",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-11-12T21:15:11.000",
"lastModified": "2024-11-13T16:35:05.837",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11112",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-11-12T21:15:11.057",
"lastModified": "2024-11-12T21:35:15.850",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Media in Google Chrome on Windows prior to 131.0.6778.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)"
},
{
"lang": "es",
"value": "El use after free en Media en Google Chrome en Windows antes de la versi\u00f3n 131.0.6778.69 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)"
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11113",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-11-12T21:15:11.143",
"lastModified": "2024-11-12T21:35:16.623",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Accessibility in Google Chrome prior to 131.0.6778.69 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)"
},
{
"lang": "es",
"value": "El use after free en Accesibilidad en Google Chrome anterior a la versi\u00f3n 131.0.6778.69 permiti\u00f3 que un atacante remoto que hab\u00eda comprometido el proceso de renderizaci\u00f3n potencialmente explotara la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Media)"
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11114",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-11-12T21:15:11.223",
"lastModified": "2024-11-12T21:35:17.413",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Views in Google Chrome on Windows prior to 131.0.6778.69 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)"
},
{
"lang": "es",
"value": "Una implementaci\u00f3n inadecuada en Vistas en Google Chrome en Windows anterior a la versi\u00f3n 131.0.6778.69 permiti\u00f3 que un atacante remoto que hab\u00eda comprometido el proceso de renderizaci\u00f3n pudiera realizar un escape de la zona protegida a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)"
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11115",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-11-12T21:15:11.280",
"lastModified": "2024-11-13T16:35:06.630",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11116",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-11-12T21:15:11.340",
"lastModified": "2024-11-13T16:35:07.427",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11117",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-11-12T21:15:11.393",
"lastModified": "2024-11-13T16:35:08.220",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11138",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-12T18:15:17.543",
"lastModified": "2024-11-12T18:15:17.543",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in DedeCMS 5.7.116. This affects an unknown part of the file /dede/uploads/dede/friendlink_add.php. The manipulation of the argument logoimg leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en DedeCMS 5.7.116. Afecta a una parte desconocida del archivo /dede/uploads/dede/friendlink_add.php. La manipulaci\u00f3n del argumento logoimg provoca una carga sin restricciones. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11143",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T03:15:05.110",
"lastModified": "2024-11-13T03:15:05.110",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Kognetiks Chatbot for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.8. This is due to missing or incorrect nonce validation on the update_assistant, add_new_assistant, and delete_assistant functions. This makes it possible for unauthenticated attackers to modify assistants via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento Kognetiks Chatbot para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.1.8 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en las funciones update_assistant, add_new_assistant y delete_assistant. Esto permite que atacantes no autenticados modifiquen asistentes a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11150",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T05:15:12.337",
"lastModified": "2024-11-13T05:15:12.337",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WordPress User Extra Fields plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_tmp_uploaded_file() function in all versions up to, and including, 16.6. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)."
},
{
"lang": "es",
"value": "El complemento User Extra Fields de WordPress es vulnerable a la eliminaci\u00f3n arbitraria de archivos debido a una validaci\u00f3n insuficiente de la ruta de archivo en la funci\u00f3n delete_tmp_uploaded_file() en todas las versiones hasta la 16.6 incluida. Esto permite que atacantes no autenticados eliminen archivos arbitrarios en el servidor, lo que puede provocar f\u00e1cilmente la ejecuci\u00f3n remota de c\u00f3digo cuando se elimina el archivo correcto (como wp-config.php)."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11159",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-11-13T14:15:15.330",
"lastModified": "2024-11-13T14:15:15.330",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11165",
"sourceIdentifier": "security@yugabyte.com",
"published": "2024-11-13T15:15:06.877",
"lastModified": "2024-11-13T15:15:06.877",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11168",
"sourceIdentifier": "cna@python.org",
"published": "2024-11-12T22:15:14.920",
"lastModified": "2024-11-13T16:35:09.027",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11175",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-13T16:15:17.740",
"lastModified": "2024-11-13T16:15:17.740",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21012",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:15.617",
"lastModified": "2024-04-26T09:15:10.307",
"lastModified": "2024-11-13T18:35:25.333",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21540",
"sourceIdentifier": "report@snyk.io",
"published": "2024-11-13T05:15:12.997",
"lastModified": "2024-11-13T05:15:12.997",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of the package source-map-support are vulnerable to Directory Traversal in the retrieveSourceMap function."
},
{
"lang": "es",
"value": "Todas las versiones del paquete source-map-support son vulnerables a Directory Traversal en la funci\u00f3n retrieveSourceMap."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21541",
"sourceIdentifier": "report@snyk.io",
"published": "2024-11-13T05:15:14.680",
"lastModified": "2024-11-13T05:15:14.680",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of the package dom-iterator are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval."
},
{
"lang": "es",
"value": "Todas las versiones del paquete dom-iterator son vulnerables a la ejecuci\u00f3n de c\u00f3digo arbitrario debido al uso del constructor Function sin una desinfecci\u00f3n completa de la entrada. Function genera un nuevo cuerpo de funci\u00f3n y, por lo tanto, se debe tener cuidado para garantizar que las entradas a Function no est\u00e9n controladas por un atacante. Los riesgos involucrados son similares a los de permitir que la entrada controlada por un atacante llegue a eval."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21937",
"sourceIdentifier": "psirt@amd.com",
"published": "2024-11-12T18:15:17.863",
"lastModified": "2024-11-12T18:15:17.863",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect default permissions in the AMD HIP SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution."
},
{
"lang": "es",
"value": "Los permisos predeterminados incorrectos en el directorio de instalaci\u00f3n del SDK AMD HIP podr\u00edan permitir que un atacante logre una escalada de privilegios que potencialmente resulte en la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21938",
"sourceIdentifier": "psirt@amd.com",
"published": "2024-11-12T18:15:18.073",
"lastModified": "2024-11-12T18:15:18.073",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect default permissions in the AMD Management Plugin for the Microsoft\u00ae System Center Configuration Manager (SCCM) installation directory could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution."
},
{
"lang": "es",
"value": "Los permisos predeterminados incorrectos en el complemento de administraci\u00f3n de AMD para el directorio de instalaci\u00f3n de Microsoft\u00ae System Center Configuration Manager (SCCM) podr\u00edan permitir que un atacante logre una escalada de privilegios, lo que podr\u00eda resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21939",
"sourceIdentifier": "psirt@amd.com",
"published": "2024-11-12T18:15:18.263",
"lastModified": "2024-11-12T18:15:18.263",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect default permissions in the AMD Cloud Manageability Service (ACMS) Software installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution."
},
{
"lang": "es",
"value": "Los permisos predeterminados incorrectos en el directorio de instalaci\u00f3n del software AMD Cloud Manageability Service (ACMS) podr\u00edan permitir que un atacante logre una escalada de privilegios que potencialmente resulte en la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21945",
"sourceIdentifier": "psirt@amd.com",
"published": "2024-11-12T18:15:18.450",
"lastModified": "2024-11-12T18:15:18.450",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect default permissions in the AMD RyzenTM Master monitoring SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution."
},
{
"lang": "es",
"value": "Los permisos predeterminados incorrectos en el directorio de instalaci\u00f3n del SDK de monitoreo AMD RyzenTM Master podr\u00edan permitir que un atacante logre una escalada de privilegios que potencialmente resulte en la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21946",
"sourceIdentifier": "psirt@amd.com",
"published": "2024-11-12T18:15:18.633",
"lastModified": "2024-11-12T18:15:18.633",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect default permissions in the AMD RyzenTM Master Utility installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution."
},
{
"lang": "es",
"value": "Los permisos predeterminados incorrectos en el directorio de instalaci\u00f3n de AMD RyzenTM Master Utility podr\u00edan permitir que un atacante logre una escalada de privilegios que potencialmente resulte en la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21949",
"sourceIdentifier": "psirt@amd.com",
"published": "2024-11-12T18:15:18.813",
"lastModified": "2024-11-12T18:15:18.813",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper validation of user input in the NPU driver could allow an attacker to provide a buffer with unexpected size, potentially leading to system crash."
},
{
"lang": "es",
"value": "La validaci\u00f3n incorrecta de la entrada del usuario en el controlador NPU podr\u00eda permitir que un atacante proporcione un b\u00fafer con un tama\u00f1o inesperado, lo que podr\u00eda provocar un bloqueo del sistema."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21957",
"sourceIdentifier": "psirt@amd.com",
"published": "2024-11-12T18:15:19.050",
"lastModified": "2024-11-12T18:15:19.050",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect default permissions in the AMD Management Console installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution."
},
{
"lang": "es",
"value": "Los permisos predeterminados incorrectos en el directorio de instalaci\u00f3n de AMD Management Console podr\u00edan permitir que un atacante logre una escalada de privilegios que potencialmente resulte en la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21958",
"sourceIdentifier": "psirt@amd.com",
"published": "2024-11-12T18:15:19.340",
"lastModified": "2024-11-12T18:15:19.340",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect default permissions in the AMD Provisioning Console installation directory could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution."
},
{
"lang": "es",
"value": "Los permisos predeterminados incorrectos en el directorio de instalaci\u00f3n de AMD Provisioning Console podr\u00edan permitir que un atacante logre una escalada de privilegios, lo que podr\u00eda resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21974",
"sourceIdentifier": "psirt@amd.com",
"published": "2024-11-12T18:15:19.533",
"lastModified": "2024-11-12T18:15:19.533",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in the NPU driver could allow an attacker to supply a specially crafted pointer potentially leading to arbitrary code execution."
},
{
"lang": "es",
"value": "Una validaci\u00f3n de entrada incorrecta en el controlador NPU podr\u00eda permitir que un atacante proporcione un puntero especialmente manipulado que podr\u00eda conducir a la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21975",
"sourceIdentifier": "psirt@amd.com",
"published": "2024-11-12T18:15:19.723",
"lastModified": "2024-11-12T18:15:19.723",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in the NPU driver could allow an attacker to supply a specially crafted pointer potentially leading to arbitrary code execution."
},
{
"lang": "es",
"value": "Una validaci\u00f3n de entrada incorrecta en el controlador NPU podr\u00eda permitir que un atacante proporcione un puntero especialmente manipulado que podr\u00eda conducir a la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21976",
"sourceIdentifier": "psirt@amd.com",
"published": "2024-11-12T18:15:19.920",
"lastModified": "2024-11-12T18:35:03.770",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in the NPU driver could allow an attacker to supply a specially crafted pointer potentially leading to arbitrary code execution."
},
{
"lang": "es",
"value": "Una validaci\u00f3n de entrada incorrecta en el controlador NPU podr\u00eda permitir que un atacante proporcione un puntero especialmente manipulado que podr\u00eda conducir a la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-2207",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2024-11-12T20:15:06.120",
"lastModified": "2024-11-12T20:15:06.120",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Potential vulnerabilities have been identified in the audio package for certain HP PC products using the Sound Research SECOMN64 driver, which might allow escalation of privilege. Sound Research has released driver updates to mitigate the potential vulnerabilities."
},
{
"lang": "es",
"value": "Se han identificado posibles vulnerabilidades en el paquete de audio de ciertos productos de PC HP que utilizan el controlador Sound Research SECOMN64, lo que podr\u00eda permitir la escalada de privilegios. Sound Research ha publicado actualizaciones de controladores para mitigar las posibles vulnerabilidades."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-2208",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2024-11-12T20:15:06.323",
"lastModified": "2024-11-12T20:15:06.323",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Potential vulnerabilities have been identified in the audio package for certain HP PC products using the Sound Research SECOMN64 driver, which might allow escalation of privilege. Sound Research has released driver updates to mitigate the potential vulnerabilities."
},
{
"lang": "es",
"value": "Se han identificado posibles vulnerabilidades en el paquete de audio de ciertos productos de PC HP que utilizan el controlador Sound Research SECOMN64, lo que podr\u00eda permitir la escalada de privilegios. Sound Research ha publicado actualizaciones de controladores para mitigar las posibles vulnerabilidades."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23666",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-11-12T19:15:07.970",
"lastModified": "2024-11-12T19:15:07.970",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A client-side enforcement of server-side security in Fortinet FortiAnalyzer-BigData \r\nat least version 7.4.0 and 7.2.0 through 7.2.6 and 7.0.1 through 7.0.6 and 6.4.5 through 6.4.7 and 6.2.5, FortiManager version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.4 and 7.0.0 through 7.0.11 and 6.4.0 through 6.4.14, FortiAnalyzer version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.4 and 7.0.0 through 7.0.11 and 6.4.0 through 6.4.14 allows attacker to improper access control via crafted requests."
},
{
"lang": "es",
"value": "Una aplicaci\u00f3n del lado del cliente de la seguridad del lado del servidor en Fortinet FortiAnalyzer-BigData al menos en las versiones 7.4.0 y 7.2.0 a 7.2.6 y 7.0.1 a 7.0.6 y 6.4.5 a 6.4.7 y 6.2.5, FortiManager versi\u00f3n 7.4.0 a 7.4.1 y 7.2.0 a 7.2.4 y 7.0.0 a 7.0.11 y 6.4.0 a 6.4.14, FortiAnalyzer versi\u00f3n 7.4.0 a 7.4.1 y 7.2.0 a 7.2.4 y 7.0.0 a 7.0.11 y 6.4.0 a 6.4.14 permite a un atacante realizar un control de acceso indebido a trav\u00e9s de solicitudes manipuladas."
}
],
"metrics": {

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-23715",
"sourceIdentifier": "security@android.com",
"published": "2024-11-13T18:15:20.080",
"lastModified": "2024-11-13T18:15:20.080",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In PMRWritePMPageList of pmr.c, there is a possible out of bounds write due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2024-11-01",
"source": "security@android.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-26011",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-11-12T19:15:08.320",
"lastModified": "2024-11-12T19:15:08.320",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A missing authentication for critical function in Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14, FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.17, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiSwitchManager version 7.2.0 through 7.2.3, 7.0.0 through 7.0.3, FortiPortal version 6.0.0 through 6.0.14, FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15, 6.2.0 through 6.2.16, 6.0.0 through 6.0.18 allows attacker to execute unauthorized code or commands via specially crafted packets."
},
{
"lang": "es",
"value": "Autenticaci\u00f3n faltante para funci\u00f3n cr\u00edtica en Fortinet FortiManager versi\u00f3n 7.4.0 a 7.4.2, 7.2.0 a 7.2.4, 7.0.0 a 7.0.11, 6.4.0 a 6.4.14, FortiPAM versi\u00f3n 1.2.0, 1.1.0 a 1.1.2, 1.0.0 a 1.0.3, FortiProxy versi\u00f3n 7.4.0 a 7.4.2, 7.2.0 a 7.2.9, 7.0.0 a 7.0.17, 2.0.0 a 2.0.14, 1.2.0 a 1.2.13, 1.1.0 a 1.1.6, 1.0.0 a 1.0.7, FortiSwitchManager versi\u00f3n 7.2.0 a 7.2.3, 7.0.0 a 7.0.3, FortiPortal versi\u00f3n 6.0.0 a 6.0.14, FortiOS versi\u00f3n 7.4.0 a 7.4.3, 7.2.0 a 7.2.7, 7.0.0 a 7.0.14, 6.4.0 a 6.4.15, 6.2.0 a 6.2.16, 6.0.0 a 6.0.18 permite a un atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de paquetes especialmente manipulados."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28052",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-10-30T14:15:04.720",
"lastModified": "2024-11-01T12:57:03.417",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-13T18:07:42.263",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
@ -51,10 +71,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:level1:wbr-6012_firmware:r0.40e6:*:*:*:*:*:*:*",
"matchCriteriaId": "FCC94B2E-4651-4E98-90A1-CB53CC2E24CC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:level1:wbr-6012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FD255E3-0DBF-440C-AC6A-90B30DB59B34"
}
]
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1997",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-28726",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-12T23:15:04.137",
"lastModified": "2024-11-13T16:35:11.950",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in DLink DWR 2000M 5G CPE With Wifi 6 Ax1800 and Dlink DWR 5G CPE DWR-2000M_1.34ME allows a local attacker to execute arbitrary code via a crafted payload to the Diagnostics function."
},
{
"lang": "es",
"value": "Un problema en DLink DWR 2000M 5G CPE con Wifi 6 Ax1800 y Dlink DWR 5G CPE DWR-2000M_1.34ME permite que un atacante local ejecute c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para la funci\u00f3n de diagn\u00f3stico."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-28728",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-12T23:15:04.230",
"lastModified": "2024-11-13T16:35:12.757",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in DLink DWR 2000M 5G CPE With Wifi 6 Ax1800 and Dlink DWR 5G CPE DWR-2000M_1.34ME allows a local attacker to obtain sensitive information via a crafted payload to the WiFi SSID Name field."
},
{
"lang": "es",
"value": "La vulnerabilidad de Cross Site Scripting en DLink DWR 2000M 5G CPE con Wifi 6 Ax1800 y Dlink DWR 5G CPE DWR-2000M_1.34ME permite a un atacante local obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado en el campo de nombre SSID de WiFi."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-28729",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-12T23:15:04.320",
"lastModified": "2024-11-12T23:15:04.320",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in DLink DWR 2000M 5G CPE With Wifi 6 Ax1800 and Dlink DWR 5G CPE DWR-2000M_1.34ME allows a local attacker to execute arbitrary code via a crafted request."
},
{
"lang": "es",
"value": "Un problema en DLink DWR 2000M 5G CPE con Wifi 6 Ax1800 y Dlink DWR 5G CPE DWR-2000M_1.34ME permite que un atacante local ejecute c\u00f3digo arbitrario a trav\u00e9s de una solicitud manipulada espec\u00edficamente para ello."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-28730",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-12T23:15:04.410",
"lastModified": "2024-11-12T23:15:04.410",
"vulnStatus": "Received",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in DLink DWR 2000M 5G CPE With Wifi 6 Ax1800 and Dlink DWR 5G CPE DWR-2000M_1.34ME allows a local attacker to obtain sensitive information via the file upload feature of the VPN configuration module."
},
{
"lang": "es",
"value": "La vulnerabilidad de Cross Site Scripting en DLink DWR 2000M 5G CPE con Wifi 6 Ax1800 y Dlink DWR 5G CPE DWR-2000M_1.34ME permite a un atacante local obtener informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n de carga de archivos del m\u00f3dulo de configuraci\u00f3n VPN."
}
],
"metrics": {},

Some files were not shown because too many files have changed in this diff Show More