diff --git a/CVE-2004/CVE-2004-14xx/CVE-2004-1464.json b/CVE-2004/CVE-2004-14xx/CVE-2004-1464.json index 3b403e1436f..3fad119424b 100644 --- a/CVE-2004/CVE-2004-14xx/CVE-2004-1464.json +++ b/CVE-2004/CVE-2004-14xx/CVE-2004-1464.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", "lastModified": "2025-02-07T15:15:10.823", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2006/CVE-2006-200xx/CVE-2006-20001.json b/CVE-2006/CVE-2006-200xx/CVE-2006-20001.json index c68c804235a..d09a9b5009b 100644 --- a/CVE-2006/CVE-2006-200xx/CVE-2006-20001.json +++ b/CVE-2006/CVE-2006-200xx/CVE-2006-20001.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2007/CVE-2007-30xx/CVE-2007-3010.json b/CVE-2007/CVE-2007-30xx/CVE-2007-3010.json index 8cf48681eef..362ec47a43e 100644 --- a/CVE-2007/CVE-2007-30xx/CVE-2007-3010.json +++ b/CVE-2007/CVE-2007-30xx/CVE-2007-3010.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2007-09-18T21:17:00.000", "lastModified": "2025-02-07T15:15:11.303", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2009/CVE-2009-05xx/CVE-2009-0557.json b/CVE-2009/CVE-2009-05xx/CVE-2009-0557.json index 7ec0b25c36a..4b28f93632b 100644 --- a/CVE-2009/CVE-2009-05xx/CVE-2009-0557.json +++ b/CVE-2009/CVE-2009-05xx/CVE-2009-0557.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2009-06-10T18:30:00.203", "lastModified": "2025-02-10T19:15:28.517", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2009/CVE-2009-05xx/CVE-2009-0563.json b/CVE-2009/CVE-2009-05xx/CVE-2009-0563.json index 215b32f87a0..224ebc0b8f7 100644 --- a/CVE-2009/CVE-2009-05xx/CVE-2009-0563.json +++ b/CVE-2009/CVE-2009-05xx/CVE-2009-0563.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2009-06-10T18:00:00.313", "lastModified": "2025-02-10T19:15:29.490", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2009/CVE-2009-18xx/CVE-2009-1862.json b/CVE-2009/CVE-2009-18xx/CVE-2009-1862.json index ab487a5d42d..bbc4caf2c2f 100644 --- a/CVE-2009/CVE-2009-18xx/CVE-2009-1862.json +++ b/CVE-2009/CVE-2009-18xx/CVE-2009-1862.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2009-07-23T20:30:00.233", "lastModified": "2025-02-10T19:15:29.713", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2009/CVE-2009-24xx/CVE-2009-2409.json b/CVE-2009/CVE-2009-24xx/CVE-2009-2409.json index de4b3f0bcca..3579654f057 100644 --- a/CVE-2009/CVE-2009-24xx/CVE-2009-2409.json +++ b/CVE-2009/CVE-2009-24xx/CVE-2009-2409.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2009-07-30T19:30:00.343", "lastModified": "2024-11-21T01:04:48.300", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2010/CVE-2010-02xx/CVE-2010-0232.json b/CVE-2010/CVE-2010-02xx/CVE-2010-0232.json index f3f5b2922a2..a8a3a11dd9f 100644 --- a/CVE-2010/CVE-2010-02xx/CVE-2010-0232.json +++ b/CVE-2010/CVE-2010-02xx/CVE-2010-0232.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2010-01-21T19:30:00.900", "lastModified": "2025-02-04T19:15:19.730", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2010/CVE-2010-25xx/CVE-2010-2572.json b/CVE-2010/CVE-2010-25xx/CVE-2010-2572.json index 1ee2520f294..45f5837c795 100644 --- a/CVE-2010/CVE-2010-25xx/CVE-2010-2572.json +++ b/CVE-2010/CVE-2010-25xx/CVE-2010-2572.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2010-11-10T03:00:01.850", "lastModified": "2025-02-10T19:15:30.363", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2010/CVE-2010-43xx/CVE-2010-4398.json b/CVE-2010/CVE-2010-43xx/CVE-2010-4398.json index fc1ed623f17..8825cb9bb43 100644 --- a/CVE-2010/CVE-2010-43xx/CVE-2010-4398.json +++ b/CVE-2010/CVE-2010-43xx/CVE-2010-4398.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2010-12-06T13:44:54.863", "lastModified": "2025-02-10T19:15:30.553", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2011/CVE-2011-20xx/CVE-2011-2005.json b/CVE-2011/CVE-2011-20xx/CVE-2011-2005.json index 01e7678d6e4..a631de8074e 100644 --- a/CVE-2011/CVE-2011-20xx/CVE-2011-2005.json +++ b/CVE-2011/CVE-2011-20xx/CVE-2011-2005.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2011-10-12T02:52:43.910", "lastModified": "2025-02-10T19:15:30.800", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1535.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1535.json index a4b6a0340c2..715106054ef 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1535.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1535.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2012-08-15T10:31:40.677", "lastModified": "2025-02-07T15:15:12.317", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2012/CVE-2012-49xx/CVE-2012-4969.json b/CVE-2012/CVE-2012-49xx/CVE-2012-4969.json index d5cc3aa85f4..9b31c162b3f 100644 --- a/CVE-2012/CVE-2012-49xx/CVE-2012-4969.json +++ b/CVE-2012/CVE-2012-49xx/CVE-2012-4969.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2012-09-18T10:39:14.147", "lastModified": "2025-02-04T22:15:30.557", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2013/CVE-2013-13xx/CVE-2013-1331.json b/CVE-2013/CVE-2013-13xx/CVE-2013-1331.json index 2f4838c1702..8d4f93b90d0 100644 --- a/CVE-2013/CVE-2013-13xx/CVE-2013-1331.json +++ b/CVE-2013/CVE-2013-13xx/CVE-2013-1331.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2013-06-12T03:29:57.117", "lastModified": "2025-02-10T19:15:31.597", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2013/CVE-2013-13xx/CVE-2013-1347.json b/CVE-2013/CVE-2013-13xx/CVE-2013-1347.json index 8dbe493742a..d2e18b80c1f 100644 --- a/CVE-2013/CVE-2013-13xx/CVE-2013-1347.json +++ b/CVE-2013/CVE-2013-13xx/CVE-2013-1347.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2013-05-05T11:07:00.527", "lastModified": "2025-02-04T19:15:20.470", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2013/CVE-2013-25xx/CVE-2013-2596.json b/CVE-2013/CVE-2013-25xx/CVE-2013-2596.json index 892372841df..fd31ff59570 100644 --- a/CVE-2013/CVE-2013-25xx/CVE-2013-2596.json +++ b/CVE-2013/CVE-2013-25xx/CVE-2013-2596.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2013-04-13T02:59:46.627", "lastModified": "2025-02-07T15:15:13.020", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2013/CVE-2013-36xx/CVE-2013-3660.json b/CVE-2013/CVE-2013-36xx/CVE-2013-3660.json index d0ef95d856c..15b952f583d 100644 --- a/CVE-2013/CVE-2013-36xx/CVE-2013-3660.json +++ b/CVE-2013/CVE-2013-36xx/CVE-2013-3660.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2013-05-24T20:55:01.903", "lastModified": "2025-02-07T15:15:13.630", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json b/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json index 9cb999b7f72..0db221a3df6 100644 --- a/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json +++ b/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json @@ -59,7 +59,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -131,7 +131,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7169.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7169.json index 11d40760a5e..2ac0a904bcb 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7169.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7169.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2014-09-25T01:55:04.367", "lastModified": "2025-02-10T20:15:37.017", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8361.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8361.json index 2cf723d3172..58c1ca70a3f 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8361.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8361.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2015-05-01T15:59:01.287", "lastModified": "2025-02-03T16:15:28.420", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1187.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1187.json index 49ec171dcf6..00ba2d2b614 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1187.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1187.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-09-21T16:29:00.147", "lastModified": "2025-02-07T15:15:14.100", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1642.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1642.json index 2d1c320ef65..550531dc705 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1642.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1642.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-08-15T00:59:00.110", "lastModified": "2025-02-10T18:15:21.377", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1701.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1701.json index dae789a3124..dd95c727b80 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1701.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1701.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-21T10:59:00.073", "lastModified": "2025-02-10T18:15:22.080", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json index 894d0c8e6a1..caece9a3555 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-06-10T01:59:36.483", "lastModified": "2025-02-10T18:15:22.347", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2291.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2291.json index 7be7902070d..2748c51e0cc 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2291.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2291.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-08-09T18:29:00.933", "lastModified": "2025-02-04T21:15:08.600", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-24xx/CVE-2015-2419.json b/CVE-2015/CVE-2015-24xx/CVE-2015-2419.json index 55adfc4fdab..569a87ea25c 100644 --- a/CVE-2015/CVE-2015-24xx/CVE-2015-2419.json +++ b/CVE-2015/CVE-2015-24xx/CVE-2015-2419.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-07-14T21:59:33.283", "lastModified": "2025-02-10T19:15:34.547", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2502.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2502.json index a811024c71d..8cb466029b5 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2502.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2502.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-08-19T10:59:00.090", "lastModified": "2025-02-10T18:15:22.627", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2545.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2545.json index 6ef32cf8069..5b5619006ae 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2545.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2545.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-09-09T00:59:52.190", "lastModified": "2025-02-10T18:15:22.913", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-61xx/CVE-2015-6175.json b/CVE-2015/CVE-2015-61xx/CVE-2015-6175.json index 8f85e2c6010..a15490e8e00 100644 --- a/CVE-2015/CVE-2015-61xx/CVE-2015-6175.json +++ b/CVE-2015/CVE-2015-61xx/CVE-2015-6175.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-12-09T11:59:56.580", "lastModified": "2025-02-10T18:15:23.560", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-00xx/CVE-2016-0034.json b/CVE-2016/CVE-2016-00xx/CVE-2016-0034.json index 3af02c13dae..3fb259ac270 100644 --- a/CVE-2016/CVE-2016-00xx/CVE-2016-0034.json +++ b/CVE-2016/CVE-2016-00xx/CVE-2016-0034.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2016-01-13T05:59:22.657", "lastModified": "2025-02-10T19:15:34.910", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-00xx/CVE-2016-0040.json b/CVE-2016/CVE-2016-00xx/CVE-2016-0040.json index dfa9c83474b..00effdd094e 100644 --- a/CVE-2016/CVE-2016-00xx/CVE-2016-0040.json +++ b/CVE-2016/CVE-2016-00xx/CVE-2016-0040.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2016-02-10T11:59:06.440", "lastModified": "2025-02-10T17:15:09.997", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-01xx/CVE-2016-0185.json b/CVE-2016/CVE-2016-01xx/CVE-2016-0185.json index bd230cddfd0..6b3c01f5c34 100644 --- a/CVE-2016/CVE-2016-01xx/CVE-2016-0185.json +++ b/CVE-2016/CVE-2016-01xx/CVE-2016-0185.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2016-05-11T01:59:26.097", "lastModified": "2025-02-10T18:15:24.027", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-95xx/CVE-2016-9563.json b/CVE-2016/CVE-2016-95xx/CVE-2016-9563.json index d8a2ee1bd40..f0d3d1d92b0 100644 --- a/CVE-2016/CVE-2016-95xx/CVE-2016-9563.json +++ b/CVE-2016/CVE-2016-95xx/CVE-2016-9563.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2016-11-23T02:59:06.370", "lastModified": "2025-02-07T15:15:14.340", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-00xx/CVE-2017-0001.json b/CVE-2017/CVE-2017-00xx/CVE-2017-0001.json index 33aab191327..62f9c51fe90 100644 --- a/CVE-2017/CVE-2017-00xx/CVE-2017-0001.json +++ b/CVE-2017/CVE-2017-00xx/CVE-2017-0001.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2017-03-17T00:59:00.167", "lastModified": "2025-02-10T16:15:28.983", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-00xx/CVE-2017-0005.json b/CVE-2017/CVE-2017-00xx/CVE-2017-0005.json index f1489499fe6..7fc435dd8aa 100644 --- a/CVE-2017/CVE-2017-00xx/CVE-2017-0005.json +++ b/CVE-2017/CVE-2017-00xx/CVE-2017-0005.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2017-03-17T00:59:00.197", "lastModified": "2025-02-10T16:15:29.783", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-00xx/CVE-2017-0022.json b/CVE-2017/CVE-2017-00xx/CVE-2017-0022.json index 6c5eb8843af..e795397be98 100644 --- a/CVE-2017/CVE-2017-00xx/CVE-2017-0022.json +++ b/CVE-2017/CVE-2017-00xx/CVE-2017-0022.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2017-03-17T00:59:00.680", "lastModified": "2025-02-10T16:15:29.970", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-00xx/CVE-2017-0059.json b/CVE-2017/CVE-2017-00xx/CVE-2017-0059.json index d299a2af89f..a598ed97573 100644 --- a/CVE-2017/CVE-2017-00xx/CVE-2017-0059.json +++ b/CVE-2017/CVE-2017-00xx/CVE-2017-0059.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2017-03-17T00:59:01.523", "lastModified": "2025-02-10T16:15:30.207", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-01xx/CVE-2017-0101.json b/CVE-2017/CVE-2017-01xx/CVE-2017-0101.json index a272841124a..36fd7e24a52 100644 --- a/CVE-2017/CVE-2017-01xx/CVE-2017-0101.json +++ b/CVE-2017/CVE-2017-01xx/CVE-2017-0101.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2017-03-17T00:59:02.743", "lastModified": "2025-02-10T16:15:30.407", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-01xx/CVE-2017-0143.json b/CVE-2017/CVE-2017-01xx/CVE-2017-0143.json index c17ca15dca9..f3505879379 100644 --- a/CVE-2017/CVE-2017-01xx/CVE-2017-0143.json +++ b/CVE-2017/CVE-2017-01xx/CVE-2017-0143.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2017-03-17T00:59:03.977", "lastModified": "2025-02-10T16:15:30.603", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-01xx/CVE-2017-0144.json b/CVE-2017/CVE-2017-01xx/CVE-2017-0144.json index e4b90b1b0a9..3c8dfea56f8 100644 --- a/CVE-2017/CVE-2017-01xx/CVE-2017-0144.json +++ b/CVE-2017/CVE-2017-01xx/CVE-2017-0144.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2017-03-17T00:59:04.010", "lastModified": "2025-02-10T16:15:30.853", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-121xx/CVE-2017-12149.json b/CVE-2017/CVE-2017-121xx/CVE-2017-12149.json index 61a13f5653e..0a2dece86ac 100644 --- a/CVE-2017/CVE-2017-121xx/CVE-2017-12149.json +++ b/CVE-2017/CVE-2017-121xx/CVE-2017-12149.json @@ -111,7 +111,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2017/CVE-2017-126xx/CVE-2017-12637.json b/CVE-2017/CVE-2017-126xx/CVE-2017-12637.json index afe20c3c766..4f5ad4483d9 100644 --- a/CVE-2017/CVE-2017-126xx/CVE-2017-12637.json +++ b/CVE-2017/CVE-2017-126xx/CVE-2017-12637.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-08-07T20:29:01.120", "lastModified": "2025-03-20T01:00:01.543", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-159xx/CVE-2017-15944.json b/CVE-2017/CVE-2017-159xx/CVE-2017-15944.json index 6caf6bf8571..5072ff0b0d0 100644 --- a/CVE-2017/CVE-2017-159xx/CVE-2017-15944.json +++ b/CVE-2017/CVE-2017-159xx/CVE-2017-15944.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-12-11T17:29:00.490", "lastModified": "2025-02-07T14:15:42.553", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20184.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20184.json index 65c560dacd3..3c637e32434 100644 --- a/CVE-2017/CVE-2017-201xx/CVE-2017-20184.json +++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20184.json @@ -68,7 +68,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2017/CVE-2017-85xx/CVE-2017-8543.json b/CVE-2017/CVE-2017-85xx/CVE-2017-8543.json index 372ab6c1ec1..1f020325079 100644 --- a/CVE-2017/CVE-2017-85xx/CVE-2017-8543.json +++ b/CVE-2017/CVE-2017-85xx/CVE-2017-8543.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2017-06-15T01:29:04.490", "lastModified": "2025-02-10T19:15:35.197", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-85xx/CVE-2017-8570.json b/CVE-2017/CVE-2017-85xx/CVE-2017-8570.json index e54cd461a5c..e13bdd43735 100644 --- a/CVE-2017/CVE-2017-85xx/CVE-2017-8570.json +++ b/CVE-2017/CVE-2017-85xx/CVE-2017-8570.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2017-07-11T21:29:01.267", "lastModified": "2025-02-10T15:15:10.437", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-98xx/CVE-2017-9841.json b/CVE-2017/CVE-2017-98xx/CVE-2017-9841.json index f0088542cef..c675307ca9a 100644 --- a/CVE-2017/CVE-2017-98xx/CVE-2017-9841.json +++ b/CVE-2017/CVE-2017-98xx/CVE-2017-9841.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-06-27T17:29:00.177", "lastModified": "2025-02-07T15:15:15.160", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-07xx/CVE-2018-0798.json b/CVE-2018/CVE-2018-07xx/CVE-2018-0798.json index 893ad36790a..c211f411cd3 100644 --- a/CVE-2018/CVE-2018-07xx/CVE-2018-0798.json +++ b/CVE-2018/CVE-2018-07xx/CVE-2018-0798.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2018-01-10T01:29:00.713", "lastModified": "2025-02-07T17:15:10.113", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-08xx/CVE-2018-0802.json b/CVE-2018/CVE-2018-08xx/CVE-2018-0802.json index 8c7fb64ea06..3e08c160b32 100644 --- a/CVE-2018/CVE-2018-08xx/CVE-2018-0802.json +++ b/CVE-2018/CVE-2018-08xx/CVE-2018-0802.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2018-01-10T01:29:00.820", "lastModified": "2025-02-07T17:15:10.330", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-08xx/CVE-2018-0824.json b/CVE-2018/CVE-2018-08xx/CVE-2018-0824.json index c532c3bd0cc..ca6b6142de4 100644 --- a/CVE-2018/CVE-2018-08xx/CVE-2018-0824.json +++ b/CVE-2018/CVE-2018-08xx/CVE-2018-0824.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2018-05-09T19:29:00.370", "lastModified": "2024-11-21T03:39:01.810", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-105xx/CVE-2018-10561.json b/CVE-2018/CVE-2018-105xx/CVE-2018-10561.json index 59e0a77aa78..a5c4f91796c 100644 --- a/CVE-2018/CVE-2018-105xx/CVE-2018-10561.json +++ b/CVE-2018/CVE-2018-105xx/CVE-2018-10561.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-05-04T03:29:00.227", "lastModified": "2025-02-03T16:15:29.493", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-105xx/CVE-2018-10562.json b/CVE-2018/CVE-2018-105xx/CVE-2018-10562.json index a03d6accc00..1d102be8f56 100644 --- a/CVE-2018/CVE-2018-105xx/CVE-2018-10562.json +++ b/CVE-2018/CVE-2018-105xx/CVE-2018-10562.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-05-04T03:29:00.287", "lastModified": "2025-02-04T15:15:10.307", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-12xx/CVE-2018-1273.json b/CVE-2018/CVE-2018-12xx/CVE-2018-1273.json index 235c01f27f7..701f046bc73 100644 --- a/CVE-2018/CVE-2018-12xx/CVE-2018-1273.json +++ b/CVE-2018/CVE-2018-12xx/CVE-2018-1273.json @@ -101,7 +101,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -111,7 +111,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2018/CVE-2018-59xx/CVE-2018-5996.json b/CVE-2018/CVE-2018-59xx/CVE-2018-5996.json index 640d709d49b..1e3f0d7f000 100644 --- a/CVE-2018/CVE-2018-59xx/CVE-2018-5996.json +++ b/CVE-2018/CVE-2018-59xx/CVE-2018-5996.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-01-31T18:29:00.363", "lastModified": "2025-01-10T19:15:28.730", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-65xx/CVE-2018-6530.json b/CVE-2018/CVE-2018-65xx/CVE-2018-6530.json index c4daf4b9bce..34381465679 100644 --- a/CVE-2018/CVE-2018-65xx/CVE-2018-6530.json +++ b/CVE-2018/CVE-2018-65xx/CVE-2018-6530.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-03-06T20:29:00.987", "lastModified": "2025-02-04T21:15:16.167", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-74xx/CVE-2018-7445.json b/CVE-2018/CVE-2018-74xx/CVE-2018-7445.json index 96466c238a5..fbf8619992f 100644 --- a/CVE-2018/CVE-2018-74xx/CVE-2018-7445.json +++ b/CVE-2018/CVE-2018-74xx/CVE-2018-7445.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-03-19T21:29:01.083", "lastModified": "2025-02-07T17:15:11.783", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-81xx/CVE-2018-8120.json b/CVE-2018/CVE-2018-81xx/CVE-2018-8120.json index 769aeeebfd0..852211ab145 100644 --- a/CVE-2018/CVE-2018-81xx/CVE-2018-8120.json +++ b/CVE-2018/CVE-2018-81xx/CVE-2018-8120.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2018-05-09T19:29:01.277", "lastModified": "2025-02-07T17:15:11.997", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-82xx/CVE-2018-8298.json b/CVE-2018/CVE-2018-82xx/CVE-2018-8298.json index 87df2c57c47..3772274c0cc 100644 --- a/CVE-2018/CVE-2018-82xx/CVE-2018-8298.json +++ b/CVE-2018/CVE-2018-82xx/CVE-2018-8298.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2018-07-11T00:29:01.663", "lastModified": "2025-02-07T17:15:12.453", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-84xx/CVE-2018-8406.json b/CVE-2018/CVE-2018-84xx/CVE-2018-8406.json index 37a506f56b5..25866ef9950 100644 --- a/CVE-2018/CVE-2018-84xx/CVE-2018-8406.json +++ b/CVE-2018/CVE-2018-84xx/CVE-2018-8406.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2018-08-15T17:29:10.157", "lastModified": "2025-02-07T17:15:13.100", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-84xx/CVE-2018-8414.json b/CVE-2018/CVE-2018-84xx/CVE-2018-8414.json index ef494ce5bf6..45529ee62e2 100644 --- a/CVE-2018/CVE-2018-84xx/CVE-2018-8414.json +++ b/CVE-2018/CVE-2018-84xx/CVE-2018-8414.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2018-08-15T17:29:10.393", "lastModified": "2025-02-07T17:15:13.290", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-85xx/CVE-2018-8581.json b/CVE-2018/CVE-2018-85xx/CVE-2018-8581.json index 1b59d09702a..335fe51fe9a 100644 --- a/CVE-2018/CVE-2018-85xx/CVE-2018-8581.json +++ b/CVE-2018/CVE-2018-85xx/CVE-2018-8581.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2018-11-14T01:29:01.927", "lastModified": "2025-02-04T16:15:31.400", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-85xx/CVE-2018-8589.json b/CVE-2018/CVE-2018-85xx/CVE-2018-8589.json index e8947262d6b..291a416a4a4 100644 --- a/CVE-2018/CVE-2018-85xx/CVE-2018-8589.json +++ b/CVE-2018/CVE-2018-85xx/CVE-2018-8589.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2018-11-14T01:29:02.067", "lastModified": "2025-02-07T17:15:13.993", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-05xx/CVE-2019-0543.json b/CVE-2019/CVE-2019-05xx/CVE-2019-0543.json index 834e00b4ba0..4990e5f04e3 100644 --- a/CVE-2019/CVE-2019-05xx/CVE-2019-0543.json +++ b/CVE-2019/CVE-2019-05xx/CVE-2019-0543.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-01-08T21:29:00.517", "lastModified": "2025-02-04T16:15:31.837", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-06xx/CVE-2019-0604.json b/CVE-2019/CVE-2019-06xx/CVE-2019-0604.json index a401783fce5..baca58d1ae4 100644 --- a/CVE-2019/CVE-2019-06xx/CVE-2019-0604.json +++ b/CVE-2019/CVE-2019-06xx/CVE-2019-0604.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-03-05T23:29:00.757", "lastModified": "2025-02-07T17:15:14.890", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-08xx/CVE-2019-0841.json b/CVE-2019/CVE-2019-08xx/CVE-2019-0841.json index 539eacfa00a..dfc4698ce7d 100644 --- a/CVE-2019/CVE-2019-08xx/CVE-2019-0841.json +++ b/CVE-2019/CVE-2019-08xx/CVE-2019-0841.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-04-09T21:29:01.990", "lastModified": "2025-02-07T17:15:16.613", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-08xx/CVE-2019-0863.json b/CVE-2019/CVE-2019-08xx/CVE-2019-0863.json index 5d3c37a753a..2a8847f33ef 100644 --- a/CVE-2019/CVE-2019-08xx/CVE-2019-0863.json +++ b/CVE-2019/CVE-2019-08xx/CVE-2019-0863.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-05-16T19:29:00.927", "lastModified": "2025-02-07T17:15:16.993", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-08xx/CVE-2019-0880.json b/CVE-2019/CVE-2019-08xx/CVE-2019-0880.json index cc7f19c1637..a71ffbd3f79 100644 --- a/CVE-2019/CVE-2019-08xx/CVE-2019-0880.json +++ b/CVE-2019/CVE-2019-08xx/CVE-2019-0880.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-07-15T19:15:15.687", "lastModified": "2024-11-21T04:17:26.037", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-09xx/CVE-2019-0903.json b/CVE-2019/CVE-2019-09xx/CVE-2019-0903.json index dd9301786f8..d6bbe918964 100644 --- a/CVE-2019/CVE-2019-09xx/CVE-2019-0903.json +++ b/CVE-2019/CVE-2019-09xx/CVE-2019-0903.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-05-16T19:29:02.303", "lastModified": "2025-02-07T17:15:17.173", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-109xx/CVE-2019-10923.json b/CVE-2019/CVE-2019-109xx/CVE-2019-10923.json index a24aedfdde4..3717cad83c7 100644 --- a/CVE-2019/CVE-2019-109xx/CVE-2019-10923.json +++ b/CVE-2019/CVE-2019-109xx/CVE-2019-10923.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2019/CVE-2019-10xx/CVE-2019-1064.json b/CVE-2019/CVE-2019-10xx/CVE-2019-1064.json index 0a6f63665e0..472e8308155 100644 --- a/CVE-2019/CVE-2019-10xx/CVE-2019-1064.json +++ b/CVE-2019/CVE-2019-10xx/CVE-2019-1064.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-06-12T14:29:04.273", "lastModified": "2025-02-07T17:15:17.363", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-10xx/CVE-2019-1069.json b/CVE-2019/CVE-2019-10xx/CVE-2019-1069.json index 6206cdd3c19..8210be9994a 100644 --- a/CVE-2019/CVE-2019-10xx/CVE-2019-1069.json +++ b/CVE-2019/CVE-2019-10xx/CVE-2019-1069.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-06-12T14:29:04.337", "lastModified": "2024-11-21T04:35:57.170", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-115xx/CVE-2019-11510.json b/CVE-2019/CVE-2019-115xx/CVE-2019-11510.json index 3063c8f2881..e9b74c666c4 100644 --- a/CVE-2019/CVE-2019-115xx/CVE-2019-11510.json +++ b/CVE-2019/CVE-2019-115xx/CVE-2019-11510.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-05-08T17:29:00.630", "lastModified": "2025-02-03T17:15:11.467", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-115xx/CVE-2019-11539.json b/CVE-2019/CVE-2019-115xx/CVE-2019-11539.json index 3c9c3d13e0a..6fa2528f1bd 100644 --- a/CVE-2019/CVE-2019-115xx/CVE-2019-11539.json +++ b/CVE-2019/CVE-2019-115xx/CVE-2019-11539.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-04-26T02:29:00.300", "lastModified": "2025-02-03T16:15:30.543", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-115xx/CVE-2019-11581.json b/CVE-2019/CVE-2019-115xx/CVE-2019-11581.json index 9462a844040..061988de014 100644 --- a/CVE-2019/CVE-2019-115xx/CVE-2019-11581.json +++ b/CVE-2019/CVE-2019-115xx/CVE-2019-11581.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@atlassian.com", "published": "2019-08-09T20:15:11.270", "lastModified": "2025-02-07T13:15:25.787", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-11xx/CVE-2019-1129.json b/CVE-2019/CVE-2019-11xx/CVE-2019-1129.json index 4ee5df4cf2f..0416ace74e8 100644 --- a/CVE-2019/CVE-2019-11xx/CVE-2019-1129.json +++ b/CVE-2019/CVE-2019-11xx/CVE-2019-1129.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-07-15T19:15:20.967", "lastModified": "2025-02-07T17:15:17.550", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-11xx/CVE-2019-1130.json b/CVE-2019/CVE-2019-11xx/CVE-2019-1130.json index a9951ee2590..d0b49ba0a03 100644 --- a/CVE-2019/CVE-2019-11xx/CVE-2019-1130.json +++ b/CVE-2019/CVE-2019-11xx/CVE-2019-1130.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-07-15T19:15:21.047", "lastModified": "2025-02-07T17:15:17.753", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-11xx/CVE-2019-1132.json b/CVE-2019/CVE-2019-11xx/CVE-2019-1132.json index 40de31081b0..d66ade2a4a4 100644 --- a/CVE-2019/CVE-2019-11xx/CVE-2019-1132.json +++ b/CVE-2019/CVE-2019-11xx/CVE-2019-1132.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-07-15T19:15:21.107", "lastModified": "2025-02-07T17:15:17.943", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-12xx/CVE-2019-1214.json b/CVE-2019/CVE-2019-12xx/CVE-2019-1214.json index 346c8a2e77d..76ac00568dd 100644 --- a/CVE-2019/CVE-2019-12xx/CVE-2019-1214.json +++ b/CVE-2019/CVE-2019-12xx/CVE-2019-1214.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-09-11T22:15:14.523", "lastModified": "2025-02-07T17:15:18.117", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-12xx/CVE-2019-1215.json b/CVE-2019/CVE-2019-12xx/CVE-2019-1215.json index a08979d3091..31351134be1 100644 --- a/CVE-2019/CVE-2019-12xx/CVE-2019-1215.json +++ b/CVE-2019/CVE-2019-12xx/CVE-2019-1215.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-09-11T22:15:14.587", "lastModified": "2025-02-07T17:15:18.327", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-12xx/CVE-2019-1253.json b/CVE-2019/CVE-2019-12xx/CVE-2019-1253.json index 8bb4ef843f3..62693ca1525 100644 --- a/CVE-2019/CVE-2019-12xx/CVE-2019-1253.json +++ b/CVE-2019/CVE-2019-12xx/CVE-2019-1253.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-09-11T22:15:16.337", "lastModified": "2025-02-07T16:15:29.200", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-139xx/CVE-2019-13939.json b/CVE-2019/CVE-2019-139xx/CVE-2019-13939.json index aeb18ce0875..20a024ce567 100644 --- a/CVE-2019/CVE-2019-139xx/CVE-2019-13939.json +++ b/CVE-2019/CVE-2019-139xx/CVE-2019-13939.json @@ -131,7 +131,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2019/CVE-2019-13xx/CVE-2019-1322.json b/CVE-2019/CVE-2019-13xx/CVE-2019-1322.json index 37da7370763..e910840c837 100644 --- a/CVE-2019/CVE-2019-13xx/CVE-2019-1322.json +++ b/CVE-2019/CVE-2019-13xx/CVE-2019-1322.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-10-10T14:15:16.190", "lastModified": "2025-02-04T16:15:31.997", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-14xx/CVE-2019-1405.json b/CVE-2019/CVE-2019-14xx/CVE-2019-1405.json index 3aae91986b8..253ca7dba0a 100644 --- a/CVE-2019/CVE-2019-14xx/CVE-2019-1405.json +++ b/CVE-2019/CVE-2019-14xx/CVE-2019-1405.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-11-12T19:15:13.410", "lastModified": "2025-02-07T16:15:30.290", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-14xx/CVE-2019-1429.json b/CVE-2019/CVE-2019-14xx/CVE-2019-1429.json index 9fd0974846f..461ab2328e1 100644 --- a/CVE-2019/CVE-2019-14xx/CVE-2019-1429.json +++ b/CVE-2019/CVE-2019-14xx/CVE-2019-1429.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-11-12T19:15:14.770", "lastModified": "2025-03-13T17:14:11.647", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-157xx/CVE-2019-15706.json b/CVE-2019/CVE-2019-157xx/CVE-2019-15706.json index 556362f61c9..f80e30dceed 100644 --- a/CVE-2019/CVE-2019-157xx/CVE-2019-15706.json +++ b/CVE-2019/CVE-2019-157xx/CVE-2019-15706.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-03-17T14:15:15.107", "lastModified": "2025-03-17T14:15:15.107", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of input during web page generation in the SSL VPN portal of FortiProxy version 2.0.0, version 1.2.9 and below and FortiOS version 6.2.1 and below, version 6.0.8 and below, version 5.6.12 may allow a remote authenticated attacker to perform a stored cross site scripting attack (XSS)." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web en el portal VPN SSL de FortiProxy versi\u00f3n 2.0.0, versi\u00f3n 1.2.9 y anteriores y FortiOS versi\u00f3n 6.2.1 y anteriores, versi\u00f3n 6.0.8 y anteriores, versi\u00f3n 5.6.12 puede permitir que un atacante autenticado remoto realice un ataque de cross site scripting (XSS) almacenado." } ], "metrics": { diff --git a/CVE-2019/CVE-2019-162xx/CVE-2019-16256.json b/CVE-2019/CVE-2019-162xx/CVE-2019-16256.json index 6c09cec2f6e..ca2dfeb90c8 100644 --- a/CVE-2019/CVE-2019-162xx/CVE-2019-16256.json +++ b/CVE-2019/CVE-2019-162xx/CVE-2019-16256.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-09-12T13:15:10.327", "lastModified": "2025-02-04T20:15:32.740", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-169xx/CVE-2019-16920.json b/CVE-2019/CVE-2019-169xx/CVE-2019-16920.json index faffeae83b0..6bfd02c80aa 100644 --- a/CVE-2019/CVE-2019-169xx/CVE-2019-16920.json +++ b/CVE-2019/CVE-2019-169xx/CVE-2019-16920.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-09-27T12:15:10.017", "lastModified": "2025-02-04T20:15:32.943", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-176xx/CVE-2019-17659.json b/CVE-2019/CVE-2019-176xx/CVE-2019-17659.json index 4c1226deb5e..32f725bfdcd 100644 --- a/CVE-2019/CVE-2019-176xx/CVE-2019-17659.json +++ b/CVE-2019/CVE-2019-176xx/CVE-2019-17659.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-03-17T14:15:16.360", "lastModified": "2025-03-17T14:15:16.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user \"tunneluser\" by leveraging knowledge of the private key from another installation or a firmware image." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el uso de una clave criptogr\u00e1fica codificada en FortiSIEM versi\u00f3n 5.2.6 puede permitir que un atacante remoto no autenticado obtenga acceso SSH al supervisor como el usuario restringido \"tunneluser\" aprovechando el conocimiento de la clave privada de otra instalaci\u00f3n o una imagen de firmware." } ], "metrics": { diff --git a/CVE-2019/CVE-2019-190xx/CVE-2019-19049.json b/CVE-2019/CVE-2019-190xx/CVE-2019-19049.json index 3cbde173c2b..f06ab987b0f 100644 --- a/CVE-2019/CVE-2019-190xx/CVE-2019-19049.json +++ b/CVE-2019/CVE-2019-190xx/CVE-2019-19049.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-11-18T06:15:11.640", "lastModified": "2025-03-07T14:37:52.380", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", diff --git a/CVE-2019/CVE-2019-193xx/CVE-2019-19300.json b/CVE-2019/CVE-2019-193xx/CVE-2019-19300.json index d90c832cccf..e3520705449 100644 --- a/CVE-2019/CVE-2019-193xx/CVE-2019-19300.json +++ b/CVE-2019/CVE-2019-193xx/CVE-2019-19300.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2019/CVE-2019-193xx/CVE-2019-19356.json b/CVE-2019/CVE-2019-193xx/CVE-2019-19356.json index fa498e665b9..30fa1a85eec 100644 --- a/CVE-2019/CVE-2019-193xx/CVE-2019-19356.json +++ b/CVE-2019/CVE-2019-193xx/CVE-2019-19356.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2020-02-07T23:15:10.013", "lastModified": "2025-02-04T21:15:18.653", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-197xx/CVE-2019-19781.json b/CVE-2019/CVE-2019-197xx/CVE-2019-19781.json index d9a4865f099..66902bd2aa3 100644 --- a/CVE-2019/CVE-2019-197xx/CVE-2019-19781.json +++ b/CVE-2019/CVE-2019-197xx/CVE-2019-19781.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-12-27T14:15:12.070", "lastModified": "2025-02-04T20:15:33.733", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-200xx/CVE-2019-20085.json b/CVE-2019/CVE-2019-200xx/CVE-2019-20085.json index 686825a818e..61a0d1c9984 100644 --- a/CVE-2019/CVE-2019-200xx/CVE-2019-20085.json +++ b/CVE-2019/CVE-2019-200xx/CVE-2019-20085.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-12-30T03:15:10.663", "lastModified": "2025-02-04T21:15:18.877", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-66xx/CVE-2019-6697.json b/CVE-2019/CVE-2019-66xx/CVE-2019-6697.json index f9d69d8ef4e..3a22d256526 100644 --- a/CVE-2019/CVE-2019-66xx/CVE-2019-6697.json +++ b/CVE-2019/CVE-2019-66xx/CVE-2019-6697.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-03-17T14:15:16.567", "lastModified": "2025-03-17T14:15:16.567", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Neutralization of Input vulnerability affecting FortiGate version 6.2.0 through 6.2.1, 6.0.0 through 6.0.6 in the hostname parameter of a DHCP packet under DHCP monitor page may allow an unauthenticated attacker in the same network as the FortiGate to perform a Stored Cross Site Scripting attack (XSS) by sending a crafted DHCP packet." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de neutralizaci\u00f3n inadecuada de entrada que afecta a FortiGate versiones 6.2.0 a 6.2.1, 6.0.0 a 6.0.6 en el par\u00e1metro de nombre de host de un paquete DHCP en la p\u00e1gina de monitoreo DHCP puede permitir que un atacante no autenticado en la misma red que FortiGate realice un ataque de cross site scripting (XSS) almacenado enviando un paquete DHCP manipulado." } ], "metrics": { diff --git a/CVE-2019/CVE-2019-72xx/CVE-2019-7286.json b/CVE-2019/CVE-2019-72xx/CVE-2019-7286.json index 48148fced98..cbc51fd02d8 100644 --- a/CVE-2019/CVE-2019-72xx/CVE-2019-7286.json +++ b/CVE-2019/CVE-2019-72xx/CVE-2019-7286.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2019-12-18T18:15:22.067", "lastModified": "2025-01-29T18:15:32.340", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-87xx/CVE-2019-8720.json b/CVE-2019/CVE-2019-87xx/CVE-2019-8720.json index e3e3615753e..38c1901fe4f 100644 --- a/CVE-2019/CVE-2019-87xx/CVE-2019-8720.json +++ b/CVE-2019/CVE-2019-87xx/CVE-2019-8720.json @@ -82,7 +82,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2019/CVE-2019-89xx/CVE-2019-8900.json b/CVE-2019/CVE-2019-89xx/CVE-2019-8900.json index 356310e6e65..18c10544a93 100644 --- a/CVE-2019/CVE-2019-89xx/CVE-2019-8900.json +++ b/CVE-2019/CVE-2019-89xx/CVE-2019-8900.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Un atacante local no autenticado puede aprovechar una vulnerabilidad en la SecureROM de algunos dispositivos Apple para ejecutar c\u00f3digo arbitrario al iniciar dichos dispositivos. Esta vulnerabilidad permite ejecutar c\u00f3digo arbitrario en el dispositivo. Para explotar la vulnerabilidad se requiere acceso f\u00edsico al dispositivo: el dispositivo debe estar conectado a un ordenador al iniciarse y debe estar en modo de actualizaci\u00f3n de firmware del dispositivo (DFU). La vulnerabilidad no es persistente; reiniciar el dispositivo anula cualquier cambio en el software del dispositivo que se haya realizado durante una sesi\u00f3n explotada en el dispositivo. Adem\u00e1s, a menos que un atacante tenga acceso al PIN de desbloqueo o la huella digital del dispositivo, no puede obtener acceso a la informaci\u00f3n protegida por las funciones Secure Enclave o Touch ID de Apple." + "value": "Un atacante local no autenticado puede aprovechar una vulnerabilidad en la SecureROM de algunos dispositivos Apple para ejecutar c\u00f3digo arbitrario al iniciar dichos dispositivos. Esta vulnerabilidad permite ejecutar c\u00f3digo arbitrario en el dispositivo. Para explotar la vulnerabilidad se requiere acceso f\u00edsico al dispositivo: el dispositivo debe estar conectado a un ordenador al iniciarse y debe estar en modo de actualizaci\u00f3n de firmware del dispositivo (DFU). El exploit no es persistente; reiniciar el dispositivo anula cualquier cambio en el software del dispositivo que se haya realizado durante una sesi\u00f3n explotada en el dispositivo. Adem\u00e1s, a menos que un atacante tenga acceso al PIN de desbloqueo o la huella digital del dispositivo, no puede obtener acceso a la informaci\u00f3n protegida por las funciones Secure Enclave o Touch ID de Apple." } ], "metrics": { diff --git a/CVE-2019/CVE-2019-96xx/CVE-2019-9670.json b/CVE-2019/CVE-2019-96xx/CVE-2019-9670.json index ad41401d6b3..46228962535 100644 --- a/CVE-2019/CVE-2019-96xx/CVE-2019-9670.json +++ b/CVE-2019/CVE-2019-96xx/CVE-2019-9670.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-05-29T22:29:01.507", "lastModified": "2025-02-25T02:00:02.097", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-99xx/CVE-2019-9978.json b/CVE-2019/CVE-2019-99xx/CVE-2019-9978.json index ac93945379d..1e393488e6c 100644 --- a/CVE-2019/CVE-2019-99xx/CVE-2019-9978.json +++ b/CVE-2019/CVE-2019-99xx/CVE-2019-9978.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-03-24T15:29:00.243", "lastModified": "2025-02-28T18:06:20.323", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-00xx/CVE-2020-0041.json b/CVE-2020/CVE-2020-00xx/CVE-2020-0041.json index 16072e93530..e6f8d94a078 100644 --- a/CVE-2020/CVE-2020-00xx/CVE-2020-0041.json +++ b/CVE-2020/CVE-2020-00xx/CVE-2020-0041.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@android.com", "published": "2020-03-10T20:15:21.383", "lastModified": "2025-02-07T13:15:28.600", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-06xx/CVE-2020-0618.json b/CVE-2020/CVE-2020-06xx/CVE-2020-0618.json index a858aee36db..f1b15f769d2 100644 --- a/CVE-2020/CVE-2020-06xx/CVE-2020-0618.json +++ b/CVE-2020/CVE-2020-06xx/CVE-2020-0618.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2020-02-11T22:15:13.400", "lastModified": "2024-11-21T04:53:52.117", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-06xx/CVE-2020-0688.json b/CVE-2020/CVE-2020-06xx/CVE-2020-0688.json index 2298032b0ef..1d7353acf4b 100644 --- a/CVE-2020/CVE-2020-06xx/CVE-2020-0688.json +++ b/CVE-2020/CVE-2020-06xx/CVE-2020-0688.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2020-02-11T22:15:15.900", "lastModified": "2025-02-04T19:15:22.067", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-07xx/CVE-2020-0796.json b/CVE-2020/CVE-2020-07xx/CVE-2020-0796.json index 2ac4ee7c8a6..9f30a8e7f33 100644 --- a/CVE-2020/CVE-2020-07xx/CVE-2020-0796.json +++ b/CVE-2020/CVE-2020-07xx/CVE-2020-0796.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2020-03-12T16:15:15.627", "lastModified": "2025-02-04T16:15:32.283", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-08xx/CVE-2020-0878.json b/CVE-2020/CVE-2020-08xx/CVE-2020-0878.json index 3286bc23eea..823de75fdc4 100644 --- a/CVE-2020/CVE-2020-08xx/CVE-2020-0878.json +++ b/CVE-2020/CVE-2020-08xx/CVE-2020-0878.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2020-09-11T17:15:14.370", "lastModified": "2025-03-13T17:28:30.013", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-09xx/CVE-2020-0938.json b/CVE-2020/CVE-2020-09xx/CVE-2020-0938.json index e878526bdfb..966318c156a 100644 --- a/CVE-2020/CVE-2020-09xx/CVE-2020-0938.json +++ b/CVE-2020/CVE-2020-09xx/CVE-2020-0938.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2020-04-15T15:15:16.573", "lastModified": "2025-02-04T19:15:22.510", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-09xx/CVE-2020-0986.json b/CVE-2020/CVE-2020-09xx/CVE-2020-0986.json index 99e315790a7..293a2700126 100644 --- a/CVE-2020/CVE-2020-09xx/CVE-2020-0986.json +++ b/CVE-2020/CVE-2020-09xx/CVE-2020-0986.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2020-06-09T20:15:12.177", "lastModified": "2025-02-07T15:15:15.383", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-101xx/CVE-2020-10181.json b/CVE-2020/CVE-2020-101xx/CVE-2020-10181.json index 10a311a7bc8..96d8b2fb920 100644 --- a/CVE-2020/CVE-2020-101xx/CVE-2020-10181.json +++ b/CVE-2020/CVE-2020-101xx/CVE-2020-10181.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2020-03-11T16:15:12.007", "lastModified": "2025-02-04T20:15:33.990", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-10xx/CVE-2020-1054.json b/CVE-2020/CVE-2020-10xx/CVE-2020-1054.json index 1655381941a..0713e6bbf32 100644 --- a/CVE-2020/CVE-2020-10xx/CVE-2020-1054.json +++ b/CVE-2020/CVE-2020-10xx/CVE-2020-1054.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2020-05-21T23:15:12.070", "lastModified": "2025-02-07T16:15:32.953", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-116xx/CVE-2020-11651.json b/CVE-2020/CVE-2020-116xx/CVE-2020-11651.json index 76d0d4d50d3..7d982292bc3 100644 --- a/CVE-2020/CVE-2020-116xx/CVE-2020-11651.json +++ b/CVE-2020/CVE-2020-116xx/CVE-2020-11651.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2020-04-30T17:15:12.143", "lastModified": "2025-02-07T14:15:47.163", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-116xx/CVE-2020-11652.json b/CVE-2020/CVE-2020-116xx/CVE-2020-11652.json index 5b90cd7d4bd..d60bc0fbd6a 100644 --- a/CVE-2020/CVE-2020-116xx/CVE-2020-11652.json +++ b/CVE-2020/CVE-2020-116xx/CVE-2020-11652.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2020-04-30T17:15:12.190", "lastModified": "2025-02-04T20:15:35.043", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-122xx/CVE-2020-12271.json b/CVE-2020/CVE-2020-122xx/CVE-2020-12271.json index dc45edae3ff..cc356c3102d 100644 --- a/CVE-2020/CVE-2020-122xx/CVE-2020-12271.json +++ b/CVE-2020/CVE-2020-122xx/CVE-2020-12271.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2020-04-27T04:15:10.553", "lastModified": "2025-02-04T20:15:35.810", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-150xx/CVE-2020-15069.json b/CVE-2020/CVE-2020-150xx/CVE-2020-15069.json index afe086ca156..d978fdf1339 100644 --- a/CVE-2020/CVE-2020-150xx/CVE-2020-15069.json +++ b/CVE-2020/CVE-2020-150xx/CVE-2020-15069.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2020-06-29T18:15:12.313", "lastModified": "2025-02-07T02:00:02.403", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-155xx/CVE-2020-15505.json b/CVE-2020/CVE-2020-155xx/CVE-2020-15505.json index 603323e53e9..5480e79668d 100644 --- a/CVE-2020/CVE-2020-155xx/CVE-2020-15505.json +++ b/CVE-2020/CVE-2020-155xx/CVE-2020-15505.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2020-07-07T02:15:10.613", "lastModified": "2025-02-04T20:15:36.467", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-252xx/CVE-2020-25223.json b/CVE-2020/CVE-2020-252xx/CVE-2020-25223.json index 05944e976d5..7088dde7e57 100644 --- a/CVE-2020/CVE-2020-252xx/CVE-2020-25223.json +++ b/CVE-2020/CVE-2020-252xx/CVE-2020-25223.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2020-09-25T04:23:04.857", "lastModified": "2025-02-03T15:15:12.253", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-269xx/CVE-2020-26942.json b/CVE-2020/CVE-2020-269xx/CVE-2020-26942.json index aacdf3dc1b4..3a94d1bad40 100644 --- a/CVE-2020/CVE-2020-269xx/CVE-2020-26942.json +++ b/CVE-2020/CVE-2020-269xx/CVE-2020-26942.json @@ -72,7 +72,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-279xx/CVE-2020-27932.json b/CVE-2020/CVE-2020-279xx/CVE-2020-27932.json index 2848ae8326d..3efee747388 100644 --- a/CVE-2020/CVE-2020-279xx/CVE-2020-27932.json +++ b/CVE-2020/CVE-2020-279xx/CVE-2020-27932.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2020-12-08T21:15:13.903", "lastModified": "2025-01-29T18:15:34.710", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-290xx/CVE-2020-29010.json b/CVE-2020/CVE-2020-290xx/CVE-2020-29010.json index 4804ba2e3f6..72376e1afcf 100644 --- a/CVE-2020/CVE-2020-290xx/CVE-2020-29010.json +++ b/CVE-2020/CVE-2020-290xx/CVE-2020-29010.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-03-17T14:15:16.730", "lastModified": "2025-03-17T14:15:16.730", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An exposure of sensitive information to an unauthorized actor vulnerability in FortiOS version 6.2.4 and below, version 6.0.10 and belowmay allow remote authenticated actors to read the SSL VPN events log entries of users in other VDOMs by executing \"get vpn ssl monitor\" from the CLI. The sensitive data includes usernames, user groups, and IP address." + }, + { + "lang": "es", + "value": "La exposici\u00f3n de informaci\u00f3n confidencial a una vulnerabilidad de un agente no autorizado en FortiOS versi\u00f3n 6.2.4 y anteriores, y versi\u00f3n 6.0.10 y anteriores, podr\u00eda permitir que agentes autenticados remotamente lean las entradas del registro de eventos de SSL VPN de usuarios en otros VDOM mediante la ejecuci\u00f3n de \"get vpn ssl monitor\" desde la CLI. Los datos confidenciales incluyen nombres de usuario, grupos de usuarios y direcciones IP." } ], "metrics": { diff --git a/CVE-2020/CVE-2020-295xx/CVE-2020-29574.json b/CVE-2020/CVE-2020-295xx/CVE-2020-29574.json index 398e0d04de4..a14fbae9392 100644 --- a/CVE-2020/CVE-2020-295xx/CVE-2020-29574.json +++ b/CVE-2020/CVE-2020-295xx/CVE-2020-29574.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2020-12-11T17:15:13.480", "lastModified": "2025-02-07T02:00:02.403", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-295xx/CVE-2020-29583.json b/CVE-2020/CVE-2020-295xx/CVE-2020-29583.json index 08328a5c017..7cd3ea3295c 100644 --- a/CVE-2020/CVE-2020-295xx/CVE-2020-29583.json +++ b/CVE-2020/CVE-2020-295xx/CVE-2020-29583.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2020-12-22T22:15:14.443", "lastModified": "2025-02-04T21:15:19.770", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-357xx/CVE-2020-35730.json b/CVE-2020/CVE-2020-357xx/CVE-2020-35730.json index dd4db999e4f..0f1ad9f3771 100644 --- a/CVE-2020/CVE-2020-357xx/CVE-2020-35730.json +++ b/CVE-2020/CVE-2020-357xx/CVE-2020-35730.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2020-12-28T20:15:13.150", "lastModified": "2025-02-28T18:06:00.523", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-361xx/CVE-2020-36193.json b/CVE-2020/CVE-2020-361xx/CVE-2020-36193.json index 9012992eeb6..c2269d09f62 100644 --- a/CVE-2020/CVE-2020-361xx/CVE-2020-36193.json +++ b/CVE-2020/CVE-2020-361xx/CVE-2020-36193.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2021-01-18T20:15:12.667", "lastModified": "2025-02-04T21:15:20.297", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-368xx/CVE-2020-36843.json b/CVE-2020/CVE-2020-368xx/CVE-2020-36843.json index ea92438994c..eee81cb2fa7 100644 --- a/CVE-2020/CVE-2020-368xx/CVE-2020-36843.json +++ b/CVE-2020/CVE-2020-368xx/CVE-2020-36843.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-13T06:15:34.043", "lastModified": "2025-03-13T06:15:34.043", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-43xx/CVE-2020-4316.json b/CVE-2020/CVE-2020-43xx/CVE-2020-4316.json index 24bdb219b3d..eb163faae72 100644 --- a/CVE-2020/CVE-2020-43xx/CVE-2020-4316.json +++ b/CVE-2020/CVE-2020-43xx/CVE-2020-4316.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2020-07-16T15:15:27.987", "lastModified": "2024-11-21T05:32:34.610", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-48xx/CVE-2020-4874.json b/CVE-2020/CVE-2020-48xx/CVE-2020-4874.json index bb539ab217d..db5f125495a 100644 --- a/CVE-2020/CVE-2020-48xx/CVE-2020-4874.json +++ b/CVE-2020/CVE-2020-48xx/CVE-2020-4874.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-49xx/CVE-2020-4914.json b/CVE-2020/CVE-2020-49xx/CVE-2020-4914.json index d1a37da503d..409ae9ea30e 100644 --- a/CVE-2020/CVE-2020-49xx/CVE-2020-4914.json +++ b/CVE-2020/CVE-2020-49xx/CVE-2020-4914.json @@ -88,7 +88,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-59xx/CVE-2020-5902.json b/CVE-2020/CVE-2020-59xx/CVE-2020-5902.json index 175ca50a2d7..a67f900d6eb 100644 --- a/CVE-2020/CVE-2020-59xx/CVE-2020-5902.json +++ b/CVE-2020/CVE-2020-59xx/CVE-2020-5902.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2020-07-01T15:15:15.360", "lastModified": "2025-01-29T21:15:09.890", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-72xx/CVE-2020-7247.json b/CVE-2020/CVE-2020-72xx/CVE-2020-7247.json index 0ecdb1329a2..3f1116b02bd 100644 --- a/CVE-2020/CVE-2020-72xx/CVE-2020-7247.json +++ b/CVE-2020/CVE-2020-72xx/CVE-2020-7247.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2020-01-29T16:15:12.897", "lastModified": "2025-02-04T21:15:20.550", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-85xx/CVE-2020-8515.json b/CVE-2020/CVE-2020-85xx/CVE-2020-8515.json index 1cab59912d8..4fd764c4c22 100644 --- a/CVE-2020/CVE-2020-85xx/CVE-2020-8515.json +++ b/CVE-2020/CVE-2020-85xx/CVE-2020-8515.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2020-02-01T13:15:12.623", "lastModified": "2025-02-28T18:05:08.880", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-92xx/CVE-2020-9295.json b/CVE-2020/CVE-2020-92xx/CVE-2020-9295.json index f1822b22056..853395d78be 100644 --- a/CVE-2020/CVE-2020-92xx/CVE-2020-9295.json +++ b/CVE-2020/CVE-2020-92xx/CVE-2020-9295.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-03-17T14:15:16.903", "lastModified": "2025-03-17T14:15:16.903", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "FortiOS 6.2 running AV engine version 6.00142 and below, FortiOS 6.4 running AV engine version 6.00144 and below and FortiClient 6.2 running AV engine version 6.00137 and below may not immediately detect certain types of malformed or non-standard RAR archives, potentially containing malicious files. Based on the samples provided, FortiClient will detect the malicious files upon trying extraction by real-time scanning and FortiGate will detect the malicious archive if Virus Outbreak Prevention is enabled." + }, + { + "lang": "es", + "value": "Es posible que FortiOS 6.2 con motor antivirus versi\u00f3n 6.00142 o inferior, FortiOS 6.4 con motor antivirus versi\u00f3n 6.00144 o inferior y FortiClient 6.2 con motor antivirus versi\u00f3n 6.00137 o inferior no detecten inmediatamente ciertos tipos de archivos RAR malformados o no est\u00e1ndar que podr\u00edan contener archivos maliciosos. Con base en las muestras proporcionadas, FortiClient detectar\u00e1 los archivos maliciosos al intentar extraerlos mediante an\u00e1lisis en tiempo real y FortiGate detectar\u00e1 el archivo malicioso si la Prevenci\u00f3n de Brotes de Virus est\u00e1 activada." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-09xx/CVE-2021-0920.json b/CVE-2021/CVE-2021-09xx/CVE-2021-0920.json index 549ebf60b63..b29a229f9bc 100644 --- a/CVE-2021/CVE-2021-09xx/CVE-2021-0920.json +++ b/CVE-2021/CVE-2021-09xx/CVE-2021-0920.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@android.com", "published": "2021-12-15T19:15:11.017", "lastModified": "2025-02-04T19:15:23.463", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-10xx/CVE-2021-1048.json b/CVE-2021/CVE-2021-10xx/CVE-2021-1048.json index 5dff3b6bcfb..0e19986feb9 100644 --- a/CVE-2021/CVE-2021-10xx/CVE-2021-1048.json +++ b/CVE-2021/CVE-2021-10xx/CVE-2021-1048.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@android.com", "published": "2021-12-15T19:15:14.917", "lastModified": "2025-02-04T20:15:39.623", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-200xx/CVE-2021-20022.json b/CVE-2021/CVE-2021-200xx/CVE-2021-20022.json index 2eea6f43dd0..49773476008 100644 --- a/CVE-2021/CVE-2021-200xx/CVE-2021-20022.json +++ b/CVE-2021/CVE-2021-200xx/CVE-2021-20022.json @@ -111,7 +111,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-200xx/CVE-2021-20038.json b/CVE-2021/CVE-2021-200xx/CVE-2021-20038.json index be1d318d560..29f2424805b 100644 --- a/CVE-2021/CVE-2021-200xx/CVE-2021-20038.json +++ b/CVE-2021/CVE-2021-200xx/CVE-2021-20038.json @@ -111,7 +111,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-204xx/CVE-2021-20451.json b/CVE-2021/CVE-2021-204xx/CVE-2021-20451.json index 1fa83a59a73..5f271acf48f 100644 --- a/CVE-2021/CVE-2021-204xx/CVE-2021-20451.json +++ b/CVE-2021/CVE-2021-204xx/CVE-2021-20451.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-220xx/CVE-2021-22017.json b/CVE-2021/CVE-2021-220xx/CVE-2021-22017.json index 7fd9f755663..b672f05b681 100644 --- a/CVE-2021/CVE-2021-220xx/CVE-2021-22017.json +++ b/CVE-2021/CVE-2021-220xx/CVE-2021-22017.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vmware.com", "published": "2021-09-23T13:15:08.207", "lastModified": "2025-01-29T18:15:39.913", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-221xx/CVE-2021-22126.json b/CVE-2021/CVE-2021-221xx/CVE-2021-22126.json index 9008ed64096..28584c8fd4a 100644 --- a/CVE-2021/CVE-2021-221xx/CVE-2021-22126.json +++ b/CVE-2021/CVE-2021-221xx/CVE-2021-22126.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-03-17T14:15:17.067", "lastModified": "2025-03-17T14:15:17.067", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use of hard-coded password vulnerability in FortiWLC version 8.5.2 and below, version 8.4.8 and below, version 8.3.3 to 8.3.2, version 8.2.7 to 8.2.6 may allow a local, authenticated attacker to connect to the managed Access Point (Meru AP and FortiAP-U) as root using the default hard-coded username and password." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el uso de contrase\u00f1a codificada de forma r\u00edgida en FortiWLC versi\u00f3n 8.5.2 y anteriores, versi\u00f3n 8.4.8 y anteriores, versi\u00f3n 8.3.3 a 8.3.2, versi\u00f3n 8.2.7 a 8.2.6 puede permitir que un atacante local autenticado se conecte al punto de acceso administrado (Meru AP y FortiAP-U) como root usando el nombre de usuario y la contrase\u00f1a codificados de forma r\u00edgida predeterminados." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-229xx/CVE-2021-22986.json b/CVE-2021/CVE-2021-229xx/CVE-2021-22986.json index f5b6e33ed5c..ebb110ef234 100644 --- a/CVE-2021/CVE-2021-229xx/CVE-2021-22986.json +++ b/CVE-2021/CVE-2021-229xx/CVE-2021-22986.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2021-03-31T15:15:15.153", "lastModified": "2025-01-29T21:15:10.697", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-229xx/CVE-2021-22991.json b/CVE-2021/CVE-2021-229xx/CVE-2021-22991.json index f4e5a399e52..e12d822b092 100644 --- a/CVE-2021/CVE-2021-229xx/CVE-2021-22991.json +++ b/CVE-2021/CVE-2021-229xx/CVE-2021-22991.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2021-03-31T18:15:14.787", "lastModified": "2025-01-29T21:15:10.903", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-256xx/CVE-2021-25664.json b/CVE-2021/CVE-2021-256xx/CVE-2021-25664.json index 6838ea5e48d..5c0ef0b6abc 100644 --- a/CVE-2021/CVE-2021-256xx/CVE-2021-25664.json +++ b/CVE-2021/CVE-2021-256xx/CVE-2021-25664.json @@ -131,7 +131,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-260xx/CVE-2021-26087.json b/CVE-2021/CVE-2021-260xx/CVE-2021-26087.json index 37384432b69..0009adf24b0 100644 --- a/CVE-2021/CVE-2021-260xx/CVE-2021-26087.json +++ b/CVE-2021/CVE-2021-260xx/CVE-2021-26087.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-03-17T14:15:17.247", "lastModified": "2025-03-17T14:15:17.247", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of input during web page generation in FortiWLC version 8.6.0, version 8.5.3 and below, version 8.4.8 and below, version 8.3.3 web interface may allow both authenticated remote attackers and non-authenticated attackers in the same network as the appliance to perform a stored cross site scripting attack (XSS) via injecting malicious payloads in different locations." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web en la interfaz web de FortiWLC versi\u00f3n 8.6.0, versi\u00f3n 8.5.3 y anteriores, versi\u00f3n 8.4.8 y anteriores, versi\u00f3n 8.3.3 puede permitir que tanto atacantes remotos autenticados como atacantes no autenticados en la misma red que el dispositivo realicen un ataque de cross site scripting (XSS) almacenado mediante la inyecci\u00f3n de payloads maliciosos en diferentes ubicaciones." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-270xx/CVE-2021-27065.json b/CVE-2021/CVE-2021-270xx/CVE-2021-27065.json index 287c0f4f479..f5f8b6a84d1 100644 --- a/CVE-2021/CVE-2021-270xx/CVE-2021-27065.json +++ b/CVE-2021/CVE-2021-270xx/CVE-2021-27065.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2021-03-03T00:15:12.307", "lastModified": "2025-03-07T21:59:37.343", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-271xx/CVE-2021-27101.json b/CVE-2021/CVE-2021-271xx/CVE-2021-27101.json index 6fa6360d493..9a532e87101 100644 --- a/CVE-2021/CVE-2021-271xx/CVE-2021-27101.json +++ b/CVE-2021/CVE-2021-271xx/CVE-2021-27101.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2021-02-16T21:15:13.077", "lastModified": "2025-02-03T17:15:11.897", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-286xx/CVE-2021-28664.json b/CVE-2021/CVE-2021-286xx/CVE-2021-28664.json index dbf08ecde7f..9771a34d8e4 100644 --- a/CVE-2021/CVE-2021-286xx/CVE-2021-28664.json +++ b/CVE-2021/CVE-2021-286xx/CVE-2021-28664.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2021-05-10T15:15:07.590", "lastModified": "2025-02-03T15:15:13.273", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-292xx/CVE-2021-29256.json b/CVE-2021/CVE-2021-292xx/CVE-2021-29256.json index 2c2b9d029ae..2977c8ed347 100644 --- a/CVE-2021/CVE-2021-292xx/CVE-2021-29256.json +++ b/CVE-2021/CVE-2021-292xx/CVE-2021-29256.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2021-05-24T18:15:08.033", "lastModified": "2025-02-04T20:15:42.447", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-301xx/CVE-2021-30184.json b/CVE-2021/CVE-2021-301xx/CVE-2021-30184.json index 6f7141307f3..0bbd38e083c 100644 --- a/CVE-2021/CVE-2021-301xx/CVE-2021-30184.json +++ b/CVE-2021/CVE-2021-301xx/CVE-2021-30184.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2021-04-07T12:15:16.437", "lastModified": "2025-01-12T21:15:18.060", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-312xx/CVE-2021-31207.json b/CVE-2021/CVE-2021-312xx/CVE-2021-31207.json index 4a7d44e8a7e..10eda2ff4ce 100644 --- a/CVE-2021/CVE-2021-312xx/CVE-2021-31207.json +++ b/CVE-2021/CVE-2021-312xx/CVE-2021-31207.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2021-05-11T19:15:10.397", "lastModified": "2025-03-13T16:41:49.303", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-319xx/CVE-2021-31979.json b/CVE-2021/CVE-2021-319xx/CVE-2021-31979.json index da5ee5ce5de..fe52ac79b4c 100644 --- a/CVE-2021/CVE-2021-319xx/CVE-2021-31979.json +++ b/CVE-2021/CVE-2021-319xx/CVE-2021-31979.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2021-07-14T18:15:09.597", "lastModified": "2025-02-07T17:15:21.370", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-31xx/CVE-2021-3156.json b/CVE-2021/CVE-2021-31xx/CVE-2021-3156.json index fc91b3925ed..21132167121 100644 --- a/CVE-2021/CVE-2021-31xx/CVE-2021-3156.json +++ b/CVE-2021/CVE-2021-31xx/CVE-2021-3156.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2021-01-26T21:15:12.987", "lastModified": "2025-02-03T17:15:12.143", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-325xx/CVE-2021-32584.json b/CVE-2021/CVE-2021-325xx/CVE-2021-32584.json index b35380bfee8..2b8bab568d8 100644 --- a/CVE-2021/CVE-2021-325xx/CVE-2021-32584.json +++ b/CVE-2021/CVE-2021-325xx/CVE-2021-32584.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-03-17T14:15:17.413", "lastModified": "2025-03-17T14:15:17.413", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper access control (CWE-284) vulnerability in FortiWLC version 8.6.0, version 8.5.3 and below, version 8.4.8 and below, version 8.3.3 and below, version 8.2.7 to 8.2.4, version 8.1.3 may allow an unauthenticated and remote attacker to access certain areas of the web management CGI functionality by just specifying the correct URL. The vulnerability applies only to limited CGI resources and might allow the unauthorized party to access configuration details." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de control de acceso indebido (CWE-284) en FortiWLC versi\u00f3n 8.6.0, 8.5.3 y anteriores, 8.4.8 y anteriores, 8.3.3 y anteriores, 8.2.7 a 8.2.4 y 8.1.3 podr\u00eda permitir que un atacante remoto no autenticado acceda a ciertas \u00e1reas de la funcionalidad CGI de administraci\u00f3n web simplemente especificando la URL correcta. Esta vulnerabilidad afecta \u00fanicamente a recursos CGI limitados y podr\u00eda permitir que un tercero no autorizado acceda a los detalles de configuraci\u00f3n." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-325xx/CVE-2021-32589.json b/CVE-2021/CVE-2021-325xx/CVE-2021-32589.json index 24595310b9f..2d267e2a103 100644 --- a/CVE-2021/CVE-2021-325xx/CVE-2021-32589.json +++ b/CVE-2021/CVE-2021-325xx/CVE-2021-32589.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@fortinet.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-353xx/CVE-2021-35395.json b/CVE-2021/CVE-2021-353xx/CVE-2021-35395.json index 03b49fa2297..19e39b73046 100644 --- a/CVE-2021/CVE-2021-353xx/CVE-2021-35395.json +++ b/CVE-2021/CVE-2021-353xx/CVE-2021-35395.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2021-08-16T12:15:07.300", "lastModified": "2025-02-04T20:15:43.577", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-374xx/CVE-2021-37415.json b/CVE-2021/CVE-2021-374xx/CVE-2021-37415.json index 6d6e84ddee9..3a79b1e1233 100644 --- a/CVE-2021/CVE-2021-374xx/CVE-2021-37415.json +++ b/CVE-2021/CVE-2021-374xx/CVE-2021-37415.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2021-09-01T06:15:06.530", "lastModified": "2025-02-03T16:15:31.193", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-393xx/CVE-2021-39350.json b/CVE-2021/CVE-2021-393xx/CVE-2021-39350.json index c231b61a4aa..439f8e5002d 100644 --- a/CVE-2021/CVE-2021-393xx/CVE-2021-39350.json +++ b/CVE-2021/CVE-2021-393xx/CVE-2021-39350.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-397xx/CVE-2021-39793.json b/CVE-2021/CVE-2021-397xx/CVE-2021-39793.json index f78a8f550c2..4d76bbc728a 100644 --- a/CVE-2021/CVE-2021-397xx/CVE-2021-39793.json +++ b/CVE-2021/CVE-2021-397xx/CVE-2021-39793.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@android.com", "published": "2022-03-16T15:15:12.430", "lastModified": "2025-01-29T17:15:15.360", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-404xx/CVE-2021-40407.json b/CVE-2021/CVE-2021-404xx/CVE-2021-40407.json index c045ea8029c..ec6d129e221 100644 --- a/CVE-2021/CVE-2021-404xx/CVE-2021-40407.json +++ b/CVE-2021/CVE-2021-404xx/CVE-2021-40407.json @@ -3,7 +3,7 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2022-01-28T20:15:11.607", "lastModified": "2024-12-19T02:00:02.193", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-405xx/CVE-2021-40539.json b/CVE-2021/CVE-2021-405xx/CVE-2021-40539.json index e5123aaf1f1..4e52ed8d3d9 100644 --- a/CVE-2021/CVE-2021-405xx/CVE-2021-40539.json +++ b/CVE-2021/CVE-2021-405xx/CVE-2021-40539.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2021-09-07T17:15:07.367", "lastModified": "2025-02-03T16:15:31.417", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-408xx/CVE-2021-40870.json b/CVE-2021/CVE-2021-408xx/CVE-2021-40870.json index 8737a00ceb5..6531d0e2b7f 100644 --- a/CVE-2021/CVE-2021-408xx/CVE-2021-40870.json +++ b/CVE-2021/CVE-2021-408xx/CVE-2021-40870.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2021-09-13T08:15:13.913", "lastModified": "2025-02-04T20:15:44.023", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-422xx/CVE-2021-42237.json b/CVE-2021/CVE-2021-422xx/CVE-2021-42237.json index 2f24a53ec23..091083b5065 100644 --- a/CVE-2021/CVE-2021-422xx/CVE-2021-42237.json +++ b/CVE-2021/CVE-2021-422xx/CVE-2021-42237.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2021-11-05T10:15:08.240", "lastModified": "2025-02-03T16:15:31.637", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-438xx/CVE-2021-43819.json b/CVE-2021/CVE-2021-438xx/CVE-2021-43819.json index feb5607affc..318ce039248 100644 --- a/CVE-2021/CVE-2021-438xx/CVE-2021-43819.json +++ b/CVE-2021/CVE-2021-438xx/CVE-2021-43819.json @@ -88,7 +88,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-442xx/CVE-2021-44228.json b/CVE-2021/CVE-2021-442xx/CVE-2021-44228.json index 57ce1292bf1..08b8de6a13a 100644 --- a/CVE-2021/CVE-2021-442xx/CVE-2021-44228.json +++ b/CVE-2021/CVE-2021-442xx/CVE-2021-44228.json @@ -91,7 +91,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-450xx/CVE-2021-45046.json b/CVE-2021/CVE-2021-450xx/CVE-2021-45046.json index fd60cb1e072..7348dc88670 100644 --- a/CVE-2021/CVE-2021-450xx/CVE-2021-45046.json +++ b/CVE-2021/CVE-2021-450xx/CVE-2021-45046.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2021-12-14T19:15:07.733", "lastModified": "2025-03-12T19:52:00.270", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-453xx/CVE-2021-45382.json b/CVE-2021/CVE-2021-453xx/CVE-2021-45382.json index 3e8031d246a..78da1d1c79a 100644 --- a/CVE-2021/CVE-2021-453xx/CVE-2021-45382.json +++ b/CVE-2021/CVE-2021-453xx/CVE-2021-45382.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-02-17T21:15:07.737", "lastModified": "2025-01-29T21:15:11.770", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46973.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46973.json index 35a72771cf3..b2897fd6695 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46973.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46973.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47201.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47201.json index 472b01fb5fb..ec545522119 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47201.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47201.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.123", "lastModified": "2024-11-21T06:35:37.100", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47203.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47203.json index b6034ba707e..a753aab765f 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47203.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47203.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.217", "lastModified": "2024-11-21T06:35:37.340", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47209.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47209.json index 1b1c7fab70e..f73960f6959 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47209.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47209.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.447", "lastModified": "2024-11-21T06:35:38.130", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47210.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47210.json index b1fecc1e767..88e63abe9c9 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47210.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47210.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.497", "lastModified": "2024-11-21T06:35:38.243", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47212.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47212.json index 377aba75ffc..98586f77213 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47212.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47212.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.597", "lastModified": "2024-11-21T06:35:38.460", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47214.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47214.json index d156c4f248b..ebd41264e1a 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47214.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47214.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.680", "lastModified": "2024-11-21T06:35:38.583", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47215.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47215.json index a6db7b1c564..ff6b2a4d4eb 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47215.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47215.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.727", "lastModified": "2024-11-21T06:35:38.693", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-02xx/CVE-2022-0209.json b/CVE-2022/CVE-2022-02xx/CVE-2022-0209.json index e314b433657..0252efd2d3c 100644 --- a/CVE-2022/CVE-2022-02xx/CVE-2022-0209.json +++ b/CVE-2022/CVE-2022-02xx/CVE-2022-0209.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-08xx/CVE-2022-0847.json b/CVE-2022/CVE-2022-08xx/CVE-2022-0847.json index c9682f9bab4..e3e10156d6c 100644 --- a/CVE-2022/CVE-2022-08xx/CVE-2022-0847.json +++ b/CVE-2022/CVE-2022-08xx/CVE-2022-0847.json @@ -111,7 +111,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-13xx/CVE-2022-1388.json b/CVE-2022/CVE-2022-13xx/CVE-2022-1388.json index 7a00dea7fd5..73a60a9f16e 100644 --- a/CVE-2022/CVE-2022-13xx/CVE-2022-1388.json +++ b/CVE-2022/CVE-2022-13xx/CVE-2022-1388.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2022-05-05T17:15:10.570", "lastModified": "2024-11-21T06:40:37.770", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20685.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20685.json index 3a8014dce9b..6f4554e0ddf 100644 --- a/CVE-2022/CVE-2022-206xx/CVE-2022-20685.json +++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20685.json @@ -72,7 +72,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-215xx/CVE-2022-21587.json b/CVE-2022/CVE-2022-215xx/CVE-2022-21587.json index 138346357ed..a389bdd0aa8 100644 --- a/CVE-2022/CVE-2022-215xx/CVE-2022-21587.json +++ b/CVE-2022/CVE-2022-215xx/CVE-2022-21587.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2022-10-18T21:15:10.960", "lastModified": "2025-03-12T19:39:15.827", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-224xx/CVE-2022-22491.json b/CVE-2022/CVE-2022-224xx/CVE-2022-22491.json index c34912b1e74..6be1706a1ab 100644 --- a/CVE-2022/CVE-2022-224xx/CVE-2022-22491.json +++ b/CVE-2022/CVE-2022-224xx/CVE-2022-22491.json @@ -72,7 +72,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-225xx/CVE-2022-22536.json b/CVE-2022/CVE-2022-225xx/CVE-2022-22536.json index cf70632eb2e..c459ffd80d3 100644 --- a/CVE-2022/CVE-2022-225xx/CVE-2022-22536.json +++ b/CVE-2022/CVE-2022-225xx/CVE-2022-22536.json @@ -91,7 +91,7 @@ "weaknesses": [ { "source": "cna@sap.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-246xx/CVE-2022-24682.json b/CVE-2022/CVE-2022-246xx/CVE-2022-24682.json index 0ea84b9b795..59bd42f4fda 100644 --- a/CVE-2022/CVE-2022-246xx/CVE-2022-24682.json +++ b/CVE-2022/CVE-2022-246xx/CVE-2022-24682.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-02-09T04:15:07.400", "lastModified": "2025-02-27T02:00:01.920", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-249xx/CVE-2022-24990.json b/CVE-2022/CVE-2022-249xx/CVE-2022-24990.json index 18e5e60be84..52f89e09522 100644 --- a/CVE-2022/CVE-2022-249xx/CVE-2022-24990.json +++ b/CVE-2022/CVE-2022-249xx/CVE-2022-24990.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2023-02-07T18:15:09.100", "lastModified": "2025-02-03T15:15:13.737", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25147.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25147.json index 554fdec3736..80eaa1bbb5b 100644 --- a/CVE-2022/CVE-2022-251xx/CVE-2022-25147.json +++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25147.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-25xx/CVE-2022-2525.json b/CVE-2022/CVE-2022-25xx/CVE-2022-2525.json index 03bd3ba4287..c036267caa5 100644 --- a/CVE-2022/CVE-2022-25xx/CVE-2022-2525.json +++ b/CVE-2022/CVE-2022-25xx/CVE-2022-2525.json @@ -90,7 +90,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-265xx/CVE-2022-26500.json b/CVE-2022/CVE-2022-265xx/CVE-2022-26500.json index 224de999610..fded4192513 100644 --- a/CVE-2022/CVE-2022-265xx/CVE-2022-26500.json +++ b/CVE-2022/CVE-2022-265xx/CVE-2022-26500.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-03-17T21:15:08.193", "lastModified": "2025-02-03T16:15:32.213", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-279xx/CVE-2022-27924.json b/CVE-2022/CVE-2022-279xx/CVE-2022-27924.json index 77ee2e3d8a3..2986d24499c 100644 --- a/CVE-2022/CVE-2022-279xx/CVE-2022-27924.json +++ b/CVE-2022/CVE-2022-279xx/CVE-2022-27924.json @@ -101,7 +101,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-286xx/CVE-2022-28685.json b/CVE-2022/CVE-2022-286xx/CVE-2022-28685.json index 1f5d4bcc2eb..f9b03ce168b 100644 --- a/CVE-2022/CVE-2022-286xx/CVE-2022-28685.json +++ b/CVE-2022/CVE-2022-286xx/CVE-2022-28685.json @@ -90,7 +90,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-288xx/CVE-2022-28810.json b/CVE-2022/CVE-2022-288xx/CVE-2022-28810.json index 49ea3c0a50a..13970cab0f6 100644 --- a/CVE-2022/CVE-2022-288xx/CVE-2022-28810.json +++ b/CVE-2022/CVE-2022-288xx/CVE-2022-28810.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-04-18T13:15:08.233", "lastModified": "2025-01-29T17:15:19.410", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-28xx/CVE-2022-2837.json b/CVE-2022/CVE-2022-28xx/CVE-2022-2837.json index c978eac09ee..fa308b0c49a 100644 --- a/CVE-2022/CVE-2022-28xx/CVE-2022-2837.json +++ b/CVE-2022/CVE-2022-28xx/CVE-2022-2837.json @@ -78,7 +78,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29059.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29059.json index dafb098f62c..0ed351decbc 100644 --- a/CVE-2022/CVE-2022-290xx/CVE-2022-29059.json +++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29059.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-03-14T16:15:27.027", "lastModified": "2025-03-14T16:15:27.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of special elements used in an SQL command\u00a0('SQL Injection') vulnerability [CWE-89] in FortiWeb version 7.0.1 and below, 6.4.2 and below, 6.3.20 and below, 6.2.7 and below may allow a privileged attacker to execute SQL commands over the log database via specifically crafted strings parameters." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('SQL Injection') [CWE-89] en FortiWeb versi\u00f3n 7.0.1 y anteriores, 6.4.2 y anteriores, 6.3.20 y anteriores, 6.2.7 y anteriores puede permitir que un atacante privilegiado ejecute comandos SQL sobre la base de datos de registros a trav\u00e9s de par\u00e1metros de cadenas espec\u00edficamente manipulados." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29081.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29081.json index d7281d5950f..4846ce21242 100644 --- a/CVE-2022/CVE-2022-290xx/CVE-2022-29081.json +++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29081.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-04-28T20:15:08.017", "lastModified": "2025-01-13T16:23:00.453", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-294xx/CVE-2022-29464.json b/CVE-2022/CVE-2022-294xx/CVE-2022-29464.json index 27cd2e9265a..a2aebf3778c 100644 --- a/CVE-2022/CVE-2022-294xx/CVE-2022-29464.json +++ b/CVE-2022/CVE-2022-294xx/CVE-2022-29464.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-04-18T22:15:09.027", "lastModified": "2025-01-29T21:15:14.070", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-294xx/CVE-2022-29489.json b/CVE-2022/CVE-2022-294xx/CVE-2022-29489.json index 6a2e3fbaa3b..4ad44ed4174 100644 --- a/CVE-2022/CVE-2022-294xx/CVE-2022-29489.json +++ b/CVE-2022/CVE-2022-294xx/CVE-2022-29489.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30170.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30170.json index 17a88f9957d..f76a8a2b63d 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30170.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30170.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-338xx/CVE-2022-33891.json b/CVE-2022/CVE-2022-338xx/CVE-2022-33891.json index 1c5c486dfb2..fb1bfd8d596 100644 --- a/CVE-2022/CVE-2022-338xx/CVE-2022-33891.json +++ b/CVE-2022/CVE-2022-338xx/CVE-2022-33891.json @@ -86,7 +86,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-339xx/CVE-2022-33954.json b/CVE-2022/CVE-2022-339xx/CVE-2022-33954.json index 000f71e0802..50f87bd396a 100644 --- a/CVE-2022/CVE-2022-339xx/CVE-2022-33954.json +++ b/CVE-2022/CVE-2022-339xx/CVE-2022-33954.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-12-19T01:15:06.773", "lastModified": "2024-12-19T01:15:06.773", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-343xx/CVE-2022-34321.json b/CVE-2022/CVE-2022-343xx/CVE-2022-34321.json index 1d07e15447d..60122f3a400 100644 --- a/CVE-2022/CVE-2022-343xx/CVE-2022-34321.json +++ b/CVE-2022/CVE-2022-343xx/CVE-2022-34321.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-344xx/CVE-2022-34412.json b/CVE-2022/CVE-2022-344xx/CVE-2022-34412.json index 662b6786495..ce45904a0ac 100644 --- a/CVE-2022/CVE-2022-344xx/CVE-2022-34412.json +++ b/CVE-2022/CVE-2022-344xx/CVE-2022-34412.json @@ -98,7 +98,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34821.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34821.json index 221caec25e9..6c87b7003e1 100644 --- a/CVE-2022/CVE-2022-348xx/CVE-2022-34821.json +++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34821.json @@ -141,7 +141,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-354xx/CVE-2022-35405.json b/CVE-2022/CVE-2022-354xx/CVE-2022-35405.json index 37ee51a193f..d9c435e583f 100644 --- a/CVE-2022/CVE-2022-354xx/CVE-2022-35405.json +++ b/CVE-2022/CVE-2022-354xx/CVE-2022-35405.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-07-19T15:15:08.680", "lastModified": "2025-01-28T22:15:10.200", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-360xx/CVE-2022-36028.json b/CVE-2022/CVE-2022-360xx/CVE-2022-36028.json index 37362a68ce1..36f6364fd49 100644 --- a/CVE-2022/CVE-2022-360xx/CVE-2022-36028.json +++ b/CVE-2022/CVE-2022-360xx/CVE-2022-36028.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-25T21:15:46.327", "lastModified": "2024-11-21T07:12:13.090", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-360xx/CVE-2022-36029.json b/CVE-2022/CVE-2022-360xx/CVE-2022-36029.json index d1e81256233..26f234da551 100644 --- a/CVE-2022/CVE-2022-360xx/CVE-2022-36029.json +++ b/CVE-2022/CVE-2022-360xx/CVE-2022-36029.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-25T21:15:46.523", "lastModified": "2024-11-21T07:12:13.233", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37355.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37355.json index ab5e9b17750..1db32959495 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37355.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37355.json @@ -60,7 +60,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-381xx/CVE-2022-38181.json b/CVE-2022/CVE-2022-381xx/CVE-2022-38181.json index 93cdbf90b28..9929c5dd7c9 100644 --- a/CVE-2022/CVE-2022-381xx/CVE-2022-38181.json +++ b/CVE-2022/CVE-2022-381xx/CVE-2022-38181.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-10-25T19:15:11.487", "lastModified": "2025-02-03T15:15:14.263", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-387xx/CVE-2022-38745.json b/CVE-2022/CVE-2022-387xx/CVE-2022-38745.json index 83ed6e60a5a..eacc909ad3d 100644 --- a/CVE-2022/CVE-2022-387xx/CVE-2022-38745.json +++ b/CVE-2022/CVE-2022-387xx/CVE-2022-38745.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-402xx/CVE-2022-40201.json b/CVE-2022/CVE-2022-402xx/CVE-2022-40201.json index 66b090d755f..8df1443dff6 100644 --- a/CVE-2022/CVE-2022-402xx/CVE-2022-40201.json +++ b/CVE-2022/CVE-2022-402xx/CVE-2022-40201.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "ics-cert@hq.dhs.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-402xx/CVE-2022-40211.json b/CVE-2022/CVE-2022-402xx/CVE-2022-40211.json index aeeca8d7c08..5fa0727fa90 100644 --- a/CVE-2022/CVE-2022-402xx/CVE-2022-40211.json +++ b/CVE-2022/CVE-2022-402xx/CVE-2022-40211.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-403xx/CVE-2022-40300.json b/CVE-2022/CVE-2022-403xx/CVE-2022-40300.json index 43efd61311d..240c0621587 100644 --- a/CVE-2022/CVE-2022-403xx/CVE-2022-40300.json +++ b/CVE-2022/CVE-2022-403xx/CVE-2022-40300.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-09-16T23:15:11.553", "lastModified": "2025-01-13T16:23:00.453", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json index aeab9314491..74776f13751 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2022-10-03T01:15:08.843", "lastModified": "2025-03-07T16:15:36.047", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-413xx/CVE-2022-41352.json b/CVE-2022/CVE-2022-413xx/CVE-2022-41352.json index 9b84c6ce340..8c7fe8851ec 100644 --- a/CVE-2022/CVE-2022-413xx/CVE-2022-41352.json +++ b/CVE-2022/CVE-2022-413xx/CVE-2022-41352.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-09-26T02:15:10.733", "lastModified": "2025-02-25T02:00:02.097", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-416xx/CVE-2022-41613.json b/CVE-2022/CVE-2022-416xx/CVE-2022-41613.json index 08b586994ce..ef18447238d 100644 --- a/CVE-2022/CVE-2022-416xx/CVE-2022-41613.json +++ b/CVE-2022/CVE-2022-416xx/CVE-2022-41613.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "ics-cert@hq.dhs.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-416xx/CVE-2022-41696.json b/CVE-2022/CVE-2022-416xx/CVE-2022-41696.json index 133d3688370..b48c173052c 100644 --- a/CVE-2022/CVE-2022-416xx/CVE-2022-41696.json +++ b/CVE-2022/CVE-2022-416xx/CVE-2022-41696.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-418xx/CVE-2022-41889.json b/CVE-2022/CVE-2022-418xx/CVE-2022-41889.json index 00d0063c93e..b30a0e41b3f 100644 --- a/CVE-2022/CVE-2022-418xx/CVE-2022-41889.json +++ b/CVE-2022/CVE-2022-418xx/CVE-2022-41889.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4118.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4118.json index 6693e6fdc7d..47d6f196887 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4118.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4118.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4134.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4134.json index 5305b721006..c339dd38604 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4134.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4134.json @@ -78,7 +78,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4265.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4265.json index bb18a493596..31227c74ba5 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4265.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4265.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-433xx/CVE-2022-43384.json b/CVE-2022/CVE-2022-433xx/CVE-2022-43384.json index 74ced6e16b2..d39fc8cca43 100644 --- a/CVE-2022/CVE-2022-433xx/CVE-2022-43384.json +++ b/CVE-2022/CVE-2022-433xx/CVE-2022-43384.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-435xx/CVE-2022-43575.json b/CVE-2022/CVE-2022-435xx/CVE-2022-43575.json index 75527b004ce..c7e1afa4d9b 100644 --- a/CVE-2022/CVE-2022-435xx/CVE-2022-43575.json +++ b/CVE-2022/CVE-2022-435xx/CVE-2022-43575.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-438xx/CVE-2022-43866.json b/CVE-2022/CVE-2022-438xx/CVE-2022-43866.json index 042d993cd9c..34f314d3be5 100644 --- a/CVE-2022/CVE-2022-438xx/CVE-2022-43866.json +++ b/CVE-2022/CVE-2022-438xx/CVE-2022-43866.json @@ -88,7 +88,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4385.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4385.json index c83a784b40b..d78351a1541 100644 --- a/CVE-2022/CVE-2022-43xx/CVE-2022-4385.json +++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4385.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4386.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4386.json index c4fbb9e6365..3fc527b389f 100644 --- a/CVE-2022/CVE-2022-43xx/CVE-2022-4386.json +++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4386.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44729.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44729.json index 68cd20e962e..c2c5a30225f 100644 --- a/CVE-2022/CVE-2022-447xx/CVE-2022-44729.json +++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44729.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44730.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44730.json index 84408ebba64..26289060c74 100644 --- a/CVE-2022/CVE-2022-447xx/CVE-2022-44730.json +++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44730.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-44xx/CVE-2022-4466.json b/CVE-2022/CVE-2022-44xx/CVE-2022-4466.json index aab164672aa..d5ee965ef19 100644 --- a/CVE-2022/CVE-2022-44xx/CVE-2022-4466.json +++ b/CVE-2022/CVE-2022-44xx/CVE-2022-4466.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45121.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45121.json index ed3d6ddb481..f2dab5bab80 100644 --- a/CVE-2022/CVE-2022-451xx/CVE-2022-45121.json +++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45121.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45135.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45135.json index 6c8927830ab..792af51462c 100644 --- a/CVE-2022/CVE-2022-451xx/CVE-2022-45135.json +++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45135.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45141.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45141.json index c94b0f5a9eb..13fd7e7a236 100644 --- a/CVE-2022/CVE-2022-451xx/CVE-2022-45141.json +++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45141.json @@ -82,7 +82,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45349.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45349.json index af78edf3708..63ecf2b3039 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45349.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45349.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45351.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45351.json index 499eb10883f..e1b6a3699a8 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45351.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45351.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45352.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45352.json index da002a3c9ef..ae4e1f161b4 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45352.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45352.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45356.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45356.json index e55836c909f..06c8e2dbf1c 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45356.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45356.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45370.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45370.json index b1b527c73e6..161b93a6508 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45370.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45370.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45374.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45374.json index 98ac8f481b9..c6897eafe70 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45374.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45374.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-454xx/CVE-2022-45468.json b/CVE-2022/CVE-2022-454xx/CVE-2022-45468.json index 197f76a733c..de4e78f2d08 100644 --- a/CVE-2022/CVE-2022-454xx/CVE-2022-45468.json +++ b/CVE-2022/CVE-2022-454xx/CVE-2022-45468.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-458xx/CVE-2022-45810.json b/CVE-2022/CVE-2022-458xx/CVE-2022-45810.json index 0eb68d6e66a..32703b777dd 100644 --- a/CVE-2022/CVE-2022-458xx/CVE-2022-45810.json +++ b/CVE-2022/CVE-2022-458xx/CVE-2022-45810.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-458xx/CVE-2022-45819.json b/CVE-2022/CVE-2022-458xx/CVE-2022-45819.json index c5eec085dfb..4016e759755 100644 --- a/CVE-2022/CVE-2022-458xx/CVE-2022-45819.json +++ b/CVE-2022/CVE-2022-458xx/CVE-2022-45819.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-13T15:15:08.120", "lastModified": "2024-12-13T15:15:08.120", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-458xx/CVE-2022-45853.json b/CVE-2022/CVE-2022-458xx/CVE-2022-45853.json index be891045ead..82f71ead18c 100644 --- a/CVE-2022/CVE-2022-458xx/CVE-2022-45853.json +++ b/CVE-2022/CVE-2022-458xx/CVE-2022-45853.json @@ -78,7 +78,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-458xx/CVE-2022-45875.json b/CVE-2022/CVE-2022-458xx/CVE-2022-45875.json index e0d451fe74b..2d1165a43fb 100644 --- a/CVE-2022/CVE-2022-458xx/CVE-2022-45875.json +++ b/CVE-2022/CVE-2022-458xx/CVE-2022-45875.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-461xx/CVE-2022-46140.json b/CVE-2022/CVE-2022-461xx/CVE-2022-46140.json index 0cc3416cc9d..b61e09283fc 100644 --- a/CVE-2022/CVE-2022-461xx/CVE-2022-46140.json +++ b/CVE-2022/CVE-2022-461xx/CVE-2022-46140.json @@ -116,7 +116,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-461xx/CVE-2022-46142.json b/CVE-2022/CVE-2022-461xx/CVE-2022-46142.json index 323e82e242e..f3a561928fa 100644 --- a/CVE-2022/CVE-2022-461xx/CVE-2022-46142.json +++ b/CVE-2022/CVE-2022-461xx/CVE-2022-46142.json @@ -116,7 +116,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-461xx/CVE-2022-46143.json b/CVE-2022/CVE-2022-461xx/CVE-2022-46143.json index 78b2ff1af40..7c687ca9d23 100644 --- a/CVE-2022/CVE-2022-461xx/CVE-2022-46143.json +++ b/CVE-2022/CVE-2022-461xx/CVE-2022-46143.json @@ -116,7 +116,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-461xx/CVE-2022-46144.json b/CVE-2022/CVE-2022-461xx/CVE-2022-46144.json index 2cffc3900aa..f4dce67a6fa 100644 --- a/CVE-2022/CVE-2022-461xx/CVE-2022-46144.json +++ b/CVE-2022/CVE-2022-461xx/CVE-2022-46144.json @@ -116,7 +116,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-467xx/CVE-2022-46732.json b/CVE-2022/CVE-2022-467xx/CVE-2022-46732.json index 7c7da92baa0..0a3b2dc5b9f 100644 --- a/CVE-2022/CVE-2022-467xx/CVE-2022-46732.json +++ b/CVE-2022/CVE-2022-467xx/CVE-2022-46732.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-467xx/CVE-2022-46751.json b/CVE-2022/CVE-2022-467xx/CVE-2022-46751.json index c7f1b70d355..228445dab2a 100644 --- a/CVE-2022/CVE-2022-467xx/CVE-2022-46751.json +++ b/CVE-2022/CVE-2022-467xx/CVE-2022-46751.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-469xx/CVE-2022-46907.json b/CVE-2022/CVE-2022-469xx/CVE-2022-46907.json index bcc8adbbf9f..6e50e74bc6d 100644 --- a/CVE-2022/CVE-2022-469xx/CVE-2022-46907.json +++ b/CVE-2022/CVE-2022-469xx/CVE-2022-46907.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4661.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4661.json index 2cd07ca1001..07e500c7971 100644 --- a/CVE-2022/CVE-2022-46xx/CVE-2022-4661.json +++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4661.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4669.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4669.json index 302fe13aefb..7ed2ace4079 100644 --- a/CVE-2022/CVE-2022-46xx/CVE-2022-4669.json +++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4669.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-471xx/CVE-2022-47181.json b/CVE-2022/CVE-2022-471xx/CVE-2022-47181.json index 9db9c244541..263400818bc 100644 --- a/CVE-2022/CVE-2022-471xx/CVE-2022-47181.json +++ b/CVE-2022/CVE-2022-471xx/CVE-2022-47181.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-471xx/CVE-2022-47184.json b/CVE-2022/CVE-2022-471xx/CVE-2022-47184.json index a82041e67f3..4fafb51f0a4 100644 --- a/CVE-2022/CVE-2022-471xx/CVE-2022-47184.json +++ b/CVE-2022/CVE-2022-471xx/CVE-2022-47184.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-471xx/CVE-2022-47185.json b/CVE-2022/CVE-2022-471xx/CVE-2022-47185.json index e6b4d5432a1..a1c078c023c 100644 --- a/CVE-2022/CVE-2022-471xx/CVE-2022-47185.json +++ b/CVE-2022/CVE-2022-471xx/CVE-2022-47185.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-475xx/CVE-2022-47501.json b/CVE-2022/CVE-2022-475xx/CVE-2022-47501.json index 2815fd3353e..7e633ba70d6 100644 --- a/CVE-2022/CVE-2022-475xx/CVE-2022-47501.json +++ b/CVE-2022/CVE-2022-475xx/CVE-2022-47501.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-475xx/CVE-2022-47502.json b/CVE-2022/CVE-2022-475xx/CVE-2022-47502.json index 3e13b2b8b08..7498652a6fd 100644 --- a/CVE-2022/CVE-2022-475xx/CVE-2022-47502.json +++ b/CVE-2022/CVE-2022-475xx/CVE-2022-47502.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-479xx/CVE-2022-47986.json b/CVE-2022/CVE-2022-479xx/CVE-2022-47986.json index 2574183912d..bf59268ace2 100644 --- a/CVE-2022/CVE-2022-479xx/CVE-2022-47986.json +++ b/CVE-2022/CVE-2022-479xx/CVE-2022-47986.json @@ -66,7 +66,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4752.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4752.json index 29ab00ee853..abce0520af3 100644 --- a/CVE-2022/CVE-2022-47xx/CVE-2022-4752.json +++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4752.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4754.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4754.json index eb5abf3c57b..cd1812e06c6 100644 --- a/CVE-2022/CVE-2022-47xx/CVE-2022-4754.json +++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4754.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4777.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4777.json index e1a11c623ec..ec6a10ce11c 100644 --- a/CVE-2022/CVE-2022-47xx/CVE-2022-4777.json +++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4777.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4786.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4786.json index 528a38ecc7f..5821d395196 100644 --- a/CVE-2022/CVE-2022-47xx/CVE-2022-4786.json +++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4786.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4788.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4788.json index 8deab01b2a1..a68f083567a 100644 --- a/CVE-2022/CVE-2022-47xx/CVE-2022-4788.json +++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4788.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4899.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4899.json index fa63eeffa3c..5f4af805a11 100644 --- a/CVE-2022/CVE-2022-48xx/CVE-2022-4899.json +++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4899.json @@ -82,7 +82,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49258.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49258.json index dfc9460ebc3..dfa0c6cb776 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49258.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49258.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: ccree - Fix use after free en cc_cipher_exit() kfree_sensitive(ctx_p->user.key) liberar\u00e1 ctx_p->user.key. Pero ctx_p->user.key a\u00fan se usa en la siguiente l\u00ednea, lo que provocar\u00e1 un use-after-free. Podemos llamar a kfree_sensitive() despu\u00e9s de dev_dbg() para evitar el uaf." + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: ccree - Se corrige el uso despu\u00e9s de liberaci\u00f3n en cc_cipher_exit() kfree_sensitive(ctx_p->user.key) liberar\u00e1 ctx_p->user.key. Pero ctx_p->user.key a\u00fan se usa en la siguiente l\u00ednea, lo que provocar\u00e1 un uso despu\u00e9s de liberaci\u00f3n. Podemos llamar a kfree_sensitive() despu\u00e9s de dev_dbg() para evitar el uaf.\n" } ], "metrics": { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49501.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49501.json index 66535d37eca..25cde5f727a 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49501.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49501.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usbnet: Run unregister_netdev() before unbind() again El commit 2c9d6c2b871d (\"usbnet: run unbind() before unregister_netdev()\") buscaba corregir un use-after-free al desconectar los adaptadores USB Ethernet. Resulta que es necesaria una correcci\u00f3n diferente para abordar el problema: https://lore.kernel.org/netdev/18b3541e5372bc9b9fc733d422f4e698c089077c.1650177997.git.lukas@wunner.de/ Por lo tanto, el commit no era necesario. El commit hizo que la vinculaci\u00f3n y desvinculaci\u00f3n de USB Ethernet fuera asim\u00e9trica: antes, usbnet_probe() primero invocaba la devoluci\u00f3n de llamada ->bind() y luego register_netdev(). usbnet_disconnect() reflej\u00f3 eso al invocar primero unregister_netdev() y luego ->unbind(). Desde el commit, el orden en usbnet_disconnect() se invierte y ya no refleja usbnet_probe(). Una consecuencia es que un PHY desconectado (y detenido) en ->unbind() se detiene luego una vez m\u00e1s por unregister_netdev() ya que cierra el netdev antes de anular el registro. Eso requiere una contorsi\u00f3n en ->stop() porque el PHY solo se puede detener si no se ha desconectado ya. Revertir el commit permite hacer que la llamada a phy_stop() sea incondicional en ->stop()." + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usbnet: Ejecutar unregister_netdev() antes unbind() de nuevo El commit 2c9d6c2b871d (\"usbnet: run unbind() antes unregister_netdev()\") buscaba corregir un uso despu\u00e9s de liberaci\u00f3n (use-after-free) al desconectar los adaptadores USB Ethernet. Resulta que es necesaria una correcci\u00f3n diferente para abordar el problema: https://lore.kernel.org/netdev/18b3541e5372bc9b9fc733d422f4e698c089077c.1650177997.git.lukas@wunner.de/ Por lo tanto, el commit no era necesario. El commit hizo que la vinculaci\u00f3n y desvinculaci\u00f3n de USB Ethernet fuera asim\u00e9trica: antes, usbnet_probe() primero invocaba la devoluci\u00f3n de llamada ->bind() y luego register_netdev(). usbnet_disconnect() reflej\u00f3 eso al invocar primero unregister_netdev() y luego ->unbind(). Desde el commit, el orden en usbnet_disconnect() se invierte y ya no refleja usbnet_probe(). Una consecuencia es que un PHY desconectado (y detenido) en ->unbind() se detiene luego una vez m\u00e1s por unregister_netdev() ya que cierra el netdev antes de anular el registro. Eso requiere una contorsi\u00f3n en ->stop() porque el PHY solo se puede detener si no se ha desconectado ya. Revertir el commit permite hacer que la llamada a phy_stop() sea incondicional en ->stop().\n" } ], "metrics": { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49540.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49540.json index 28b1a4a9d43..82b9d7ee0cd 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49540.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49540.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:29.947", "lastModified": "2025-02-26T07:01:29.947", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49700.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49700.json index 28c692f340f..a5c0e841517 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49700.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49700.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:44.740", "lastModified": "2025-02-27T19:15:46.863", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49711.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49711.json index 3ac25941462..6b6b5ef7ef5 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49711.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49711.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:46.893", "lastModified": "2025-02-27T19:15:47.010", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49730.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49730.json index 4ed783fe03e..4ca628cc5c2 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49730.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49730.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:48.620", "lastModified": "2025-02-27T19:15:47.153", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4946.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4946.json index 24f20cd6552..424814b89d0 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4946.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4946.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4963.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4963.json index 8e33648d44d..6122b5c0afb 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4963.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4963.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0030.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0030.json index 3ddfe8a8252..ab7ab631c92 100644 --- a/CVE-2023/CVE-2023-00xx/CVE-2023-0030.json +++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0030.json @@ -78,7 +78,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0049.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0049.json index 9e14e0ec57f..bf4f477f21e 100644 --- a/CVE-2023/CVE-2023-00xx/CVE-2023-0049.json +++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0049.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0056.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0056.json index e6681913bc7..26c67ececbc 100644 --- a/CVE-2023/CVE-2023-00xx/CVE-2023-0056.json +++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0056.json @@ -78,7 +78,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0063.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0063.json index 4039ebecbe7..0663c5c0cd5 100644 --- a/CVE-2023/CVE-2023-00xx/CVE-2023-0063.json +++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0063.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0064.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0064.json index 5e16b49029e..b1fe82a4674 100644 --- a/CVE-2023/CVE-2023-00xx/CVE-2023-0064.json +++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0064.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0068.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0068.json index cac25a874f1..c61c9738e6e 100644 --- a/CVE-2023/CVE-2023-00xx/CVE-2023-0068.json +++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0068.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0073.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0073.json index 82da28146b5..a4e3656cffa 100644 --- a/CVE-2023/CVE-2023-00xx/CVE-2023-0073.json +++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0073.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0145.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0145.json index 72553f294ca..f079ddaa396 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0145.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0145.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0152.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0152.json index d95d9e7a0cd..4c3438782a4 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0152.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0152.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0156.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0156.json index 05fece5b79c..20c90703594 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0156.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0156.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0165.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0165.json index 6f7a31d437b..2d3db106796 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0165.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0165.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0172.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0172.json index 748e5f78d3a..72ad8451359 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0172.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0172.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0212.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0212.json index 4765df97ab0..c1aa0b6fe78 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0212.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0212.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0225.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0225.json index 15bdc14c996..9d4242e6f73 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0225.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0225.json @@ -82,7 +82,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0231.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0231.json index aaffec2c893..963bd0c0f4d 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0231.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0231.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0285.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0285.json index ccec2693515..7eff2c6594c 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0285.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0285.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0328.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0328.json index 9fc43710730..0c669b902d8 100644 --- a/CVE-2023/CVE-2023-03xx/CVE-2023-0328.json +++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0328.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0364.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0364.json index 3f22e390db5..e1a8c3252e0 100644 --- a/CVE-2023/CVE-2023-03xx/CVE-2023-0364.json +++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0364.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0365.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0365.json index 80599aeafa7..cacebc6edb1 100644 --- a/CVE-2023/CVE-2023-03xx/CVE-2023-0365.json +++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0365.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0369.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0369.json index 43c0c45f6dc..f52800dc454 100644 --- a/CVE-2023/CVE-2023-03xx/CVE-2023-0369.json +++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0369.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0371.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0371.json index c299c857405..b7d357e0ba1 100644 --- a/CVE-2023/CVE-2023-03xx/CVE-2023-0371.json +++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0371.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0374.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0374.json index 73444930195..2fcf1f3285e 100644 --- a/CVE-2023/CVE-2023-03xx/CVE-2023-0374.json +++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0374.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0386.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0386.json index 46ade0bb1d8..e7f13d919fc 100644 --- a/CVE-2023/CVE-2023-03xx/CVE-2023-0386.json +++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0386.json @@ -78,7 +78,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-04xx/CVE-2023-0419.json b/CVE-2023/CVE-2023-04xx/CVE-2023-0419.json index 7436fd41333..ca172b88153 100644 --- a/CVE-2023/CVE-2023-04xx/CVE-2023-0419.json +++ b/CVE-2023/CVE-2023-04xx/CVE-2023-0419.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-04xx/CVE-2023-0497.json b/CVE-2023/CVE-2023-04xx/CVE-2023-0497.json index 6dddd4b553e..0cdb5865c4d 100644 --- a/CVE-2023/CVE-2023-04xx/CVE-2023-0497.json +++ b/CVE-2023/CVE-2023-04xx/CVE-2023-0497.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0514.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0514.json index d2af98a7d06..c30777d4541 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0514.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0514.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0522.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0522.json index 91c9dfb97b7..3094815963f 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0522.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0522.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0538.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0538.json index f6a368ad123..67c65814e86 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0538.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0538.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0540.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0540.json index d21c2794c74..6c4c82fe523 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0540.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0540.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0542.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0542.json index 18be33ef4a9..f081cd57745 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0542.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0542.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0597.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0597.json index 44393c76f4b..b68aa4f3d18 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0597.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0597.json @@ -78,7 +78,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0621.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0621.json index fd7650c2dc4..e26b6098ac1 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0621.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0621.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0622.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0622.json index 25f32194508..560c7fbfc1b 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0622.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0622.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0623.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0623.json index f3bbb05a415..71a2e1445ee 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0623.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0623.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0630.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0630.json index c6e0b54542b..2cab84a7bed 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0630.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0630.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0631.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0631.json index 610dfc4ef54..5ebfb19c35b 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0631.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0631.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0664.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0664.json index 9748a874433..6087ed05f0c 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0664.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0664.json @@ -78,7 +78,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0765.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0765.json index a2a9f0123cb..a18869724ba 100644 --- a/CVE-2023/CVE-2023-07xx/CVE-2023-0765.json +++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0765.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0820.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0820.json index fc8caf659e8..93948aca52f 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0820.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0820.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0836.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0836.json index 1a33012624d..07baa08c33b 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0836.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0836.json @@ -78,7 +78,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0844.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0844.json index b92bfdd2828..7c9ff95ce4e 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0844.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0844.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0865.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0865.json index 20905d3b29b..8532bed93c0 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0865.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0865.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0891.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0891.json index dd3527f046b..ffda340e49b 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0891.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0891.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0893.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0893.json index ee3688e52a5..da55d7bb860 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0893.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0893.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0924.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0924.json index e1ad7a0b891..fa49e9762b0 100644 --- a/CVE-2023/CVE-2023-09xx/CVE-2023-0924.json +++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0924.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1021.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1021.json index 171ede3d1d7..61ffaa35139 100644 --- a/CVE-2023/CVE-2023-10xx/CVE-2023-1021.json +++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1021.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1079.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1079.json index 636073bc4c0..86c5406b675 100644 --- a/CVE-2023/CVE-2023-10xx/CVE-2023-1079.json +++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1079.json @@ -78,7 +78,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1090.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1090.json index 64b111e075d..66656f34367 100644 --- a/CVE-2023/CVE-2023-10xx/CVE-2023-1090.json +++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1090.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1101.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1101.json index 53a36682eb3..6f22115293d 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1101.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1101.json @@ -78,7 +78,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1111.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1111.json index 95a0f42d3c7..a1a985f88e5 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1111.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1111.json @@ -131,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1122.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1122.json index b99730a9695..ee955d4c5d5 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1122.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1122.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1125.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1125.json index 4e22ad83247..ac6d73a165a 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1125.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1125.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1152.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1152.json index 3278a79baf7..6c0a29a5fe5 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1152.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1152.json @@ -98,7 +98,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1196.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1196.json index 1109a68573a..87eacdadd9f 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1196.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1196.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1258.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1258.json index accdf0788f6..305c7ca497d 100644 --- a/CVE-2023/CVE-2023-12xx/CVE-2023-1258.json +++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1258.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "cybersecurity@ch.abb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1330.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1330.json index a8431ecc875..06e114c2297 100644 --- a/CVE-2023/CVE-2023-13xx/CVE-2023-1330.json +++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1330.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1347.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1347.json index b478bd79f1d..74eae5e5951 100644 --- a/CVE-2023/CVE-2023-13xx/CVE-2023-1347.json +++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1347.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1381.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1381.json index 6f6ed49ab32..2a890f53ce1 100644 --- a/CVE-2023/CVE-2023-13xx/CVE-2023-1381.json +++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1381.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1466.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1466.json index a3375896b6b..1b5198ab952 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1466.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1466.json @@ -83,7 +83,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1478.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1478.json index 45d51d733c3..761213c34e9 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1478.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1478.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1513.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1513.json index 9364c63fe47..d3c6ba590f2 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1513.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1513.json @@ -78,7 +78,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1546.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1546.json index dfcfc5e33b3..6d890b6664f 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1546.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1546.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1554.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1554.json index f97b9883b29..8447d668dfc 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1554.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1554.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1614.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1614.json index c0a7c3a5fff..16be09c1898 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1614.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1614.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1649.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1649.json index 90d3b3dfb5c..3c5d82636f6 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1649.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1649.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1652.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1652.json index 926b008ede3..0c43930283d 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1652.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1652.json @@ -78,7 +78,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1669.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1669.json index ec76e6fc4db..4eef559cbcf 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1669.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1669.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1730.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1730.json index 867b485cd16..608a0fd9e7c 100644 --- a/CVE-2023/CVE-2023-17xx/CVE-2023-1730.json +++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1730.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1804.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1804.json index 177249533f3..1e5fe1ad9c8 100644 --- a/CVE-2023/CVE-2023-18xx/CVE-2023-1804.json +++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1804.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1805.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1805.json index a9af2417ef1..d0feb351b3c 100644 --- a/CVE-2023/CVE-2023-18xx/CVE-2023-1805.json +++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1805.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1861.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1861.json index c1abbe6f83b..2514991ec54 100644 --- a/CVE-2023/CVE-2023-18xx/CVE-2023-1861.json +++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1861.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1906.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1906.json index e9aa636f1ca..6e6a69f37f9 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1906.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1906.json @@ -78,7 +78,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1907.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1907.json index 237fff07853..e2624974108 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1907.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1907.json @@ -52,7 +52,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1911.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1911.json index c3c33c67942..2a9c6818476 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1911.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1911.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1934.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1934.json index 9ec9dd97493..9b131621c24 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1934.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1934.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "ics-cert@hq.dhs.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20248.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20248.json index c102b8027ac..c37e349e44f 100644 --- a/CVE-2023/CVE-2023-202xx/CVE-2023-20248.json +++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20248.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2024-04-24T21:15:46.510", "lastModified": "2024-11-21T07:40:59.390", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20249.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20249.json index 0dd5ecf0af6..283f208412d 100644 --- a/CVE-2023/CVE-2023-202xx/CVE-2023-20249.json +++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20249.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2024-04-24T21:15:46.600", "lastModified": "2024-11-21T07:40:59.573", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-209xx/CVE-2023-20963.json b/CVE-2023/CVE-2023-209xx/CVE-2023-20963.json index 86a7dc9d37b..755dfd7945d 100644 --- a/CVE-2023/CVE-2023-209xx/CVE-2023-20963.json +++ b/CVE-2023/CVE-2023-209xx/CVE-2023-20963.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@android.com", "published": "2023-03-24T20:15:10.010", "lastModified": "2025-01-28T22:15:13.970", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2094.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2094.json index 126359d9cd1..2f637ff190e 100644 --- a/CVE-2023/CVE-2023-20xx/CVE-2023-2094.json +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2094.json @@ -55,7 +55,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -113,7 +113,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21237.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21237.json index b4978f5d5b6..75ba4086eda 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21237.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21237.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@android.com", "published": "2023-06-28T18:15:16.560", "lastModified": "2024-11-21T07:42:27.973", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2102.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2102.json index 36d607a9d37..12030648c47 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2102.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2102.json @@ -90,7 +90,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2103.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2103.json index 5689c09fb11..909b273d195 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2103.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2103.json @@ -90,7 +90,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2104.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2104.json index 5e1bef29800..bce5129ff35 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2104.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2104.json @@ -90,7 +90,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2105.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2105.json index d852801fdbf..cbb4e45ec63 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2105.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2105.json @@ -90,7 +90,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2106.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2106.json index dd34e9a9ad4..c9fc881ad51 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2106.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2106.json @@ -90,7 +90,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2114.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2114.json index b1293c936e6..1d2ac045076 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2114.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2114.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2166.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2166.json index 6d34f129786..942b55e0116 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2166.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2166.json @@ -78,7 +78,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22069.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22069.json index 34987ca56de..78c4492794b 100644 --- a/CVE-2023/CVE-2023-220xx/CVE-2023-22069.json +++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22069.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22072.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22072.json index 0ac5220c982..7a42cc63850 100644 --- a/CVE-2023/CVE-2023-220xx/CVE-2023-22072.json +++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22072.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22101.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22101.json index 452b2de9a5b..6d5f4bae596 100644 --- a/CVE-2023/CVE-2023-221xx/CVE-2023-22101.json +++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22101.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22102.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22102.json index c281f710fdf..d2da3163f23 100644 --- a/CVE-2023/CVE-2023-221xx/CVE-2023-22102.json +++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22102.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-225xx/CVE-2023-22512.json b/CVE-2023/CVE-2023-225xx/CVE-2023-22512.json index 07b8ccebfc9..e6b73a3d108 100644 --- a/CVE-2023/CVE-2023-225xx/CVE-2023-22512.json +++ b/CVE-2023/CVE-2023-225xx/CVE-2023-22512.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@atlassian.com", "published": "2024-01-16T18:15:09.130", "lastModified": "2025-03-17T23:15:16.143", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This High severity DoS (Denial of Service) vulnerability was introduced in version 5.6.0 of Confluence Data Center and Server. With a CVSS Score of 7.5, this vulnerability allows an unauthenticated attacker to cause a resource to be unavailable for its intended users by temporarily or indefinitely disrupting services of a vulnerable host (Confluence instance) connected to a network, which has no impact to confidentiality, no impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Confluence Data Center and Server 7.19: Upgrade to a release greater than or equal to 7.19.14 Confluence Data Center and Server 8.5: Upgrade to a release greater than or equal to 8.5.1 Confluence Data Center and Server 8.6 or above: No need to upgrade, you're already on a patched version See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ]). This vulnerability was reported via our Bug Bounty program." + }, + { + "lang": "es", + "value": "Esta vulnerabilidad de denegaci\u00f3n de servicio (DoS) de alta gravedad se introdujo en la versi\u00f3n 5.6.0 de Confluence Data Center and Server. Con una puntuaci\u00f3n CVSS de 7,5, permite a un atacante no autenticado provocar la indisponibilidad de un recurso para sus usuarios previstos mediante la interrupci\u00f3n temporal o indefinida de los servicios de un host vulnerable (instancia de Confluence) conectado a una red. Esto no afecta a la confidencialidad ni a la integridad, tiene un alto impacto en la disponibilidad y no requiere la interacci\u00f3n del usuario. Atlassian recomienda que los clientes de Confluence Data Center y Server actualicen a la \u00faltima versi\u00f3n. Si no pueden hacerlo, actualicen su instancia a una de las versiones corregidas compatibles especificadas: Confluence Data Center y Server 7.19: actualice a una versi\u00f3n mayor o igual a la 7.19.14 Confluence Data Center y Server 8.5: actualice a una versi\u00f3n mayor o igual a la 8.5.1 Confluence Data Center y Server 8.6 o posterior: no es necesario actualizar, ya tienen una versi\u00f3n parcheada Consulte las notas de la versi\u00f3n (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). Puede descargar la \u00faltima versi\u00f3n de Confluence Data Center y Server desde el centro de descargas (https://www.atlassian.com/software/confluence/download-archives ]). Esta vulnerabilidad se inform\u00f3 a trav\u00e9s de nuestro programa Bug Bounty." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-225xx/CVE-2023-22514.json b/CVE-2023/CVE-2023-225xx/CVE-2023-22514.json index 1da8ca2b9bb..11daa2615e0 100644 --- a/CVE-2023/CVE-2023-225xx/CVE-2023-22514.json +++ b/CVE-2023/CVE-2023-225xx/CVE-2023-22514.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@atlassian.com", "published": "2024-01-16T18:15:09.170", "lastModified": "2025-03-18T17:15:39.890", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This High severity RCE (Remote Code Execution) vulnerability was introduced in version 3.4.14 of Sourcetree for Mac and Sourcetree for Windows. \r\n\t\r\n\tThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.8, and a CVSS Vector of: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H which allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction. \r\n\t\r\n\tAtlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\r\n\t\t\r\n\t\tSourcetree for Mac and Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.15\r\n\t\t\r\n\t\t\r\n\t\r\n\tSee the release notes (https://www.sourcetreeapp.com/download-archives). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center (https://www.sourcetreeapp.com/download-archives). \r\n\t\r\n\tThis vulnerability was reported via our Penetration Testing program." + }, + { + "lang": "es", + "value": "Esta vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) de alta gravedad se introdujo en la versi\u00f3n 3.4.14 de Sourcetree para Mac y Sourcetree para Windows. Esta vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE), con una puntuaci\u00f3n CVSS de 7,8 y un vector CVSS de: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, permite a un atacante no autenticado ejecutar c\u00f3digo arbitrario que tiene un alto impacto en la confidencialidad, la integridad y la disponibilidad, y requiere la interacci\u00f3n del usuario. Atlassian recomienda que los clientes de Sourcetree para Mac y Sourcetree para Windows actualicen a la \u00faltima versi\u00f3n. Si no puede hacerlo, actualice su instancia a una de las versiones corregidas compatibles especificadas: Sourcetree para Mac y Sourcetree para Windows 3.4: Actualice a una versi\u00f3n posterior o igual a la 3.4.15. Consulte las notas de la versi\u00f3n (https://www.sourcetreeapp.com/download-archives). Puede descargar la \u00faltima versi\u00f3n de Sourcetree para Mac y Windows desde el centro de descargas (https://www.sourcetreeapp.com/download-archives). Esta vulnerabilidad se report\u00f3 a trav\u00e9s de nuestro programa de pruebas de penetraci\u00f3n." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22645.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22645.json index 7167961f7e1..d0c22d855d5 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22645.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22645.json @@ -88,7 +88,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22651.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22651.json index d435d558e82..bc7ca54c1d2 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22651.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22651.json @@ -88,7 +88,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22652.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22652.json index b303ac4b9a7..2b6e39b34f5 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22652.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22652.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "meissner@suse.de", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-227xx/CVE-2023-22701.json b/CVE-2023/CVE-2023-227xx/CVE-2023-22701.json index 3245c7ec1e4..34a0140b380 100644 --- a/CVE-2023/CVE-2023-227xx/CVE-2023-22701.json +++ b/CVE-2023/CVE-2023-227xx/CVE-2023-22701.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2223.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2223.json index 8089127e376..83a9bb6c1d6 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2223.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2223.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2241.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2241.json index 7141b2a41d8..1aacb75ecd0 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2241.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2241.json @@ -123,7 +123,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2245.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2245.json index 56ec4c85124..4b7d7ee362a 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2245.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2245.json @@ -113,7 +113,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2256.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2256.json index 2e6b63583b3..1c37b247542 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2256.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2256.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2296.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2296.json index 2ab14f6fcca..144be122e43 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2296.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2296.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23472.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23472.json index 59f4cd8b2f5..62e49e40ee4 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23472.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23472.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23474.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23474.json index 8f1d4e7d02f..f0ad230e2d1 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23474.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23474.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23583.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23583.json index f91a95a24dc..f9532090feb 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23583.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23583.json @@ -82,7 +82,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23735.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23735.json index 9125a29c177..9b1d6e82b44 100644 --- a/CVE-2023/CVE-2023-237xx/CVE-2023-23735.json +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23735.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23775.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23775.json index 2ea81e8d692..36c7a198ee3 100644 --- a/CVE-2023/CVE-2023-237xx/CVE-2023-23775.json +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23775.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@fortinet.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-239xx/CVE-2023-23976.json b/CVE-2023/CVE-2023-239xx/CVE-2023-23976.json index d6e5d004781..21d73025031 100644 --- a/CVE-2023/CVE-2023-239xx/CVE-2023-23976.json +++ b/CVE-2023/CVE-2023-239xx/CVE-2023-23976.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-239xx/CVE-2023-23989.json b/CVE-2023/CVE-2023-239xx/CVE-2023-23989.json index 0f74c08232c..9917b0b4045 100644 --- a/CVE-2023/CVE-2023-239xx/CVE-2023-23989.json +++ b/CVE-2023/CVE-2023-239xx/CVE-2023-23989.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24410.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24410.json index f062d7cc3fa..da2c9159957 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24410.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24410.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24416.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24416.json index 4b23484b112..7ce4e3de288 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24416.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24416.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24505.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24505.json index e2c6c1b9dce..b5cab7f74c2 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24505.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24505.json @@ -98,7 +98,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24506.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24506.json index 51af58674ce..ae7171b9cd7 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24506.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24506.json @@ -98,7 +98,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24957.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24957.json index 1729585d5cb..c116d534f04 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24957.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24957.json @@ -88,7 +88,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24958.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24958.json index ef9f6fa35d4..9bc7fee154b 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24958.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24958.json @@ -98,7 +98,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24998.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24998.json index 57e980f7f63..88161cf488b 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24998.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24998.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2428.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2428.json index 3a781c3de6b..2cb831df54b 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2428.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2428.json @@ -60,7 +60,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2429.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2429.json index b67293cb860..6c3ad69f7ba 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2429.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2429.json @@ -60,7 +60,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2470.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2470.json index 6520ae9d21f..897e1782001 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2470.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2470.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2473.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2473.json index 37897712db8..b9aa3532d04 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2473.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2473.json @@ -113,7 +113,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-255xx/CVE-2023-25514.json b/CVE-2023/CVE-2023-255xx/CVE-2023-25514.json index 9c189cbca97..a1d38f509d6 100644 --- a/CVE-2023/CVE-2023-255xx/CVE-2023-25514.json +++ b/CVE-2023/CVE-2023-255xx/CVE-2023-25514.json @@ -98,7 +98,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25601.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25601.json index fb40c43b43e..727127401a5 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25601.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25601.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25619.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25619.json index b9d751ecfad..f6cfb7da1b4 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25619.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25619.json @@ -88,7 +88,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25681.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25681.json index eca1fedcb97..207c798a2ed 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25681.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25681.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25690.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25690.json index eb028a4e476..506193e1b95 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25690.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25690.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25691.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25691.json index 2893b9595f9..2ef1f92ae41 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25691.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25691.json @@ -68,7 +68,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25692.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25692.json index 1208036ff5d..06dcee477bb 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25692.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25692.json @@ -68,7 +68,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25693.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25693.json index 0fd3e541b54..23335cc9487 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25693.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25693.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25695.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25695.json index 8ad2aa297ca..01fb90a12f2 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25695.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25695.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25699.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25699.json index 365e6651b81..16199684055 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25699.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25699.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-03T13:15:59.923", "lastModified": "2024-11-21T07:49:57.770", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25934.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25934.json index df9409e8f11..a44fc811c18 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25934.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25934.json @@ -98,7 +98,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2521.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2521.json index c674e743f12..f1d9bfd37fe 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2521.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2521.json @@ -113,7 +113,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-260xx/CVE-2023-26015.json b/CVE-2023/CVE-2023-260xx/CVE-2023-26015.json index 32352dfe0aa..433cde79839 100644 --- a/CVE-2023/CVE-2023-260xx/CVE-2023-26015.json +++ b/CVE-2023/CVE-2023-260xx/CVE-2023-26015.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-262xx/CVE-2023-26269.json b/CVE-2023/CVE-2023-262xx/CVE-2023-26269.json index 25a0a1a0740..41de5025a9b 100644 --- a/CVE-2023/CVE-2023-262xx/CVE-2023-26269.json +++ b/CVE-2023/CVE-2023-262xx/CVE-2023-26269.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-262xx/CVE-2023-26285.json b/CVE-2023/CVE-2023-262xx/CVE-2023-26285.json index 594690d7266..1094ffe79ac 100644 --- a/CVE-2023/CVE-2023-262xx/CVE-2023-26285.json +++ b/CVE-2023/CVE-2023-262xx/CVE-2023-26285.json @@ -88,7 +88,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-264xx/CVE-2023-26464.json b/CVE-2023/CVE-2023-264xx/CVE-2023-26464.json index 4efd8e70c45..741175e3d21 100644 --- a/CVE-2023/CVE-2023-264xx/CVE-2023-26464.json +++ b/CVE-2023/CVE-2023-264xx/CVE-2023-26464.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26523.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26523.json index 7e27c758201..6c1eadcd415 100644 --- a/CVE-2023/CVE-2023-265xx/CVE-2023-26523.json +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26523.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2646.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2646.json index b88c6633162..c720f083604 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2646.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2646.json @@ -123,7 +123,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2660.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2660.json index 4eba4077a9d..0776d6264bb 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2660.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2660.json @@ -113,7 +113,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2682.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2682.json index 06964b3935d..234a26fd18a 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2682.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2682.json @@ -113,7 +113,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27325.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27325.json index 85e402fa75f..d48ff309ac9 100644 --- a/CVE-2023/CVE-2023-273xx/CVE-2023-27325.json +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27325.json @@ -74,7 +74,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27460.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27460.json index 42ff2bbd998..01ab5be1495 100644 --- a/CVE-2023/CVE-2023-274xx/CVE-2023-27460.json +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27460.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27522.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27522.json index 57d7bfcc5fb..7b64d46d1c2 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27522.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27522.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27554.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27554.json index a87b37bbe05..226460ea4c6 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27554.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27554.json @@ -88,7 +88,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-276xx/CVE-2023-27602.json b/CVE-2023/CVE-2023-276xx/CVE-2023-27602.json index 6b066aa1d04..c77674e3df8 100644 --- a/CVE-2023/CVE-2023-276xx/CVE-2023-27602.json +++ b/CVE-2023/CVE-2023-276xx/CVE-2023-27602.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27870.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27870.json index 1293c8e8934..e58fd91cd48 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27870.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27870.json @@ -88,7 +88,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28158.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28158.json index b537c872376..562f0b37f2b 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28158.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28158.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28494.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28494.json index 14339538f59..4d3814f3413 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28494.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28494.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28517.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28517.json index bca3854ae3e..9a3e657c681 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28517.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28517.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28708.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28708.json index 737ae9532b7..c5cd249d69c 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28708.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28708.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28709.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28709.json index 663819c4506..36e7f49bbf9 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28709.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28709.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28770.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28770.json index 488584b1fcb..4627fb9e66f 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28770.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28770.json @@ -98,7 +98,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2826.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2826.json index 20fd90be446..d4b6f4e6970 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2826.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2826.json @@ -83,7 +83,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29001.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29001.json index c10b53c9c0c..5d8dabebb0c 100644 --- a/CVE-2023/CVE-2023-290xx/CVE-2023-29001.json +++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29001.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-27T19:15:31.497", "lastModified": "2024-11-27T19:15:31.497", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29053.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29053.json index 2baafb4bb3c..7715eaf6c2a 100644 --- a/CVE-2023/CVE-2023-290xx/CVE-2023-29053.json +++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29053.json @@ -68,7 +68,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29055.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29055.json index 7c6efad6da4..3546fba6a9b 100644 --- a/CVE-2023/CVE-2023-290xx/CVE-2023-29055.json +++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29055.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-292xx/CVE-2023-29215.json b/CVE-2023/CVE-2023-292xx/CVE-2023-29215.json index b33122b9fc1..74f8c6f5d11 100644 --- a/CVE-2023/CVE-2023-292xx/CVE-2023-29215.json +++ b/CVE-2023/CVE-2023-292xx/CVE-2023-29215.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-292xx/CVE-2023-29216.json b/CVE-2023/CVE-2023-292xx/CVE-2023-29216.json index 0d2f60581f7..0bf706605a4 100644 --- a/CVE-2023/CVE-2023-292xx/CVE-2023-29216.json +++ b/CVE-2023/CVE-2023-292xx/CVE-2023-29216.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-292xx/CVE-2023-29234.json b/CVE-2023/CVE-2023-292xx/CVE-2023-29234.json index d3c9a9b77bb..8970a9176b0 100644 --- a/CVE-2023/CVE-2023-292xx/CVE-2023-29234.json +++ b/CVE-2023/CVE-2023-292xx/CVE-2023-29234.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29428.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29428.json index 9f836396e21..82fc4221a3a 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29428.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29428.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29552.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29552.json index fd0ab78836c..3d2b5b6109e 100644 --- a/CVE-2023/CVE-2023-295xx/CVE-2023-29552.json +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29552.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2023-04-25T16:15:09.537", "lastModified": "2025-01-28T22:15:14.983", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2904.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2904.json index 3223a6df822..d3bd6b66406 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2904.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2904.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "ics-cert@hq.dhs.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2953.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2953.json index 8a76d4d5358..85ccee04d8b 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2953.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2953.json @@ -78,7 +78,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30465.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30465.json index 5166de7aaa5..b321f440c9c 100644 --- a/CVE-2023/CVE-2023-304xx/CVE-2023-30465.json +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30465.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-305xx/CVE-2023-30550.json b/CVE-2023/CVE-2023-305xx/CVE-2023-30550.json index 221277374fe..3569029073b 100644 --- a/CVE-2023/CVE-2023-305xx/CVE-2023-30550.json +++ b/CVE-2023/CVE-2023-305xx/CVE-2023-30550.json @@ -98,7 +98,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-306xx/CVE-2023-30610.json b/CVE-2023/CVE-2023-306xx/CVE-2023-30610.json index 61b7073c456..7329e2bbabc 100644 --- a/CVE-2023/CVE-2023-306xx/CVE-2023-30610.json +++ b/CVE-2023/CVE-2023-306xx/CVE-2023-30610.json @@ -88,7 +88,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-306xx/CVE-2023-30611.json b/CVE-2023/CVE-2023-306xx/CVE-2023-30611.json index ccf79622af3..f3f716e960a 100644 --- a/CVE-2023/CVE-2023-306xx/CVE-2023-30611.json +++ b/CVE-2023/CVE-2023-306xx/CVE-2023-30611.json @@ -98,7 +98,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-306xx/CVE-2023-30619.json b/CVE-2023/CVE-2023-306xx/CVE-2023-30619.json index 582a4000f7a..e11945b6f61 100644 --- a/CVE-2023/CVE-2023-306xx/CVE-2023-30619.json +++ b/CVE-2023/CVE-2023-306xx/CVE-2023-30619.json @@ -88,7 +88,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-306xx/CVE-2023-30631.json b/CVE-2023/CVE-2023-306xx/CVE-2023-30631.json index 528608bb10c..9d5c1af9479 100644 --- a/CVE-2023/CVE-2023-306xx/CVE-2023-30631.json +++ b/CVE-2023/CVE-2023-306xx/CVE-2023-30631.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-307xx/CVE-2023-30771.json b/CVE-2023/CVE-2023-307xx/CVE-2023-30771.json index fef88c77f85..5306d0c3e07 100644 --- a/CVE-2023/CVE-2023-307xx/CVE-2023-30771.json +++ b/CVE-2023/CVE-2023-307xx/CVE-2023-30771.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-307xx/CVE-2023-30775.json b/CVE-2023/CVE-2023-307xx/CVE-2023-30775.json index 8a666a9cdf6..4b3e68ef343 100644 --- a/CVE-2023/CVE-2023-307xx/CVE-2023-30775.json +++ b/CVE-2023/CVE-2023-307xx/CVE-2023-30775.json @@ -78,7 +78,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3026.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3026.json index 62b78c02114..73772549cca 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3026.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3026.json @@ -60,7 +60,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3027.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3027.json index 6a4b8c110ce..42f20c74476 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3027.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3027.json @@ -78,7 +78,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31090.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31090.json index c6bc5f533e3..17cf6c44da9 100644 --- a/CVE-2023/CVE-2023-310xx/CVE-2023-31090.json +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31090.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31122.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31122.json index 0f267e60856..c4ee5c8c01f 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31122.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31122.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31146.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31146.json index 4a80e537c6f..f7c7a9c3a84 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31146.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31146.json @@ -88,7 +88,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32007.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32007.json index c9543fabfb5..253d33d7fa1 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32007.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32007.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32058.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32058.json index 824eaf90ba4..72923c42b2e 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32058.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32058.json @@ -88,7 +88,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32070.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32070.json index e20181b65c9..17e97a27701 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32070.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32070.json @@ -98,7 +98,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32121.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32121.json index 38dad9a77ea..3ab4840c814 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32121.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32121.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32140.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32140.json index 623d5fd2f82..02ec7bd30c0 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32140.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32140.json @@ -74,7 +74,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32143.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32143.json index c362cbd85da..fdcf9f7833f 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32143.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32143.json @@ -74,7 +74,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32146.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32146.json index 67d836e0087..d5db0cda4f0 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32146.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32146.json @@ -74,7 +74,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32167.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32167.json index e94ca2db869..d74dbe4bd71 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32167.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32167.json @@ -74,7 +74,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32181.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32181.json index eb94f3d0b0a..062a69f1f8a 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32181.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32181.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "meissner@suse.de", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32295.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32295.json index 1a53d70f042..765f004363c 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32295.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32295.json @@ -72,7 +72,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-327xx/CVE-2023-32739.json b/CVE-2023/CVE-2023-327xx/CVE-2023-32739.json index 8e093476347..1b2ed2951c0 100644 --- a/CVE-2023/CVE-2023-327xx/CVE-2023-32739.json +++ b/CVE-2023/CVE-2023-327xx/CVE-2023-32739.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33246.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33246.json index 51a318842a0..8fe2a296980 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33246.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33246.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-333xx/CVE-2023-33300.json b/CVE-2023/CVE-2023-333xx/CVE-2023-33300.json index 599e891d4d3..a775d954e70 100644 --- a/CVE-2023/CVE-2023-333xx/CVE-2023-33300.json +++ b/CVE-2023/CVE-2023-333xx/CVE-2023-33300.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-03-14T16:15:27.203", "lastModified": "2025-03-14T16:15:27.203", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A improper neutralization of special elements used in a command ('command injection') in Fortinet FortiNAC 7.2.1 and earlier, 9.4.3 and earlier allows attacker a limited, unauthorized file access via specifically crafted request in inter-server communication port." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando ('inyecci\u00f3n de comando') en Fortinet FortiNAC 7.2.1 y anteriores, 9.4.3 y anteriores permite a un atacante un acceso limitado y no autorizado a archivos a trav\u00e9s de una solicitud espec\u00edficamente manipulada en el puerto de comunicaci\u00f3n entre servidores." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-333xx/CVE-2023-33321.json b/CVE-2023/CVE-2023-333xx/CVE-2023-33321.json index aa2401cb832..0ab3741da25 100644 --- a/CVE-2023/CVE-2023-333xx/CVE-2023-33321.json +++ b/CVE-2023/CVE-2023-333xx/CVE-2023-33321.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-339xx/CVE-2023-33930.json b/CVE-2023/CVE-2023-339xx/CVE-2023-33930.json index a8291340a9a..a8d3374ebfb 100644 --- a/CVE-2023/CVE-2023-339xx/CVE-2023-33930.json +++ b/CVE-2023/CVE-2023-339xx/CVE-2023-33930.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-339xx/CVE-2023-33933.json b/CVE-2023/CVE-2023-339xx/CVE-2023-33933.json index 38e47c8e1f4..3c96c9414d4 100644 --- a/CVE-2023/CVE-2023-339xx/CVE-2023-33933.json +++ b/CVE-2023/CVE-2023-339xx/CVE-2023-33933.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-339xx/CVE-2023-33934.json b/CVE-2023/CVE-2023-339xx/CVE-2023-33934.json index 13a4b7dbe56..d4263a37d7c 100644 --- a/CVE-2023/CVE-2023-339xx/CVE-2023-33934.json +++ b/CVE-2023/CVE-2023-339xx/CVE-2023-33934.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3316.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3316.json index f30fbbba313..122135b2c44 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3316.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3316.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "reefs@jfrog.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34149.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34149.json index c6f6c330328..600dc1b8e5b 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34149.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34149.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34189.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34189.json index 1c88e4c62f4..257d4c1e69c 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34189.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34189.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34302.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34302.json index b1326c9eee4..efd8f4064bf 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34302.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34302.json @@ -74,7 +74,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34396.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34396.json index 0e131b9855c..3df8776217f 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34396.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34396.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34434.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34434.json index b712ee0e4c5..3e63763e5b9 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34434.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34434.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34468.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34468.json index 5f951246090..8fb49f35003 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34468.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34468.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34478.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34478.json index 3fe0ee1ff28..e52d97cb105 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34478.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34478.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-349xx/CVE-2023-34990.json b/CVE-2023/CVE-2023-349xx/CVE-2023-34990.json index add96cf941e..468e622bec7 100644 --- a/CVE-2023/CVE-2023-349xx/CVE-2023-34990.json +++ b/CVE-2023/CVE-2023-349xx/CVE-2023-34990.json @@ -72,7 +72,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3411.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3411.json index d5441823311..c5dbccb7091 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3411.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3411.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2023-06-27T04:15:10.267", "lastModified": "2025-01-13T18:27:44.140", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3412.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3412.json index 059782215a3..a61cbf29890 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3412.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3412.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2023-06-27T04:15:10.447", "lastModified": "2025-01-13T18:27:44.140", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35017.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35017.json index 65fdc0a4d05..5cb70f3adb7 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35017.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35017.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35049.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35049.json index ddc229a2844..ea524ca24a2 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35049.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35049.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35088.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35088.json index 6544f1b7a24..10083bf3501 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35088.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35088.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35311.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35311.json index 710561962e6..2bb5ea72268 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35311.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35311.json @@ -55,7 +55,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35710.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35710.json index 2fd4b82991f..75dd8ca5f24 100644 --- a/CVE-2023/CVE-2023-357xx/CVE-2023-35710.json +++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35710.json @@ -74,7 +74,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35712.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35712.json index e6d38f4b4f7..03d226555ac 100644 --- a/CVE-2023/CVE-2023-357xx/CVE-2023-35712.json +++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35712.json @@ -74,7 +74,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35797.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35797.json index 0fc9ee94392..99c767b5c24 100644 --- a/CVE-2023/CVE-2023-357xx/CVE-2023-35797.json +++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35797.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35894.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35894.json index 753801e6776..411085d2796 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35894.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35894.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35899.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35899.json index 483ab9ad0c8..3014aad738b 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35899.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35899.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35910.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35910.json index 3a8448fd805..4d713c0c9d2 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35910.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35910.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35911.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35911.json index 00a5beb4add..6c9868c4fd6 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35911.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35911.json @@ -82,7 +82,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35949.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35949.json index 0516a930c4a..1af83f9971e 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35949.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35949.json @@ -52,7 +52,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35950.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35950.json index e1fad568419..7f0db18fc61 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35950.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35950.json @@ -52,7 +52,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35951.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35951.json index 24f82b8232e..25714522c98 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35951.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35951.json @@ -52,7 +52,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35952.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35952.json index ed4cc56e3f9..a1406d69f61 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35952.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35952.json @@ -52,7 +52,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35953.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35953.json index 2ce7963f8f4..9cb32b63f86 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35953.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35953.json @@ -52,7 +52,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36508.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36508.json index befc5054112..7b1e38eda35 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36508.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36508.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36529.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36529.json index 0d5248974f3..f422343bc81 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36529.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36529.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36542.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36542.json index edf844e674c..f391dbdbf27 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36542.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36542.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36679.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36679.json index 1548be40dd7..a9fad9680c7 100644 --- a/CVE-2023/CVE-2023-366xx/CVE-2023-36679.json +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36679.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37407.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37407.json index f5132a4a766..5fff47c34d4 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37407.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37407.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37411.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37411.json index 53b58317801..d48e896f805 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37411.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37411.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37415.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37415.json index 5eba41f6f4b..7da0f31c09a 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37415.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37415.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37582.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37582.json index f61cd1d1eae..be26a90a579 100644 --- a/CVE-2023/CVE-2023-375xx/CVE-2023-37582.json +++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37582.json @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-378xx/CVE-2023-37869.json b/CVE-2023/CVE-2023-378xx/CVE-2023-37869.json index 6c46d69529d..a73f350af3a 100644 --- a/CVE-2023/CVE-2023-378xx/CVE-2023-37869.json +++ b/CVE-2023/CVE-2023-378xx/CVE-2023-37869.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-378xx/CVE-2023-37895.json b/CVE-2023/CVE-2023-378xx/CVE-2023-37895.json index 21154c4a23f..f1b95712b7b 100644 --- a/CVE-2023/CVE-2023-378xx/CVE-2023-37895.json +++ b/CVE-2023/CVE-2023-378xx/CVE-2023-37895.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37941.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37941.json index f20fe998436..115eb15519f 100644 --- a/CVE-2023/CVE-2023-379xx/CVE-2023-37941.json +++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37941.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3758.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3758.json index 73067c3ae91..346d7ed6f76 100644 --- a/CVE-2023/CVE-2023-37xx/CVE-2023-3758.json +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3758.json @@ -72,7 +72,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38095.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38095.json index ab75da4da78..21d984bbd1a 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38095.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38095.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38098.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38098.json index 13188b125e9..3c8e021827a 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38098.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38098.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38099.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38099.json index 0804fd0440f..ccf90722677 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38099.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38099.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38100.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38100.json index eb5f8e4e6cf..130620611d2 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38100.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38100.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38102.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38102.json index 2be07a30cc5..9e7601c6b0e 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38102.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38102.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38360.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38360.json index 9d577b07efc..f64a65f9291 100644 --- a/CVE-2023/CVE-2023-383xx/CVE-2023-38360.json +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38360.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38366.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38366.json index 3bfa18e70dc..8ee11aec84c 100644 --- a/CVE-2023/CVE-2023-383xx/CVE-2023-38366.json +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38366.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38562.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38562.json index 8526b92daf6..4ce1a40162e 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38562.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38562.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-387xx/CVE-2023-38723.json b/CVE-2023/CVE-2023-387xx/CVE-2023-38723.json index 4835ca053f0..eadbf5d025d 100644 --- a/CVE-2023/CVE-2023-387xx/CVE-2023-38723.json +++ b/CVE-2023/CVE-2023-387xx/CVE-2023-38723.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-387xx/CVE-2023-38724.json b/CVE-2023/CVE-2023-387xx/CVE-2023-38724.json index 708a94b5fec..4dc5eef86ef 100644 --- a/CVE-2023/CVE-2023-387xx/CVE-2023-38724.json +++ b/CVE-2023/CVE-2023-387xx/CVE-2023-38724.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39196.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39196.json index e8047e1bd6e..1620b05474c 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39196.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39196.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39254.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39254.json index f7f2da4034a..e40ce584248 100644 --- a/CVE-2023/CVE-2023-392xx/CVE-2023-39254.json +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39254.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39307.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39307.json index 1c682958877..d4471962409 100644 --- a/CVE-2023/CVE-2023-393xx/CVE-2023-39307.json +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39307.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39313.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39313.json index 15261556f76..538f72dd484 100644 --- a/CVE-2023/CVE-2023-393xx/CVE-2023-39313.json +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39313.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39410.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39410.json index 6b6d5ec4e49..eadba9513c7 100644 --- a/CVE-2023/CVE-2023-394xx/CVE-2023-39410.json +++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39410.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39456.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39456.json index cf3f10735fd..0ed5ff24b35 100644 --- a/CVE-2023/CVE-2023-394xx/CVE-2023-39456.json +++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39456.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39473.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39473.json index eb7cb643b90..e6b2d02ee2d 100644 --- a/CVE-2023/CVE-2023-394xx/CVE-2023-39473.json +++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39473.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39474.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39474.json index de0f471c048..60d631c42da 100644 --- a/CVE-2023/CVE-2023-394xx/CVE-2023-39474.json +++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39474.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39541.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39541.json index bcb9ac87f43..3620ec75633 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39541.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39541.json @@ -52,7 +52,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39553.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39553.json index fd1c4c6a24e..de75a3bc02c 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39553.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39553.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39922.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39922.json index 856d58f445e..88d52fee0d5 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39922.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39922.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39990.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39990.json index 26ce56b205e..62cea24258c 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39990.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39990.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39998.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39998.json index e826bf87e57..6567465eb57 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39998.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39998.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40495.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40495.json index 38ccaaf19f7..70e3a7958cb 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40495.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40495.json @@ -74,7 +74,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40610.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40610.json index 5a01f60da6c..4335e7ba9ef 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40610.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40610.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40695.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40695.json index b6b11028d46..15dc9383046 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40695.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40695.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40696.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40696.json index 6a285bab07f..a7395aec994 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40696.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40696.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40743.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40743.json index 400231483f1..9931ff39611 100644 --- a/CVE-2023/CVE-2023-407xx/CVE-2023-40743.json +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40743.json @@ -69,7 +69,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-411xx/CVE-2023-41182.json b/CVE-2023/CVE-2023-411xx/CVE-2023-41182.json index c300f6e670a..b2de29c1e66 100644 --- a/CVE-2023/CVE-2023-411xx/CVE-2023-41182.json +++ b/CVE-2023/CVE-2023-411xx/CVE-2023-41182.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-412xx/CVE-2023-41267.json b/CVE-2023/CVE-2023-412xx/CVE-2023-41267.json index 2e5b0221f90..fc0c7bcc386 100644 --- a/CVE-2023/CVE-2023-412xx/CVE-2023-41267.json +++ b/CVE-2023/CVE-2023-412xx/CVE-2023-41267.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41752.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41752.json index f92f0631866..12b661a9478 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41752.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41752.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41798.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41798.json index b75329ce40e..5017f1b6baa 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41798.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41798.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41916.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41916.json index 0e9e64a7bc8..1c6a007dc00 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41916.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41916.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41955.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41955.json index 597682a708c..11e54c04ec2 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41955.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41955.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42501.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42501.json index 82f3d3ce27c..799806c362b 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42501.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42501.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42504.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42504.json index aad4bc67252..b1ec233b279 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42504.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42504.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42509.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42509.json index 6c2ad0d26d1..944d2c2f6e0 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42509.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42509.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "reefs@jfrog.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42662.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42662.json index 59ce3c310e1..32ed908f51f 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42662.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42662.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "reefs@jfrog.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42794.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42794.json index 9e16a4f431a..baf383c1bb2 100644 --- a/CVE-2023/CVE-2023-427xx/CVE-2023-42794.json +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42794.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42795.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42795.json index 4a55de908d2..323a1b06bb7 100644 --- a/CVE-2023/CVE-2023-427xx/CVE-2023-42795.json +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42795.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4296.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4296.json index 9904a9a152a..04f128a9696 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4296.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4296.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "ics-cert@hq.dhs.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-430xx/CVE-2023-43052.json b/CVE-2023/CVE-2023-430xx/CVE-2023-43052.json index e4a109d4714..786778487e6 100644 --- a/CVE-2023/CVE-2023-430xx/CVE-2023-43052.json +++ b/CVE-2023/CVE-2023-430xx/CVE-2023-43052.json @@ -39,7 +39,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", @@ -72,7 +72,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43622.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43622.json index 42d4896c248..c1090114e03 100644 --- a/CVE-2023/CVE-2023-436xx/CVE-2023-43622.json +++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43622.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43826.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43826.json index bc580f7ca7a..33b342322a5 100644 --- a/CVE-2023/CVE-2023-438xx/CVE-2023-43826.json +++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43826.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4308.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4308.json index 8781b8c32cc..c1b78d0f6ba 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4308.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4308.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44313.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44313.json index fde608032b9..0776be8099d 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44313.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44313.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44320.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44320.json index 5e37ef9fbae..b3f032a921c 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44320.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44320.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44322.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44322.json index 1a93d534cd7..97293f482d3 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44322.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44322.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44449.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44449.json index 4e0a45e38fb..ceb5172b67a 100644 --- a/CVE-2023/CVE-2023-444xx/CVE-2023-44449.json +++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44449.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44450.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44450.json index 8ec194237b2..7fdb899172c 100644 --- a/CVE-2023/CVE-2023-444xx/CVE-2023-44450.json +++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44450.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44483.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44483.json index c85d1e42658..4a1d6a8d523 100644 --- a/CVE-2023/CVE-2023-444xx/CVE-2023-44483.json +++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44483.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json index 3489d4a582b..221f60fd981 100644 --- a/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json +++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2023-10-10T14:15:10.883", "lastModified": "2025-03-07T19:15:36.157", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-449xx/CVE-2023-44981.json b/CVE-2023/CVE-2023-449xx/CVE-2023-44981.json index dccaa6d68fe..b947301104f 100644 --- a/CVE-2023/CVE-2023-449xx/CVE-2023-44981.json +++ b/CVE-2023/CVE-2023-449xx/CVE-2023-44981.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-449xx/CVE-2023-44999.json b/CVE-2023/CVE-2023-449xx/CVE-2023-44999.json index f39000f2be9..de97ddc0754 100644 --- a/CVE-2023/CVE-2023-449xx/CVE-2023-44999.json +++ b/CVE-2023/CVE-2023-449xx/CVE-2023-44999.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4408.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4408.json index 4f0a48e0678..93f2d67ece4 100644 --- a/CVE-2023/CVE-2023-44xx/CVE-2023-4408.json +++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4408.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security-officer@isc.org", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45000.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45000.json index f3e63392032..db8b89f4a8a 100644 --- a/CVE-2023/CVE-2023-450xx/CVE-2023-45000.json +++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45000.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45069.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45069.json index 01eb2fb8358..85e9068efb3 100644 --- a/CVE-2023/CVE-2023-450xx/CVE-2023-45069.json +++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45069.json @@ -82,7 +82,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45074.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45074.json index a52fecf9318..9f8a5a9d9d6 100644 --- a/CVE-2023/CVE-2023-450xx/CVE-2023-45074.json +++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45074.json @@ -72,7 +72,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45186.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45186.json index 7cb1b146f69..4ffa07cdebd 100644 --- a/CVE-2023/CVE-2023-451xx/CVE-2023-45186.json +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45186.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45188.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45188.json index b2773fe2da1..b7f5b9e6ff6 100644 --- a/CVE-2023/CVE-2023-451xx/CVE-2023-45188.json +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45188.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45588.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45588.json index 1f8027056f2..b8cd479336e 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45588.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45588.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-03-14T16:15:27.570", "lastModified": "2025-03-14T16:15:27.570", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An external control of file name or path vulnerability [CWE-73] in FortiClientMac version 7.2.3 and below, version 7.0.10 and below installer may allow a local attacker to execute arbitrary code or commands via writing a malicious configuration file in /tmp before starting the installation process." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de control externo de nombre de archivo o ruta [CWE-73] en el instalador de FortiClientMac versi\u00f3n 7.2.3 y anteriores, versi\u00f3n 7.0.10 y anteriores puede permitir que un atacante local ejecute c\u00f3digo o comandos arbitrarios mediante la escritura de un archivo de configuraci\u00f3n malicioso en /tmp antes de iniciar el proceso de instalaci\u00f3n." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45590.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45590.json index 37952c0185f..b73b086b37c 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45590.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45590.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@fortinet.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45593.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45593.json index 05de90bd9f9..378d2ce6854 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45593.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45593.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "prodsec@nozominetworks.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45596.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45596.json index 3ddcb022970..6ef402cbc9e 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45596.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45596.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "prodsec@nozominetworks.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45598.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45598.json index 961afe971a3..e6f8f321eb0 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45598.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45598.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "prodsec@nozominetworks.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45648.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45648.json index 96cc85d407b..1004a85d525 100644 --- a/CVE-2023/CVE-2023-456xx/CVE-2023-45648.json +++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45648.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4527.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4527.json index f7410cb732b..400da500ee8 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4527.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4527.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-18T17:15:55.067", "lastModified": "2024-11-21T08:35:21.017", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46104.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46104.json index d908b770c24..3716802376c 100644 --- a/CVE-2023/CVE-2023-461xx/CVE-2023-46104.json +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46104.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46170.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46170.json index 70209d60dfb..35f6d8ed92c 100644 --- a/CVE-2023/CVE-2023-461xx/CVE-2023-46170.json +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46170.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46171.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46171.json index 1719e011941..3d77abbe5d2 100644 --- a/CVE-2023/CVE-2023-461xx/CVE-2023-46171.json +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46171.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46197.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46197.json index ad61be1af8b..ca2ad976240 100644 --- a/CVE-2023/CVE-2023-461xx/CVE-2023-46197.json +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46197.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46215.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46215.json index ee3aa4410b1..0c28a7bd6db 100644 --- a/CVE-2023/CVE-2023-462xx/CVE-2023-46215.json +++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46215.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46279.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46279.json index 10d6366efe5..a3098d37c07 100644 --- a/CVE-2023/CVE-2023-462xx/CVE-2023-46279.json +++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46279.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46604.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46604.json index e7807d48f5b..1c0b384461f 100644 --- a/CVE-2023/CVE-2023-466xx/CVE-2023-46604.json +++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46604.json @@ -66,7 +66,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46747.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46747.json index 1dd418f8e76..0f3018dd28d 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46747.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46747.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2023-10-26T21:15:08.097", "lastModified": "2025-02-13T18:15:36.957", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46823.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46823.json index f6f73cf265f..360fb729621 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46823.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46823.json @@ -72,7 +72,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47037.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47037.json index 5a96016bc83..9d4f586921f 100644 --- a/CVE-2023/CVE-2023-470xx/CVE-2023-47037.json +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47037.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47166.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47166.json index 65eab9f8ab7..cab89ac6649 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47166.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47166.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47237.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47237.json index 24a6fc3e415..727486764a5 100644 --- a/CVE-2023/CVE-2023-472xx/CVE-2023-47237.json +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47237.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47248.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47248.json index 36ae0784997..5615e3ae2c0 100644 --- a/CVE-2023/CVE-2023-472xx/CVE-2023-47248.json +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47248.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47265.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47265.json index e3a9ec94fba..3d3aaa7fff7 100644 --- a/CVE-2023/CVE-2023-472xx/CVE-2023-47265.json +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47265.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47539.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47539.json index 60e209ea26e..39d6c5db5cb 100644 --- a/CVE-2023/CVE-2023-475xx/CVE-2023-47539.json +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47539.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-03-18T14:15:37.830", "lastModified": "2025-03-18T14:15:37.830", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability in FortiMail version 7.4.0 configured with RADIUS authentication and remote_wildcard enabled may allow a remote unauthenticated attacker to bypass admin login via a crafted HTTP request." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de control de acceso inadecuado en FortiMail versi\u00f3n 7.4.0 configurada con autenticaci\u00f3n RADIUS y remote_wildcard habilitado puede permitir que un atacante remoto no autenticado evite el inicio de sesi\u00f3n de administrador a trav\u00e9s de una solicitud HTTP manipulada." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47565.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47565.json index 78ce221f4e8..4eea226e2dd 100644 --- a/CVE-2023/CVE-2023-475xx/CVE-2023-47565.json +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47565.json @@ -66,7 +66,7 @@ "weaknesses": [ { "source": "security@qnapsecurity.com.tw", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47679.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47679.json index 21b78304bfb..6ef80b72a3f 100644 --- a/CVE-2023/CVE-2023-476xx/CVE-2023-47679.json +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47679.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47709.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47709.json index 7a9e85f9888..c191c9f4ff4 100644 --- a/CVE-2023/CVE-2023-477xx/CVE-2023-47709.json +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47709.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47710.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47710.json index 651fff20a70..fa3d77990fa 100644 --- a/CVE-2023/CVE-2023-477xx/CVE-2023-47710.json +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47710.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47711.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47711.json index eea93a70297..93858a7d731 100644 --- a/CVE-2023/CVE-2023-477xx/CVE-2023-47711.json +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47711.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47714.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47714.json index dede26c7a6e..fe51c113f20 100644 --- a/CVE-2023/CVE-2023-477xx/CVE-2023-47714.json +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47714.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47802.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47802.json index bb0f998c91d..31a0960f004 100644 --- a/CVE-2023/CVE-2023-478xx/CVE-2023-47802.json +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47802.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@synology.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47803.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47803.json index 3ddd1f7e648..0ad0f367fc1 100644 --- a/CVE-2023/CVE-2023-478xx/CVE-2023-47803.json +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47803.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@synology.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47805.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47805.json index a8ce4357102..dc09f10e21e 100644 --- a/CVE-2023/CVE-2023-478xx/CVE-2023-47805.json +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47805.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47826.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47826.json index 6626de7a239..ceb74a8323f 100644 --- a/CVE-2023/CVE-2023-478xx/CVE-2023-47826.json +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47826.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T13:15:31.537", "lastModified": "2024-12-09T13:15:31.537", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47868.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47868.json index 290a2275a0b..d00a5db2230 100644 --- a/CVE-2023/CVE-2023-478xx/CVE-2023-47868.json +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47868.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48290.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48290.json index 93f9b56f620..a9162edd7c8 100644 --- a/CVE-2023/CVE-2023-482xx/CVE-2023-48290.json +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48290.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48677.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48677.json index 8b202a6319c..10df2a8f9e1 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48677.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48677.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@acronis.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48678.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48678.json index 1e818d4a813..331a3548263 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48678.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48678.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@acronis.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48679.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48679.json index c2b8c871b78..9edac0ce8f6 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48679.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48679.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@acronis.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48681.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48681.json index 8109b7d5d0a..c9b7e09b74a 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48681.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48681.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@acronis.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48682.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48682.json index 875e24133ab..c3959926756 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48682.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48682.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@acronis.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48777.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48777.json index 71243cea728..be128b2e948 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48777.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48777.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48784.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48784.json index 37c8d09509b..ff7b284bcdb 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48784.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48784.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@fortinet.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48785.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48785.json index d7bd90736a6..d4699455ba9 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48785.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48785.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-03-14T16:15:27.733", "lastModified": "2025-03-14T16:15:27.733", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper certificate validation vulnerability [CWE-295] in FortiNAC-F version 7.2.4 and below may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the HTTPS communication channel between the FortiOS device, an inventory, and FortiNAC-F." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de validaci\u00f3n de certificado incorrecta [CWE-295] en FortiNAC-F versi\u00f3n 7.2.4 y anteriores puede permitir que un atacante remoto y no autenticado realice un ataque Man-in-the-Middle en el canal de comunicaci\u00f3n HTTPS entre el dispositivo FortiOS, un inventario y FortiNAC-F." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48788.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48788.json index 53da9f128ce..143f61fad87 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48788.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48788.json @@ -66,7 +66,7 @@ "weaknesses": [ { "source": "psirt@fortinet.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-489xx/CVE-2023-48906.json b/CVE-2023/CVE-2023-489xx/CVE-2023-48906.json index 5cc438bfaf1..2194f216cd4 100644 --- a/CVE-2023/CVE-2023-489xx/CVE-2023-48906.json +++ b/CVE-2023/CVE-2023-489xx/CVE-2023-48906.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T20:15:07.750", "lastModified": "2024-11-21T08:32:36.377", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-490xx/CVE-2023-49070.json b/CVE-2023/CVE-2023-490xx/CVE-2023-49070.json index a57b4cdfc05..a1f01ebf30f 100644 --- a/CVE-2023/CVE-2023-490xx/CVE-2023-49070.json +++ b/CVE-2023/CVE-2023-490xx/CVE-2023-49070.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49299.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49299.json index a224961253e..c04e40a8d5d 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49299.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49299.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49572.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49572.json index 681040f5b61..dbdb9bd5b29 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49572.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49572.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "cve-coordination@incibe.es", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49573.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49573.json index c06b64b9065..ce56235ed09 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49573.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49573.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "cve-coordination@incibe.es", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49574.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49574.json index 582e0c5b41a..419ba12f01c 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49574.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49574.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "cve-coordination@incibe.es", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49575.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49575.json index 378166d5151..3f6d279f096 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49575.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49575.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "cve-coordination@incibe.es", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49582.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49582.json index 861153d42ee..503854dc1ef 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49582.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49582.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49733.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49733.json index e800c1790d2..a43ccb89ceb 100644 --- a/CVE-2023/CVE-2023-497xx/CVE-2023-49733.json +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49733.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49734.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49734.json index 8bd8ac7b369..2d78e7f9321 100644 --- a/CVE-2023/CVE-2023-497xx/CVE-2023-49734.json +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49734.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49736.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49736.json index 1e01c9726e0..3ffc6988953 100644 --- a/CVE-2023/CVE-2023-497xx/CVE-2023-49736.json +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49736.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-501xx/CVE-2023-50164.json b/CVE-2023/CVE-2023-501xx/CVE-2023-50164.json index ada9aac9e6c..0ba6a264855 100644 --- a/CVE-2023/CVE-2023-501xx/CVE-2023-50164.json +++ b/CVE-2023/CVE-2023-501xx/CVE-2023-50164.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50231.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50231.json index c36fd6cab57..28e3f7159c5 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50231.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50231.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50291.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50291.json index a255d787110..b3053b7b84a 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50291.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50291.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50292.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50292.json index 36e8585c3c1..d2f5d783464 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50292.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50292.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50307.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50307.json index 303a17da9e1..2d8f5553d53 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50307.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50307.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50324.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50324.json index b90b3c7179a..c3a12b6a112 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50324.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50324.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50380.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50380.json index e1f7d064eca..226414ae9e5 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50380.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50380.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50386.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50386.json index 962263fef5a..f59ee7fe2e9 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50386.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50386.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50861.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50861.json index d3569449021..4f3b1053924 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50861.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50861.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50886.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50886.json index 1384b9e215b..88905ab1ef4 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50886.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50886.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50898.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50898.json index 2e637541bde..8c36d53605b 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50898.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50898.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50903.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50903.json index f9d5a6b9af0..99083e5dd69 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50903.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50903.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50905.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50905.json index e4d47884237..40dc189aa68 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50905.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50905.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50944.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50944.json index 286683fcd5e..cae2458d4ec 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50944.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50944.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50945.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50945.json index fbeb11bb3ca..bca6b25b543 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50945.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50945.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50949.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50949.json index 1b57b70b609..a10c40f14ab 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50949.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50949.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50961.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50961.json index 79422b1cba3..438e97fe552 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50961.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50961.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-512xx/CVE-2023-51297.json b/CVE-2023/CVE-2023-512xx/CVE-2023-51297.json index 806e1cf3b6b..991118acab8 100644 --- a/CVE-2023/CVE-2023-512xx/CVE-2023-51297.json +++ b/CVE-2023/CVE-2023-512xx/CVE-2023-51297.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "La falta de limitaci\u00f3n de velocidad en the 'Email Settings' feature of PHPJabbers Hotel Booking System v4.0 permite a los atacantes enviar una cantidad excesiva de correo electr\u00f3nico a un usuario leg\u00edtimo, lo que lleva a una posible denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una gran cantidad de mensajes de correo electr\u00f3nico generados." + "value": "La falta de limitaci\u00f3n de velocidad en the 'Email Settings' feature of PHPJabbers Hotel Booking System v4.0 permite a los atacantes enviar una cantidad excesiva de correos electr\u00f3nicos a un usuario leg\u00edtimo, lo que lleva a una posible denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una gran cantidad de mensajes de correo electr\u00f3nico generados." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51353.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51353.json index 31f02e4a407..ad059d674f2 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51353.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51353.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51369.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51369.json index 834471b2012..a8de538a312 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51369.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51369.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-514xx/CVE-2023-51407.json b/CVE-2023/CVE-2023-514xx/CVE-2023-51407.json index d1fa99b52c2..447be26e632 100644 --- a/CVE-2023/CVE-2023-514xx/CVE-2023-51407.json +++ b/CVE-2023/CVE-2023-514xx/CVE-2023-51407.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-514xx/CVE-2023-51486.json b/CVE-2023/CVE-2023-514xx/CVE-2023-51486.json index e4d282cb8c7..8f9451a2107 100644 --- a/CVE-2023/CVE-2023-514xx/CVE-2023-51486.json +++ b/CVE-2023/CVE-2023-514xx/CVE-2023-51486.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-514xx/CVE-2023-51487.json b/CVE-2023/CVE-2023-514xx/CVE-2023-51487.json index d974b806bd9..f0344a9ddc3 100644 --- a/CVE-2023/CVE-2023-514xx/CVE-2023-51487.json +++ b/CVE-2023/CVE-2023-514xx/CVE-2023-51487.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-514xx/CVE-2023-51489.json b/CVE-2023/CVE-2023-514xx/CVE-2023-51489.json index f2f018fd2be..d9ee62bf811 100644 --- a/CVE-2023/CVE-2023-514xx/CVE-2023-51489.json +++ b/CVE-2023/CVE-2023-514xx/CVE-2023-51489.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-514xx/CVE-2023-51491.json b/CVE-2023/CVE-2023-514xx/CVE-2023-51491.json index fa36ac736fd..d1081aaa2aa 100644 --- a/CVE-2023/CVE-2023-514xx/CVE-2023-51491.json +++ b/CVE-2023/CVE-2023-514xx/CVE-2023-51491.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51510.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51510.json index 693474f5717..258e97b4638 100644 --- a/CVE-2023/CVE-2023-515xx/CVE-2023-51510.json +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51510.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51522.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51522.json index 958b26530e2..94178cd2779 100644 --- a/CVE-2023/CVE-2023-515xx/CVE-2023-51522.json +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51522.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51528.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51528.json index 5bc0e1e33a6..1cdeaf6e928 100644 --- a/CVE-2023/CVE-2023-515xx/CVE-2023-51528.json +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51528.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51529.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51529.json index 4aeee389171..4963212d940 100644 --- a/CVE-2023/CVE-2023-515xx/CVE-2023-51529.json +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51529.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51530.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51530.json index 59cd3e19e03..bacc03e51da 100644 --- a/CVE-2023/CVE-2023-515xx/CVE-2023-51530.json +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51530.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51531.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51531.json index 593393a399b..5cf8e6b7d3e 100644 --- a/CVE-2023/CVE-2023-515xx/CVE-2023-51531.json +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51531.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51599.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51599.json index 2cc8ecca000..1ceb71a8da3 100644 --- a/CVE-2023/CVE-2023-515xx/CVE-2023-51599.json +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51599.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51600.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51600.json index c83e25ae397..8c6cd165b42 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51600.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51600.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51601.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51601.json index 6c568f28cbf..a9895a94bae 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51601.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51601.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51602.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51602.json index a42bfed8f8d..cad76c89d86 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51602.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51602.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51603.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51603.json index 2e8ddb6fa7a..b1ff3a1ac34 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51603.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51603.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51604.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51604.json index 7283437bc55..bce70462a65 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51604.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51604.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51605.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51605.json index ab2b36bd124..4e921d1c5c7 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51605.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51605.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51656.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51656.json index aa2bae0155d..947fa226b6c 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51656.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51656.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51692.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51692.json index 7e9a47a489e..8278b235513 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51692.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51692.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51696.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51696.json index 90feafb832e..b5112af82bf 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51696.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51696.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51699.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51699.json index fe418eddff8..a59828d7c3a 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51699.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51699.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-15T19:15:06.810", "lastModified": "2024-11-21T08:38:38.060", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51770.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51770.json index add2f057c07..9cc82c7c7e1 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51770.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51770.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51784.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51784.json index eca5de7a1ee..8a7ccfc1252 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51784.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51784.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51785.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51785.json index e63065019e8..f471ae85256 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51785.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51785.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52214.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52214.json index b736a807e29..dbf36985480 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52214.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52214.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52226.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52226.json index 57042ecbc22..10615b4f2c6 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52226.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52226.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52291.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52291.json index 23fba295be9..71b3ccf2bc7 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52291.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52291.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52335.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52335.json index 108fa085b8b..b2055e3a6d6 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52335.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52335.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52362.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52362.json index 8681fc9443d..2d1bffc8d3b 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52362.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52362.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52367.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52367.json index a62bc674ff8..c22d77f3f1a 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52367.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52367.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52374.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52374.json index 96696d51b3c..30cc73b42ec 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52374.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52374.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52376.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52376.json index c372d1c3350..fe2839f7090 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52376.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52376.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52537.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52537.json index 3acf37ef43b..dd939ac8cae 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52537.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52537.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52539.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52539.json index f7b1dbe3646..de35f1c36c4 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52539.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52539.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52541.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52541.json index c8d9a412e42..1d06d39fa36 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52541.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52541.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52542.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52542.json index d0392514cec..726b48e31c7 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52542.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52542.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52545.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52545.json index c29a090343d..b9e659391f5 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52545.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52545.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52553.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52553.json index 324e8068472..21e91ef8828 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52553.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52553.json @@ -52,7 +52,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52554.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52554.json index f9242f28067..29c14643806 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52554.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52554.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52584.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52584.json index 1035cc0c637..950061bc573 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52584.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52584.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52585.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52585.json index 8b85345e903..785f9a33055 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52585.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52585.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52601.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52601.json index 638627f1e53..177757284cf 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52601.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52601.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52602.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52602.json index a73d64dfe42..d71ff8bf261 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52602.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52602.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52607.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52607.json index a70425dca18..1a151941254 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52607.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52607.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52642.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52642.json index a6ba78257c3..69556f64482 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52642.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52642.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T10:15:08.447", "lastModified": "2024-11-21T08:40:16.077", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52644.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52644.json index 6ff994d85b8..74d14896660 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52644.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52644.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:08.210", "lastModified": "2024-11-21T08:40:16.333", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52713.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52713.json index fe6bae7fa4a..52d1315d323 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52713.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52713.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52714.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52714.json index 041b1c8147a..63b86952492 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52714.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52714.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52717.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52717.json index 59eee821887..15a58a11f62 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52717.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52717.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52927.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52927.json index e6c7d5788fd..561ae329d99 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52927.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52927.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-14T15:15:39.253", "lastModified": "2025-03-14T15:15:39.253", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: allow exp not to be removed in nf_ct_find_expectation\n\nCurrently nf_conntrack_in() calling nf_ct_find_expectation() will\nremove the exp from the hash table. However, in some scenario, we\nexpect the exp not to be removed when the created ct will not be\nconfirmed, like in OVS and TC conntrack in the following patches.\n\nThis patch allows exp not to be removed by setting IPS_CONFIRMED\nin the status of the tmpl." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: permite que exp no se elimine en nf_ct_find_expectation. Actualmente, nf_conntrack_in(), que llama a nf_ct_find_expectation(), elimina la exp de la tabla hash. Sin embargo, en algunos casos, esperamos que la exp no se elimine cuando el ct creado no se confirme, como en OVS y TC conntrack en los parches posteriores. Este parche permite que exp no se elimine estableciendo IPS_CONFIRMED en el estado del tmpl." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5823.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5823.json index 61d752467b2..8a4f69e2bc0 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5823.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5823.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6090.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6090.json index 97ab4d62d67..89757428ed5 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6090.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6090.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6132.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6132.json index 741e937b623..4a7b5252058 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6132.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6132.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "ics-cert@hq.dhs.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6267.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6267.json index 84aa7cbb5be..3d309768c75 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6267.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6267.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6317.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6317.json index 7bff4dd04c7..88d967679f5 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6317.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6317.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "cve-requests@bitdefender.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6318.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6318.json index 48e62bebc9a..b8e08b7c46a 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6318.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6318.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "cve-requests@bitdefender.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6319.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6319.json index 40ab3b8186e..c44425a6be4 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6319.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6319.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "cve-requests@bitdefender.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6320.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6320.json index fa003f503a5..4131aabdaec 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6320.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6320.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "cve-requests@bitdefender.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6323.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6323.json index e3ddc1c7c2b..8413645fa02 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6323.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6323.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "cve-requests@bitdefender.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6408.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6408.json index f74d3b75504..269fe2a5f42 100644 --- a/CVE-2023/CVE-2023-64xx/CVE-2023-6408.json +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6408.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "cybersecurity@se.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6531.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6531.json index b0943f14464..e795737c682 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6531.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6531.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6731.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6731.json index 7b60ba79627..45769b90ad6 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6731.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6731.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json index d77d5d6047d..16ebfa129ec 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6942.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6942.json index 34cb1931c19..1ceb0fb3acf 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6942.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6942.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6943.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6943.json index 36eeaee2bc3..5ef08ca4e0d 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6943.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6943.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6948.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6948.json index a859f940f85..cfc03b28bbb 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6948.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6948.json @@ -72,7 +72,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7015.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7015.json index da5abd62e2a..be3ade618c1 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7015.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7015.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7103.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7103.json index 4bef2007f5f..1ad256bdb64 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7103.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7103.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "iletisim@usom.gov.tr", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "iletisim@usom.gov.tr", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0083.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0083.json index 7a506115d2c..a5fd4bd7ea3 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0083.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0083.json @@ -72,7 +72,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0155.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0155.json index f810e47c6db..6a594bf4dfc 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0155.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0155.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0163.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0163.json index 7c6b8430694..d64c35bef57 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0163.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0163.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0243.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0243.json index 5fca779fd73..c4142e79522 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0243.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0243.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0245.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0245.json index bbf2897975a..957de79b7e7 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0245.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0245.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:13.043", "lastModified": "2025-03-20T10:15:13.043", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A misconfiguration in the AndroidManifest.xml file in hamza417/inure before build97 allows for task hijacking. This vulnerability permits malicious applications to inherit permissions of the vulnerable app, potentially leading to the exposure of sensitive information. An attacker can create a malicious app that hijacks the legitimate Inure app, intercepting and stealing sensitive information when installed on the victim's device. This issue affects all Android versions before Android 11." + }, + { + "lang": "es", + "value": "Una configuraci\u00f3n incorrecta en el archivo AndroidManifest.xml de hamza417/inure anterior a la compilaci\u00f3n 97 permite el secuestro de tareas. Esta vulnerabilidad permite que aplicaciones maliciosas hereden los permisos de la aplicaci\u00f3n vulnerable, lo que podr\u00eda exponer informaci\u00f3n confidencial. Un atacante puede crear una aplicaci\u00f3n maliciosa que secuestre la aplicaci\u00f3n leg\u00edtima Inure, interceptando y robando informaci\u00f3n confidencial al instalarse en el dispositivo de la v\u00edctima. Este problema afecta a todas las versiones de Android anteriores a Android 11." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0368.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0368.json index 7bc39c01d09..f66df23dc0a 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0368.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0368.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0369.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0369.json index 788e886f5f0..445f14ad3c8 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0369.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0369.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0399.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0399.json index 2ed665857f7..94d717841a4 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0399.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0399.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-15T05:15:14.627", "lastModified": "2024-11-21T08:46:29.970", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0406.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0406.json index 3292edb9780..916409d9111 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0406.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0406.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-06T17:15:07.127", "lastModified": "2025-03-11T04:15:22.860", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0435.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0435.json index 646455e099e..8e7c4dfcf65 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0435.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0435.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0436.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0436.json index af49420f7f5..4c95dae2c04 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0436.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0436.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0439.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0439.json index ccc2986c431..db15a92a735 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0439.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0439.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0440.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0440.json index 076ca5e3974..82728274657 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0440.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0440.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0447.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0447.json index 85aa9089a87..cadefb30107 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0447.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0447.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0455.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0455.json index 41406898a4c..6eba7e48b7e 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0455.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0455.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0550.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0550.json index 25bdb1fa90d..2fa0c9e29c8 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0550.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0550.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0551.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0551.json index 038cb5a2490..71e39ee5244 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0551.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0551.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0560.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0560.json index e159754df86..d25ea3eadfc 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0560.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0560.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0640.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0640.json index 2c4b9794a3d..8cf445700c8 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0640.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0640.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:14.093", "lastModified": "2025-03-20T10:15:14.093", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability exists in chatwoot/chatwoot versions 3.0.0 to 3.5.1. This vulnerability allows an admin user to inject malicious JavaScript code via the dashboard app settings, which can then be executed by another admin user when they access the affected dashboard app. The issue is fixed in version 3.5.2." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en chatwoot/chatwoot versiones 3.0.0 a 3.5.1. Esta vulnerabilidad permite a un usuario administrador inyectar c\u00f3digo JavaScript malicioso a trav\u00e9s de la configuraci\u00f3n de la aplicaci\u00f3n del panel, que posteriormente puede ser ejecutado por otro usuario administrador al acceder a la aplicaci\u00f3n del panel afectada. El problema se ha corregido en la versi\u00f3n 3.5.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0681.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0681.json index 514ecc55ad6..0a551937c47 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0681.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0681.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0687.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0687.json index c8feaef8c76..29ecffbcf18 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0687.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0687.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0702.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0702.json index 0162965a7e8..6ade0c510cb 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0702.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0702.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0759.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0759.json index 594717ca25f..2f332795fe3 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0759.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0759.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0763.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0763.json index c3248d372c4..83658861e3b 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0763.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0763.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0765.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0765.json index 8a9f3eeaf42..e5b184e2d0c 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0765.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0765.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0795.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0795.json index 039d01af8b7..7042d4b1d6d 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0795.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0795.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0798.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0798.json index 092022f8d23..e8cd00d2828 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0798.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0798.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0815.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0815.json index 5de463a1c96..17b30207543 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0815.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0815.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0817.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0817.json index 3bc6f4a2e7a..5851d0a0d9f 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0817.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0817.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0818.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0818.json index db26a3e80ec..82eb0ea60d5 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0818.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0818.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0829.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0829.json index 418c3fffb6f..4d712264a2a 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0829.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0829.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0839.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0839.json index 0aed4b44f42..975679362b0 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0839.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0839.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0860.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0860.json index 2796262c189..32cc938653f 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0860.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0860.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "ics-cert@hq.dhs.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0864.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0864.json index ca1e3432398..e147bc68021 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0864.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0864.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cvd@cert.pl", "published": "2024-02-29T13:15:07.260", "lastModified": "2024-11-21T08:47:31.940", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0893.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0893.json index 18114cbf556..f59e76a03ba 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0893.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0893.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-24T07:15:09.387", "lastModified": "2024-11-21T08:47:38.243", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0902.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0902.json index eab5da6fae4..7a9f9d73675 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0902.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0902.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-15T05:15:14.680", "lastModified": "2024-11-21T08:47:39.947", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0906.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0906.json index 2a1d7fa2069..2658472cf72 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0906.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0906.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0976.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0976.json index 3dde4215cbf..63bff2090bb 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0976.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0976.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0978.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0978.json index 51d3d098570..28dc1154979 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0978.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0978.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10012.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10012.json index 1ae05b0b73f..155a1ae5065 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10012.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10012.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@progress.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10013.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10013.json index 26fcde5c0f2..97d254c3109 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10013.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10013.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@progress.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10019.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10019.json index b99082f6796..e4804cb06af 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10019.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10019.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:14.230", "lastModified": "2025-03-20T10:15:14.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the `start_app_server` function of parisneo/lollms-webui V12 (Strawberry) allows for path traversal and OS command injection. The function does not properly sanitize the `app_name` parameter, enabling an attacker to upload a malicious `server.py` file and execute arbitrary code by exploiting the path traversal vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la funci\u00f3n `start_app_server` de parisneo/lollms-webui V12 (Strawberry) permite el path traversal y la inyecci\u00f3n de comandos del sistema operativo. La funci\u00f3n no depura correctamente el par\u00e1metro `app_name`, lo que permite a un atacante cargar un archivo `server.py` malicioso y ejecutar c\u00f3digo arbitrario aprovechando la vulnerabilidad de path traversal." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10041.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10041.json index a4ada132451..29e0ca6514a 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10041.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10041.json @@ -62,7 +62,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10047.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10047.json index 5b83f32894a..29bc0404ed3 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10047.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10047.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:14.360", "lastModified": "2025-03-20T10:15:14.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "parisneo/lollms-webui versions v9.9 to the latest are vulnerable to a directory listing vulnerability. An attacker can list arbitrary directories on a Windows system by sending a specially crafted HTTP request to the /open_file endpoint." + }, + { + "lang": "es", + "value": "Las versiones de parisneo/lollms-webui (v9.9 y posteriores) son vulnerables a una vulnerabilidad de listado de directorios. Un atacante puede listar directorios arbitrarios en un sistema Windows enviando una solicitud HTTP especialmente manipulada al endpoint /open_file." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10051.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10051.json index 0b6d06d34f1..c8d6dbadd4b 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10051.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10051.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:14.490", "lastModified": "2025-03-20T10:15:14.490", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Realchar version v0.0.4 is vulnerable to an unauthenticated denial of service (DoS) attack. The vulnerability exists in the file upload request handling, where appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request causes the server to continuously process each character. This leads to excessive resource consumption and renders the service unavailable. The issue is unauthenticated and does not require any user interaction, impacting all users of the service." + }, + { + "lang": "es", + "value": "La versi\u00f3n v0.0.4 de Realchar es vulnerable a un ataque de denegaci\u00f3n de servicio (DoS) no autenticado. La vulnerabilidad se presenta en la gesti\u00f3n de solicitudes de carga de archivos, donde a\u00f1adir caracteres, como guiones (-), al final de un l\u00edmite multiparte en una solicitud HTTP, hace que el servidor procese continuamente cada car\u00e1cter. Esto provoca un consumo excesivo de recursos y deja el servicio indisponible. El problema no est\u00e1 autenticado y no requiere la interacci\u00f3n del usuario, lo que afecta a todos los usuarios del servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10096.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10096.json index 78664baded4..99fdee5ebd9 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10096.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10096.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:14.613", "lastModified": "2025-03-20T10:15:14.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dask versions <=2024.8.2 contain a vulnerability in the Dask Distributed Server where the use of pickle serialization allows attackers to craft malicious objects. These objects can be serialized on the client side and sent to the server for deserialization, leading to remote command execution and potentially granting full control over the Dask server." + }, + { + "lang": "es", + "value": "Las versiones de Dask anteriores a la 2024.8.2 contienen una vulnerabilidad en el servidor distribuido de Dask donde el uso de la serializaci\u00f3n de pickle permite a los atacantes manipular objetos maliciosos. Estos objetos pueden serializarse en el cliente y enviarse al servidor para su deserializaci\u00f3n, lo que permite la ejecuci\u00f3n remota de comandos y potencialmente otorga control total sobre el servidor de Dask." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10109.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10109.json index e88fbece480..8dc5c70562f 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10109.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10109.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:14.737", "lastModified": "2025-03-20T10:15:14.737", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the mintplex-labs/anything-llm repository, as of commit 5c40419, allows low privilege users to access the sensitive API endpoint \"/api/system/custom-models\". This access enables them to modify the model's API key and base path, leading to potential API key leakage and denial of service on chats." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el repositorio mintplex-labs/anything-llm, a partir de commit 5c40419, permite a usuarios con pocos privilegios acceder al endpoint de la API sensible \"/api/system/custom-models\". Este acceso les permite modificar la clave API y la ruta base del modelo, lo que puede provocar una fuga de la clave API y una denegaci\u00f3n de servicio en los chats." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10110.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10110.json index 442d70b7b5e..4163a7b1fa4 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10110.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10110.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:14.867", "lastModified": "2025-03-20T10:15:14.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In version 3.23.0 of aimhubio/aim, the ScheduledStatusReporter object can be instantiated to run on the main thread of the tracking server, leading to the main thread being blocked indefinitely. This results in a denial of service as the tracking server becomes unable to respond to other requests." + }, + { + "lang": "es", + "value": "En la versi\u00f3n 3.23.0 de aimhubio/aim, el objeto ScheduledStatusReporter puede instanciarse para ejecutarse en el hilo principal del servidor de seguimiento, lo que provoca el bloqueo indefinido de dicho hilo. Esto provoca una denegaci\u00f3n de servicio, ya que el servidor de seguimiento no puede responder a otras solicitudes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10188.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10188.json index 134f0519c76..9155c80636c 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10188.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10188.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:14.993", "lastModified": "2025-03-20T10:15:14.993", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in BerriAI/litellm, as of commit 26c03c9, allows unauthenticated users to cause a Denial of Service (DoS) by exploiting the use of ast.literal_eval to parse user input. This function is not safe and is prone to DoS attacks, which can crash the litellm Python server." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en BerriAI/litellm, a partir del commit 26c03c9, permite a usuarios no autenticados causar una denegaci\u00f3n de servicio (DoS) al explotar el uso de ast.literal_eval para analizar la entrada del usuario. Esta funci\u00f3n no es segura y es propensa a ataques DoS, que pueden colapsar el servidor Python de litellm." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10190.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10190.json index fe3b6fd11e4..266fc9fe094 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10190.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10190.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:15.117", "lastModified": "2025-03-20T10:15:15.117", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Horovod versions up to and including v0.28.1 are vulnerable to unauthenticated remote code execution. The vulnerability is due to improper handling of base64-encoded data in the `ElasticRendezvousHandler`, a subclass of `KVStoreHandler`. Specifically, the `_put_value` method in `ElasticRendezvousHandler` calls `codec.loads_base64(value)`, which eventually invokes `cloudpickle.loads(decoded)`. This allows an attacker to send a malicious pickle object via a PUT request, leading to arbitrary code execution on the server." + }, + { + "lang": "es", + "value": "Las versiones de Horovod hasta la v0.28.1 incluida son vulnerables a la ejecuci\u00f3n remota de c\u00f3digo no autenticado. Esta vulnerabilidad se debe a la gesti\u00f3n inadecuada de datos codificados en base64 en `ElasticRendezvousHandler`, una subclase de `KVStoreHandler`. Espec\u00edficamente, el m\u00e9todo `_put_value` de `ElasticRendezvousHandler` llama a `codec.loads_base64(value)`, que finalmente invoca a `cloudpickle.loads(decoded)`. Esto permite a un atacante enviar un objeto pickle malicioso mediante una solicitud PUT, lo que provoca la ejecuci\u00f3n de c\u00f3digo arbitrario en el servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10225.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10225.json index 9801bd37f22..62448cf056b 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10225.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10225.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:15.237", "lastModified": "2025-03-20T10:15:15.237", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in haotian-liu/llava v1.2.0 allows an attacker to cause a Denial of Service (DoS) by appending a large number of characters to the end of a multipart boundary in a file upload request. This causes the server to continuously process each character, rendering the application inaccessible." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en haotian-liu/llava v1.2.0 permite a un atacante provocar una denegaci\u00f3n de servicio (DoS) a\u00f1adiendo una gran cantidad de caracteres al final de un l\u00edmite multiparte en una solicitud de carga de archivos. Esto provoca que el servidor procese continuamente cada car\u00e1cter, lo que hace que la aplicaci\u00f3n sea inaccesible." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10234.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10234.json index 671b5a3e92a..b982747abfd 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10234.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10234.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10252.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10252.json index bf78d3e7b04..fc1c6af6ccc 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10252.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10252.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:15.360", "lastModified": "2025-03-20T10:15:15.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in langgenius/dify versions <=v0.9.1 allows for code injection via internal SSRF requests in the Dify sandbox service. This vulnerability enables an attacker to execute arbitrary Python code with root privileges within the sandbox environment, potentially leading to the deletion of the entire sandbox service and causing irreversible damage." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en las versiones de langgenius/dify anteriores a la v0.9.1 permite la inyecci\u00f3n de c\u00f3digo mediante solicitudes SSRF internas en el servicio de la sandbox de Dify. Esta vulnerabilidad permite a un atacante ejecutar c\u00f3digo Python arbitrario con privilegios de root dentro del entorno de la sandbox, lo que podr\u00eda provocar la eliminaci\u00f3n completa del servicio de la sandbox y causar da\u00f1os irreversibles." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10261.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10261.json index 36ba7e6fd4e..83d2d4be382 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10261.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10261.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10264.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10264.json index 7145ceded69..f8c0855ca16 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10264.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10264.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:15.487", "lastModified": "2025-03-20T10:15:15.487", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HTTP Request Smuggling vulnerability in netease-youdao/qanything version 1.4.1 allows attackers to exploit inconsistencies in the interpretation of HTTP requests between a proxy and a server. This can lead to unauthorized access, bypassing security controls, session hijacking, data leakage, and potentially arbitrary code execution." + }, + { + "lang": "es", + "value": "La vulnerabilidad de contrabando de solicitudes HTTP en netease-youdao/qanything versi\u00f3n 1.4.1 permite a los atacantes explotar inconsistencias en la interpretaci\u00f3n de las solicitudes HTTP entre un proxy y un servidor. Esto puede provocar acceso no autorizado, eludir los controles de seguridad, secuestro de sesiones, fuga de datos y, potencialmente, la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10267.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10267.json index 57576bdd349..85ba543c772 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10267.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10267.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:15.607", "lastModified": "2025-03-20T10:15:15.607", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information disclosure vulnerability exists in the latest version of transformeroptimus/superagi. An attacker can leak sensitive user information, including names, emails, and passwords, by attempting to register a new account with an email that is already in use. The server returns all information associated with the existing account. The vulnerable endpoint is located in the user registration functionality." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en la \u00faltima versi\u00f3n de transformeroptimus/superagi. Un atacante puede filtrar informaci\u00f3n confidencial del usuario, como nombres, correos electr\u00f3nicos y contrase\u00f1as, al intentar registrar una nueva cuenta con un correo electr\u00f3nico ya utilizado. El servidor devuelve toda la informaci\u00f3n asociada a la cuenta existente. El endpoint vulnerable se encuentra en la funci\u00f3n de registro de usuarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10272.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10272.json index 7a3346ce8a9..f81ab430f51 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10272.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10272.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "lunary-ai/lunary is vulnerable to broken access control in the latest version. An attacker can view the content of any dataset without any kind of authorization by sending a GET request to the /v1/datasets endpoint without a valid authorization token." + }, + { + "lang": "es", + "value": "lunary-ai/lunary es vulnerable a un control de acceso deficiente en la \u00faltima versi\u00f3n. Un atacante puede acceder al contenido de cualquier conjunto de datos sin autorizaci\u00f3n enviando una solicitud GET al endpoint /v1/datasets sin un token de autorizaci\u00f3n v\u00e1lido." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10273.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10273.json index d5c1a11df76..ea34d88d5f5 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10273.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10273.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:15.853", "lastModified": "2025-03-20T10:15:15.853", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In lunary-ai/lunary v1.5.0, improper privilege management in the models.ts file allows users with viewer roles to modify models owned by others. The PATCH endpoint for models does not have appropriate privilege checks, enabling low-privilege users to update models they should not have access to modify. This vulnerability could lead to unauthorized changes in critical resources, affecting the integrity and reliability of the system." + }, + { + "lang": "es", + "value": "En lunary-ai/lunary v1.5.0, una gesti\u00f3n incorrecta de privilegios en el archivo models.ts permite a los usuarios con roles de visor modificar modelos de otros usuarios. El endpoint PATCH para modelos no cuenta con las comprobaciones de privilegios adecuadas, lo que permite a usuarios con pocos privilegios actualizar modelos a los que no deber\u00edan tener acceso para modificar. Esta vulnerabilidad podr\u00eda provocar cambios no autorizados en recursos cr\u00edticos, lo que afecta la integridad y la fiabilidad del sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10274.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10274.json index 7af51ba0315..400667c2687 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10274.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10274.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:15.983", "lastModified": "2025-03-20T10:15:15.983", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper authorization vulnerability exists in lunary-ai/lunary version 1.5.5. The /users/me/org endpoint lacks adequate access control mechanisms, allowing unauthorized users to access sensitive information about all team members in the current organization. This vulnerability can lead to the disclosure of sensitive information such as names, roles, or emails to users without sufficient privileges, resulting in privacy violations and potential reconnaissance for targeted attacks." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de autorizaci\u00f3n indebida en la versi\u00f3n 1.5.5 de lunary-ai/lunary. El endpoint /users/me/org carece de mecanismos de control de acceso adecuados, lo que permite que usuarios no autorizados accedan a informaci\u00f3n confidencial sobre todos los miembros del equipo de la organizaci\u00f3n actual. Esta vulnerabilidad puede provocar la divulgaci\u00f3n de informaci\u00f3n confidencial, como nombres, roles o correos electr\u00f3nicos, a usuarios sin los privilegios necesarios, lo que resulta en violaciones de la privacidad y un posible reconocimiento para ataques dirigidos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10275.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10275.json index 11ba98435b2..acb304a1396 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10275.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10275.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:16.107", "lastModified": "2025-03-20T10:15:16.107", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In version 1.5.5 of lunary-ai/lunary, a vulnerability exists where admins, who do not have direct permissions to access billing resources, can change the permissions of existing users to include billing permissions. This can lead to a privilege escalation scenario where an administrator can manage billing, effectively bypassing the intended role-based access control. Only users with the 'owner' role should be allowed to invite members with billing permissions. This flaw allows admins to circumvent those restrictions, gaining unauthorized access and control over billing information, posing a risk to the organization\u2019s financial resources." + }, + { + "lang": "es", + "value": "En la versi\u00f3n 1.5.5 de lunary-ai/lunary, existe una vulnerabilidad que permite a los administradores, sin permisos directos para acceder a los recursos de facturaci\u00f3n, modificar los permisos de los usuarios existentes para incluirlos. Esto puede dar lugar a una escalada de privilegios donde un administrador puede gestionar la facturaci\u00f3n, omitiendo as\u00ed el control de acceso basado en roles. Solo los usuarios con el rol de \"propietario\" deber\u00edan poder invitar a miembros con permisos de facturaci\u00f3n. Esta falla permite a los administradores eludir estas restricciones, obteniendo acceso y control no autorizados sobre la informaci\u00f3n de facturaci\u00f3n, lo que supone un riesgo para los recursos financieros de la organizaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10294.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10294.json index 0e65fccbb40..ec42e077ada 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10294.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10294.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10321.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10321.json index fbed5ff4b98..25636f11430 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10321.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10321.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10322.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10322.json index 59b601ef6c2..f2b8bd2e660 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10322.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10322.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "El complemento Brizy \u2013 Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de las cargas de archivos SVG de la API REST en todas las versiones hasta 2.6.8 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida insuficientes. Esto hace posible que los atacantes autenticados, con acceso de nivel de autor y superior, inyecten scripts web arbitraria en las p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." + "value": "El complemento Brizy \u2013 Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de las cargas de archivos SVG de la API REST en todas las versiones hasta 2.6.8 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto hace posible que los atacantes autenticados, con acceso de nivel de autor y superior, inyecten scripts web arbitrarios en las p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10326.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10326.json index b98bbe481e7..fafa9282450 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10326.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10326.json @@ -52,7 +52,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10330.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10330.json index ef2676e4a0b..763db378a31 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10330.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10330.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:16.230", "lastModified": "2025-03-20T10:15:16.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In lunary-ai/lunary version 1.5.6, the `/v1/evaluators/` endpoint lacks proper access control, allowing any user associated with a project to fetch all evaluator data regardless of their role. This vulnerability permits low-privilege users to access potentially sensitive evaluation data." + }, + { + "lang": "es", + "value": "En la versi\u00f3n 1.5.6 de lunary-ai/lunary, el endpoint `/v1/evaluators/` carece de un control de acceso adecuado, lo que permite que cualquier usuario asociado a un proyecto obtenga todos los datos de los evaluadores, independientemente de su rol. Esta vulnerabilidad permite a usuarios con pocos privilegios acceder a datos de evaluaci\u00f3n potencialmente sensibles." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10356.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10356.json index 578150ed105..f397b43d65a 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10356.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10356.json @@ -52,7 +52,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10359.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10359.json index 7eb8a63712f..1c485904e52 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10359.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10359.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:16.357", "lastModified": "2025-03-20T10:15:16.357", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In danny-avila/librechat version v0.7.5-rc2, a vulnerability exists in the preset creation functionality where a user can manipulate the user ID field through mass assignment. This allows an attacker to inject a different user ID into the preset object, causing the preset to appear in the UI of another user. The vulnerability arises because the backend saves the entire object received without validating the attributes and their values, impacting both integrity and confidentiality." + }, + { + "lang": "es", + "value": "En la versi\u00f3n v0.7.5-rc2 de danny-avila/librechat, existe una vulnerabilidad en la funci\u00f3n de creaci\u00f3n de presets, donde un usuario puede manipular el campo de ID de usuario mediante asignaci\u00f3n masiva. Esto permite a un atacante inyectar un ID de usuario diferente en el objeto preset, provocando que este aparezca en la interfaz de usuario de otro usuario. La vulnerabilidad surge porque el backend guarda todo el objeto recibido sin validar los atributos ni sus valores, lo que afecta tanto la integridad como la confidencialidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10361.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10361.json index 600730f4953..549594c6aec 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10361.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10361.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:16.507", "lastModified": "2025-03-20T10:15:16.507", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An arbitrary file deletion vulnerability exists in danny-avila/librechat version v0.7.5-rc2, specifically within the /api/files endpoint. This vulnerability arises from improper input validation, allowing path traversal techniques to delete arbitrary files on the server. Attackers can exploit this to bypass security mechanisms and delete files outside the intended directory, including critical system files, user data, or application resources. This vulnerability impacts the integrity and availability of the system." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de eliminaci\u00f3n arbitraria de archivos en la versi\u00f3n v0.7.5-rc2 de danny-avila/librechat, espec\u00edficamente en el endpoint /api/files. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada incorrecta, lo que permite que t\u00e9cnicas de path traversal eliminen archivos arbitrarios en el servidor. Los atacantes pueden explotar esto para eludir los mecanismos de seguridad y eliminar archivos fuera del directorio previsto, incluyendo archivos cr\u00edticos del sistema, datos de usuario o recursos de la aplicaci\u00f3n. Esta vulnerabilidad afecta la integridad y la disponibilidad del sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10363.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10363.json index ef2cd271427..af9c7ec5d5c 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10363.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10363.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:16.630", "lastModified": "2025-03-20T10:15:16.630", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In version 0.7.5 of danny-avila/LibreChat, there is an improper access control vulnerability. Users can share, use, and create prompts without being granted permission by the admin. This can break application logic and permissions, allowing unauthorized actions." + }, + { + "lang": "es", + "value": "En la versi\u00f3n 0.7.5 de danny-avila/LibreChat, existe una vulnerabilidad de control de acceso indebido. Los usuarios pueden compartir, usar y crear avisos sin permiso del administrador. Esto puede vulnerar la l\u00f3gica y los permisos de la aplicaci\u00f3n, permitiendo acciones no autorizadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10366.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10366.json index 1564c60d146..b5ec61de71b 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10366.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10366.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:16.757", "lastModified": "2025-03-20T10:15:16.757", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability (IDOR) exists in the delete attachments functionality of danny-avila/librechat version v0.7.5-rc2. The endpoint does not verify whether the provided attachment ID belongs to the current user, allowing any authenticated user to delete attachments of other users." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de control de acceso indebido (IDOR) en la funci\u00f3n de eliminaci\u00f3n de adjuntos de la versi\u00f3n v0.7.5-rc2 de danny-avila/librechat. El endpoint no verifica si el ID del adjunto proporcionado pertenece al usuario actual, lo que permite que cualquier usuario autenticado elimine los adjuntos de otros usuarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10402.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10402.json index 0b42c0c05f8..050f58b3aeb 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10402.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10402.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10441.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10441.json index 56b3846cb6a..24abac6b1c3 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10441.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10441.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@synology.com", "published": "2025-03-19T02:15:27.120", "lastModified": "2025-03-20T04:15:16.153", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10442.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10442.json index 89a22cfc6d9..a67203047e3 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10442.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10442.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@synology.com", "published": "2025-03-19T03:15:11.790", "lastModified": "2025-03-19T03:15:11.790", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Off-by-one error vulnerability in the transmission component in Synology Replication Service before 1.0.12-0066, 1.2.2-0353 and 1.3.0-0423 and Synology Unified Controller (DSMUC) before 3.1.4-23079 allows remote attackers to execute arbitrary code, potentially leading to a broader impact across the system via unspecified vectors." + }, + { + "lang": "es", + "value": "La vulnerabilidad de error de uno en uno en el componente de transmisi\u00f3n en Synology Replication Service anterior a 1.0.12-0066, 1.2.2-0353 y 1.3.0-0423 y Synology Unified Controller (DSMUC) anterior a 3.1.4-23079 permite a atacantes remotos ejecutar c\u00f3digo arbitrario, lo que podr\u00eda generar un impacto m\u00e1s amplio en todo el sistema a trav\u00e9s de vectores no especificados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10443.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10443.json index eb625b0f7a2..0e4c6ea658d 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10443.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10443.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@synology.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10444.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10444.json index 72bb4771932..f03d52d81b8 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10444.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10444.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@synology.com", "published": "2025-03-19T02:15:28.297", "lastModified": "2025-03-19T02:15:28.297", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper certificate validation vulnerability in the LDAP utilities in Synology DiskStation Manager (DSM) before 7.1.1-42962-8, 7.2.1-69057-7 and 7.2.2-72806-3 allows man-in-the-middle attackers to hijack the authentication of administrators via unspecified vectors." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de validaci\u00f3n de certificado incorrecta en las utilidades LDAP en Synology DiskStation Manager (DSM) anteriores a 7.1.1-42962-8, 7.2.1-69057-7 y 7.2.2-72806-3 permite a atacantes intermediarios secuestrar la autenticaci\u00f3n de los administradores a trav\u00e9s de vectores no especificados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10445.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10445.json index 9d70dfa0d7b..405fabb0996 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10445.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10445.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@synology.com", "published": "2025-03-19T02:15:28.413", "lastModified": "2025-03-20T05:15:38.783", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10453.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10453.json index 198235a6b4a..b845f5ada10 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10453.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10453.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-12-21T10:15:05.740", "lastModified": "2024-12-21T10:15:05.740", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10457.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10457.json index 4aec42c9da9..3c45ba8302d 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10457.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10457.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:16.880", "lastModified": "2025-03-20T10:15:16.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple Server-Side Request Forgery (SSRF) vulnerabilities were identified in the significant-gravitas/autogpt repository, specifically in the GitHub Integration and Web Search blocks. These vulnerabilities affect version agpt-platform-beta-v0.1.1. The issues arise when block inputs are controlled by untrusted sources, leading to potential credential leakage, internal network scanning, and unauthorized access to internal services, APIs, or data stores. The affected blocks include GithubListPullRequestsBlock, GithubReadPullRequestBlock, GithubAssignPRReviewerBlock, GithubListPRReviewersBlock, GithubUnassignPRReviewerBlock, GithubCommentBlock, GithubMakeIssueBlock, GithubReadIssueBlock, GithubListIssuesBlock, GithubAddLabelBlock, GithubRemoveLabelBlock, GithubListBranchesBlock, and ExtractWebsiteContentBlock." + }, + { + "lang": "es", + "value": "Se identificaron m\u00faltiples vulnerabilidades de Server-Side Request Forgery (SSRF) en el repositorio significant-gravitas/autogpt, espec\u00edficamente en los bloques de integraci\u00f3n de GitHub y b\u00fasqueda web. Estas vulnerabilidades afectan a la versi\u00f3n agpt-platform-beta-v0.1.1. Los problemas surgen cuando las entradas de los bloques son controladas por fuentes no confiables, lo que puede provocar fugas de credenciales, escaneo interno de la red y acceso no autorizado a servicios internos, API o almacenes de datos. Los bloques afectados incluyen GithubListPullRequestsBlock, GithubReadPullRequestBlock, GithubAssignPRReviewerBlock, GithubListPRReviewersBlock, GithubUnassignPRReviewerBlock, GithubCommentBlock, GithubMakeIssueBlock, GithubReadIssueBlock, GithubListIssuesBlock, GithubAddLabelBlock, GithubRemoveLabelBlock, GithubListBranchesBlock y ExtractWebsiteContentBlock." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10481.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10481.json index 88c7e139ed1..97108c2d9c6 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10481.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10481.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:17.010", "lastModified": "2025-03-20T10:15:17.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CSRF vulnerability exists in comfyanonymous/comfyui versions up to v0.2.2. This vulnerability allows attackers to host malicious websites that, when visited by authenticated ComfyUI users, can perform arbitrary API requests on behalf of the user. This can be exploited to perform actions such as uploading arbitrary files via the `/upload/image` endpoint. The lack of CSRF protections on API endpoints like `/upload/image`, `/prompt`, and `/history` leaves users vulnerable to unauthorized actions, which could be combined with other vulnerabilities such as stored-XSS to further compromise user sessions." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad CSRF en las versiones de comfyanonymous/comfyui hasta la v0.2.2. Esta vulnerabilidad permite a los atacantes alojar sitios web maliciosos que, al ser visitados por usuarios autenticados de ComfyUI, pueden realizar solicitudes arbitrarias a la API en nombre del usuario. Esto puede explotarse para realizar acciones como subir archivos arbitrarios a trav\u00e9s del endpoint `/upload/image`. La falta de protecci\u00f3n CSRF en endpoints de API como `/upload/image`, `/prompt` y `/history` deja a los usuarios vulnerables a acciones no autorizadas, que podr\u00edan combinarse con otras vulnerabilidades como el XSS almacenado para comprometer a\u00fan m\u00e1s las sesiones de usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10513.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10513.json index 5a29d8903e5..d0d78d71f23 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10513.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10513.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:17.140", "lastModified": "2025-03-20T10:15:17.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability exists in the 'document uploads manager' feature of mintplex-labs/anything-llm, affecting the latest version prior to 1.2.2. This vulnerability allows users with the 'manager' role to access and manipulate the 'anythingllm.db' database file. By exploiting the vulnerable endpoint '/api/document/move-files', an attacker can move the database file to a publicly accessible directory, download it, and subsequently delete it. This can lead to unauthorized access to sensitive data, privilege escalation, and potential data loss." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de path traversal en la funci\u00f3n \"Administrador de subida de documentos\" de mintplex-labs/anything-llm, que afecta a las versiones anteriores a la 1.2.2. Esta vulnerabilidad permite a los usuarios con el rol de \"administrador\" acceder y manipular el archivo de base de datos \"anythingllm.db\". Al explotar el endpoint vulnerable \"/api/document/move-files\", un atacante puede mover el archivo de base de datos a un directorio de acceso p\u00fablico, descargarlo y posteriormente eliminarlo. Esto puede provocar acceso no autorizado a datos confidenciales, escalada de privilegios y posible p\u00e9rdida de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10549.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10549.json index f3819c3f275..d8f7a7021be 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10549.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10549.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:17.263", "lastModified": "2025-03-20T10:15:17.263", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the `/3/Parse` endpoint of h2oai/h2o-3 version 3.46.0.1 allows for a denial of service (DoS) attack. The endpoint uses a user-specified string to construct a regular expression, which is then applied to another user-specified string. By sending multiple simultaneous requests, an attacker can exhaust all available threads, leading to a complete denial of service." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el endpoint `/3/Parse` de h2oai/h2o-3 versi\u00f3n 3.46.0.1 permite un ataque de denegaci\u00f3n de servicio (DoS). El endpoint utiliza una cadena especificada por el usuario para construir una expresi\u00f3n regular, que posteriormente se aplica a otra cadena especificada por el usuario. Al enviar m\u00faltiples solicitudes simult\u00e1neas, un atacante puede agotar todos los subprocesos disponibles, lo que provoca una denegaci\u00f3n de servicio completa." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10550.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10550.json index 401cd176825..9883016c7c5 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10550.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10550.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:17.390", "lastModified": "2025-03-20T10:15:17.390", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the `/3/ParseSetup` endpoint of h2oai/h2o-3 version 3.46.0.1 allows for a denial of service (DoS) attack. The endpoint applies a user-specified regular expression to a user-controllable string. This can be exploited by an attacker to cause inefficient regular expression complexity, leading to the exhaustion of server resources and making the server unresponsive." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el endpoint `/3/ParseSetup` de h2oai/h2o-3 versi\u00f3n 3.46.0.1 permite un ataque de denegaci\u00f3n de servicio (DoS). El endpoint aplica una expresi\u00f3n regular especificada por el usuario a una cadena controlable por este. Un atacante puede explotar esto para generar una complejidad ineficiente en las expresiones regulares, agotando los recursos del servidor y dej\u00e1ndolo inoperante." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10553.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10553.json index e061edfe93b..18752c2af79 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10553.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10553.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:17.513", "lastModified": "2025-03-20T10:15:17.513", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the h2oai/h2o-3 REST API versions 3.46.0.4 allows unauthenticated remote attackers to execute arbitrary code via deserialization of untrusted data. The vulnerability exists in the endpoints POST /99/ImportSQLTable and POST /3/SaveToHiveTable, where user-controlled JDBC URLs are passed to DriverManager.getConnection, leading to deserialization if a MySQL or PostgreSQL driver is available in the classpath. This issue is fixed in version 3.47.0." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la API REST h2oai/h2o-3, versiones 3.46.0.4, permite a atacantes remotos no autenticados ejecutar c\u00f3digo arbitrario mediante la deserializaci\u00f3n de datos no confiables. La vulnerabilidad existe en los endpoints POST /99/ImportSQLTable y POST /3/SaveToHiveTable, donde las URL JDBC controladas por el usuario se pasan a DriverManager.getConnection, lo que provoca la deserializaci\u00f3n si hay un controlador MySQL o PostgreSQL disponible en la ruta de clases. Este problema se ha corregido en la versi\u00f3n 3.47.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10569.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10569.json index 74d290d4c95..65020309be2 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10569.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10569.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the dataframe component of gradio-app/gradio (version git 98cbcae) allows for a zip bomb attack. The component uses pd.read_csv to process input values, which can accept compressed files. An attacker can exploit this by uploading a maliciously crafted zip bomb, leading to a server crash and causing a denial of service." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el componente dataframe de gradio-app/gradio (versi\u00f3n git 98cbcae) permite un ataque con bomba zip. El componente utiliza pd.read_csv para procesar valores de entrada, que pueden aceptar archivos comprimidos. Un atacante puede explotar esto subiendo una bomba zip maliciosa, lo que provoca un fallo del servidor y una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10572.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10572.json index 5be508064be..b42bdbd684f 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10572.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10572.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:17.760", "lastModified": "2025-03-20T10:15:17.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In h2oai/h2o-3 version 3.46.0.1, the `run_tool` command exposes classes in the `water.tools` package through the `ast` parser. This includes the `XGBoostLibExtractTool` class, which can be exploited to shut down the server and write large files to arbitrary directories, leading to a denial of service." + }, + { + "lang": "es", + "value": "En la versi\u00f3n 3.46.0.1 de h2oai/h2o-3, el comando `run_tool` expone las clases del paquete `water.tools` mediante el analizador `ast`. Esto incluye la clase `XGBoostLibExtractTool`, que puede explotarse para apagar el servidor y escribir archivos grandes en directorios arbitrarios, lo que provoca una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10583.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10583.json index 507f87d516a..84cc0214ec0 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10583.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10583.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-12-12T07:15:05.570", "lastModified": "2024-12-12T07:15:05.570", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10624.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10624.json index f8441a144ea..a964f3f4924 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10624.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10624.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:17.880", "lastModified": "2025-03-20T10:15:17.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Regular Expression Denial of Service (ReDoS) vulnerability exists in the gradio-app/gradio repository, affecting the gr.Datetime component. The affected version is git commit 98cbcae. The vulnerability arises from the use of a regular expression `^(?:\\s*now\\s*(?:-\\s*(\\d+)\\s*([dmhs]))?)?\\s*$` to process user input. In Python's default regex engine, this regular expression can take polynomial time to match certain crafted inputs. An attacker can exploit this by sending a crafted HTTP request, causing the gradio process to consume 100% CPU and potentially leading to a Denial of Service (DoS) condition on the server." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio de expresiones regulares (ReDoS) en el repositorio gradio-app/gradio, que afecta al componente gr.Datetime. La versi\u00f3n afectada es el commit git 98cbcae. La vulnerabilidad surge del uso de la expresi\u00f3n regular `^(?:\\s*now\\s*(?:-\\s*(\\d+)\\s*([dmhs]))?)?\\s*$` para procesar la entrada del usuario. En el motor de expresiones regulares predeterminado de Python, esta expresi\u00f3n regular puede tardar un tiempo polinomial en coincidir con ciertas entradas manipuladas. Un atacante puede explotar esto enviando una solicitud HTTP manipulada, lo que provoca que el proceso gradio consuma el 100 % de la CPU y potencialmente genere una denegaci\u00f3n de servicio (DoS) en el servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10648.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10648.json index 4f3d16efd21..226ca9a32e0 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10648.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10648.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:18.010", "lastModified": "2025-03-20T10:15:18.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability exists in the Gradio Audio component of gradio-app/gradio, as of version git 98cbcae. This vulnerability allows an attacker to control the format of the audio file, leading to arbitrary file content deletion. By manipulating the output format, an attacker can reset any file to an empty file, causing a denial of service (DOS) on the server." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de path traversal en el componente Gradio Audio de gradio-app/gradio, a partir de la versi\u00f3n git 98cbcae. Esta vulnerabilidad permite a un atacante controlar el formato del archivo de audio, lo que provoca la eliminaci\u00f3n arbitraria de contenido. Al manipular el formato de salida, un atacante puede restablecer cualquier archivo a un archivo vac\u00edo, provocando una denegaci\u00f3n de servicio (DOS) en el servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10650.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10650.json index 005d2a431e4..165d8de6d56 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10650.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10650.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:18.150", "lastModified": "2025-03-20T13:15:35.600", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unauthenticated Denial of Service (DoS) vulnerability was identified in ChuanhuChatGPT version 20240918, which could be exploited by sending large data payloads using a multipart boundary. Although a patch was applied for CVE-2024-7807, the issue can still be exploited by sending data in groups with 10 characters in a line, with multiple lines. This can cause the system to continuously process these characters, resulting in prolonged unavailability of the service. The exploitation now requires low privilege if authentication is enabled due to a version upgrade in Gradio." + }, + { + "lang": "es", + "value": "Se identific\u00f3 una vulnerabilidad de denegaci\u00f3n de servicio (DoS) no autenticada en ChuanhuChatGPT versi\u00f3n 20240918, que podr\u00eda explotarse enviando grandes cargas de datos mediante un l\u00edmite multiparte. Aunque se aplic\u00f3 un parche para CVE-2024-7807, el problema a\u00fan puede explotarse enviando datos en grupos de 10 caracteres por l\u00ednea, con varias l\u00edneas. Esto puede provocar que el sistema procese estos caracteres continuamente, lo que resulta en una indisponibilidad prolongada del servicio. Esta vulnerabilidad ahora requiere privilegios bajos si la autenticaci\u00f3n est\u00e1 habilitada debido a una actualizaci\u00f3n de versi\u00f3n de Gradio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10670.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10670.json index 424ba9a619d..a18bcc4cac6 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10670.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10670.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-11-28T10:15:04.987", "lastModified": "2024-11-28T10:15:04.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10707.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10707.json index 2d89c3cff12..085f39ceacf 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10707.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10707.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:18.280", "lastModified": "2025-03-20T10:15:18.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "gaizhenbiao/chuanhuchatgpt version git d4ec6a3 is affected by a local file inclusion vulnerability due to the use of the gradio component gr.JSON, which has a known issue (CVE-2024-4941). This vulnerability allows unauthenticated users to access arbitrary files on the server by uploading a specially crafted JSON file and exploiting the improper input validation in the handle_dataset_selection function." + }, + { + "lang": "es", + "value": "La versi\u00f3n git d4ec6a3 de gaizhenbiao/chuanhuchatgpt se ve afectada por una vulnerabilidad de inclusi\u00f3n de archivos locales debido al uso del componente gr.JSON de gradio, que presenta un problema conocido (CVE-2024-4941). Esta vulnerabilidad permite a usuarios no autenticados acceder a archivos arbitrarios en el servidor subiendo un archivo JSON especialmente manipulado y aprovechando la validaci\u00f3n de entrada incorrecta en la funci\u00f3n handle_dataset_selection." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10713.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10713.json index 2105e28907f..715ed4e6481 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10713.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10713.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:18.400", "lastModified": "2025-03-20T10:15:18.400", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in szad670401/hyperlpr v3.0 allows for a Denial of Service (DoS) attack. The server fails to handle excessive characters appended to the end of multipart boundaries, regardless of the character used. This flaw can be exploited by sending malformed multipart requests with arbitrary characters at the end of the boundary, leading to excessive resource consumption and a complete denial of service for all users. The vulnerability is unauthenticated, meaning no user login or interaction is required for an attacker to exploit this issue." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en szad670401/hyperlpr v3.0 permite un ataque de denegaci\u00f3n de servicio (DoS). El servidor no gestiona el exceso de caracteres a\u00f1adidos al final de los l\u00edmites multiparte, independientemente del car\u00e1cter utilizado. Esta falla puede explotarse enviando solicitudes multiparte malformadas con caracteres arbitrarios al final del l\u00edmite, lo que provoca un consumo excesivo de recursos y una denegaci\u00f3n de servicio completa para todos los usuarios. La vulnerabilidad no est\u00e1 autenticada, lo que significa que un atacante no requiere que el usuario inicie sesi\u00f3n ni interact\u00fae con \u00e9l." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10714.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10714.json index 3dd6c7b3444..7cfeac12a2e 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10714.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10714.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:18.527", "lastModified": "2025-03-20T10:15:18.527", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in binary-husky/gpt_academic version 3.83 allows an attacker to cause a Denial of Service (DoS) by adding excessive characters to the end of a multipart boundary during file upload. This results in the server continuously processing each character and displaying warnings, rendering the application inaccessible. The issue occurs when the terminal shows a warning: 'multipart.multipart Consuming a byte '0x2d' in end state'." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en binary-husky/gpt_academic versi\u00f3n 3.83 permite a un atacante provocar una denegaci\u00f3n de servicio (DoS) a\u00f1adiendo caracteres excesivos al final de un l\u00edmite multiparte durante la carga de un archivo. Esto provoca que el servidor procese continuamente cada car\u00e1cter y muestre advertencias, lo que hace que la aplicaci\u00f3n sea inaccesible. El problema ocurre cuando la terminal muestra la advertencia: \u00abmultipart.multipart Consuming a byte '0x2d' in end state\u00bb." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10718.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10718.json index 43eb24de56d..2e6346f2d1c 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10718.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10718.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:18.650", "lastModified": "2025-03-20T10:15:18.650", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In phpipam/phpipam version 1.5.1, the Secure attribute for sensitive cookies in HTTPS sessions is not set. This could cause the user agent to send those cookies in plaintext over an HTTP session, potentially exposing sensitive information. The issue is fixed in version 1.7.0." + }, + { + "lang": "es", + "value": "En la versi\u00f3n 1.5.1 de phpipam/phpipam, el atributo \"Secure\" para cookies sensibles en sesiones HTTPS no est\u00e1 configurado. Esto podr\u00eda provocar que el agente de usuario env\u00ede dichas cookies en texto plano a trav\u00e9s de una sesi\u00f3n HTTP, lo que podr\u00eda exponer informaci\u00f3n sensible. El problema se solucion\u00f3 en la versi\u00f3n 1.7.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10719.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10719.json index 2715ed81e8f..a777646b19a 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10719.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10719.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:18.770", "lastModified": "2025-03-20T10:15:18.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability exists in phpipam version 1.5.2, specifically in the circuits options functionality. This vulnerability allows an attacker to inject malicious scripts via the 'option' parameter in the POST request to /phpipam/app/admin/circuits/edit-options-submit.php. The injected script can be executed in the context of the user's browser, leading to potential cookie theft and end-user file disclosure. The issue is fixed in version 1.7.0." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la versi\u00f3n 1.5.2 de phpipam, espec\u00edficamente en la funcionalidad de opciones de circuitos. Esta vulnerabilidad permite a un atacante inyectar scripts maliciosos mediante el par\u00e1metro 'option' en la solicitud POST a /phpipam/app/admin/circuits/edit-options-submit.php. El script inyectado puede ejecutarse en el contexto del navegador del usuario, lo que puede provocar el robo de cookies y la divulgaci\u00f3n de archivos del usuario final. El problema se ha corregido en la versi\u00f3n 1.7.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10720.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10720.json index c7c72e56753..1994a20d552 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10720.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10720.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:18.897", "lastModified": "2025-03-20T10:15:18.897", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability exists in phpipam/phpipam version 1.5.2. The vulnerability occurs in the 'Device Management' section under 'Administration' where an attacker can inject malicious scripts into the 'Name' and 'Description' fields when adding a new device type. This can lead to data theft, account compromise, distribution of malware, website defacement, and phishing attacks. The issue is fixed in version 1.7.0." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en phpipam/phpipam versi\u00f3n 1.5.2. La vulnerabilidad se produce en la secci\u00f3n \"Administraci\u00f3n de dispositivos\", dentro de \"Administraci\u00f3n\", donde un atacante puede inyectar scripts maliciosos en los campos \"Nombre\" y \"Descripci\u00f3n\" al a\u00f1adir un nuevo tipo de dispositivo. Esto puede provocar robo de datos, vulneraci\u00f3n de cuentas, distribuci\u00f3n de malware, desfiguraci\u00f3n de sitios web y ataques de phishing. El problema est\u00e1 corregido en la versi\u00f3n 1.7.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10721.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10721.json index ee66f5d8187..58042156a07 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10721.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10721.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:19.020", "lastModified": "2025-03-20T14:15:16.777", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability was discovered in phpipam/phpipam version 1.5.2. This vulnerability allows an attacker to inject malicious scripts into the application, which can be executed in the context of other users who view the affected page. The issue occurs in the circuits options page (https://demo.phpipam.net/tools/circuits/options/). An attacker can exploit this vulnerability to steal cookies, gain unauthorized access to user accounts, or redirect users to malicious websites. The vulnerability has been fixed in version 1.7.0." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en phpipam/phpipam versi\u00f3n 1.5.2. Esta vulnerabilidad permite a un atacante inyectar scripts maliciosos en la aplicaci\u00f3n, que pueden ejecutarse en el contexto de otros usuarios que visitan la p\u00e1gina afectada. El problema ocurre en la p\u00e1gina de opciones de circuitos (https://demo.phpipam.net/tools/circuits/options/). Un atacante puede explotar esta vulnerabilidad para robar cookies, obtener acceso no autorizado a cuentas de usuario o redirigir a usuarios a sitios web maliciosos. La vulnerabilidad se ha corregido en la versi\u00f3n 1.7.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10722.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10722.json index e61bb84c96f..5168fccd7cc 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10722.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10722.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:19.140", "lastModified": "2025-03-20T10:15:19.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability exists in phpipam/phpipam version 1.5.2. The vulnerability allows attackers to inject malicious scripts into the 'Description' field of custom fields in the 'IP RELATED MANAGEMENT' section. This can lead to data theft, account compromise, distribution of malware, website defacement, content manipulation, and phishing attacks. The issue is fixed in version 1.7.0." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en phpipam/phpipam versi\u00f3n 1.5.2. Esta vulnerabilidad permite a los atacantes inyectar scripts maliciosos en el campo \"Descripci\u00f3n\" de los campos personalizados de la secci\u00f3n \"GESTI\u00d3N DE IP\". Esto puede provocar robo de datos, vulneraci\u00f3n de cuentas, distribuci\u00f3n de malware, desfiguraci\u00f3n de sitios web, manipulaci\u00f3n de contenido y ataques de phishing. El problema est\u00e1 corregido en la versi\u00f3n 1.7.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10723.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10723.json index 59c6811b394..b90a75deaf9 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10723.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10723.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:19.267", "lastModified": "2025-03-20T10:15:19.267", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability was discovered in phpipam/phpipam version 1.5.2. This vulnerability allows an attacker to inject malicious scripts into the destination address field of the NAT tool, which can be executed when a user interacts with the field. The impact of this vulnerability includes the potential theft of user cookies, unauthorized access to user accounts, and redirection to malicious websites. The issue has been fixed in version 1.7.0." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en phpipam/phpipam versi\u00f3n 1.5.2. Esta vulnerabilidad permite a un atacante inyectar scripts maliciosos en el campo de direcci\u00f3n de destino de la herramienta NAT, que pueden ejecutarse cuando un usuario interact\u00faa con dicho campo. El impacto de esta vulnerabilidad incluye el posible robo de cookies de usuario, acceso no autorizado a cuentas de usuario y redirecci\u00f3n a sitios web maliciosos. El problema se ha corregido en la versi\u00f3n 1.7.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10724.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10724.json index 0ff73ec6c50..3c4d63ada63 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10724.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10724.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:19.390", "lastModified": "2025-03-20T10:15:19.390", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability exists in phpipam/phpipam version 1.5.2, specifically in the Subnet NAT translations section when editing the Destination address. This vulnerability allows an attacker to execute malicious code. The issue is fixed in version 1.7.0." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en phpipam/phpipam versi\u00f3n 1.5.2, espec\u00edficamente en la secci\u00f3n de traducciones NAT de subred al editar la direcci\u00f3n de destino. Esta vulnerabilidad permite a un atacante ejecutar c\u00f3digo malicioso. El problema se ha corregido en la versi\u00f3n 1.7.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10725.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10725.json index fc202f6cf5f..f05f4dda3c1 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10725.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10725.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:19.513", "lastModified": "2025-03-20T10:15:19.513", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability exists in phpipam/phpipam version 1.5.2. This vulnerability allows an attacker to inject malicious scripts into the application, which are then executed in the context of other users who view the affected pages. The issue occurs when editing the NAT destination address, where user input is not properly sanitized. This can lead to data theft, account compromise, and other malicious activities. The vulnerability is fixed in version 1.7.0." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en phpipam/phpipam versi\u00f3n 1.5.2. Esta vulnerabilidad permite a un atacante inyectar scripts maliciosos en la aplicaci\u00f3n, que se ejecutan en el contexto de otros usuarios que visitan las p\u00e1ginas afectadas. El problema se produce al editar la direcci\u00f3n de destino NAT, donde la entrada del usuario no se depura correctamente. Esto puede provocar el robo de datos, la vulneraci\u00f3n de cuentas y otras actividades maliciosas. La vulnerabilidad est\u00e1 corregida en la versi\u00f3n 1.7.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10727.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10727.json index ef86e60210c..ed0850aabbe 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10727.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10727.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A reflected cross-site scripting (XSS) vulnerability exists in phpipam/phpipam versions 1.5.0 through 1.6.0. The vulnerability arises when the application receives data in an HTTP request and includes that data within the immediate response in an unsafe manner. This allows an attacker to execute arbitrary JavaScript in the context of the user's browser, potentially leading to full compromise of the user." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) reflejado en phpipam/phpipam, versiones 1.5.0 a 1.6.0. Esta vulnerabilidad surge cuando la aplicaci\u00f3n recibe datos en una solicitud HTTP y los incluye en la respuesta inmediata de forma insegura. Esto permite a un atacante ejecutar JavaScript arbitrario en el contexto del navegador del usuario, lo que podr\u00eda comprometer su seguridad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10761.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10761.json index 7e57af8b1d1..fde58336465 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10761.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10761.json @@ -145,7 +145,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10762.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10762.json index a921c70a77a..94bb48c3a4b 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10762.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10762.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:19.753", "lastModified": "2025-03-20T10:15:19.753", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In lunary-ai/lunary before version 1.5.9, the /v1/evaluators/ endpoint allows users to delete evaluators of a project by sending a DELETE request. However, the route lacks proper access control, such as middleware to ensure that only users with appropriate roles can delete evaluator data. This vulnerability allows low-privilege users to delete evaluators data, causing permanent data loss and potentially hindering operations." + }, + { + "lang": "es", + "value": "En lunary-ai/lunary, versiones anteriores a la 1.5.9, el endpoint /v1/evaluators/ permite a los usuarios eliminar evaluadores de un proyecto mediante una solicitud DELETE. Sin embargo, la ruta carece de un control de acceso adecuado, como middleware, para garantizar que solo los usuarios con los roles adecuados puedan eliminar los datos de los evaluadores. Esta vulnerabilidad permite a usuarios con pocos privilegios eliminar los datos de los evaluadores, lo que provoca una p\u00e9rdida permanente de datos y podr\u00eda dificultar las operaciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10779.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10779.json index d47824491fd..8ce8908f0dc 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10779.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10779.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10812.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10812.json index 36379443097..449fa276059 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10812.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10812.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:19.880", "lastModified": "2025-03-20T10:15:19.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An open redirect vulnerability exists in binary-husky/gpt_academic version 3.83. The vulnerability occurs when a user is redirected to a URL specified by user-controlled input in the 'file' parameter without proper validation or sanitization. This can be exploited by attackers to conduct phishing attacks, distribute malware, and steal user credentials." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de redirecci\u00f3n abierta en binary-husky/gpt_academic versi\u00f3n 3.83. Esta vulnerabilidad ocurre cuando un usuario es redirigido a una URL especificada por el usuario en el par\u00e1metro 'file' sin la validaci\u00f3n ni la depuraci\u00f3n adecuada. Los atacantes pueden aprovechar esta vulnerabilidad para realizar ataques de phishing, distribuir malware y robar credenciales de usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10819.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10819.json index cb00edb10e9..4993d47df9d 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10819.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10819.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:20.010", "lastModified": "2025-03-20T10:15:20.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site Request Forgery (CSRF) vulnerability in version 3.83 of binary-husky/gpt_academic allows an attacker to trick a user into uploading files without their consent, exploiting their session. This can lead to unauthorized file uploads and potential system compromise. The uploaded file can contain malicious scripts, leading to stored Cross-Site Scripting (XSS) attacks. Through stored XSS, an attacker can steal information about the victim and perform any action on their behalf." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-Site Request Forgery (CSRF) en la versi\u00f3n 3.83 de binary-husky/gpt_academic permite a un atacante enga\u00f1ar a un usuario para que cargue archivos sin su consentimiento, vulnerando su sesi\u00f3n. Esto puede provocar cargas de archivos no autorizadas y una posible vulneraci\u00f3n del sistema. El archivo subido puede contener scripts maliciosos, lo que da lugar a ataques de Cross-Site Scripting (XSS) almacenado. Mediante XSS almacenado, un atacante puede robar informaci\u00f3n sobre la v\u00edctima y realizar cualquier acci\u00f3n en su nombre." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10821.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10821.json index 60fc207472c..9983bb7281e 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10821.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10821.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:20.130", "lastModified": "2025-03-20T10:15:20.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial of Service (DoS) vulnerability in the multipart request boundary processing mechanism of the Invoke-AI server (version v5.0.1) allows unauthenticated attackers to cause excessive resource consumption. The server fails to handle excessive characters appended to the end of multipart boundaries, leading to an infinite loop and a complete denial of service for all users. The affected endpoint is `/api/v1/images/upload`." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en el mecanismo de procesamiento de l\u00edmites de solicitud multiparte del servidor Invoke-AI (versi\u00f3n v5.0.1) permite a atacantes no autenticados consumir recursos excesivamente. El servidor no gestiona el exceso de caracteres a\u00f1adidos al final de los l\u00edmites multiparte, lo que genera un bucle infinito y una denegaci\u00f3n de servicio completa para todos los usuarios. El endpoint afectado es `/api/v1/images/upload`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10829.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10829.json index 3287fb77bbf..94f8acd0145 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10829.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10829.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:20.257", "lastModified": "2025-03-20T10:15:20.257", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial of Service (DoS) vulnerability in the multipart request boundary processing mechanism of eosphoros-ai/db-gpt v0.6.0 allows unauthenticated attackers to cause excessive resource consumption. The server fails to handle excessive characters appended to the end of multipart boundaries, leading to an infinite loop and complete denial of service for all users. This vulnerability affects all endpoints processing multipart/form-data requests." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en el mecanismo de procesamiento de los l\u00edmites de solicitudes multiparte de eosphoros-ai/db-gpt v0.6.0 permite a atacantes no autenticados consumir recursos excesivamente. El servidor no gestiona el exceso de caracteres a\u00f1adidos al final de los l\u00edmites multiparte, lo que genera un bucle infinito y una denegaci\u00f3n de servicio completa para todos los usuarios. Esta vulnerabilidad afecta a todos los endpoints que procesan solicitudes multiparte/form-data." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10830.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10830.json index c9fede2a3af..c8587f8f61d 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10830.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10830.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Path Traversal vulnerability exists in the eosphoros-ai/db-gpt version 0.6.0 at the API endpoint `/v1/resource/file/delete`. This vulnerability allows an attacker to delete any file on the server by manipulating the `file_key` parameter. The `file_key` parameter is not properly sanitized, enabling an attacker to specify arbitrary file paths. If the specified file exists, the application will delete it." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Path Traversal en eosphoros-ai/db-gpt versi\u00f3n 0.6.0 en el endpoint de la API `/v1/resource/file/delete`. Esta vulnerabilidad permite a un atacante eliminar cualquier archivo del servidor manipulando el par\u00e1metro `file_key`. Este par\u00e1metro no se depura correctamente, lo que permite a un atacante especificar rutas de archivo arbitrarias. Si el archivo especificado existe, la aplicaci\u00f3n lo eliminar\u00e1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10831.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10831.json index dc93abe3b87..44936ac619a 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10831.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10831.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:20.500", "lastModified": "2025-03-20T10:15:20.500", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In eosphoros-ai/db-gpt version 0.6.0, the endpoint for uploading files is vulnerable to absolute path traversal. This vulnerability allows an attacker to upload arbitrary files to arbitrary locations on the target server. The issue arises because the `file_key` and `doc_file.filename` parameters are user-controllable, enabling the construction of paths outside the intended directory. This can lead to overwriting essential system files, such as SSH keys, for further exploitation." + }, + { + "lang": "es", + "value": "En la versi\u00f3n 0.6.0 de eosphoros-ai/db-gpt, el endpoint para subir archivos es vulnerable a path traversal absoluto. Esta vulnerabilidad permite a un atacante subir archivos arbitrarios a ubicaciones arbitrarias en el servidor objetivo. El problema surge porque los par\u00e1metros `file_key` y `doc_file.filename` son controlables por el usuario, lo que permite la construcci\u00f3n de rutas fuera del directorio de destino. Esto puede provocar la sobrescritura de archivos esenciales del sistema, como claves SSH, para su posterior explotaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10833.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10833.json index fd3f542a8a9..244200055e7 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10833.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10833.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:20.630", "lastModified": "2025-03-20T10:15:20.630", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "eosphoros-ai/db-gpt version 0.6.0 is vulnerable to an arbitrary file write through the knowledge API. The endpoint for uploading files as 'knowledge' is susceptible to absolute path traversal, allowing attackers to write files to arbitrary locations on the target server. This vulnerability arises because the 'doc_file.filename' parameter is user-controllable, enabling the construction of absolute paths." + }, + { + "lang": "es", + "value": "La versi\u00f3n 0.6.0 de eosphoros-ai/db-gpt es vulnerable a la escritura arbitraria de archivos a trav\u00e9s de la API de conocimiento. El endpoint para subir archivos como \"conocimiento\" es susceptible a path traversal absoluto, lo que permite a los atacantes escribir archivos en ubicaciones arbitrarias en el servidor objetivo. Esta vulnerabilidad surge porque el par\u00e1metro \"doc_file.filename\" es controlable por el usuario, lo que permite la construcci\u00f3n de rutas absolutas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10834.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10834.json index ef941fc482c..edc50169fdd 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10834.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10834.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:20.753", "lastModified": "2025-03-20T10:15:20.753", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "eosphoros-ai/db-gpt version 0.6.0 contains a vulnerability in the RAG-knowledge endpoint that allows for arbitrary file write. The issue arises from the ability to pass an absolute path to a call to `os.path.join`, enabling an attacker to write files to arbitrary locations on the target server. This vulnerability can be exploited by setting the `doc_file.filename` to an absolute path, which can lead to overwriting system files or creating new SSH-key entries." + }, + { + "lang": "es", + "value": "La versi\u00f3n 0.6.0 de eosphoros-ai/db-gpt contiene una vulnerabilidad en el endpoint RAG-knowledge que permite la escritura arbitraria de archivos. El problema surge de la posibilidad de pasar una ruta absoluta a una llamada a `os.path.join`, lo que permite a un atacante escribir archivos en ubicaciones arbitrarias del servidor objetivo. Esta vulnerabilidad puede explotarse configurando `doc_file.filename` con una ruta absoluta, lo que puede provocar la sobrescritura de archivos del sistema o la creaci\u00f3n de nuevas entradas de clave SSH." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10835.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10835.json index 7598205a7ed..49bb6dd461c 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10835.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10835.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:20.870", "lastModified": "2025-03-20T10:15:20.870", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /api/v1/editor/sql/run` allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers to perform Arbitrary File Write using DuckDB SQL, enabling them to write arbitrary files to the victim's file system. This can potentially lead to Remote Code Execution (RCE)." + }, + { + "lang": "es", + "value": "En la versi\u00f3n v0.6.0 de eosphoros-ai/db-gpt, la API web `POST /api/v1/editor/sql/run` permite la ejecuci\u00f3n de consultas SQL arbitrarias sin control de acceso. Esta vulnerabilidad puede ser explotada por atacantes para realizar escrituras arbitrarias de archivos mediante DuckDB SQL, lo que les permite escribir archivos arbitrarios en el sistema de archivos de la v\u00edctima. Esto puede provocar la ejecuci\u00f3n remota de c\u00f3digo (RCE)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10860.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10860.json index a7534808d30..8f462b8ed70 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10860.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10860.json @@ -52,7 +52,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10867.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10867.json index edb2bd8fee3..046d38f255c 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10867.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10867.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-31T05:15:09.803", "lastModified": "2025-01-31T05:15:09.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10901.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10901.json index 4d3a32f9f04..d0f601955d4 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10901.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10901.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:20.997", "lastModified": "2025-03-20T10:15:20.997", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /api/v1/editor/chart/run` allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers to perform Arbitrary File Write, enabling them to write arbitrary files to the victim's file system. This can potentially lead to Remote Code Execution (RCE) by writing malicious files such as `__init__.py` in the Python's `/site-packages/` directory." + }, + { + "lang": "es", + "value": "En la versi\u00f3n v0.6.0 de eosphoros-ai/db-gpt, la API web `POST /api/v1/editor/chart/run` permite la ejecuci\u00f3n de consultas SQL arbitrarias sin control de acceso. Esta vulnerabilidad puede ser explotada por atacantes para realizar escrituras arbitrarias de archivos, lo que les permite escribir archivos arbitrarios en el sistema de archivos de la v\u00edctima. Esto puede provocar la ejecuci\u00f3n remota de c\u00f3digo (RCE) mediante la escritura de archivos maliciosos como `__init__.py` en el directorio `/site-packages/` de Python." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10902.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10902.json index dc994983130..66133ec1426 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10902.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10902.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:21.117", "lastModified": "2025-03-20T10:15:21.117", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /v1/personal/agent/upload` is vulnerable to Arbitrary File Upload with Path Traversal. This vulnerability allows unauthorized attackers to upload arbitrary files to the victim's file system at any location. The impact of this vulnerability includes the potential for remote code execution (RCE) by writing malicious files, such as a malicious `__init__.py` in the Python's `/site-packages/` directory." + }, + { + "lang": "es", + "value": "En la versi\u00f3n 0.6.0 de eosphoros-ai/db-gpt, la API web `POST /v1/personal/agent/upload` es vulnerable a la carga arbitraria de archivos con Path Traversal. Esta vulnerabilidad permite a atacantes no autorizados cargar archivos arbitrarios al sistema de archivos de la v\u00edctima en cualquier ubicaci\u00f3n. El impacto de esta vulnerabilidad incluye la posibilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) mediante la escritura de archivos maliciosos, como `__init__.py` malicioso en el directorio `/site-packages/` de Python." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10906.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10906.json index 8d9805470e8..ac9dd0cfd79 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10906.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10906.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:21.233", "lastModified": "2025-03-20T10:15:21.233", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In version 0.6.0 of eosphoros-ai/db-gpt, the `uvicorn` app created by `dbgpt_server` uses an overly permissive instance of `CORSMiddleware` which sets the `Access-Control-Allow-Origin` to `*` for all requests. This configuration makes all endpoints exposed by the server vulnerable to Cross-Site Request Forgery (CSRF). An attacker can exploit this vulnerability to interact with any endpoints of the instance, even if the instance is not publicly exposed to the network." + }, + { + "lang": "es", + "value": "En la versi\u00f3n 0.6.0 de eosphoros-ai/db-gpt, la aplicaci\u00f3n `uvicorn` creada por `dbgpt_server` utiliza una instancia excesivamente permisiva de `CORSMiddleware` que establece `Access-Control-Allow-Origin` en `*` para todas las solicitudes. Esta configuraci\u00f3n hace que todos los endpoints expuestos por el servidor sean vulnerables a Cross-Site Request Forgery (CSRF). Un atacante puede explotar esta vulnerabilidad para interactuar con cualquier endpoint de la instancia, incluso si esta no est\u00e1 expuesta p\u00fablicamente a la red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10907.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10907.json index f583fdebf9a..64ab7557306 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10907.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10907.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:21.357", "lastModified": "2025-03-20T10:15:21.357", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In lm-sys/fastchat Release v0.2.36, the server fails to handle excessive characters appended to the end of multipart boundaries. This flaw can be exploited by sending malformed multipart requests with arbitrary characters at the end of the boundary. Each extra character is processed in an infinite loop, leading to excessive resource consumption and a complete denial of service (DoS) for all users. The vulnerability is unauthenticated, meaning no user login or interaction is required for an attacker to exploit this issue." + }, + { + "lang": "es", + "value": "En la versi\u00f3n v0.2.36 de lm-sys/fastchat, el servidor no gestiona el exceso de caracteres a\u00f1adidos al final de los l\u00edmites multiparte. Esta vulnerabilidad puede explotarse enviando solicitudes multiparte malformadas con caracteres arbitrarios al final del l\u00edmite. Cada car\u00e1cter adicional se procesa en un bucle infinito, lo que provoca un consumo excesivo de recursos y una denegaci\u00f3n de servicio (DoS) completa para todos los usuarios. La vulnerabilidad no est\u00e1 autenticada, lo que significa que un atacante no requiere que el usuario inicie sesi\u00f3n ni interact\u00fae con \u00e9l para explotarla." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10908.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10908.json index 89d4815a769..0056be6952f 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10908.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10908.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:21.480", "lastModified": "2025-03-20T10:15:21.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An open redirect vulnerability in lm-sys/fastchat Release v0.2.36 allows a remote unauthenticated attacker to redirect users to arbitrary websites via a specially crafted URL. This can be exploited for phishing attacks, malware distribution, and credential theft." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de redirecci\u00f3n abierta en lm-sys/fastchat (versi\u00f3n v0.2.36) permite a un atacante remoto no autenticado redirigir a los usuarios a sitios web arbitrarios mediante una URL especialmente manipulada. Esto puede explotarse para ataques de phishing, distribuci\u00f3n de malware y robo de credenciales." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10912.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10912.json index 13f75b36906..c1d5ffaac60 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10912.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10912.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:21.607", "lastModified": "2025-03-20T10:15:21.607", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial of Service (DoS) vulnerability exists in the file upload feature of lm-sys/fastchat version 0.2.36. The vulnerability is due to improper handling of form-data with a large filename in the file upload request. An attacker can exploit this by sending a payload with an excessively large filename, causing the server to become overwhelmed and unavailable to legitimate users." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en la funci\u00f3n de carga de archivos de lm-sys/fastchat versi\u00f3n 0.2.36. Esta vulnerabilidad se debe a una gesti\u00f3n inadecuada de datos de formulario con un nombre de archivo demasiado grande en la solicitud de carga de archivos. Un atacante puede explotar esto enviando un payload con un nombre de archivo excesivamente grande, lo que provoca la saturaci\u00f3n del servidor y lo inhabilita para usuarios leg\u00edtimos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10925.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10925.json index 7e7a736392d..6b7ff86fd2b 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10925.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10925.json @@ -72,7 +72,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10935.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10935.json index add27f055c1..7efb4afb82c 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10935.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10935.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:21.727", "lastModified": "2025-03-20T10:15:21.727", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "automatic1111/stable-diffusion-webui version 1.10.0 contains a vulnerability where the server fails to handle excessive characters appended to the end of multipart boundaries. This flaw can be exploited by sending malformed multipart requests with arbitrary characters at the end of the boundary, leading to excessive resource consumption and a complete denial of service (DoS) for all users. The vulnerability is unauthenticated, meaning no user login or interaction is required for an attacker to exploit this issue." + }, + { + "lang": "es", + "value": "La versi\u00f3n 1.10.0 de automatic1111/stable-diffusion-webui contiene una vulnerabilidad que impide que el servidor gestione el exceso de caracteres a\u00f1adidos al final de los l\u00edmites multiparte. Esta vulnerabilidad puede explotarse enviando solicitudes multiparte malformadas con caracteres arbitrarios al final del l\u00edmite, lo que provoca un consumo excesivo de recursos y una denegaci\u00f3n de servicio (DoS) completa para todos los usuarios. La vulnerabilidad no est\u00e1 autenticada, lo que significa que un atacante no requiere que el usuario inicie sesi\u00f3n ni interact\u00fae con el sistema para explotarla." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10940.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10940.json index e236bcfcd24..4878233ebeb 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10940.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10940.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:21.850", "lastModified": "2025-03-20T10:15:21.850", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in langchain-core versions >=0.1.17,<0.1.53, >=0.2.0,<0.2.43, and >=0.3.0,<0.3.15 allows unauthorized users to read arbitrary files from the host file system. The issue arises from the ability to create langchain_core.prompts.ImagePromptTemplate's (and by extension langchain_core.prompts.ChatPromptTemplate's) with input variables that can read any user-specified path from the server file system. If the outputs of these prompt templates are exposed to the user, either directly or through downstream model outputs, it can lead to the exposure of sensitive information." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en las versiones de langchain-core >=0.1.17, <0.1.53, >=0.2.0, <0.2.43 y >=0.3.0, <0.3.15 permite a usuarios no autorizados leer archivos arbitrarios del sistema de archivos del host. El problema surge de la posibilidad de crear plantillas langchain_core.prompts.ImagePromptTemplate (y, por extensi\u00f3n, langchain_core.prompts.ChatPromptTemplate) con variables de entrada que pueden leer cualquier ruta especificada por el usuario desde el sistema de archivos del servidor. Si las salidas de estas plantillas de solicitud se exponen al usuario, ya sea directamente o a trav\u00e9s de las salidas del modelo posterior, se puede exponer informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10942.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10942.json index fddd307dfda..122cc36ddae 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10942.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10942.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-13T13:15:39.257", "lastModified": "2025-03-13T13:15:39.257", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10948.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10948.json index 5fa7b2b3268..8084cc98b58 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10948.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10948.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:21.977", "lastModified": "2025-03-20T14:15:16.890", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the upload function of binary-husky/gpt_academic allows any user to read arbitrary files on the system, including sensitive files such as `config.py`. This issue affects the latest version of the product. An attacker can exploit this vulnerability by intercepting the websocket request during file upload and replacing the file path with the path of the file they wish to read. The server then copies the file to the `private_upload` folder and provides the path to the copied file, which can be accessed via a GET request. This vulnerability can lead to the exposure of sensitive system files, potentially including credentials, configuration files, or sensitive user data." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la funci\u00f3n de carga de binary-husky/gpt_academic permite a cualquier usuario leer archivos arbitrarios del sistema, incluyendo archivos sensibles como `config.py`. Este problema afecta a la \u00faltima versi\u00f3n del producto. Un atacante puede explotar esta vulnerabilidad interceptando la solicitud websocket durante la carga del archivo y reemplazando la ruta del archivo con la ruta del archivo que desea leer. El servidor copia el archivo a la carpeta `private_upload` y proporciona la ruta al archivo copiado, al que se puede acceder mediante una solicitud GET. Esta vulnerabilidad puede exponer archivos sensibles del sistema, como credenciales, archivos de configuraci\u00f3n o datos sensibles del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10950.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10950.json index 388aec6d814..77b058ffee8 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10950.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10950.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:22.110", "lastModified": "2025-03-20T10:15:22.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In binary-husky/gpt_academic version <= 3.83, the plugin `CodeInterpreter` is vulnerable to code injection caused by prompt injection. The root cause is the execution of user-provided prompts that generate untrusted code without a sandbox, allowing the execution of parts of the LLM-generated code. This vulnerability can be exploited by an attacker to achieve remote code execution (RCE) on the application backend server, potentially gaining full control of the server." + }, + { + "lang": "es", + "value": "En binary-husky/gpt_academic versi\u00f3n 3.83, el complemento `CodeInterpreter` es vulnerable a la inyecci\u00f3n de c\u00f3digo mediante la inyecci\u00f3n de prompts. La causa principal es la ejecuci\u00f3n de prompts proporcionados por el usuario que generan c\u00f3digo no confiable sin un entorno de pruebas, lo que permite la ejecuci\u00f3n de partes del c\u00f3digo generado por LLM. Un atacante puede explotar esta vulnerabilidad para lograr la ejecuci\u00f3n remota de c\u00f3digo (RCE) en el servidor backend de la aplicaci\u00f3n, lo que podr\u00eda permitir obtener el control total del servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10954.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10954.json index 2a146987f89..a687c7f8fdd 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10954.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10954.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:22.230", "lastModified": "2025-03-20T10:15:22.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the `manim` plugin of binary-husky/gpt_academic, versions prior to the fix, a vulnerability exists due to improper handling of user-provided prompts. The root cause is the execution of untrusted code generated by the LLM without a proper sandbox. This allows an attacker to perform remote code execution (RCE) on the app backend server by injecting malicious code through the prompt." + }, + { + "lang": "es", + "value": "En el complemento `manim` de binary-husky/gpt_academic, versiones anteriores a la correcci\u00f3n, existe una vulnerabilidad debido a la gesti\u00f3n inadecuada de las indicaciones proporcionadas por el usuario. La causa principal es la ejecuci\u00f3n de c\u00f3digo no confiable generado por el LLM sin un entorno de pruebas adecuado. Esto permite a un atacante realizar una ejecuci\u00f3n remota de c\u00f3digo (RCE) en el servidor backend de la aplicaci\u00f3n inyectando c\u00f3digo malicioso a trav\u00e9s de la indicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10955.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10955.json index 4fcca75e297..6f2f2b41d87 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10955.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10955.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:22.350", "lastModified": "2025-03-20T10:15:22.350", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Regular Expression Denial of Service (ReDoS) vulnerability exists in gaizhenbiao/chuanhuchatgpt, as of commit 20b2e02. The server uses the regex pattern `r'<[^>]+>'` to parse user input. In Python's default regex engine, this pattern can take polynomial time to match certain crafted inputs. An attacker can exploit this by uploading a malicious JSON payload, causing the server to consume 100% CPU for an extended period. This can lead to a Denial of Service (DoS) condition, potentially affecting the entire server." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio de expresiones regulares (ReDoS) en gaizhenbiao/chuanhuchatgpt, a partir del commit 20b2e02. El servidor utiliza el patr\u00f3n de expresiones regulares `r'<[^>]+>''` para analizar la entrada del usuario. En el motor de expresiones regulares predeterminado de Python, este patr\u00f3n puede tardar un tiempo polinomial en coincidir con ciertas entradas manipuladas. Un atacante puede explotar esto cargando un payload JSON maliciosa, lo que provoca que el servidor consuma el 100 % de la CPU durante un per\u00edodo prolongado. Esto puede provocar una denegaci\u00f3n de servicio (DoS), que podr\u00eda afectar a todo el servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10956.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10956.json index e8e62639039..f5d8c460168 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10956.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10956.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:22.470", "lastModified": "2025-03-20T10:15:22.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "GPT Academy version 3.83 in the binary-husky/gpt_academic repository is vulnerable to Cross-Site WebSocket Hijacking (CSWSH). This vulnerability allows an attacker to hijack an existing WebSocket connection between the victim's browser and the server, enabling unauthorized actions such as deleting conversation history without the victim's consent. The issue arises due to insufficient WebSocket authentication and lack of origin validation." + }, + { + "lang": "es", + "value": "La versi\u00f3n 3.83 de GPT Academy, disponible en el repositorio binary-husky/gpt_academic, es vulnerable a Cross-Site WebSocket Hijacking (CSWSH). Esta vulnerabilidad permite a un atacante secuestrar una conexi\u00f3n WebSocket existente entre el navegador de la v\u00edctima y el servidor, lo que permite acciones no autorizadas, como borrar el historial de conversaciones sin su consentimiento. El problema surge debido a una autenticaci\u00f3n WebSocket insuficiente y a la falta de validaci\u00f3n del origen." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10986.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10986.json index 9fb59545422..3974706aa7d 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10986.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10986.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:22.597", "lastModified": "2025-03-20T10:15:22.597", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "GPT Academic version 3.83 is vulnerable to a Local File Read (LFI) vulnerability through its HotReload function. This function can download and extract tar.gz files from arxiv.org. Despite implementing protections against path traversal, the application overlooks the Tarslip triggered by symlinks. This oversight allows attackers to read arbitrary local files from the victim server." + }, + { + "lang": "es", + "value": "La versi\u00f3n 3.83 de GPT Academic es vulnerable a una vulnerabilidad de lectura local de archivos (LFI) a trav\u00e9s de su funci\u00f3n HotReload. Esta funci\u00f3n puede descargar y extraer archivos tar.gz de arxiv.org. A pesar de implementar protecciones contra el path traversal, la aplicaci\u00f3n ignora el Tarslip activado por enlaces simb\u00f3licos. Esta omisi\u00f3n permite a los atacantes leer archivos locales arbitrarios del servidor v\u00edctima." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1071.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1071.json index 42d0ef661c9..cad6c15db71 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1071.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1071.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1083.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1083.json index d158b6e09d3..2a2f3c3ec80 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1083.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1083.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1088.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1088.json index a15fbe9117a..849e1614520 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1088.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1088.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11030.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11030.json index 85df48cd25d..45cef94f01f 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11030.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11030.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:22.707", "lastModified": "2025-03-20T14:15:17.473", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "GPT Academic version 3.83 is vulnerable to a Server-Side Request Forgery (SSRF) vulnerability through its HotReload plugin function, which calls the crazy_utils.get_files_from_everything() API without proper sanitization. This allows attackers to exploit the vulnerability to abuse the victim GPT Academic's Gradio Web server's credentials to access unauthorized web resources." + }, + { + "lang": "es", + "value": "La versi\u00f3n 3.83 de GPT Academic es vulnerable a una vulnerabilidad de Server-Side Request Forgery (SSRF) a trav\u00e9s de la funci\u00f3n del complemento HotReload, que llama a la API crazy_utils.get_files_from_everything() sin la debida depuraci\u00f3n. Esto permite a los atacantes explotar la vulnerabilidad para abusar de las credenciales del servidor web Gradio de GPT Academic y acceder a recursos web no autorizados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11031.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11031.json index b29596b867e..17a9d10c625 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11031.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11031.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:22.820", "lastModified": "2025-03-20T10:15:22.820", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In version 3.83 of binary-husky/gpt_academic, a Server-Side Request Forgery (SSRF) vulnerability exists in the Markdown_Translate.get_files_from_everything() API. This vulnerability is exploited through the HotReload(Markdown\u7ffb\u8bd1\u4e2d) plugin function, which allows downloading arbitrary web hosts by only checking if the link starts with 'http'. Attackers can exploit this vulnerability to abuse the victim GPT Academic's Gradio Web server's credentials to access unauthorized web resources." + }, + { + "lang": "es", + "value": "En la versi\u00f3n 3.83 de binary-husky/gpt_academic, existe una vulnerabilidad de Server-Side Request Forgery (SSRF) en la API Markdown_Translate.get_files_from_everything(). Esta vulnerabilidad se explota mediante la funci\u00f3n del complemento HotReload(Markdown???), que permite descargar servidores web arbitrarios comprobando \u00fanicamente si el enlace empieza por \"http\". Los atacantes pueden aprovechar esta vulnerabilidad para abusar de las credenciales del servidor web Gradio de GPT Academic y acceder a recursos web no autorizados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11033.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11033.json index d13375b8ba3..4d0846a2d21 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11033.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11033.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:22.933", "lastModified": "2025-03-20T10:15:22.933", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial of Service (DoS) vulnerability exists in the file upload feature of binary-husky/gpt_academic version 3.83. The vulnerability is due to improper handling of form-data with a large filename in the file upload request. An attacker can exploit this vulnerability by sending a payload with an excessively large filename, causing the server to become overwhelmed and unavailable for legitimate users." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en la funci\u00f3n de carga de archivos de binary-husky/gpt_academic versi\u00f3n 3.83. Esta vulnerabilidad se debe a la gesti\u00f3n incorrecta de datos de formulario con un nombre de archivo demasiado grande en la solicitud de carga de archivos. Un atacante puede explotar esta vulnerabilidad enviando un payload con un nombre de archivo excesivamente grande, lo que provoca la saturaci\u00f3n del servidor y su indisponibilidad para usuarios leg\u00edtimos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11036.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11036.json index 25994b7725c..665eecb0cc8 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11036.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11036.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11037.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11037.json index 4a4e7f319cf..9bd5cf39232 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11037.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11037.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:23.053", "lastModified": "2025-03-20T10:15:23.053", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability exists in binary-husky/gpt_academic at commit 679352d, which allows an attacker to bypass the blocked_paths protection and read the config.py file containing sensitive information such as the OpenAI API key. This vulnerability is exploitable on Windows operating systems by accessing a specific URL that includes the absolute path of the project." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de path traversal en binary-husky/gpt_academic, en el commit 679352d, que permite a un atacante eludir la protecci\u00f3n de las rutas bloqueadas y leer el archivo config.py que contiene informaci\u00f3n confidencial, como la clave de la API de OpenAI. Esta vulnerabilidad se puede explotar en sistemas operativos Windows accediendo a una URL espec\u00edfica que incluye la ruta absoluta del proyecto." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11039.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11039.json index 8fb09e285ea..5013bf5e58b 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11039.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11039.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:23.170", "lastModified": "2025-03-20T10:15:23.170", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A pickle deserialization vulnerability exists in the Latex English error correction plug-in function of binary-husky/gpt_academic versions up to and including 3.83. This vulnerability allows attackers to achieve remote command execution by deserializing untrusted data. The issue arises from the inclusion of numpy in the deserialization whitelist, which can be exploited by constructing a malicious compressed package containing a merge_result.pkl file and a merge_proofread_en.tex file. The vulnerability is fixed in commit 91f5e6b." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de deserializaci\u00f3n de pickle en la funci\u00f3n del complemento de correcci\u00f3n de errores de Latex English de las versiones binary-husky/gpt_academic hasta la 3.83 incluida. Esta vulnerabilidad permite a los atacantes ejecutar comandos de forma remota deserializando datos no confiables. El problema surge de la inclusi\u00f3n de numpy en la lista blanca de deserializaci\u00f3n, que puede explotarse mediante la creaci\u00f3n de un paquete comprimido malicioso que contenga los archivos merge_result.pkl y merge_proofread_en.tex. La vulnerabilidad est\u00e1 corregida en el commit 91f5e6b." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11040.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11040.json index 229b1437218..3ba4cf2abf1 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11040.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11040.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:23.293", "lastModified": "2025-03-20T10:15:23.293", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "vllm-project vllm version 0.5.2.2 is vulnerable to Denial of Service attacks. The issue occurs in the 'POST /v1/completions' and 'POST /v1/embeddings' endpoints. For 'POST /v1/completions', enabling 'use_beam_search' and setting 'best_of' to a high value causes the HTTP connection to time out, with vllm ceasing effective work and the request remaining in a 'pending' state, blocking new completion requests. For 'POST /v1/embeddings', supplying invalid inputs to the JSON object causes an issue in the background loop, resulting in all further completion requests returning a 500 HTTP error code ('Internal Server Error') until vllm is restarted." + }, + { + "lang": "es", + "value": "vllm-project vllm versi\u00f3n 0.5.2.2 es vulnerable a ataques de denegaci\u00f3n de servicio. El problema ocurre en los endpoints 'POST /v1/completions' y 'POST /v1/embeddings'. En 'POST /v1/completions', habilitar 'use_beam_search' y establecer 'best_of' en un valor alto provoca que la conexi\u00f3n HTTP se agote, vllm deja de funcionar y la solicitud permanece en estado 'pendiente', bloqueando as\u00ed nuevas solicitudes de finalizaci\u00f3n. En 'POST /v1/embeddings', proporcionar entradas no v\u00e1lidas al objeto JSON causa un problema en el bucle en segundo plano, lo que provoca que todas las solicitudes de finalizaci\u00f3n posteriores devuelvan un c\u00f3digo de error HTTP 500 ('Error interno del servidor') hasta que se reinicie vllm." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11041.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11041.json index 1e7abfa2abc..ced421a51bb 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11041.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11041.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:23.420", "lastModified": "2025-03-20T10:15:23.420", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "vllm-project vllm version v0.6.2 contains a vulnerability in the MessageQueue.dequeue() API function. The function uses pickle.loads to parse received sockets directly, leading to a remote code execution vulnerability. An attacker can exploit this by sending a malicious payload to the MessageQueue, causing the victim's machine to execute arbitrary code." + }, + { + "lang": "es", + "value": "vllm-project vllm versi\u00f3n v0.6.2 contiene una vulnerabilidad en la funci\u00f3n de la API MessageQueue.dequeue(). Esta funci\u00f3n utiliza pickle.loads para analizar directamente los sockets recibidos, lo que genera una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede explotar esto enviando un payload a MessageQueue, lo que provoca que el equipo de la v\u00edctima ejecute c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11042.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11042.json index 5d7c86b6d07..3808e67e253 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11042.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11042.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:23.537", "lastModified": "2025-03-20T10:15:23.537", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In invoke-ai/invokeai version v5.0.2, the web API `POST /api/v1/images/delete` is vulnerable to Arbitrary File Deletion. This vulnerability allows unauthorized attackers to delete arbitrary files on the server, potentially including critical or sensitive system files such as SSH keys, SQLite databases, and configuration files. This can impact the integrity and availability of applications relying on these files." + }, + { + "lang": "es", + "value": "En la versi\u00f3n v5.0.2 de evolve-ai/invokeai, la API web `POST /api/v1/images/delete` es vulnerable a la eliminaci\u00f3n arbitraria de archivos. Esta vulnerabilidad permite a atacantes no autorizados eliminar archivos arbitrarios del servidor, incluyendo potencialmente archivos cr\u00edticos o sensibles del sistema, como claves SSH, bases de datos SQLite y archivos de configuraci\u00f3n. Esto puede afectar la integridad y la disponibilidad de las aplicaciones que dependen de estos archivos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11043.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11043.json index a032b51caff..ce0dc85783a 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11043.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11043.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:23.647", "lastModified": "2025-03-20T14:15:17.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial of Service (DoS) vulnerability was discovered in the /api/v1/boards/{board_id} endpoint of invoke-ai/invokeai version v5.0.2. This vulnerability occurs when an excessively large payload is sent in the board_name field during a PATCH request. By sending a large payload, the UI becomes unresponsive, rendering it impossible for users to interact with or manage the affected board. Additionally, the option to delete the board becomes inaccessible, amplifying the severity of the issue." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en el endpoint /api/v1/boards/{board_id} de la versi\u00f3n v5.0.2 de evolve-ai/invokeai. Esta vulnerabilidad se produce cuando se env\u00eda un payload excesivamente grande en el campo board_name durante una solicitud PATCH. Al enviar una carga excesiva, la interfaz de usuario deja de responder, lo que impide a los usuarios interactuar con el tablero afectado o gestionarlo. Adem\u00e1s, la opci\u00f3n para eliminar el tablero se vuelve inaccesible, lo que agrava el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11044.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11044.json index 5fff38b1f3c..a8870283198 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11044.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11044.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:23.760", "lastModified": "2025-03-20T10:15:23.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An open redirect vulnerability in automatic1111/stable-diffusion-webui version 1.10.0 allows a remote unauthenticated attacker to redirect users to arbitrary websites via a specially crafted URL. This vulnerability can be exploited to conduct phishing attacks, distribute malware, and steal user credentials." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de redirecci\u00f3n abierta en automatic1111/stable-diffusion-webui versi\u00f3n 1.10.0 permite a un atacante remoto no autenticado redirigir a los usuarios a sitios web arbitrarios mediante una URL especialmente manipulada. Esta vulnerabilidad puede explotarse para realizar ataques de phishing, distribuir malware y robar credenciales de usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11045.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11045.json index e5ebfd86527..1179cb6505a 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11045.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11045.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:23.873", "lastModified": "2025-03-20T10:15:23.873", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site WebSocket Hijacking (CSWSH) vulnerability in automatic1111/stable-diffusion-webui version 1.10.0 allows an attacker to clone a malicious server extension from a GitHub repository. The vulnerability arises from the lack of proper validation on WebSocket connections at ws://127.0.0.1:7860/queue/join, enabling unauthorized actions on the server. This can lead to unauthorized cloning of server extensions, execution of malicious scripts, data exfiltration, and potential denial of service (DoS)." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-Site WebSocket Hijacking (CSWSH) en automatic1111/stable-diffusion-webui versi\u00f3n 1.10.0 permite a un atacante clonar una extensi\u00f3n de servidor maliciosa desde un repositorio de GitHub. La vulnerabilidad se debe a la falta de una validaci\u00f3n adecuada de las conexiones WebSocket en ws://127.0.0.1:7860/queue/join, lo que permite acciones no autorizadas en el servidor. Esto puede provocar la clonaci\u00f3n no autorizada de extensiones de servidor, la ejecuci\u00f3n de scripts maliciosos, la exfiltraci\u00f3n de datos y una posible denegaci\u00f3n de servicio (DoS)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11087.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11087.json index 258da8f74f0..9b90fc1bb91 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11087.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11087.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11131.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11131.json index 646b67567ce..270c7946c70 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11131.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11131.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@synology.com", "published": "2025-03-19T03:15:12.850", "lastModified": "2025-03-19T03:15:12.850", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability regarding out-of-bounds read is found in the video interface. This allows remote attackers to execute arbitrary code via unspecified vectors. The following models with Synology Camera Firmware versions before 1.2.0-0525 may be affected: BC500, CC400W and TC500." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad relacionada con la lectura fuera de los l\u00edmites en la interfaz de v\u00eddeo. Esto permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante vectores no especificados. Los siguientes modelos con versiones de Synology Camera Firmware anteriores a la 1.2.0-0525 podr\u00edan verse afectados: BC500, CC400W y TC500." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11137.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11137.json index f330c29a4b5..4212bc17df4 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11137.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11137.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:23.987", "lastModified": "2025-03-20T10:15:23.987", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Insecure Direct Object Reference (IDOR) vulnerability exists in the `PATCH /v1/runs/:id/score` endpoint of lunary-ai/lunary version 1.6.0. This vulnerability allows an attacker to update the score data of any run by manipulating the id parameter in the request URL, which corresponds to the `runId_score` in the database. The endpoint does not sufficiently validate whether the authenticated user has permission to modify the specified runId, enabling an attacker with a valid account to modify other users' runId scores by specifying different id values. This issue was fixed in version 1.6.1." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Referencia Directa a Objetos Insegura (IDOR) en el endpoint `PATCH /v1/runs/:id/score` de la versi\u00f3n 1.6.0 de lunary-ai/lunary. Esta vulnerabilidad permite a un atacante actualizar la puntuaci\u00f3n de cualquier ejecuci\u00f3n manipulando el par\u00e1metro id en la URL de solicitud, que corresponde al `runId_score` en la base de datos. El endpoint no valida adecuadamente si el usuario autenticado tiene permiso para modificar el runId especificado, lo que permite a un atacante con una cuenta v\u00e1lida modificar las puntuaciones de runId de otros usuarios especificando valores de id diferentes. Este problema se solucion\u00f3 en la versi\u00f3n 1.6.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11167.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11167.json index 253f43c62fd..16b517ed642 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11167.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11167.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:24.097", "lastModified": "2025-03-20T10:15:24.097", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability in danny-avila/librechat versions prior to 0.7.6 allows authenticated users to delete other users' prompts via the groupid parameter. This issue occurs because the endpoint does not verify whether the provided prompt ID belongs to the current user." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de control de acceso indebido en versiones de danny-avila/librechat anteriores a la 0.7.6 permite a los usuarios autenticados eliminar las solicitudes de otros usuarios mediante el par\u00e1metro groupid. Este problema se produce porque el endpoint no verifica si el ID de solicitud proporcionado pertenece al usuario actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11169.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11169.json index ed21f4f2ee6..4d6e29bb260 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11169.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11169.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:24.210", "lastModified": "2025-03-20T10:15:24.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unhandled exception in danny-avila/librechat version 3c94ff2 can lead to a server crash. The issue occurs when the fs module throws an exception while handling file uploads. An unauthenticated user can trigger this exception by sending a specially crafted request, causing the server to crash. The vulnerability is fixed in version 0.7.6." + }, + { + "lang": "es", + "value": "Una excepci\u00f3n no controlada en la versi\u00f3n 3c94ff2 de danny-avila/librechat puede provocar un fallo del servidor. El problema ocurre cuando el m\u00f3dulo fs lanza una excepci\u00f3n al gestionar la carga de archivos. Un usuario no autenticado puede activar esta excepci\u00f3n enviando una solicitud especialmente manipulada, lo que provoca el fallo del servidor. La vulnerabilidad est\u00e1 corregida en la versi\u00f3n 0.7.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11170.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11170.json index 52958d58c80..1197b8324cb 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11170.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11170.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:24.323", "lastModified": "2025-03-20T10:15:24.323", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in danny-avila/librechat version git 81f2936 allows for path traversal due to improper sanitization of file paths by the multer middleware. This can lead to arbitrary file write and potentially remote code execution. The issue is fixed in version 0.7.6." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la versi\u00f3n git 81f2936 de danny-avila/librechat permite el path traversal debido a la depuraci\u00f3n incorrecta de las rutas de archivo por parte del middleware multer. Esto puede provocar escrituras arbitrarias en archivos y, potencialmente, la ejecuci\u00f3n remota de c\u00f3digo. El problema se solucion\u00f3 en la versi\u00f3n 0.7.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11171.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11171.json index b83de5d6f29..5852c3b9a31 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11171.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11171.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:24.437", "lastModified": "2025-03-20T10:15:24.437", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In danny-avila/librechat version git 0c2a583, there is an improper input validation vulnerability. The application uses multer middleware for handling multipart file uploads. When using in-memory storage (the default setting for multer), there is no limit on the upload file size. This can lead to a server crash due to out-of-memory errors when handling large files. An attacker without any privileges can exploit this vulnerability to cause a complete denial of service. The issue is fixed in version 0.7.6." + }, + { + "lang": "es", + "value": "En la versi\u00f3n git 0c2a583 de danny-avila/librechat, existe una vulnerabilidad de validaci\u00f3n de entrada incorrecta. La aplicaci\u00f3n utiliza el middleware multer para gestionar la carga de archivos multiparte. Al usar almacenamiento en memoria (configuraci\u00f3n predeterminada de multer), no hay l\u00edmite de tama\u00f1o para los archivos de carga. Esto puede provocar un fallo del servidor debido a errores de memoria insuficiente al gestionar archivos grandes. Un atacante sin privilegios puede explotar esta vulnerabilidad para provocar una denegaci\u00f3n de servicio completa. El problema se ha corregido en la versi\u00f3n 0.7.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11172.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11172.json index 7268b2ef713..229fad8a4ae 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11172.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11172.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:24.550", "lastModified": "2025-03-20T10:15:24.550", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in danny-avila/librechat version git a1647d7 allows an unauthenticated attacker to cause a denial of service by sending a crafted payload to the server. The middleware `checkBan` is not surrounded by a try-catch block, and an unhandled exception will cause the server to crash. This issue is fixed in version 0.7.6." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la versi\u00f3n git a1647d7 de danny-avila/librechat permite a un atacante no autenticado provocar una denegaci\u00f3n de servicio mediante el env\u00edo de un payload manipulado al servidor. El middleware `checkBan` no est\u00e1 rodeado por un bloque try-catch, y una excepci\u00f3n no controlada provocar\u00e1 el bloqueo del servidor. Este problema se ha corregido en la versi\u00f3n 0.7.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11173.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11173.json index dbb015c8242..c4780461d93 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11173.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11173.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:24.663", "lastModified": "2025-03-20T10:15:24.663", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unhandled exception in the danny-avila/librechat repository, version git 600d217, can cause the server to crash, leading to a full denial of service. This issue occurs when certain API endpoints receive malformed input, resulting in an uncaught exception. Although a valid JWT is required to exploit this vulnerability, LibreChat allows open registration, enabling unauthenticated attackers to create an account and perform the attack. The issue is fixed in version 0.7.6." + }, + { + "lang": "es", + "value": "Una excepci\u00f3n no controlada en el repositorio danny-avila/librechat, versi\u00f3n git 600d217, puede provocar un fallo del servidor, lo que resulta en una denegaci\u00f3n de servicio total. Este problema ocurre cuando ciertos endpoints de la API reciben una entrada mal formada, lo que resulta en una excepci\u00f3n no detectada. Aunque se requiere un JWT v\u00e1lido para explotar esta vulnerabilidad, LibreChat permite el registro abierto, lo que permite a atacantes no autenticados crear una cuenta y ejecutar el ataque. El problema est\u00e1 corregido en la versi\u00f3n 0.7.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11203.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11203.json index 827906a5fc7..ac966c92a5b 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11203.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11203.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-11-28T09:15:04.007", "lastModified": "2024-11-28T09:15:04.007", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11283.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11283.json index 8345388394a..e62cee0bc28 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11283.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11283.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-14T05:15:37.577", "lastModified": "2025-03-14T05:15:37.577", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11284.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11284.json index 83e497097d8..d37bfcf6c52 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11284.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11284.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-14T05:15:40.463", "lastModified": "2025-03-14T05:15:40.463", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11285.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11285.json index 1a40a47473a..a1310b2d56f 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11285.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11285.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-14T05:15:40.693", "lastModified": "2025-03-14T05:15:40.693", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11286.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11286.json index 98bd408439f..82149af63ca 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11286.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11286.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-14T05:15:40.917", "lastModified": "2025-03-14T05:15:40.917", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11297.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11297.json index 9542a10d231..e359adb776b 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11297.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11297.json @@ -52,7 +52,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11300.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11300.json index 0208566422e..8efe59912e0 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11300.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11300.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In lunary-ai/lunary before version 1.6.3, an improper access control vulnerability exists where a user can access prompt data of another user. This issue affects version 1.6.2 and the main branch. The vulnerability allows unauthorized users to view sensitive prompt data by accessing specific URLs, leading to potential exposure of critical information." + }, + { + "lang": "es", + "value": "En lunary-ai/lunary, versiones anteriores a la 1.6.3, existe una vulnerabilidad de control de acceso indebido que permite a un usuario acceder a los datos de los avisos de otro usuario. Este problema afecta a la versi\u00f3n 1.6.2 y a la rama principal. Esta vulnerabilidad permite a usuarios no autorizados acceder a datos confidenciales de los avisos mediante URL espec\u00edficas, lo que podr\u00eda exponer informaci\u00f3n cr\u00edtica." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11301.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11301.json index 85dd5de4c49..586862df8d6 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11301.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11301.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:24.890", "lastModified": "2025-03-20T10:15:24.890", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In lunary-ai/lunary before version 1.6.3, the application allows the creation of evaluators without enforcing a unique constraint on the combination of projectId and slug. This allows an attacker to overwrite existing data by submitting a POST request with the same slug as an existing evaluator. The lack of database constraints or application-layer validation to prevent duplicates exposes the application to data integrity issues. This vulnerability can result in corrupted data and potentially malicious actions, impairing the system's functionality." + }, + { + "lang": "es", + "value": "En lunary-ai/lunary, versiones anteriores a la 1.6.3, la aplicaci\u00f3n permite la creaci\u00f3n de evaluadores sin imponer una restricci\u00f3n \u00fanica en la combinaci\u00f3n de projectId y slug. Esto permite a un atacante sobrescribir datos existentes al enviar una solicitud POST con el mismo slug que un evaluador existente. La falta de restricciones en la base de datos o validaci\u00f3n en la capa de aplicaci\u00f3n para evitar duplicados expone la aplicaci\u00f3n a problemas de integridad de datos. Esta vulnerabilidad puede provocar la corrupci\u00f3n de datos y posibles acciones maliciosas, lo que afecta la funcionalidad del sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11302.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11302.json index f2d0fadd37b..fff2239aec5 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11302.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11302.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:25.003", "lastModified": "2025-03-20T10:15:25.003", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A missing check_access() function in the lollms_binding_infos module of the parisneo/lollms repository, version V14, allows attackers to add, modify, and remove bindings arbitrarily. This vulnerability affects the /install_binding and /reinstall_binding endpoints, among others, enabling unauthorized access and manipulation of binding settings without requiring the client_id value." + }, + { + "lang": "es", + "value": "La falta de la funci\u00f3n check_access() en el m\u00f3dulo lollms_binding_infos del repositorio parisneo/lollms (versi\u00f3n V14) permite a los atacantes a\u00f1adir, modificar y eliminar enlaces arbitrariamente. Esta vulnerabilidad afecta a los endpoints /install_binding y /reinstall_binding, entre otros, lo que permite el acceso no autorizado y la manipulaci\u00f3n de la configuraci\u00f3n de enlaces sin necesidad del valor client_id." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11441.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11441.json index 0469fd5f6d0..ae77a17301d 100644 --- a/CVE-2024/CVE-2024-114xx/CVE-2024-11441.json +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11441.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:25.110", "lastModified": "2025-03-20T10:15:25.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability exists in Serge version 0.9.0. The vulnerability is due to improper neutralization of input during web page generation in the chat prompt. An attacker can exploit this vulnerability by sending a crafted message containing malicious HTML/JavaScript code, which will be stored and executed whenever the chat is accessed, leading to unintended content being shown to the user and potential phishing attacks." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la versi\u00f3n 0.9.0 de Serge. Esta vulnerabilidad se debe a la neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web en el mensaje de chat. Un atacante puede explotar esta vulnerabilidad enviando un mensaje manipulado con c\u00f3digo HTML/JavaScript malicioso, que se almacenar\u00e1 y ejecutar\u00e1 al acceder al chat, lo que provocar\u00e1 la visualizaci\u00f3n de contenido no deseado al usuario y posibles ataques de phishing." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11449.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11449.json index 394e90dff70..e66f061d7e9 100644 --- a/CVE-2024/CVE-2024-114xx/CVE-2024-11449.json +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11449.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:25.223", "lastModified": "2025-03-20T10:15:25.223", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in haotian-liu/llava version 1.2.0 (LLaVA-1.6) allows for Server-Side Request Forgery (SSRF) through the /run/predict endpoint. An attacker can gain unauthorized access to internal networks or the AWS metadata endpoint by sending crafted requests that exploit insufficient validation of the path parameter. This flaw can lead to unauthorized network access, sensitive data exposure, and further exploitation within the network." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en haotian-liu/llava versi\u00f3n 1.2.0 (LLaVA-1.6) permite Server-Side Request Forgery (SSRF) a trav\u00e9s del endpoint /run/predict. Un atacante puede obtener acceso no autorizado a las redes internas o al endpoint de metadatos de AWS mediante el env\u00edo de solicitudes manipuladas que aprovechan la validaci\u00f3n insuficiente del par\u00e1metro path. Esta falla puede provocar acceso no autorizado a la red, la exposici\u00f3n de datos confidenciales y una mayor explotaci\u00f3n dentro de la red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11477.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11477.json index 8ae8dda0d31..5a62b1623eb 100644 --- a/CVE-2024/CVE-2024-114xx/CVE-2024-11477.json +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11477.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11602.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11602.json index 33fbb4d0027..1e74ce13aab 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11602.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11602.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:25.337", "lastModified": "2025-03-20T10:15:25.337", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Origin Resource Sharing (CORS) vulnerability exists in feast-dev/feast version 0.40.0. The CORS configuration on the agentscope server does not properly restrict access to only trusted origins, allowing any external domain to make requests to the API. This can bypass intended security controls and potentially expose sensitive information." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-Origin Resource Sharing (CORS) en feast-dev/feast versi\u00f3n 0.40.0. La configuraci\u00f3n de CORS en el servidor agentscope no restringe correctamente el acceso \u00fanicamente a or\u00edgenes de confianza, lo que permite que cualquier dominio externo realice solicitudes a la API. Esto puede eludir los controles de seguridad previstos y potencialmente exponer informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11603.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11603.json index 06fe3af4b70..43139bf1d4a 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11603.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11603.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:25.450", "lastModified": "2025-03-20T10:15:25.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Server-Side Request Forgery (SSRF) vulnerability exists in lm-sys/fastchat version 0.2.36. The vulnerability is present in the `/queue/join?` endpoint, where insufficient validation of the path parameter allows an attacker to send crafted requests. This can lead to unauthorized access to internal networks or the AWS metadata endpoint, potentially exposing sensitive data and compromising internal servers." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Server-Side Request Forgery (SSRF) en lm-sys/fastchat versi\u00f3n 0.2.36. La vulnerabilidad se presenta en el endpoint `/queue/join?`, donde una validaci\u00f3n insuficiente del par\u00e1metro path permite a un atacante enviar solicitudes manipuladas. Esto puede provocar acceso no autorizado a las redes internas o al endpoint de metadatos de AWS, lo que podr\u00eda exponer datos confidenciales y comprometer los servidores internos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11640.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11640.json index ac7a0cc098a..6ae592b309c 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11640.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11640.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11728.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11728.json index 74355bbd9da..218f7189d42 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11728.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11728.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11821.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11821.json index 8ce93c21505..8fcabe768e7 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11821.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11821.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:25.563", "lastModified": "2025-03-20T10:15:25.563", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privilege escalation vulnerability exists in langgenius/dify version 0.9.1. This vulnerability allows a normal user to modify Orchestrate instructions for a chatbot created by an admin user. The issue arises because the application does not properly enforce access controls on the endpoint /console/api/apps/{chatbot-id}/model-config, allowing unauthorized users to alter chatbot configurations." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de escalada de privilegios en langgenius/dify versi\u00f3n 0.9.1. Esta vulnerabilidad permite a un usuario normal modificar las instrucciones de Orchestrate para un chatbot creado por un usuario administrador. El problema surge porque la aplicaci\u00f3n no aplica correctamente los controles de acceso en el endpoint /console/api/apps/{chatbot-id}/model-config, lo que permite que usuarios no autorizados alteren la configuraci\u00f3n del chatbot." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11822.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11822.json index 9e5150b5935..0525d20a4c2 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11822.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11822.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:25.677", "lastModified": "2025-03-20T14:15:18.070", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "langgenius/dify version 0.9.1 contains a Server-Side Request Forgery (SSRF) vulnerability. The vulnerability exists due to improper handling of the api_endpoint parameter, allowing an attacker to make direct requests to internal network services. This can lead to unauthorized access to internal servers and potentially expose sensitive information, including access to the AWS metadata endpoint." + }, + { + "lang": "es", + "value": "La versi\u00f3n 0.9.1 de langgenius/dify contiene una vulnerabilidad de Server-Side Request Forgery (SSRF). Esta vulnerabilidad se debe a la gesti\u00f3n incorrecta del par\u00e1metro api_endpoint, lo que permite a un atacante realizar solicitudes directas a los servicios de red internos. Esto puede provocar acceso no autorizado a servidores internos y potencialmente exponer informaci\u00f3n confidencial, incluido el acceso al endpoint de metadatos de AWS." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11824.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11824.json index 92f2f40f4cc..d964330b0d0 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11824.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11824.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:25.790", "lastModified": "2025-03-20T10:15:25.790", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability exists in langgenius/dify version latest, specifically in the chat log functionality. The vulnerability arises because certain HTML tags like and