mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2024-10-04T14:00:27.718839+00:00
This commit is contained in:
parent
700625af95
commit
4baf5a3079
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-2628",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-04-19T02:29:00.457",
|
||||
"lastModified": "2024-10-03T19:35:01.060",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-10-04T13:35:26.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-09-08",
|
||||
"cisaActionDue": "2022-09-29",
|
||||
@ -22,8 +22,8 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -40,15 +40,13 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -157,6 +155,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/103776",
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -165,6 +164,7 @@
|
||||
"url": "http://www.securitytracker.com/id/1040696",
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-24523",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2021-09-13T18:15:16.077",
|
||||
"lastModified": "2021-09-23T12:46:11.887",
|
||||
"lastModified": "2024-10-04T12:53:24.000",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:daily_prayer_time_project:daily_prayer_time:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:mmrs151:daily_prayer_time:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2021.08.10",
|
||||
"matchCriteriaId": "4E60B610-4059-4272-8C86-1EAF2673EDF5"
|
||||
"matchCriteriaId": "779AB1FD-D2FA-49E8-871D-0F5E1C875779"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2021-37577",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T15:15:06.423",
|
||||
"lastModified": "2024-10-01T15:15:06.423",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Bluetooth LE and BR/EDR Secure Connections pairing and Secure Simple Pairing using the Passkey entry protocol in Bluetooth Core Specifications 2.1 through 5.3 may permit an unauthenticated man-in-the-middle attacker to identify the Passkey used during pairing by reflection of a crafted public key with the same X coordinate as the offered public key and by reflection of the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. This is a related issue to CVE-2020-26558."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El emparejamiento de conexiones seguras de Bluetooth LE y BR/EDR y el emparejamiento simple seguro mediante el protocolo de entrada de clave de acceso en las especificaciones b\u00e1sicas de Bluetooth 2.1 a 5.3 pueden permitir que un atacante intermediario no autenticado identifique la clave de acceso utilizada durante el emparejamiento mediante el reflejo de una clave p\u00fablica manipulada con la misma coordenada X que la clave p\u00fablica ofrecida y mediante el reflejo de la evidencia de autenticaci\u00f3n del dispositivo iniciador, lo que potencialmente permite que este atacante complete el emparejamiento autenticado con el dispositivo que responde utilizando la clave de acceso correcta para la sesi\u00f3n de emparejamiento. Este es un problema relacionado con CVE-2020-26558."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27631",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-06-22T08:15:09.433",
|
||||
"lastModified": "2023-06-28T03:27:49.077",
|
||||
"lastModified": "2024-10-04T12:53:24.000",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -76,9 +76,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:daily_prayer_time_project:daily_prayer_time:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:mmrs151:daily_prayer_time:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2023.05.04",
|
||||
"matchCriteriaId": "08D775FF-51F3-496D-9FC9-AFE735D81283"
|
||||
"matchCriteriaId": "DE6D830B-76BE-49B6-886C-EBD090F79711"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27632",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-12T23:15:09.093",
|
||||
"lastModified": "2023-11-17T19:29:14.953",
|
||||
"lastModified": "2024-10-04T12:53:24.000",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -80,9 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:daily_prayer_time_project:daily_prayer_time:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:mmrs151:daily_prayer_time:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2023.03.08",
|
||||
"matchCriteriaId": "6F83BED9-7397-49D2-9AD9-38679A7A703E"
|
||||
"matchCriteriaId": "57FB17EF-A4F0-4D13-BF8E-1065BBDD3214"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3441",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-10-01T10:15:02.997",
|
||||
"lastModified": "2024-10-01T10:15:02.997",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2023-37822",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-03T18:15:04.443",
|
||||
"lastModified": "2024-10-03T18:15:04.443",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Eufy HomeBase 2 model T8010X v3.2.8.3h was discovered to use the deprecated wireless protocol WPA2-PSK."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que Eufy HomeBase 2 modelo T8010X v3.2.8.3h utiliza el protocolo inal\u00e1mbrico obsoleto WPA2-PSK."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2023-7273",
|
||||
"sourceIdentifier": "a341c0d1-ebf7-493f-a84e-38cf86618674",
|
||||
"published": "2024-10-01T13:15:02.463",
|
||||
"lastModified": "2024-10-01T13:15:02.463",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross site request forgery in Kiteworks OwnCloud allows an unauthenticated attacker to forge requests.\nIf a request has no Authorization header, it is created with an empty string as value by a rewrite rule. The CSRF check is done by comparing the header value to null, meaning that the existing CSRF check is bypassed in this case. An attacker can, for example, create a new administrator account if the request is executed in the browser of an authenticated victim."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Cross site request forgery en Kiteworks OwnCloud permite que un atacante no autenticado falsifique solicitudes. Si una solicitud no tiene un encabezado de autorizaci\u00f3n, se crea con una cadena vac\u00eda como valor mediante una regla de reescritura. La comprobaci\u00f3n CSRF se realiza comparando el valor del encabezado con un valor nulo, lo que significa que en este caso se omite la comprobaci\u00f3n CSRF existente. Un atacante puede, por ejemplo, crear una nueva cuenta de administrador si la solicitud se ejecuta en el navegador de una v\u00edctima autenticada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-0116",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-10-01T05:15:11.920",
|
||||
"lastModified": "2024-10-01T05:15:11.920",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA Triton Inference Server contains a vulnerability where a user may cause an out-of-bounds read issue by releasing a shared memory region while it is in use. A successful exploit of this vulnerability may lead to denial of service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "NVIDIA Triton Inference Server contiene una vulnerabilidad en la que un usuario puede provocar un problema de lectura fuera de los l\u00edmites al liberar una regi\u00f3n de memoria compartida mientras est\u00e1 en uso. Una explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar la denegaci\u00f3n de servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-0123",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-10-03T17:15:14.030",
|
||||
"lastModified": "2024-10-03T17:15:14.030",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA CUDA toolkit for Windows and Linux contains a vulnerability in the nvdisasm command line tool where an attacker may cause an improper validation in input issue by tricking the user into running nvdisasm on a malicious ELF file. A successful exploit of this vulnerability may lead to denial of service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El kit de herramientas NVIDIA CUDA para Windows y Linux contiene una vulnerabilidad en la herramienta de l\u00ednea de comandos nvdisasm, que permite a un atacante provocar una validaci\u00f3n incorrecta en la entrada de datos enga\u00f1ando al usuario para que ejecute nvdisasm en un archivo ELF malicioso. Una explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar una denegaci\u00f3n de servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-0124",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-10-03T17:15:14.253",
|
||||
"lastModified": "2024-10-03T17:15:14.253",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA CUDA Toolkit for Windows and Linux contains a vulnerability in the nvdisam command line tool, where a user can cause nvdisasm to read freed memory by running it on a malformed ELF file. A successful exploit of this vulnerability might lead to a limited denial of service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "NVIDIA CUDA Toolkit para Windows y Linux contiene una vulnerabilidad en la herramienta de l\u00ednea de comandos nvdisam, donde un usuario puede hacer que nvdisasm lea la memoria liberada al ejecutarla en un archivo ELF mal formado. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda provocar una denegaci\u00f3n de servicio limitada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-0125",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-10-03T17:15:14.490",
|
||||
"lastModified": "2024-10-03T17:15:14.490",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA CUDA Toolkit for Windows and Linux contains a vulnerability in the nvdisam command line tool, where a user can cause a NULL pointer dereference by running nvdisasm on a malformed ELF file. A successful exploit of this vulnerability might lead to a limited denial of service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "NVIDIA CUDA Toolkit para Windows y Linux contiene una vulnerabilidad en la herramienta de l\u00ednea de comandos nvdisam, donde un usuario puede provocar una desreferencia de puntero NULL al ejecutar nvdisasm en un archivo ELF mal formado. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda provocar una denegaci\u00f3n de servicio limitada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20365",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:14.863",
|
||||
"lastModified": "2024-10-02T17:15:14.863",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the Redfish API of Cisco UCS B-Series, Cisco UCS Managed C-Series, and Cisco UCS X-Series Servers could allow an authenticated, remote attacker with administrative privileges to perform command injection attacks on an affected system and elevate privileges to root.\r\n\r\nThis vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by sending crafted commands through the Redfish API on an affected device. A successful exploit could allow the attacker to elevate privileges to root."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en la API Redfish de los servidores Cisco UCS B-Series, Cisco UCS Managed C-Series y Cisco UCS X-Series podr\u00eda permitir que un atacante remoto autenticado con privilegios administrativos realice ataques de inyecci\u00f3n de comandos en un sistema afectado y eleve los privilegios a superusuario. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente. Un atacante con privilegios administrativos podr\u00eda aprovechar esta vulnerabilidad enviando comandos manipulados a trav\u00e9s de la API Redfish en un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante elevar los privilegios a superusuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20385",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:15.110",
|
||||
"lastModified": "2024-10-02T17:15:15.110",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the SSL/TLS implementation of Cisco Nexus Dashboard Orchestrator (NDO) could allow an unauthenticated, remote attacker to intercept sensitive information from an affected device. \r\n\r\nThis vulnerability exists because the Cisco NDO Validate Peer Certificate site management feature validates the certificates for Cisco Application Policy Infrastructure Controller (APIC), Cisco Cloud Network Controller (CNC), and Cisco Nexus Dashboard only when a new site is added or an existing one is reregistered. An attacker could exploit this vulnerability by using machine-in-the-middle techniques to intercept the traffic between the affected device and Cisco NDO and then using a crafted certificate to impersonate the affected device. A successful exploit could allow the attacker to learn sensitive information during communications between these devices."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en la implementaci\u00f3n de SSL/TLS de Cisco Nexus Dashboard Orchestrator (NDO) podr\u00eda permitir que un atacante remoto no autenticado intercepte informaci\u00f3n confidencial de un dispositivo afectado. Esta vulnerabilidad existe porque la funci\u00f3n de administraci\u00f3n de sitios Validate Peer Certificate de Cisco NDO valida los certificados para Cisco Application Policy Infrastructure Controller (APIC), Cisco Cloud Network Controller (CNC) y Cisco Nexus Dashboard solo cuando se agrega un sitio nuevo o se vuelve a registrar uno existente. Un atacante podr\u00eda aprovechar esta vulnerabilidad mediante t\u00e9cnicas de m\u00e1quina en el medio para interceptar el tr\u00e1fico entre el dispositivo afectado y Cisco NDO y luego usar un certificado manipulado para hacerse pasar por el dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante obtenga informaci\u00f3n confidencial durante las comunicaciones entre estos dispositivos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20393",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:15.337",
|
||||
"lastModified": "2024-10-02T17:15:15.337",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to elevate privileges on an affected device.\r\n\r\nThis vulnerability exists because the web-based management interface discloses sensitive information. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow an attacker to elevate privileges from guest to admin."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores VPN Gigabit de doble WAN Cisco Small Business RV340, RV340W, RV345 y RV345P podr\u00eda permitir que un atacante remoto autenticado eleve los privilegios en un dispositivo afectado. Esta vulnerabilidad existe porque la interfaz de administraci\u00f3n basada en web revela informaci\u00f3n confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una entrada HTTP manipulada a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que un atacante eleve los privilegios de invitado a administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20432",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:15.550",
|
||||
"lastModified": "2024-10-02T17:15:15.550",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the REST API and web UI of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, low-privileged, remote attacker to perform a command injection attack against an affected device.\r\n \r\nThis vulnerability is due to improper user authorization and insufficient validation of command arguments. An attacker could exploit this vulnerability by submitting crafted commands to an affected REST API endpoint or through the web UI. A successful exploit could allow the attacker to execute arbitrary commands on the CLI of a Cisco NDFC-managed device with network-admin privileges.\r\n \r\nNote: This vulnerability does not affect Cisco NDFC when it is configured for storage area network (SAN) controller deployment."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en la API REST y la interfaz de usuario web de Cisco Nexus Dashboard Fabric Controller (NDFC) podr\u00eda permitir que un atacante remoto autenticado y con pocos privilegios realice un ataque de inyecci\u00f3n de comandos contra un dispositivo afectado. Esta vulnerabilidad se debe a una autorizaci\u00f3n de usuario incorrecta y una validaci\u00f3n insuficiente de los argumentos de los comandos. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando comandos manipulados a un endpoint de la API REST afectada o a trav\u00e9s de la interfaz de usuario web. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante ejecute comandos arbitrarios en la CLI de un dispositivo administrado por Cisco NDFC con privilegios de administrador de red. Nota: Esta vulnerabilidad no afecta a Cisco NDFC cuando est\u00e1 configurado para la implementaci\u00f3n del controlador de red de \u00e1rea de almacenamiento (SAN)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20438",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:15.753",
|
||||
"lastModified": "2024-10-02T17:15:15.753",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the REST API endpoints of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to read or write files on an affected device.\r\n\r\nThis vulnerability exists because of missing authorization controls on some REST API endpoints. An attacker could exploit this vulnerability by sending crafted API requests to an affected endpoint. A successful exploit could allow the attacker to perform limited network-admin functions such as reading device configuration information, uploading files, and modifying uploaded files.\r\nNote: This vulnerability only affects a subset of REST API endpoints and does not affect the web-based management interface."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en los endpoints de la API REST de Cisco NDFC podr\u00eda permitir que un atacante remoto autenticado y con pocos privilegios lea o escriba archivos en un dispositivo afectado. Esta vulnerabilidad existe debido a la falta de controles de autorizaci\u00f3n en algunos endpoints de la API REST. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando solicitudes de API manipuladas a un endpoint afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante realice funciones limitadas de administraci\u00f3n de red, como leer informaci\u00f3n de configuraci\u00f3n del dispositivo, cargar archivos y modificar archivos cargados. Nota: Esta vulnerabilidad solo afecta a un subconjunto de endpoints de la API REST y no afecta a la interfaz de administraci\u00f3n basada en web."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20441",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:15.967",
|
||||
"lastModified": "2024-10-02T17:15:15.967",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in a specific REST API endpoint of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to learn sensitive information on an affected device.\r\n\r\nThis vulnerability is due to insufficient authorization controls on the affected REST API endpoint. An attacker could exploit this vulnerability by sending crafted API requests to the affected endpoint. A successful exploit could allow the attacker to download config only or full backup files and learn sensitive configuration information. This vulnerability only affects a specific REST API endpoint and does not affect the web-based management interface."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en un endpoint de API REST espec\u00edfico de Cisco NDFC podr\u00eda permitir que un atacante remoto autenticado y con pocos privilegios obtenga informaci\u00f3n confidencial sobre un dispositivo afectado. Esta vulnerabilidad se debe a controles de autorizaci\u00f3n insuficientes en el endpoint de API REST afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando solicitudes de API manipuladas al endpoint afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante descargue solo archivos de configuraci\u00f3n o de respaldo completo y obtenga informaci\u00f3n de configuraci\u00f3n confidencial. Esta vulnerabilidad solo afecta a un endpoint de API REST espec\u00edfico y no afecta a la interfaz de administraci\u00f3n basada en web."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20442",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:16.177",
|
||||
"lastModified": "2024-10-02T17:15:16.177",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the REST API endpoints of Cisco Nexus Dashboard could allow an authenticated, low-privileged, remote attacker to perform limited Administrator actions on an affected device.\r\n\r\nThis vulnerability is due to insufficient authorization controls on some REST API endpoints. An attacker could exploit this vulnerability by sending crafted API requests to an affected endpoint. A successful exploit could allow the attacker to perform limited Administrator functions such as viewing portions of the web UI, generating config only or full backup files, and deleting tech support files. This vulnerability only affects a subset of REST API endpoints and does not affect the web-based management interface."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en los endpoints de la API REST de Cisco Nexus Dashboard podr\u00eda permitir que un atacante remoto autenticado y con pocos privilegios realice acciones limitadas de administrador en un dispositivo afectado. Esta vulnerabilidad se debe a controles de autorizaci\u00f3n insuficientes en algunos endpoints de la API REST. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando solicitudes de API manipuladas a un endpoint afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante realice funciones limitadas de administrador, como ver partes de la interfaz de usuario web, generar archivos de configuraci\u00f3n \u00fanicamente o de respaldo completo y eliminar archivos de soporte t\u00e9cnico. Esta vulnerabilidad solo afecta a un subconjunto de endpoints de la API REST y no afecta a la interfaz de administraci\u00f3n basada en web."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20444",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:16.390",
|
||||
"lastModified": "2024-10-02T17:15:16.390",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC), formerly Cisco Data Center Network Manager (DCNM), could allow an authenticated, remote attacker with network-admin privileges to perform a command injection attack against an affected device.\r\n \r\nThis vulnerability is due to insufficient validation of command arguments. An attacker could exploit this vulnerability by submitting crafted command arguments to a specific REST API endpoint. A successful exploit could allow the attacker to overwrite sensitive files or crash a specific container, which would restart on its own, causing a low-impact denial of service (DoS) condition."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en Cisco Nexus Dashboard Fabric Controller (NDFC), anteriormente Cisco Data Center Network Manager (DCNM), podr\u00eda permitir que un atacante remoto autenticado con privilegios de administrador de red realice un ataque de inyecci\u00f3n de comandos contra un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de los argumentos de los comandos. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando argumentos de comandos manipulados a un endpoint de API REST espec\u00edfico. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante sobrescribir archivos confidenciales o bloquear un contenedor espec\u00edfico, que se reiniciar\u00eda por s\u00ed solo, lo que provocar\u00eda una condici\u00f3n de denegaci\u00f3n de servicio (DoS) de bajo impacto."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20448",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:16.597",
|
||||
"lastModified": "2024-10-02T17:15:16.597",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the Cisco Nexus Dashboard Fabric Controller (NDFC) software, formerly Cisco Data Center Network Manager (DCNM), could allow an attacker with access to a backup file to view sensitive information.\r\n\r\nThis vulnerability is due to the improper storage of sensitive information within config only and full backup files. An attacker could exploit this vulnerability by parsing the contents of a backup file that is generated from an affected device. A successful exploit could allow the attacker to access sensitive information, including NDFC-connected device credentials, the NDFC site manager private key, and the scheduled backup file encryption key."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en el software Cisco Nexus Dashboard Fabric Controller (NDFC), anteriormente Cisco Data Center Network Manager (DCNM), podr\u00eda permitir que un atacante con acceso a un archivo de copia de seguridad vea informaci\u00f3n confidencial. Esta vulnerabilidad se debe al almacenamiento inadecuado de informaci\u00f3n confidencial en archivos de copia de seguridad completa y de solo configuraci\u00f3n. Un atacante podr\u00eda aprovechar esta vulnerabilidad al analizar el contenido de un archivo de copia de seguridad que se genera desde un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante acceder a informaci\u00f3n confidencial, incluidas las credenciales del dispositivo conectado a NDFC, la clave privada del administrador del sitio de NDFC y la clave de cifrado del archivo de copia de seguridad programada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20449",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:16.820",
|
||||
"lastModified": "2024-10-02T17:15:16.820",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with low privileges to execute arbitrary code on an affected device.\r\n\r\nThis vulnerability is due to improper path validation. An attacker could exploit this vulnerability by using the Secure Copy Protocol (SCP) to upload malicious code to an affected device using path traversal techniques. A successful exploit could allow the attacker to execute arbitrary code in a specific container with the privileges of root."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en Cisco Nexus Dashboard Fabric Controller (NDFC) podr\u00eda permitir que un atacante remoto autenticado con privilegios bajos ejecute c\u00f3digo arbitrario en un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n de ruta incorrecta. Un atacante podr\u00eda aprovechar esta vulnerabilidad utilizando el Protocolo de copia segura (SCP) para cargar c\u00f3digo malicioso en un dispositivo afectado utilizando t\u00e9cnicas de path traversal. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en un contenedor espec\u00edfico con los privilegios de superusuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20470",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:17.027",
|
||||
"lastModified": "2024-10-02T20:35:31.370",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device. In order to exploit this vulnerability, the attacker must have valid admin credentials.\r\n\r\nThis vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores VPN Gigabit de doble WAN Cisco Small Business RV340, RV340W, RV345 y RV345P podr\u00eda permitir que un atacante remoto autenticado ejecute c\u00f3digo arbitrario en un dispositivo afectado. Para aprovechar esta vulnerabilidad, el atacante debe tener credenciales de administrador v\u00e1lidas. Esta vulnerabilidad existe porque la interfaz de administraci\u00f3n basada en web no valida de manera suficiente la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una entrada HTTP manipulada a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante ejecute c\u00f3digo arbitrario como usuario ra\u00edz en el sistema operativo subyacente."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20477",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:17.130",
|
||||
"lastModified": "2024-10-02T17:15:17.130",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in a specific REST API endpoint of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to upload or delete files on an affected device.\r\n\r\nThis vulnerability exists because of missing authorization controls on the affected REST API endpoint. An attacker could exploit this vulnerability by sending crafted API requests to the affected endpoint. A successful exploit could allow the attacker to upload files into a specific container or delete files from a specific folder within that container. This vulnerability only affects a specific REST API endpoint and does not affect the web-based management interface."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en un endpoint de API REST espec\u00edfico de Cisco NDFC podr\u00eda permitir que un atacante remoto autenticado y con pocos privilegios cargue o elimine archivos en un dispositivo afectado. Esta vulnerabilidad existe debido a la falta de controles de autorizaci\u00f3n en el endpoint de API REST afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando solicitudes de API manipuladas al endpoint afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante cargue archivos en un contenedor espec\u00edfico o elimine archivos de una carpeta espec\u00edfica dentro de ese contenedor. Esta vulnerabilidad solo afecta a un endpoint de API REST espec\u00edfico y no afecta a la interfaz de administraci\u00f3n basada en web."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20490",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:17.350",
|
||||
"lastModified": "2024-10-02T17:15:17.350",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in a logging function of Cisco Nexus Dashboard Fabric Controller (NDFC) and Cisco Nexus Dashboard Orchestrator (NDO) could allow an attacker with access to a tech support file to view sensitive information.\r\n\r\nThis vulnerability exists because HTTP proxy credentials could be recorded in an internal log that is stored in the tech support file. An attacker could exploit this vulnerability by accessing a tech support file that is generated from an affected system. A successful exploit could allow the attacker to view HTTP proxy server admin credentials in clear text that are configured on Nexus Dashboard to reach an external network.\r\nNote: Best practice is to store debug logs and tech support files safely and to share them only with trusted parties because they may contain sensitive information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en una funci\u00f3n de registro de Cisco Nexus Dashboard Fabric Controller (NDFC) y Cisco Nexus Dashboard Orchestrator (NDO) podr\u00eda permitir que un atacante con acceso a un archivo de soporte t\u00e9cnico vea informaci\u00f3n confidencial. Esta vulnerabilidad existe porque las credenciales de proxy HTTP se pueden registrar en un registro interno que se almacena en el archivo de soporte t\u00e9cnico. Un atacante podr\u00eda aprovechar esta vulnerabilidad al acceder a un archivo de soporte t\u00e9cnico que se genera desde un sistema afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante vea las credenciales de administrador del servidor proxy HTTP en texto plano que est\u00e1n configuradas en Nexus Dashboard para llegar a una red externa. Nota: La mejor pr\u00e1ctica es almacenar los registros de depuraci\u00f3n y los archivos de soporte t\u00e9cnico de forma segura y compartirlos solo con partes de confianza porque pueden contener informaci\u00f3n confidencial."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20491",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:17.563",
|
||||
"lastModified": "2024-10-02T17:15:17.563",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in a logging function of Cisco Nexus Dashboard Insights could allow an attacker with access to a tech support file to view sensitive information.\r\n\r\nThis vulnerability exists because remote controller credentials are recorded in an internal log that is stored in the tech support file. An attacker could exploit this vulnerability by accessing a tech support file that is generated from an affected system. A successful exploit could allow the attacker to view remote controller admin credentials in clear text.\r\nNote: Best practice is to store debug logs and tech support files safely and to share them only with trusted parties because they may contain sensitive information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en una funci\u00f3n de registro de Cisco Nexus Dashboard Insights podr\u00eda permitir que un atacante con acceso a un archivo de soporte t\u00e9cnico vea informaci\u00f3n confidencial. Esta vulnerabilidad existe porque las credenciales del controlador remoto se registran en un registro interno que se almacena en el archivo de soporte t\u00e9cnico. Un atacante podr\u00eda aprovechar esta vulnerabilidad accediendo a un archivo de soporte t\u00e9cnico que se genera desde un sistema afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante vea las credenciales de administrador del controlador remoto en texto plano. Nota: La pr\u00e1ctica recomendada es almacenar los registros de depuraci\u00f3n y los archivos de soporte t\u00e9cnico de forma segura y compartirlos solo con partes de confianza porque pueden contener informaci\u00f3n confidencial."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20492",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:17.763",
|
||||
"lastModified": "2024-10-02T17:15:17.763",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the restricted shell of Cisco Expressway Series could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have Administrator-level credentials with read-write privileges on an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a series of crafted CLI commands. A successful exploit could allow the attacker to escape the restricted shell and gain root privileges on the underlying operating system of the affected device.\r\nNote: Cisco Expressway Series refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en el shell restringido de Cisco Expressway Series podr\u00eda permitir que un atacante local autenticado realice ataques de inyecci\u00f3n de comandos en el sistema operativo subyacente y eleve los privilegios a superusuario. Para explotar esta vulnerabilidad, el atacante debe tener credenciales de nivel de administrador con privilegios de lectura y escritura en un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una serie de comandos CLI manipulados. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante escapar del shell restringido y obtener privilegios de superusuario en el sistema operativo subyacente del dispositivo afectado. Nota: Cisco Expressway Series hace referencia a los dispositivos Cisco Expressway Control (Expressway-C) y Cisco Expressway Edge (Expressway-E)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20498",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T19:15:13.870",
|
||||
"lastModified": "2024-10-02T19:15:13.870",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.\r\n\r\nThese vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.\r\nNote: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Varias vulnerabilidades en el servidor VPN de Cisco AnyConnect de los dispositivos Cisco Meraki MX y Cisco Meraki Z Series Teleworker Gateway podr\u00edan permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en el servicio AnyConnect de un dispositivo afectado. Estas vulnerabilidades se deben a una validaci\u00f3n insuficiente de los par\u00e1metros proporcionados por el cliente al establecer una sesi\u00f3n VPN SSL. Un atacante podr\u00eda aprovechar estas vulnerabilidades enviando una solicitud HTTPS manipulada al servidor VPN de un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante haga que el servidor VPN de Cisco AnyConnect se reinicie, lo que provocar\u00eda la falla de las conexiones VPN SSL establecidas y obligar\u00eda a los usuarios remotos a iniciar una nueva conexi\u00f3n VPN y volver a autenticarse. Un ataque sostenido podr\u00eda evitar que se establezcan nuevas conexiones VPN SSL. Nota: Cuando el tr\u00e1fico del ataque se detiene, el servidor VPN de Cisco AnyConnect se recupera sin problemas sin necesidad de intervenci\u00f3n manual."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20499",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T19:15:14.143",
|
||||
"lastModified": "2024-10-02T19:15:14.143",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.\r\n\r\nThese vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.\r\nNote: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Varias vulnerabilidades en el servidor VPN de Cisco AnyConnect de los dispositivos Cisco Meraki MX y Cisco Meraki Z Series Teleworker Gateway podr\u00edan permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en el servicio AnyConnect de un dispositivo afectado. Estas vulnerabilidades se deben a una validaci\u00f3n insuficiente de los par\u00e1metros proporcionados por el cliente al establecer una sesi\u00f3n VPN SSL. Un atacante podr\u00eda aprovechar estas vulnerabilidades enviando una solicitud HTTPS manipulada al servidor VPN de un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante haga que el servidor VPN de Cisco AnyConnect se reinicie, lo que provocar\u00eda la falla de las conexiones VPN SSL establecidas y obligar\u00eda a los usuarios remotos a iniciar una nueva conexi\u00f3n VPN y volver a autenticarse. Un ataque sostenido podr\u00eda evitar que se establezcan nuevas conexiones VPN SSL. Nota: Cuando el tr\u00e1fico del ataque se detiene, el servidor VPN de Cisco AnyConnect se recupera sin problemas sin necesidad de intervenci\u00f3n manual."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20500",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T19:15:14.350",
|
||||
"lastModified": "2024-10-02T19:15:14.350",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.\r\n\r\nThis vulnerability is due to insufficient resource management when establishing TLS/SSL sessions. An attacker could exploit this vulnerability by sending a series of crafted TLS/SSL messages to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to stop accepting new connections, preventing new SSL VPN connections from being established. Existing SSL VPN sessions are not impacted.\r\nNote: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en el servidor VPN de Cisco AnyConnect de los dispositivos Cisco Meraki MX y Cisco Meraki Z Series Teleworker Gateway podr\u00eda permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en el servicio AnyConnect de un dispositivo afectado. Esta vulnerabilidad se debe a una gesti\u00f3n insuficiente de los recursos al establecer sesiones TLS/SSL. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una serie de mensajes TLS/SSL manipulados al servidor VPN de un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante hacer que el servidor VPN de Cisco AnyConnect deje de aceptar nuevas conexiones, lo que impedir\u00eda que se establecieran nuevas conexiones VPN SSL. Las sesiones VPN SSL existentes no se ven afectadas. Nota: Cuando el tr\u00e1fico del ataque se detiene, el servidor VPN de Cisco AnyConnect se recupera sin problemas sin necesidad de intervenci\u00f3n manual."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20501",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T19:15:14.570",
|
||||
"lastModified": "2024-10-02T19:15:14.570",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.\r\n\r\nThese vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.\r\nNote: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Varias vulnerabilidades en el servidor VPN de Cisco AnyConnect de los dispositivos Cisco Meraki MX y Cisco Meraki Z Series Teleworker Gateway podr\u00edan permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en el servicio AnyConnect de un dispositivo afectado. Estas vulnerabilidades se deben a una validaci\u00f3n insuficiente de los par\u00e1metros proporcionados por el cliente al establecer una sesi\u00f3n VPN SSL. Un atacante podr\u00eda aprovechar estas vulnerabilidades enviando una solicitud HTTPS manipulada al servidor VPN de un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante haga que el servidor VPN de Cisco AnyConnect se reinicie, lo que provocar\u00eda la falla de las conexiones VPN SSL establecidas y obligar\u00eda a los usuarios remotos a iniciar una nueva conexi\u00f3n VPN y volver a autenticarse. Un ataque sostenido podr\u00eda evitar que se establezcan nuevas conexiones VPN SSL. Nota: Cuando el tr\u00e1fico del ataque se detiene, el servidor VPN de Cisco AnyConnect se recupera sin problemas sin necesidad de intervenci\u00f3n manual."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20502",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T19:15:14.780",
|
||||
"lastModified": "2024-10-02T19:15:14.780",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition on an affected device.\r\n\r\nThis vulnerability is due to insufficient resource management while establishing SSL VPN sessions. An attacker could exploit this vulnerability by sending a series of crafted HTTPS requests to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to stop accepting new connections, preventing new SSL VPN connections from being established. Existing SSL VPN sessions are not impacted.\r\nNote: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en el servidor VPN de Cisco AnyConnect de los dispositivos Cisco Meraki MX y Cisco Meraki Z Series Teleworker Gateway podr\u00eda permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a una gesti\u00f3n insuficiente de los recursos al establecer sesiones VPN SSL. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una serie de solicitudes HTTPS manipuladas al servidor VPN de un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante hacer que el servidor VPN de Cisco AnyConnect deje de aceptar nuevas conexiones, lo que impedir\u00eda que se establecieran nuevas conexiones VPN SSL. Las sesiones VPN SSL existentes no se ven afectadas. Nota: Cuando el tr\u00e1fico del ataque se detiene, el servidor VPN de Cisco AnyConnect se recupera sin problemas sin necesidad de intervenci\u00f3n manual."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20509",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T19:15:14.997",
|
||||
"lastModified": "2024-10-02T19:15:14.997",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to hijack an AnyConnect VPN session or cause a denial of service (DoS) condition for individual users of the AnyConnect VPN service on an affected device.\r\n\r\nThis vulnerability is due to weak entropy for handlers that are used during the VPN authentication process as well as a race condition that exists in the same process. An attacker could exploit this vulnerability by correctly guessing an authentication handler and then sending crafted HTTPS requests to an affected device. A successful exploit could allow the attacker to take over the AnyConnect VPN session from a target user or prevent the target user from establishing an AnyConnect VPN session with the affected device."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en el servidor VPN de Cisco AnyConnect de los dispositivos Cisco Meraki MX y Cisco Meraki Z Series Teleworker Gateway podr\u00eda permitir que un atacante remoto no autenticado secuestre una sesi\u00f3n VPN de AnyConnect o provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) para usuarios individuales del servicio VPN de AnyConnect en un dispositivo afectado. Esta vulnerabilidad se debe a una entrop\u00eda d\u00e9bil para los controladores que se utilizan durante el proceso de autenticaci\u00f3n de VPN, as\u00ed como a una condici\u00f3n de ejecuci\u00f3n que existe en el mismo proceso. Un atacante podr\u00eda aprovechar esta vulnerabilidad adivinando correctamente un controlador de autenticaci\u00f3n y luego enviando solicitudes HTTPS manipuladas a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante tomar el control de la sesi\u00f3n VPN de AnyConnect de un usuario objetivo o evitar que el usuario objetivo establezca una sesi\u00f3n VPN de AnyConnect con el dispositivo afectado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20513",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T19:15:15.210",
|
||||
"lastModified": "2024-10-02T19:15:15.210",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition for targeted users of the AnyConnect service on an affected device.\r\n\r\nThis vulnerability is due to insufficient entropy for handlers that are used during SSL VPN session establishment. An unauthenticated attacker could exploit this vulnerability by brute forcing valid session handlers. An authenticated attacker could exploit this vulnerability by connecting to the AnyConnect VPN service of an affected device to retrieve a valid session handler and, based on that handler, predict further valid session handlers. The attacker would then send a crafted HTTPS request using the brute-forced or predicted session handler to the AnyConnect VPN server of the device. A successful exploit could allow the attacker to terminate targeted SSL VPN sessions, forcing remote users to initiate new VPN connections and reauthenticate."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en el servidor VPN de Cisco AnyConnect de los dispositivos Cisco Meraki MX y Cisco Meraki Z Series Teleworker Gateway podr\u00eda permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) para usuarios espec\u00edficos del servicio AnyConnect en un dispositivo afectado. Esta vulnerabilidad se debe a una entrop\u00eda insuficiente para los controladores que se utilizan durante el establecimiento de una sesi\u00f3n VPN SSL. Un atacante no autenticado podr\u00eda explotar esta vulnerabilidad mediante la fuerza bruta de controladores de sesi\u00f3n v\u00e1lidos. Un atacante autenticado podr\u00eda explotar esta vulnerabilidad conect\u00e1ndose al servicio VPN AnyConnect de un dispositivo afectado para recuperar un controlador de sesi\u00f3n v\u00e1lido y, en funci\u00f3n de ese controlador, predecir otros controladores de sesi\u00f3n v\u00e1lidos. A continuaci\u00f3n, el atacante enviar\u00eda una solicitud HTTPS manipulada mediante el controlador de sesi\u00f3n forzado o previsto al servidor VPN AnyConnect del dispositivo. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante finalizar sesiones VPN SSL espec\u00edficas, lo que obligar\u00eda a los usuarios remotos a iniciar nuevas conexiones VPN y volver a autenticarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20515",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:17.973",
|
||||
"lastModified": "2024-10-02T17:15:17.973",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information from an affected device.\r\n\r\nThis vulnerability is due to a lack of proper data protection mechanisms for certain configuration settings. An attacker with Read-Only Administrator privileges could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to view device credentials that are normally not visible to Read-Only Administrators."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Identity Services Engine (ISE) podr\u00eda permitir que un atacante remoto autenticado obtenga informaci\u00f3n confidencial de un dispositivo afectado. Esta vulnerabilidad se debe a la falta de mecanismos de protecci\u00f3n de datos adecuados para determinadas opciones de configuraci\u00f3n. Un atacante con privilegios de administrador de solo lectura podr\u00eda aprovechar esta vulnerabilidad navegando a una p\u00e1gina que contenga datos confidenciales. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ver las credenciales del dispositivo que normalmente no son visibles para los administradores de solo lectura."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20516",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:18.200",
|
||||
"lastModified": "2024-10-02T17:15:18.200",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores Cisco Small Business RV042, RV042G, RV320 y RV325 podr\u00eda permitir que un atacante remoto autenticado, de nivel de administrador, provoque una recarga inesperada de un dispositivo afectado, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Para explotar esta vulnerabilidad, un atacante necesitar\u00eda tener credenciales de administrador v\u00e1lidas en el dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada del usuario que se encuentra en los paquetes HTTP entrantes. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una solicitud HTTP manipulada a la interfaz de administraci\u00f3n basada en web del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante provoque una recarga inesperada del dispositivo, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20517",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:18.417",
|
||||
"lastModified": "2024-10-02T17:15:18.417",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores Cisco Small Business RV042, RV042G, RV320 y RV325 podr\u00eda permitir que un atacante remoto autenticado, de nivel de administrador, provoque una recarga inesperada de un dispositivo afectado, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Para explotar esta vulnerabilidad, un atacante necesitar\u00eda tener credenciales de administrador v\u00e1lidas en el dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada del usuario que se encuentra en los paquetes HTTP entrantes. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una solicitud HTTP manipulada a la interfaz de administraci\u00f3n basada en web del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante provoque una recarga inesperada del dispositivo, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20518",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:18.637",
|
||||
"lastModified": "2024-10-02T17:15:18.637",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores Cisco Small Business RV042, RV042G, RV320 y RV325 podr\u00eda permitir que un atacante remoto autenticado de nivel de administrador ejecute c\u00f3digo arbitrario como usuario ra\u00edz. Para aprovechar esta vulnerabilidad, un atacante necesitar\u00eda tener credenciales de administrador v\u00e1lidas en el dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada proporcionada por el usuario en la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando solicitudes HTTP manipuladas a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en el sistema operativo subyacente como usuario ra\u00edz."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20519",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:18.837",
|
||||
"lastModified": "2024-10-02T17:15:18.837",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores Cisco Small Business RV042, RV042G, RV320 y RV325 podr\u00eda permitir que un atacante remoto autenticado de nivel de administrador ejecute c\u00f3digo arbitrario como usuario ra\u00edz. Para aprovechar esta vulnerabilidad, un atacante necesitar\u00eda tener credenciales de administrador v\u00e1lidas en el dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada proporcionada por el usuario en la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando solicitudes HTTP manipuladas a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en el sistema operativo subyacente como usuario ra\u00edz."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20520",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:19.050",
|
||||
"lastModified": "2024-10-02T17:15:19.050",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores Cisco Small Business RV042, RV042G, RV320 y RV325 podr\u00eda permitir que un atacante remoto autenticado de nivel de administrador ejecute c\u00f3digo arbitrario como usuario ra\u00edz. Para aprovechar esta vulnerabilidad, un atacante necesitar\u00eda tener credenciales de administrador v\u00e1lidas en el dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada proporcionada por el usuario en la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando solicitudes HTTP manipuladas a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en el sistema operativo subyacente como usuario ra\u00edz."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20521",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:19.280",
|
||||
"lastModified": "2024-10-02T17:15:19.280",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores Cisco Small Business RV042, RV042G, RV320 y RV325 podr\u00eda permitir que un atacante remoto autenticado de nivel de administrador ejecute c\u00f3digo arbitrario como usuario ra\u00edz. Para aprovechar esta vulnerabilidad, un atacante necesitar\u00eda tener credenciales de administrador v\u00e1lidas en el dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada proporcionada por el usuario en la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando solicitudes HTTP manipuladas a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en el sistema operativo subyacente como usuario ra\u00edz."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20522",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:19.490",
|
||||
"lastModified": "2024-10-02T17:15:19.490",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores Cisco Small Business RV042, RV042G, RV320 y RV325 podr\u00eda permitir que un atacante remoto autenticado, de nivel de administrador, provoque una recarga inesperada de un dispositivo afectado, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Para explotar esta vulnerabilidad, un atacante necesitar\u00eda tener credenciales de administrador v\u00e1lidas en el dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada del usuario que se encuentra en los paquetes HTTP entrantes. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una solicitud HTTP manipulada a la interfaz de administraci\u00f3n basada en web del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante provoque una recarga inesperada del dispositivo, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20523",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:19.707",
|
||||
"lastModified": "2024-10-02T17:15:19.707",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores Cisco Small Business RV042, RV042G, RV320 y RV325 podr\u00eda permitir que un atacante remoto autenticado, de nivel de administrador, provoque una recarga inesperada de un dispositivo afectado, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Para explotar esta vulnerabilidad, un atacante necesitar\u00eda tener credenciales de administrador v\u00e1lidas en el dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada del usuario que se encuentra en los paquetes HTTP entrantes. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una solicitud HTTP manipulada a la interfaz de administraci\u00f3n basada en web del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante provoque una recarga inesperada del dispositivo, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-20524",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:19.930",
|
||||
"lastModified": "2024-10-02T17:15:19.930",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores Cisco Small Business RV042, RV042G, RV320 y RV325 podr\u00eda permitir que un atacante remoto autenticado, de nivel de administrador, provoque una recarga inesperada de un dispositivo afectado, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Para explotar esta vulnerabilidad, un atacante necesitar\u00eda tener credenciales de administrador v\u00e1lidas en el dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada del usuario que se encuentra en los paquetes HTTP entrantes. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una solicitud HTTP manipulada a la interfaz de administraci\u00f3n basada en web del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante provoque una recarga inesperada del dispositivo, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-21489",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2024-10-01T05:15:12.227",
|
||||
"lastModified": "2024-10-01T05:15:12.227",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Versions of the package uplot before 1.6.31 are vulnerable to Prototype Pollution via the uplot.assign function due to missing check if the attribute resolves to the object prototype."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones del paquete uplot anteriores a 1.6.31 son vulnerables a la contaminaci\u00f3n de prototipos a trav\u00e9s de la funci\u00f3n uplot.assign debido a la falta de verificaci\u00f3n de si el atributo se resuelve en el prototipo del objeto."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-21530",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2024-10-02T05:15:11.300",
|
||||
"lastModified": "2024-10-02T05:15:11.300",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Versions of the package cocoon before 0.4.0 are vulnerable to Reusing a Nonce, Key Pair in Encryption when the encrypt, wrap, and dump functions are sequentially called. An attacker can generate the same ciphertext by creating a new encrypted message with the same cocoon object.\r\r**Note:**\rThe issue does NOT affect objects created with Cocoon::new which utilizes ThreadRng."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones del paquete cocoon anteriores a la 0.4.0 son vulnerables a la reutilizaci\u00f3n de un par de claves nonce en el cifrado cuando se invocan secuencialmente las funciones de cifrado, envoltura y volcado. Un atacante puede generar el mismo texto cifrado creando un nuevo mensaje cifrado con el mismo objeto cocoon. **Nota:** El problema NO afecta a los objetos creados con Cocoon::new, que utiliza ThreadRng."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-21531",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2024-10-01T05:15:12.440",
|
||||
"lastModified": "2024-10-01T05:15:12.440",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "All versions of the package git-shallow-clone are vulnerable to Command injection due to missing sanitization or mitigation flags in the process variable of the gitShallowClone function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Todas las versiones del paquete git-shallow-clone son vulnerables a la inyecci\u00f3n de comandos debido a la falta de indicadores de saneamiento o mitigaci\u00f3n en la variable de proceso de la funci\u00f3n gitShallowClone."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-24116",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-02T19:15:15.463",
|
||||
"lastModified": "2024-10-02T19:15:15.463",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Ruijie RG-NBS2009G-P RGOS v.10.4(1)P2 Release(9736) allows a remote attacker to gain privileges via the system/config_menu.htm."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Ruijie RG-NBS2009G-P RGOS v.10.4(1)P2 Release(9736) permite que un atacante remoto obtenga privilegios a trav\u00e9s de system/config_menu.htm."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-24117",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-02T21:15:13.300",
|
||||
"lastModified": "2024-10-02T21:15:13.300",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure Permissions vulnerability in Ruijie RG-NBS2009G-P RGOS v.10.4(1)P2 Release (9736) allows a remote attacker to gain privileges via the login check state component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de permisos inseguros en Ruijie RG-NBS2009G-P RGOS v.10.4(1)P2 Release (9736) permite a un atacante remoto obtener privilegios a trav\u00e9s del componente de verificaci\u00f3n de estado de inicio de sesi\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-24122",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-02T18:15:04.957",
|
||||
"lastModified": "2024-10-02T18:15:04.957",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A remote code execution vulnerability in the project management of Wanxing Technology's Yitu project which allows an attacker to use the exp.adpx file as a zip compressed file to construct a special file name, which can be used to decompress the project file into the system startup folder, restart the system, and automatically execute the constructed attack script."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en la gesti\u00f3n de proyectos del proyecto Yitu de Wanxing Technology que permite a un atacante utilizar el archivo exp.adpx como un archivo comprimido zip para construir un nombre de archivo especial, que puede usarse para descomprimir el archivo del proyecto en la carpeta de inicio del sistema, reiniciar el sistema y ejecutar autom\u00e1ticamente el script de ataque construido."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-25590",
|
||||
"sourceIdentifier": "security@open-xchange.com",
|
||||
"published": "2024-10-03T16:15:04.643",
|
||||
"lastModified": "2024-10-03T16:15:04.643",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An attacker can publish a zone containing specific Resource Record Sets.\n\n Repeatedly processing and caching results for these sets can lead to a \n\ndenial of service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un atacante puede publicar una zona que contenga conjuntos de registros de recursos espec\u00edficos. El procesamiento y almacenamiento en cach\u00e9 repetidos de los resultados de estos conjuntos puede provocar una denegaci\u00f3n de servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-25632",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-01T15:15:07.383",
|
||||
"lastModified": "2024-10-01T15:15:07.383",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "eLabFTW is an open source electronic lab notebook for research labs. In the context of eLabFTW, an administrator is a user account with certain privileges to manage users and content in their assigned team/teams. A user may be an administrator in one team and a regular user in another. The vulnerability allows a regular user to become administrator of a team where they are a member, under a reasonable configuration. Additionally, in eLabFTW versions subsequent to v5.0.0, the vulnerability may allow an initially unauthenticated user to gain administrative privileges over an arbitrary team. The vulnerability does not affect system administrator status. Users should upgrade to version 5.1.0. System administrators are advised to turn off local user registration, saml_team_create and not allow administrators to import users into teams, unless strictly required."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "eLabFTW es un cuaderno de laboratorio electr\u00f3nico de c\u00f3digo abierto para laboratorios de investigaci\u00f3n. En el contexto de eLabFTW, un administrador es una cuenta de usuario con ciertos privilegios para administrar usuarios y contenido en su equipo o equipos asignados. Un usuario puede ser administrador en un equipo y usuario regular en otro. La vulnerabilidad permite que un usuario regular se convierta en administrador de un equipo del que es miembro, bajo una configuraci\u00f3n razonable. Adem\u00e1s, en versiones de eLabFTW posteriores a la v5.0.0, la vulnerabilidad puede permitir que un usuario inicialmente no autenticado obtenga privilegios administrativos sobre un equipo arbitrario. La vulnerabilidad no afecta el estado de administrador del sistema. Los usuarios deben actualizar a la versi\u00f3n 5.1.0. Se recomienda a los administradores del sistema que desactiven el registro de usuarios locales, saml_team_create y no permitan que los administradores importen usuarios a los equipos, a menos que sea estrictamente necesario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-25658",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T15:15:07.640",
|
||||
"lastModified": "2024-10-01T15:15:07.640",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cleartext storage of passwords in Infinera TNMS (Transcend Network Management System) Server 19.10.3 allows attackers (with access to the database or exported configuration files) to obtain SNMP users' usernames and passwords in cleartext."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El almacenamiento de contrase\u00f1as en texto plano en Infinera TNMS (Transcend Network Management System) Server 19.10.3 permite a los atacantes (con acceso a la base de datos o a los archivos de configuraci\u00f3n exportados) obtener los nombres de usuario y las contrase\u00f1as de los usuarios de SNMP en texto plano."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-25659",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T16:15:09.363",
|
||||
"lastModified": "2024-10-01T18:35:06.917",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Infinera TNMS (Transcend Network Management System) 19.10.3, an insecure default configuration of the internal SFTP server on Linux servers allows remote attacker to access files and directories outside the SFTP user home directory."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En Infinera TNMS (Transcend Network Management System) 19.10.3, una configuraci\u00f3n predeterminada insegura del servidor SFTP interno en servidores Linux permite a un atacante remoto acceder a archivos y directorios fuera del directorio de inicio del usuario SFTP."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-25660",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T16:15:09.463",
|
||||
"lastModified": "2024-10-01T18:35:07.807",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WebDAV service in Infinera TNMS (Transcend Network Management System) 19.10.3 allows a low-privileged remote attacker to conduct unauthorized file operations, because of execution with unnecessary privileges."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El servicio WebDAV en Infinera TNMS (Transcend Network Management System) 19.10.3 permite que un atacante remoto con pocos privilegios realice operaciones de archivos no autorizadas debido a la ejecuci\u00f3n con privilegios innecesarios."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-25661",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T15:15:07.740",
|
||||
"lastModified": "2024-10-01T15:35:11.597",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Infinera TNMS (Transcend Network Management System) 19.10.3, cleartext storage of sensitive information in memory of the desktop application TNMS Client allows guest OS administrators to obtain various users' passwords by reading memory dumps of the desktop application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En Infinera TNMS (Transcend Network Management System) 19.10.3, el almacenamiento de texto plano de informaci\u00f3n confidencial en la memoria de la aplicaci\u00f3n de escritorio TNMS Client permite a los administradores del sistema operativo invitado obtener las contrase\u00f1as de varios usuarios leyendo volcados de memoria de la aplicaci\u00f3n de escritorio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-28807",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T21:15:03.427",
|
||||
"lastModified": "2024-09-30T21:35:02.137",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Infinera hiT 7300 5.60.50. Cleartext storage of sensitive information in the memory of the @CT desktop management application allows guest OS administrators to obtain various users' passwords by accessing memory dumps of the desktop application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en Infinera hiT 7300 5.60.50. El almacenamiento de texto plano de informaci\u00f3n confidencial en la memoria de la aplicaci\u00f3n de administraci\u00f3n de escritorio @CT permite que los administradores del sistema operativo invitado obtengan las contrase\u00f1as de varios usuarios accediendo a los volcados de memoria de la aplicaci\u00f3n de escritorio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-28808",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T21:15:03.493",
|
||||
"lastModified": "2024-09-30T21:15:03.493",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Infinera hiT 7300 5.60.50. Hidden functionality in the web interface allows a remote authenticated attacker to access reserved information by accessing undocumented web applications."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en Infinera hiT 7300 5.60.50. Una funcionalidad oculta en la interfaz web permite que un atacante remoto autenticado acceda a informaci\u00f3n reservada mediante el acceso a aplicaciones web no documentadas. "
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-28809",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T18:15:05.633",
|
||||
"lastModified": "2024-09-30T21:35:03.053",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Infinera hiT 7300 5.60.50. Cleartext storage of sensitive password in firmware update packages allows attackers to access various appliance services via hardcoded credentials."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en Infinera hiT 7300 5.60.50. El almacenamiento en texto plano de contrase\u00f1as confidenciales en paquetes de actualizaci\u00f3n de firmware permite a los atacantes acceder a varios servicios del dispositivo mediante credenciales codificadas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-28810",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T19:15:03.987",
|
||||
"lastModified": "2024-09-30T21:35:03.830",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Infinera hiT 7300 5.60.50. Sensitive information inside diagnostic files (exported by the @CT application) allows an attacker to achieve loss of confidentiality by analyzing these files."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en Infinera hiT 7300 5.60.50. La informaci\u00f3n confidencial dentro de los archivos de diagn\u00f3stico (exportados por la aplicaci\u00f3n @CT) permite que un atacante logre la p\u00e9rdida de confidencialidad al analizar estos archivos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-28811",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T19:15:04.060",
|
||||
"lastModified": "2024-09-30T19:15:04.060",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Infinera hiT 7300 5.60.50. A web application allows a remote privileged attacker to execute applications contained in a specific OS directory via HTTP invocations."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en Infinera hiT 7300 5.60.50. Una aplicaci\u00f3n web permite que un atacante remoto con privilegios ejecute aplicaciones contenidas en un directorio de SO espec\u00edfico a trav\u00e9s de invocaciones HTTP."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-28812",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T19:15:04.130",
|
||||
"lastModified": "2024-09-30T19:35:03.620",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Infinera hiT 7300 5.60.50. A hidden SSH service (on the local management network interface) with hardcoded credentials allows attackers to access the appliance operating system (with highest privileges) via an SSH connection."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en Infinera hiT 7300 5.60.50. Un servicio SSH oculto (en la interfaz de red de administraci\u00f3n local) con credenciales codificadas permite a los atacantes acceder al sistema operativo del dispositivo (con los privilegios m\u00e1s altos) a trav\u00e9s de una conexi\u00f3n SSH."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-28813",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T19:15:04.210",
|
||||
"lastModified": "2024-09-30T19:35:04.427",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Infinera hiT 7300 5.60.50. Undocumented privileged functions in the @CT management application allow an attacker to activate remote SSH access to the appliance via an unexpected network interface."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en Infinera hiT 7300 5.60.50. Las funciones privilegiadas no documentadas en la aplicaci\u00f3n de administraci\u00f3n @CT permiten que un atacante active el acceso SSH remoto al dispositivo a trav\u00e9s de una interfaz de red inesperada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28888",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2024-10-02T21:15:13.430",
|
||||
"lastModified": "2024-10-03T16:15:04.900",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-30132",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2024-10-01T12:15:03.687",
|
||||
"lastModified": "2024-10-01T12:15:03.687",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HCL Nomad server on Domino did not configure certain HTTP Security headers by default which could allow an attacker to obtain sensitive information via unspecified vectors."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El servidor HCL Nomad en Domino no configur\u00f3 ciertos encabezados de seguridad HTTP de forma predeterminada, lo que podr\u00eda permitir que un atacante obtenga informaci\u00f3n confidencial a trav\u00e9s de vectores no especificados."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-3056",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-08-02T21:16:30.950",
|
||||
"lastModified": "2024-09-23T17:19:10.877",
|
||||
"lastModified": "2024-10-04T12:31:32.350",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,20 +22,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.0
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-31835",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T19:15:07.493",
|
||||
"lastModified": "2024-10-01T19:15:07.493",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in flatpress CMS Flatpress v1.3 allows a remote attacker to execute arbitrary code via a crafted payload to the file name parameter."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de Cross-Site Scripting en Flatpress CMS Flatpress v1.3 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en el par\u00e1metro de nombre de archivo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-33209",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-02T16:15:10.300",
|
||||
"lastModified": "2024-10-02T16:15:10.300",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FlatPress v1.3 is vulnerable to Cross Site Scripting (XSS). An attacker can inject malicious JavaScript code into the \"Add New Entry\" section, which allows them to execute arbitrary code in the context of a victim's web browser."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "FlatPress v1.3 es vulnerable a Cross Site Scripting (XSS). Un atacante puede inyectar c\u00f3digo JavaScript malicioso en la secci\u00f3n \"Agregar nueva entrada\", lo que le permite ejecutar c\u00f3digo arbitrario en el contexto del navegador web de la v\u00edctima."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-33210",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-02T16:15:10.383",
|
||||
"lastModified": "2024-10-02T16:35:30.553",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability has been identified in Flatpress 1.3. This vulnerability allows an attacker to inject malicious scripts into web pages viewed by other users."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad de Cross-Site Scripting (XSS) en Flatpress 1.3. Esta vulnerabilidad permite a un atacante inyectar secuencias de comandos maliciosas en p\u00e1ginas web visitadas por otros usuarios."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-33662",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-02T05:15:11.643",
|
||||
"lastModified": "2024-10-02T05:15:11.643",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Portainer before 2.20.2 improperly uses an encryption algorithm in the AesEncrypt function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Portainer anterior a 2.20.2 utiliza incorrectamente un algoritmo de cifrado en la funci\u00f3n AesEncrypt."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-34535",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-03T18:15:04.693",
|
||||
"lastModified": "2024-10-03T18:15:04.693",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Mastodon 4.1.6, API endpoint rate limiting can be bypassed by setting a crafted HTTP request header."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En Mastodon 4.1.6, la limitaci\u00f3n de velocidad del endpoint de la API se puede evitar configurando un encabezado de solicitud HTTP manipulado espec\u00edficamente."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-35293",
|
||||
"sourceIdentifier": "info@cert.vde.com",
|
||||
"published": "2024-10-02T10:15:03.160",
|
||||
"lastModified": "2024-10-02T10:15:03.160",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthenticated remote attacker may use a missing authentication for critical function vulnerability to reboot or erase the affected devices resulting in data loss and/or a DoS."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un atacante remoto no autenticado puede usar una vulnerabilidad de autenticaci\u00f3n faltante para una funci\u00f3n cr\u00edtica para reiniciar o borrar los dispositivos afectados, lo que resulta en p\u00e9rdida de datos y/o un DoS."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-35294",
|
||||
"sourceIdentifier": "info@cert.vde.com",
|
||||
"published": "2024-10-02T11:15:10.780",
|
||||
"lastModified": "2024-10-02T11:15:10.780",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthenticated remote attacker may use the devices traffic capture without authentication to grab plaintext administrative credentials."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un atacante remoto no autenticado puede utilizar la captura de tr\u00e1fico de dispositivos sin autenticaci\u00f3n para obtener credenciales administrativas en texto plano."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-35495",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T18:15:05.713",
|
||||
"lastModified": "2024-09-30T18:15:05.713",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Information Disclosure vulnerability in the Telemetry component in TP-Link Kasa KP125M V1.0.0 and Tapo P125M 1.0.0 Build 220930 Rel.143947 allows attackers to observe device state via observing network traffic."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en el componente Telemetr\u00eda en TP-Link Kasa KP125M V1.0.0 y Tapo P125M 1.0.0 Build 220930 Rel.143947 permite a los atacantes observar el estado del dispositivo mediante la observaci\u00f3n del tr\u00e1fico de la red."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-36474",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2024-10-03T16:15:05.010",
|
||||
"lastModified": "2024-10-03T16:15:05.010",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de desbordamiento de n\u00fameros enteros en el analizador de formato de archivo binario de documento compuesto de GNOME Project G Structured File Library (libgsf), versi\u00f3n v1.14.52. Un archivo especialmente manipulado puede provocar un desbordamiento de n\u00fameros enteros al procesar el directorio desde el archivo que permite que se utilice un \u00edndice fuera de los l\u00edmites al leer y escribir en una matriz. Esto puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede proporcionar un archivo malicioso para activar esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-39755",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2024-10-03T16:15:05.230",
|
||||
"lastModified": "2024-10-03T16:15:05.230",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A privilege escalation vulnerability exists in the Veertu Anka Build 1.42.0. The vulnerability occurs during Anka node agent update. A low privilege user can trigger the update action which can result in unexpected elevation of privilege."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de escalada de privilegios en Veertu Anka Build 1.42.0. La vulnerabilidad ocurre durante la actualizaci\u00f3n del agente del nodo Anka. Un usuario con pocos privilegios puede activar la acci\u00f3n de actualizaci\u00f3n, lo que puede provocar una elevaci\u00f3n inesperada de privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3944",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-29T11:15:26.403",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-04T13:19:51.383",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:delower:wp_to_do:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.3.0",
|
||||
"matchCriteriaId": "48CF09FC-8FBD-4B6D-97E0-91F39CD1B51F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L225",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b36b9b8a-41b0-4b57-92c7-5acebe2b0bae?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41163",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2024-10-03T16:15:05.427",
|
||||
"lastModified": "2024-10-03T16:15:05.427",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A directory traversal vulnerability exists in the archive download functionality of Veertu Anka Build 1.42.0. A specially crafted HTTP request can lead to a disclosure of arbitrary files. An attacker can make an unauthenticated HTTP request to exploit this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de navegaci\u00f3n de directorios en la funci\u00f3n de descarga de archivos de Veertu Anka Build 1.42.0. Una solicitud HTTP especialmente manipulada puede dar lugar a la divulgaci\u00f3n de archivos arbitrarios. Un atacante puede realizar una solicitud HTTP no autenticada para aprovechar esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41276",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T14:15:05.477",
|
||||
"lastModified": "2024-10-01T15:35:13.190",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Kaiten version 57.131.12 and earlier allows attackers to bypass the PIN code authentication mechanism. The application requires users to input a 6-digit PIN code sent to their email for authorization after entering their login credentials. However, the request limiting mechanism can be easily bypassed, enabling attackers to perform a brute force attack to guess the correct PIN and gain unauthorized access to the application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en la versi\u00f3n 57.131.12 y anteriores de Kaiten permite a los atacantes eludir el mecanismo de autenticaci\u00f3n del c\u00f3digo PIN. La aplicaci\u00f3n requiere que los usuarios ingresen un c\u00f3digo PIN de 6 d\u00edgitos que se env\u00eda a su correo electr\u00f3nico para la autorizaci\u00f3n despu\u00e9s de ingresar sus credenciales de inicio de sesi\u00f3n. Sin embargo, el mecanismo de limitaci\u00f3n de solicitudes se puede eludir f\u00e1cilmente, lo que permite a los atacantes realizar un ataque de fuerza bruta para adivinar el PIN correcto y obtener acceso no autorizado a la aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41290",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-02T17:15:20.217",
|
||||
"lastModified": "2024-10-02T19:35:05.817",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FlatPress CMS v1.3.1 1.3 was discovered to use insecure methods to store authentication data via the cookie's component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que FlatPress CMS v1.3.1 1.3 utiliza m\u00e9todos inseguros para almacenar datos de autenticaci\u00f3n a trav\u00e9s del componente de cookies."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41583",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-03T19:15:04.053",
|
||||
"lastModified": "2024-10-03T19:35:13.010",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DrayTek Vigor3910 devices through 4.3.2.6 are vulnerable to stored Cross Site Scripting (XSS) by authenticated users due to poor sanitization of the router name."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los dispositivos DrayTek Vigor3910 hasta 4.3.2.6 son vulnerables a Cross Site Scripting (XSS) Almacenado por usuarios autenticados debido a una mala desinfecci\u00f3n del nombre del enrutador."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41584",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-03T19:15:04.140",
|
||||
"lastModified": "2024-10-03T19:35:13.793",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DrayTek Vigor3910 devices through 4.3.2.6 are vulnerable to reflected XSS by authenticated users, caused by missing validation of the sFormAuthStr parameter."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los dispositivos DrayTek Vigor3910 hasta 4.3.2.6 son vulnerables a XSS reflejado por usuarios autenticados, causado por la falta de validaci\u00f3n del par\u00e1metro sFormAuthStr."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41585",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-03T19:15:04.197",
|
||||
"lastModified": "2024-10-03T19:15:04.197",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DrayTek Vigor3910 devices through 4.3.2.6 are affected by an OS command injection vulnerability that allows an attacker to leverage the recvCmd binary to escape from the emulated instance and inject arbitrary commands into the host machine."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los dispositivos DrayTek Vigor3910 hasta la versi\u00f3n 4.3.2.6 est\u00e1n afectados por una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo que permite a un atacante aprovechar el binario recvCmd para escapar de la instancia emulada e inyectar comandos arbitrarios en la m\u00e1quina host."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41586",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-03T19:15:04.253",
|
||||
"lastModified": "2024-10-03T21:35:26.963",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stack-based Buffer Overflow vulnerability in DrayTek Vigor310 devices through 4.3.2.6 allows a remote attacker to execute arbitrary code via a long query string to the cgi-bin/ipfedr.cgi component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de desbordamiento de b\u00fafer basada en pila en los dispositivos DrayTek Vigor310 hasta la versi\u00f3n 4.3.2.6 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una cadena de consulta larga al componente cgi-bin/ipfedr.cgi."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41587",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-03T19:15:04.310",
|
||||
"lastModified": "2024-10-03T19:15:04.310",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El XSS almacenado, por parte de usuarios autenticados, es causado por una mala desinfecci\u00f3n del mensaje de saludo de la p\u00e1gina de inicio de sesi\u00f3n en los dispositivos DrayTek Vigor310 hasta 4.3.2.6."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41588",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-03T19:15:04.363",
|
||||
"lastModified": "2024-10-03T19:15:04.363",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The CGI endpoints v2x00.cgi and cgiwcg.cgi of DrayTek Vigor3910 devices through 4.3.2.6 are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strncpy function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los endpoints CGI v2x00.cgi y cgiwcg.cgi de los dispositivos DrayTek Vigor3910 hasta 4.3.2.6 son vulnerables a desbordamientos de b\u00fafer, por parte de usuarios autenticados, debido a la falta de verificaci\u00f3n de los l\u00edmites en los par\u00e1metros pasados a trav\u00e9s de solicitudes POST a la funci\u00f3n strncpy."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41589",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-03T19:15:04.423",
|
||||
"lastModified": "2024-10-03T21:35:28.537",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DrayTek Vigor310 devices through 4.3.2.6 use unencrypted HTTP for authentication requests."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los dispositivos DrayTek Vigor310 hasta la versi\u00f3n 4.3.2.6 utilizan HTTP sin cifrar para solicitudes de autenticaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41590",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-03T19:15:04.487",
|
||||
"lastModified": "2024-10-03T19:15:04.487",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Several CGI endpoints are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strcpy function on DrayTek Vigor310 devices through 4.3.2.6."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Varios endpoints de CGI son vulnerables a desbordamientos de b\u00fafer, por parte de usuarios autenticados, debido a la falta de verificaci\u00f3n de los l\u00edmites en los par\u00e1metros pasados a trav\u00e9s de solicitudes POST a la funci\u00f3n strcpy en dispositivos DrayTek Vigor310 hasta 4.3.2.6."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41591",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-03T19:15:04.560",
|
||||
"lastModified": "2024-10-03T19:15:04.560",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los dispositivos DrayTek Vigor3910 hasta 4.3.2.6 permiten XSS reflejado basado en DOM no autenticado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41592",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-03T19:15:04.633",
|
||||
"lastModified": "2024-10-03T19:35:14.553",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DrayTek Vigor3910 devices through 4.3.2.6 have a stack-based overflow when processing query string parameters because GetCGI mishandles extraneous ampersand characters and long key-value pairs."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los dispositivos DrayTek Vigor3910 hasta 4.3.2.6 tienen un desbordamiento basado en pila al procesar par\u00e1metros de cadena de consulta porque GetCGI maneja incorrectamente los caracteres ampersand extra\u00f1os y los pares clave-valor largos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41593",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-03T19:15:04.740",
|
||||
"lastModified": "2024-10-03T19:15:04.740",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los dispositivos DrayTek Vigor310 hasta 4.3.2.6 permiten a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n ft_payload_dns(), porque se produce una operaci\u00f3n de extensi\u00f3n de signo de byte para el argumento de longitud de una llamada _memcpy, lo que lleva a un desbordamiento de b\u00fafer basado en el mont\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41594",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-03T19:15:04.800",
|
||||
"lastModified": "2024-10-03T19:15:04.800",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en los dispositivos DrayTek Vigor310 hasta la versi\u00f3n 4.3.2.6 permite a un atacante obtener informaci\u00f3n confidencial porque el servidor httpd de la interfaz de administraci\u00f3n de Vigor utiliza una cadena est\u00e1tica para inicializar el PRNG de OpenSSL."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41595",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-03T19:15:04.857",
|
||||
"lastModified": "2024-10-03T19:35:15.407",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to change settings or cause a denial of service via .cgi pages because of missing bounds checks on read and write operations."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los dispositivos DrayTek Vigor310 hasta 4.3.2.6 permiten que un atacante remoto cambie configuraciones o provoque una denegaci\u00f3n de servicio a trav\u00e9s de p\u00e1ginas .cgi debido a la falta de controles de l\u00edmites en las operaciones de lectura y escritura."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41596",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-03T19:15:04.923",
|
||||
"lastModified": "2024-10-03T19:35:16.170",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerabilities exist in DrayTek Vigor310 devices through 4.3.2.6 (in the Vigor management UI) because of improper retrieval and handling of the CGI form parameters."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existen vulnerabilidades de desbordamiento de b\u00fafer en los dispositivos DrayTek Vigor310 hasta la versi\u00f3n 4.3.2.6 (en la interfaz de administraci\u00f3n de Vigor) debido a la recuperaci\u00f3n y el manejo incorrectos de los par\u00e1metros del formulario CGI."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41673",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-01T15:15:07.873",
|
||||
"lastModified": "2024-10-01T15:15:07.873",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Decidim is a participatory democracy framework. The version control feature used in resources is subject to potential XSS attack through a malformed URL. This vulnerability is fixed in 0.27.8."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Decidim es un framework de democracia participativa. La funci\u00f3n de control de versiones utilizada en los recursos est\u00e1 sujeta a posibles ataques XSS a trav\u00e9s de una URL mal formada. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 0.27.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41922",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2024-10-03T16:15:05.640",
|
||||
"lastModified": "2024-10-03T16:15:05.640",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A directory traversal vulnerability exists in the log files download functionality of Veertu Anka Build 1.42.0. A specially crafted HTTP request can result in a disclosure of arbitrary files. An attacker can make an unauthenticated HTTP request to trigger this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de directory traversal en la funcionalidad de descarga de archivos de registro de Veertu Anka Build 1.42.0. Una solicitud HTTP especialmente manipulada puede dar como resultado la divulgaci\u00f3n de archivos arbitrarios. Un atacante puede realizar una solicitud HTTP no autenticada para activar esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41925",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-10-03T23:15:02.970",
|
||||
"lastModified": "2024-10-03T23:15:02.970",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The web service for ONS-S8 - Spectra Aggregation Switch includes functions which do not properly validate user input, allowing an attacker to traverse directories, bypass authentication, and execute remote code."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El servicio web para ONS-S8 - Spectra Aggregation Switch incluye funciones que no validan correctamente la entrada del usuario, lo que permite a un atacante atravesar directorios, eludir la autenticaci\u00f3n y ejecutar c\u00f3digo remoto."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41987",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-10-03T18:15:04.837",
|
||||
"lastModified": "2024-10-03T18:15:04.837",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The TEM Opera Plus FM Family Transmitter application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La interfaz de la aplicaci\u00f3n TEM Opera Plus FM Family Transmitter permite a los usuarios realizar determinadas acciones a trav\u00e9s de solicitudes HTTP sin realizar ninguna comprobaci\u00f3n de validez para verificar las solicitudes. Esto se puede aprovechar para realizar determinadas acciones con privilegios administrativos si un usuario conectado visita un sitio web malicioso."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41988",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-10-03T18:15:05.030",
|
||||
"lastModified": "2024-10-03T18:15:05.030",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "TEM Opera Plus FM Family Transmitter allows access to an unprotected endpoint that allows MPFS File System binary image upload without authentication. This file system serves as the basis for the HTTP2 web server module but is also used by the SNMP module and is available to other applications that require basic read-only storage capabilities. This can be exploited to overwrite the flash program memory that holds the web server's main interfaces and execute arbitrary code."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "TEM Opera Plus FM Family Transmitter permite el acceso a un endpoint desprotegido que permite la carga de im\u00e1genes binarias del sistema de archivos MPFS sin autenticaci\u00f3n. Este sistema de archivos sirve como base para el m\u00f3dulo de servidor web HTTP2, pero tambi\u00e9n lo utiliza el m\u00f3dulo SNMP y est\u00e1 disponible para otras aplicaciones que requieren capacidades b\u00e1sicas de almacenamiento de solo lectura. Esto se puede aprovechar para sobrescribir la memoria flash del programa que contiene las interfaces principales del servidor web y ejecutar c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-42017",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T18:15:05.827",
|
||||
"lastModified": "2024-09-30T18:15:05.827",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Atos Eviden iCare 2.7.1 through 2.7.11. The application exposes a web interface locally. In the worst-case scenario, if the application is remotely accessible, it allows an attacker to execute arbitrary commands with system privilege on the endpoint hosting the application, without any authentication."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en Atos Eviden iCare 2.7.1 a 2.7.11. La aplicaci\u00f3n expone una interfaz web localmente. En el peor de los casos, si la aplicaci\u00f3n es accesible de forma remota, permite que un atacante ejecute comandos arbitrarios con privilegios del sistema en el endpoint que aloja la aplicaci\u00f3n, sin ninguna autenticaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user