Auto-Update: 2024-09-04T14:00:36.195174+00:00

This commit is contained in:
cad-safe-bot 2024-09-04 14:03:36 +00:00
parent a1b2617761
commit 5096b07bd4
107 changed files with 1357 additions and 366 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52435",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-20T20:15:08.063",
"lastModified": "2024-06-25T22:15:14.763",
"lastModified": "2024-09-04T12:15:03.967",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -123,6 +123,10 @@
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0d3ffbbf8631d6db0552f46250015648991c856f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/23d05d563b7e7b0314e65c8e882bc27eac2da8e7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
@ -164,10 +168,6 @@
"tags": [
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34637",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:11.377",
"lastModified": "2024-09-04T06:15:11.377",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in WindowManagerService prior to SMR Sep-2024 Release 1 in Android 12, and SMR Jun-2024 Release 1 in Android 13 and Android 14 allows local attackers to bypass restrictions on starting services from the background."
},
{
"lang": "es",
"value": "El control de acceso inadecuado en WindowManagerService antes de SMR Sep-2024 Release 1 en Android 12, y SMR Jun-2024 Release 1 en Android 13 y Android 14 permite a atacantes locales eludir las restricciones al inicio de servicios desde segundo plano."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34638",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:11.767",
"lastModified": "2024-09-04T06:15:11.767",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper handling of exceptional conditions in ThemeCenter prior to SMR Sep-2024 Release 1 allows local attackers to delete non-preloaded applications."
},
{
"lang": "es",
"value": "El manejo inadecuado de condiciones excepcionales en ThemeCenter antes de SMR Sep-2024 Release 1 permite a atacantes locales eliminar aplicaciones no precargadas."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34639",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:11.997",
"lastModified": "2024-09-04T06:15:11.997",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper handling of exceptional conditions in Setupwizard prior to SMR Aug-2024 Release 1 allows physical attackers to bypass proper validation."
},
{
"lang": "es",
"value": "El manejo inadecuado de condiciones excepcionales en Setupwizard anterior a SMR Aug-2024 Release 1 permite a atacantes f\u00edsicos eludir la validaci\u00f3n adecuada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34640",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:12.217",
"lastModified": "2024-09-04T06:15:12.217",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control vulnerability in BGProtectManager prior to SMR Sep-2024 Release 1 allows local attackers to bypass restriction of process expiration."
},
{
"lang": "es",
"value": "Una vulnerabilidad de control de acceso inadecuado en BGProtectManager anterior a SMR Sep-2024 Release 1 permite a atacantes locales eludir la restricci\u00f3n de expiraci\u00f3n del proceso."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34641",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:12.460",
"lastModified": "2024-09-04T06:15:12.460",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Export of Android Application Components in FeliCaTest prior to SMR Sep-2024 Release 1 allows local attackers to enable NFC configuration."
},
{
"lang": "es",
"value": "La exportaci\u00f3n incorrecta de componentes de aplicaciones de Android en FeliCaTest anterior a la versi\u00f3n 1 de SMR de septiembre de 2024 permite que atacantes locales habiliten la configuraci\u00f3n de NFC."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34642",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:12.730",
"lastModified": "2024-09-04T06:15:12.730",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper authorization in One UI Home prior to SMR Sep-2024 Release 1 allows physical attackers to temporarily access sensitive information."
},
{
"lang": "es",
"value": "La autorizaci\u00f3n incorrecta en One UI Home anterior a la versi\u00f3n 1 de SMR de septiembre de 2024 permite que atacantes f\u00edsicos accedan temporalmente a informaci\u00f3n confidencial."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34643",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:12.970",
"lastModified": "2024-09-04T06:15:12.970",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in key input related function in Dressroom prior to SMR Sep-2024 Release 1 allows local attackers to access protected data. User interaction is required for triggering this vulnerability."
},
{
"lang": "es",
"value": "El control de acceso inadecuado en la funci\u00f3n relacionada con la entrada de claves en Dressroom antes de la versi\u00f3n 1 de SMR de septiembre de 2024 permite que los atacantes locales accedan a datos protegidos. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34644",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:13.173",
"lastModified": "2024-09-04T06:15:13.173",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in item selection related in Dressroom prior to SMR Sep-2024 Release 1 allows local attackers to access protected data. User interaction is required for triggering this vulnerability."
},
{
"lang": "es",
"value": "El control de acceso inadecuado en la selecci\u00f3n de art\u00edculos en Dressroom antes de la versi\u00f3n 1 de SMR de septiembre de 2024 permite que los atacantes locales accedan a datos protegidos. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34645",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:13.400",
"lastModified": "2024-09-04T06:15:13.400",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in ThemeCenter prior to SMR Sep-2024 Release 1 allows physical attackers to install privileged applications."
},
{
"lang": "es",
"value": "La validaci\u00f3n de entrada incorrecta en ThemeCenter antes de SMR Sep-2024 Release 1 permite que atacantes f\u00edsicos instalen aplicaciones privilegiadas."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34646",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:13.647",
"lastModified": "2024-09-04T06:15:13.647",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in DualDarManagerProxy prior to SMR Sep-2024 Release 1 allows local attackers to cause local permanent denial of service."
},
{
"lang": "es",
"value": "El control de acceso inadecuado en DualDarManagerProxy anterior a SMR Sep-2024 Release 1 permite que atacantes locales provoquen una denegaci\u00f3n de servicio permanente local."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34647",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:13.890",
"lastModified": "2024-09-04T06:15:13.890",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect use of privileged API in DualDarManagerProxy prior to SMR Sep-2024 Release 1 allows local attackers to access privileged APIs related to knox without proper license."
},
{
"lang": "es",
"value": "El uso incorrecto de la API privilegiada en DualDarManagerProxy antes de SMR Sep-2024 Release 1 permite a atacantes locales acceder a las API privilegiadas relacionadas con knox sin la licencia adecuada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34648",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:14.113",
"lastModified": "2024-09-04T06:15:14.113",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Handling of Insufficient Permissions in KnoxMiscPolicy prior to SMR Sep-2024 Release 1 allows local attackers to access sensitive data."
},
{
"lang": "es",
"value": "El manejo inadecuado de permisos insuficientes en KnoxMiscPolicy anterior a la versi\u00f3n 1 de SMR de septiembre de 2024 permite que atacantes locales accedan a datos confidenciales."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34649",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:14.347",
"lastModified": "2024-09-04T06:15:14.347",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in new Dex Mode in multitasking framework prior to SMR Sep-2024 Release 1 allows physical attackers to temporarily access an unlocked screen."
},
{
"lang": "es",
"value": "El control de acceso inadecuado en el nuevo modo Dex en el framework multitarea anterior a la versi\u00f3n 1 de SMR de septiembre de 2024 permite que atacantes f\u00edsicos accedan temporalmente a una pantalla desbloqueada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34650",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:14.583",
"lastModified": "2024-09-04T06:15:14.583",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect authorization in CocktailbarService prior to SMR Sep-2024 Release 1 allows local attackers to access privileged APIs related to Edge panel."
},
{
"lang": "es",
"value": "La autorizaci\u00f3n incorrecta en CocktailbarService anterior a SMR Sep-2024 Release 1 permite a atacantes locales acceder a API privilegiadas relacionadas con el panel Edge."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34651",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:14.810",
"lastModified": "2024-09-04T06:15:14.810",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper authorization in My Files prior to SMR Sep-2024 Release 1 allows local attackers to access restricted data in My Files."
},
{
"lang": "es",
"value": "La autorizaci\u00f3n incorrecta en Mis archivos antes de la versi\u00f3n 1 de SMR de septiembre de 2024 permite que atacantes locales accedan a datos restringidos en Mis archivos."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34652",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:15.040",
"lastModified": "2024-09-04T06:15:15.040",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect authorization in kperfmon prior to SMR Sep-2024 Release 1 allows local attackers to access information related to performance including app usage."
},
{
"lang": "es",
"value": "La autorizaci\u00f3n incorrecta en kperfmon anterior a SMR Sep-2024 Release 1 permite a atacantes locales acceder a informaci\u00f3n relacionada con el rendimiento, incluido el uso de la aplicaci\u00f3n."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34653",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:15.267",
"lastModified": "2024-09-04T06:15:15.267",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Path Traversal in My Files prior to SMR Sep-2024 Release 1 allows physical attackers to access directories with My Files' privilege."
},
{
"lang": "es",
"value": "Path Traversal en Mis archivos antes de SMR Sep-2024 Release 1 permite a atacantes f\u00edsicos acceder a directorios con el privilegio Mis archivos."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34654",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:15.520",
"lastModified": "2024-09-04T06:15:15.520",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Export of android application component in My Files prior to SMR Sep-2024 Release 1 allows local attackers to access files with My Files' privilege."
},
{
"lang": "es",
"value": "La exportaci\u00f3n incorrecta del componente de aplicaci\u00f3n de Android en Mis archivos antes de la versi\u00f3n 1 de SMR de septiembre de 2024 permite que atacantes locales accedan a archivos con el privilegio de Mis archivos."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34655",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:15.710",
"lastModified": "2024-09-04T06:15:15.710",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect use of privileged API in UniversalCredentialManager prior to SMR Sep-2024 Release 1 allows local attackers to access privileged API related to UniversalCredentialManager."
},
{
"lang": "es",
"value": "El uso incorrecto de la API privilegiada en UniversalCredentialManager antes de SMR Sep-2024 Release 1 permite que atacantes locales accedan a la API privilegiada relacionada con UniversalCredentialManager."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34656",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:15.950",
"lastModified": "2024-09-04T06:15:15.950",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Path traversal in Samsung Notes prior to version 4.4.21.62 allows local attackers to execute arbitrary code."
},
{
"lang": "es",
"value": "Path traversal en Samsung Notes anterior a la versi\u00f3n 4.4.21.62 permite a atacantes locales ejecutar c\u00f3digo arbitrario."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34657",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:16.150",
"lastModified": "2024-09-04T06:15:16.150",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based out-of-bounds write in Samsung Notes prior to version 4.4.21.62 allows remote attackers to execute arbitrary code."
},
{
"lang": "es",
"value": "La escritura fuera de los l\u00edmites basada en pila en Samsung Notes anteriores a la versi\u00f3n 4.4.21.62 permite a atacantes remotos ejecutar c\u00f3digo arbitrario."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34658",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:16.333",
"lastModified": "2024-09-04T06:15:16.333",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds read in Samsung Notes allows local attackers to bypass ASLR."
},
{
"lang": "es",
"value": "La lectura fuera de los l\u00edmites en Samsung Notes permite a los atacantes locales eludir ASLR."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34659",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:16.567",
"lastModified": "2024-09-04T06:15:16.567",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Exposure of sensitive information in GroupSharing prior to version 13.6.13.3 allows remote attackers can force the victim to join the group."
},
{
"lang": "es",
"value": "La exposici\u00f3n de informaci\u00f3n confidencial en GroupSharing anterior a la versi\u00f3n 13.6.13.3 permite que atacantes remotos puedan obligar a la v\u00edctima a unirse al grupo."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34660",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:16.790",
"lastModified": "2024-09-04T06:15:16.790",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based out-of-bounds write in Samsung Notes prior to version 4.4.21.62 allows local attackers to execute arbitrary code."
},
{
"lang": "es",
"value": "La escritura fuera de los l\u00edmites basada en mont\u00f3n en Samsung Notes anterior a la versi\u00f3n 4.4.21.62 permite a atacantes locales ejecutar c\u00f3digo arbitrario."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34661",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:17.003",
"lastModified": "2024-09-04T06:15:17.003",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper handling of insufficient permissions in Samsung Assistant prior to version 9.1.00.7 allows remote attackers to access location data. User interaction is required for triggering this vulnerability."
},
{
"lang": "es",
"value": "El manejo inadecuado de permisos insuficientes en Samsung Assistant anterior a la versi\u00f3n 9.1.00.7 permite a atacantes remotos acceder a datos de ubicaci\u00f3n. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-39921",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-09-04T03:15:03.300",
"lastModified": "2024-09-04T03:15:03.300",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Observable timing discrepancy issue exists in IPCOM EX2 Series V01L02NF0001 to V01L06NF0401, V01L20NF0001 to V01L20NF0401, V02L20NF0001 to V02L21NF0301, and IPCOM VE2 Series V01L04NF0001 to V01L06NF0112. If this vulnerability is exploited, some of the encrypted communication may be decrypted by an attacker who can obtain the contents of the communication."
},
{
"lang": "es",
"value": "Existe un problema de discrepancia de tiempo observable en las series IPCOM EX2 V01L02NF0001 a V01L06NF0401, V01L20NF0001 a V01L20NF0401, V02L20NF0001 a V02L21NF0301 y en las series IPCOM VE2 V01L04NF0001 a V01L06NF0112. Si se explota esta vulnerabilidad, un atacante puede descifrar parte de la comunicaci\u00f3n cifrada y obtener el contenido de la misma."
}
],
"metrics": {},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-41011",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-18T07:15:02.070",
"lastModified": "2024-07-18T12:28:43.707",
"lastModified": "2024-09-04T12:15:04.280",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
@ -17,6 +17,10 @@
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/009c4d78bcf07c4ac2e3dd9f275b4eaa72b4f884",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/4b4cff994a27ebf7bd3fb9a798a1cdfa8d01b724",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
@ -29,9 +33,17 @@
"url": "https://git.kernel.org/stable/c/89fffbdf535ce659c1a26b51ad62070566e33b28",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8ad4838040e5515939c071a0f511ce2661a0889d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/be4a2a81b6b90d1a47eaeaace4cc8e2cb57b96c7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f7276cdc1912325b64c33fcb1361952c06e55f63",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41098",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-29T16:15:04.837",
"lastModified": "2024-08-08T17:27:55.600",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T12:15:04.447",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -78,6 +78,10 @@
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0f0d37c154bb108730c90a91aa31e3170e827962",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/119c97ace2a9ffcf4dc09a23bb057d6c281aff28",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
@ -85,6 +89,14 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/221e3b1297e74fdec32d0f572f4dcb2260a0a2af",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/56e62977eaaae3eb7122ee2cf9b720b6703114a9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5d92c7c566dc76d96e0e19e481d926bbe6631c1e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
@ -98,6 +110,14 @@
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d9c4df80b1b009de1eb77c07e3bb4d45bd212aa5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e83405e75d90694ee6a5d898f7f0473ac2686054",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41160",
"sourceIdentifier": "scy@openharmony.io",
"published": "2024-09-02T05:15:16.923",
"lastModified": "2024-09-03T12:59:02.453",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-04T12:00:59.630",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "scy@openharmony.io",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
},
{
"source": "scy@openharmony.io",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:-:*:*:*",
"versionEndIncluding": "4.1.0",
"matchCriteriaId": "136CAE97-D053-45DE-9FD3-7FD06D4ED98D"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md",
"source": "scy@openharmony.io"
"source": "scy@openharmony.io",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-41433",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T21:15:16.050",
"lastModified": "2024-09-03T21:35:09.333",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PingCAP TiDB v8.1.0 was discovered to contain a buffer overflow via the component expression.ExplainExpressionList. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que PingCAP TiDB v8.1.0 conten\u00eda un desbordamiento de b\u00fafer a trav\u00e9s del componente expression.ExplainExpressionList. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una entrada manipulada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-41434",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T20:15:07.573",
"lastModified": "2024-09-03T21:35:10.147",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PingCAP TiDB v8.1.0 was discovered to contain a buffer overflow via the component (*Column).GetDecimal. This allows attackers to cause a Denial of Service (DoS) via a crafted input to the 'RemoveUnnecessaryFirstRow', it will check the expression between 'Agg' and 'GroupBy', but does not check the return type."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que PingCAP TiDB v8.1.0 conten\u00eda un desbordamiento de b\u00fafer a trav\u00e9s del componente (*Column).GetDecimal. Esto permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una entrada manipulada para 'RemoveUnnecessaryFirstRow', que comprobar\u00e1 la expresi\u00f3n entre 'Agg' y 'GroupBy', pero no comprobar\u00e1 el tipo de retorno."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-41716",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-09-04T01:15:11.747",
"lastModified": "2024-09-04T01:15:11.747",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cleartext storage of sensitive information vulnerability exists in WindLDR and WindO/I-NV4. If this vulnerability is exploited, an attacker who obtained the product's project file may obtain user credentials of the PLC or Operator Interfaces. As a result, an attacker may be able to manipulate and/or suspend the PLC and Operator Interfaces by accessing or hijacking them."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de almacenamiento de texto plano de informaci\u00f3n confidencial en WindLDR y WindO/I-NV4. Si se explota esta vulnerabilidad, un atacante que haya obtenido el archivo de proyecto del producto puede obtener las credenciales de usuario del PLC o las interfaces del operador. Como resultado, un atacante puede manipular y/o suspender el PLC y las interfaces del operador accediendo a ellos o secuestr\u00e1ndolos."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-41927",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-09-04T01:15:11.827",
"lastModified": "2024-09-04T01:15:11.827",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cleartext transmission of sensitive information vulnerability exists in multiple IDEC PLCs. If an attacker sends a specific command to PLC's serial communication port, user credentials may be obtained. As a result, the program of the PLC may be obtained, and the PLC may be manipulated."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de transmisi\u00f3n de informaci\u00f3n confidencial en texto plano en varios PLC de IDEC. Si un atacante env\u00eda un comando espec\u00edfico al puerto de comunicaci\u00f3n en serie del PLC, se pueden obtener las credenciales del usuario. Como resultado, se puede obtener el programa del PLC y manipularlo."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-42039",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-04T02:15:03.733",
"lastModified": "2024-09-04T02:15:03.733",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Access control vulnerability in the SystemUI module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
},
{
"lang": "es",
"value": "Vulnerabilidad de control de acceso en el m\u00f3dulo SystemUI Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42228",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:07.960",
"lastModified": "2024-07-30T20:12:16.913",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T12:15:04.577",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -77,6 +77,10 @@
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/3b505759447637dcccb50cbd98ec6f8d2a04fc46",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/855ae72c20310e5402b2317fc537d911e87537ef",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
@ -91,6 +95,22 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9ee1534ecdd5b4c013064663502d7fde824d2144",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d35cf41c8eb5d9fe95b21ae6ee2910f9ba4878e8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/da6a85d197888067e8d38b5d22c986b5b5cab712",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/df02642c21c984303fe34c3f7d72965792fb1a15",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f8f120b3de48b8b6bdf8988a9b334c2d61c17440",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42314",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-17T09:15:11.397",
"lastModified": "2024-08-22T15:50:47.437",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T12:15:04.723",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -92,6 +92,10 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c1cc3326e27b0bd7a2806b40bc48e49afaf951e7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c205565e0f2f439f278a4a94ee97b67ef7b56ae8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43772",
"sourceIdentifier": "ART@zuso.ai",
"published": "2024-09-02T05:15:17.120",
"lastModified": "2024-09-03T12:59:02.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T12:11:13.073",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "CRITICAL"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "ART@zuso.ai",
"type": "Secondary",
@ -73,10 +105,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easytest:easytest_online_test_platform:*:*:*:*:*:*:*:*",
"versionEndIncluding": "24e01",
"matchCriteriaId": "66A01710-07B8-49AF-A09D-462A63912357"
}
]
}
]
}
],
"references": [
{
"url": "https://zuso.ai/advisory/za-2024-05",
"source": "ART@zuso.ai"
"source": "ART@zuso.ai",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43773",
"sourceIdentifier": "ART@zuso.ai",
"published": "2024-09-02T05:15:17.237",
"lastModified": "2024-09-03T12:59:02.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T12:26:08.270",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "CRITICAL"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "ART@zuso.ai",
"type": "Secondary",
@ -73,10 +105,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easytest:easytest_online_test_platform:*:*:*:*:*:*:*:*",
"versionEndIncluding": "24e01",
"matchCriteriaId": "66A01710-07B8-49AF-A09D-462A63912357"
}
]
}
]
}
],
"references": [
{
"url": "https://zuso.ai/advisory/za-2024-06",
"source": "ART@zuso.ai"
"source": "ART@zuso.ai",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43774",
"sourceIdentifier": "ART@zuso.ai",
"published": "2024-09-02T05:15:17.330",
"lastModified": "2024-09-03T12:59:02.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T12:26:42.387",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "ART@zuso.ai",
"type": "Secondary",
@ -73,10 +105,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easytest:easytest_online_test_platform:*:*:*:*:*:*:*:*",
"versionEndIncluding": "24e01",
"matchCriteriaId": "66A01710-07B8-49AF-A09D-462A63912357"
}
]
}
]
}
],
"references": [
{
"url": "https://zuso.ai/advisory/za-2024-07",
"source": "ART@zuso.ai"
"source": "ART@zuso.ai",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43775",
"sourceIdentifier": "ART@zuso.ai",
"published": "2024-09-02T05:15:17.420",
"lastModified": "2024-09-03T12:59:02.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T12:27:22.670",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "ART@zuso.ai",
"type": "Secondary",
@ -73,10 +105,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easytest:easytest_online_test_platform:*:*:*:*:*:*:*:*",
"versionEndIncluding": "24e01",
"matchCriteriaId": "66A01710-07B8-49AF-A09D-462A63912357"
}
]
}
]
}
],
"references": [
{
"url": "https://zuso.ai/advisory/za-2024-08",
"source": "ART@zuso.ai"
"source": "ART@zuso.ai",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43776",
"sourceIdentifier": "ART@zuso.ai",
"published": "2024-09-02T05:15:17.520",
"lastModified": "2024-09-03T12:59:02.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T12:27:40.113",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "ART@zuso.ai",
"type": "Secondary",
@ -73,10 +105,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easytest:easytest_online_test_platform:*:*:*:*:*:*:*:*",
"versionEndIncluding": "24e01",
"matchCriteriaId": "66A01710-07B8-49AF-A09D-462A63912357"
}
]
}
]
}
],
"references": [
{
"url": "https://zuso.ai/advisory/za-2024-09",
"source": "ART@zuso.ai"
"source": "ART@zuso.ai",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43853",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-17T10:15:10.383",
"lastModified": "2024-08-22T18:06:38.087",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T12:15:04.827",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -85,6 +85,10 @@
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/10aeaa47e4aa2432f29b3e5376df96d7dac5537a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/1be59c97c83ccd67a519d8a49486b3a8a73ca28a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
@ -92,6 +96,10 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/27d6dbdc6485d68075a0ebf8544d6425c1ed84bb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/29a8d4e02fd4840028c38ceb1536cc8f82a257d4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
@ -106,6 +114,14 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4e8d6ac8fc9f843e940ab7389db8136634e07989",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/688325078a8b5badd6e07ae22b27cd04e9947aec",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/96226fbed566f3f686f53a489a29846f2d538080",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-43884",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-26T08:15:03.827",
"lastModified": "2024-08-29T17:15:08.457",
"lastModified": "2024-09-04T12:15:04.927",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -95,6 +95,10 @@
"url": "https://git.kernel.org/stable/c/064dd929c76532359d2905d90a7c12348043cfd4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/11b4b0e63f2621b33b2e107407a7d67a65994ca1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/538fd3921afac97158d4177139a0ad39f056dbb2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
@ -106,6 +110,18 @@
"url": "https://git.kernel.org/stable/c/5da2884292329bc9be32a7778e0e119f06abe503",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/90e1ff1c15e5a8f3023ca8266e3a85869ed03ee9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/951d6cb5eaac5130d076c728f2a6db420621afdb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9df9783bd85610d3d6e126a1aca221531f6f6dcb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ee0799103b1ae4bcfd80dc11a15df085f6ee1b61",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,17 +2,25 @@
"id": "CVE-2024-43891",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-26T11:15:04.103",
"lastModified": "2024-08-26T12:47:20.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T12:15:05.050",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Have format file honor EVENT_FILE_FL_FREED\n\nWhen eventfs was introduced, special care had to be done to coordinate the\nfreeing of the file meta data with the files that are exposed to user\nspace. The file meta data would have a ref count that is set when the file\nis created and would be decremented and freed after the last user that\nopened the file closed it. When the file meta data was to be freed, it\nwould set a flag (EVENT_FILE_FL_FREED) to denote that the file is freed,\nand any new references made (like new opens or reads) would fail as it is\nmarked freed. This allowed other meta data to be freed after this flag was\nset (under the event_mutex).\n\nAll the files that were dynamically created in the events directory had a\npointer to the file meta data and would call event_release() when the last\nreference to the user space file was closed. This would be the time that it\nis safe to free the file meta data.\n\nA shortcut was made for the \"format\" file. It's i_private would point to\nthe \"call\" entry directly and not point to the file's meta data. This is\nbecause all format files are the same for the same \"call\", so it was\nthought there was no reason to differentiate them. The other files\nmaintain state (like the \"enable\", \"trigger\", etc). But this meant if the\nfile were to disappear, the \"format\" file would be unaware of it.\n\nThis caused a race that could be trigger via the user_events test (that\nwould create dynamic events and free them), and running a loop that would\nread the user_events format files:\n\nIn one console run:\n\n # cd tools/testing/selftests/user_events\n # while true; do ./ftrace_test; done\n\nAnd in another console run:\n\n # cd /sys/kernel/tracing/\n # while true; do cat events/user_events/__test_event/format; done 2>/dev/null\n\nWith KASAN memory checking, it would trigger a use-after-free bug report\n(which was a real bug). This was because the format file was not checking\nthe file's meta data flag \"EVENT_FILE_FL_FREED\", so it would access the\nevent that the file meta data pointed to after the event was freed.\n\nAfter inspection, there are other locations that were found to not check\nthe EVENT_FILE_FL_FREED flag when accessing the trace_event_file. Add a\nnew helper function: event_file_file() that will make sure that the\nevent_mutex is held, and will return NULL if the trace_event_file has the\nEVENT_FILE_FL_FREED flag set. Have the first reference of the struct file\npointer use event_file_file() and check for NULL. Later uses can still use\nthe event_file_data() helper function if the event_mutex is still held and\nwas not released since the event_file_file() call."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rastreo: Tener formato de archivo honor\u00edfico EVENT_FILE_FL_FREED Cuando se introdujo eventfs, se tuvo que tener especial cuidado para coordinar la liberaci\u00f3n de los metadatos del archivo con los archivos que est\u00e1n expuestos al espacio del usuario. Los metadatos del archivo tendr\u00edan un recuento de referencias que se establece cuando se crea el archivo y se reducir\u00edan y liberar\u00edan despu\u00e9s de que el \u00faltimo usuario que abri\u00f3 el archivo lo cerr\u00f3. Cuando se iban a liberar los metadatos del archivo, se establecer\u00eda un indicador (EVENT_FILE_FL_FREED) para indicar que el archivo est\u00e1 liberado, y cualquier nueva referencia realizada (como nuevas aperturas o lecturas) fallar\u00eda ya que se marca como liberado. Esto permiti\u00f3 liberar otros metadatos despu\u00e9s de establecer este indicador (bajo event_mutex). Todos los archivos que se crearon din\u00e1micamente en el directorio de eventos ten\u00edan un puntero a los metadatos del archivo y llamar\u00edan a event_release() cuando se cerrara la \u00faltima referencia al archivo de espacio de usuario. Este ser\u00eda el momento en el que ser\u00e1 seguro liberar los metadatos del archivo. Se cre\u00f3 un acceso directo para el archivo \"formato\". Es i_private apuntar\u00eda a la entrada \"llamar\" directamente y no a los metadatos del archivo. Esto se debe a que todos los archivos de formato son iguales para una misma \"llamada\", por lo que se pens\u00f3 que no hab\u00eda motivo para diferenciarlos. Los otros archivos mantienen el estado (como \"habilitar\", \"activar\", etc.). Pero esto significaba que si el archivo desapareciera, el archivo \"formateado\" no lo sabr\u00eda. Esto provoc\u00f3 una ejecuci\u00f3n que podr\u00eda desencadenarse a trav\u00e9s de la prueba user_events (que crear\u00eda eventos din\u00e1micos y los liberar\u00eda) y ejecutar un bucle que leer\u00eda los archivos de formato user_events: En una ejecuci\u00f3n de consola: # cd tools/testing/selftests/user_events # si bien es cierto; hacer ./ftrace_test; hecho Y en otra consola ejecute: # cd /sys/kernel/tracing/ # while true; hacer eventos de gato/eventos_usuario/__test_event/formato; done 2>/dev/null Con la comprobaci\u00f3n de memoria de KASAN, se activar\u00eda un informe de error de use-after-free (que era un error real). Esto se deb\u00eda a que el archivo de formato no estaba verificando el indicador de metadatos del archivo \"EVENT_FILE_FL_FREED\", por lo que acceder\u00eda al evento al que apuntaban los metadatos del archivo despu\u00e9s de que se liberara el evento. Despu\u00e9s de la inspecci\u00f3n, se encontr\u00f3 que hay otras ubicaciones que no marcaban el indicador EVENT_FILE_FL_FREED al acceder a trace_event_file. Agregue una nueva funci\u00f3n auxiliar: event_file_file() que garantizar\u00e1 que event_mutex se mantenga y devolver\u00e1 NULL si trace_event_file tiene establecido el indicador EVENT_FILE_FL_FREED. Haga que la primera referencia del puntero del archivo de estructura use event_file_file() y verifique NULL. Los usos posteriores a\u00fan pueden usar la funci\u00f3n auxiliar event_file_data() si event_mutex a\u00fan se mantiene y no se liber\u00f3 desde la llamada event_file_file()."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/4ed03758ddf0b19d69eed69386d65a92d0091e0c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/531dc6780d94245af037c25c2371c8caf652f0f9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43941",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T15:15:30.040",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T13:40:41.620",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:propovoice:propovoice:*:*:*:*:pro:wordpress:*:*",
"versionEndIncluding": "1.7.0.3",
"matchCriteriaId": "69842D64-445C-4238-8DDF-6FAA205B76E9"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/propovoice-pro/wordpress-propovoice-pro-plugin-1-7-0-3-unauthenticated-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-44383",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-04T13:15:06.753",
"lastModified": "2024-09-04T13:15:06.753",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WAYOS FBM-291W v19.09.11 is vulnerable to Command Execution via msp_info_htm."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/GroundCTL2MajorTom/pocs/blob/main/wayos_%20FBM_291W.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-44400",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-04T13:15:06.867",
"lastModified": "2024-09-04T13:15:06.867",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "D-Link DI-8400 16.07.26A1 is vulnerable to Command Injection via upgrade_filter_asp."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/lonelylonglong/openfile-/blob/main/D-link_DI_8400-16.07.26A1_Command_Injection.md/D-link_DI_8400-16.07.26A1_Command_Injection.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-44809",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T22:15:04.590",
"lastModified": "2024-09-03T22:15:04.590",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A remote code execution (RCE) vulnerability exists in the Pi Camera project, version 1.0, maintained by RECANTHA. The issue arises from improper sanitization of user input passed to the \"position\" GET parameter in the tilt.php script. An attacker can exploit this by sending crafted input data that includes malicious command sequences, allowing arbitrary commands to be executed on the server with the privileges of the web server user. This vulnerability is exploitable remotely and poses significant risk if the application is exposed to untrusted networks."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remoto (RCE) en el proyecto Pi Camera, versi\u00f3n 1.0, mantenido por RECANTHA. El problema surge de una desinfecci\u00f3n inadecuada de la entrada del usuario que se pasa al par\u00e1metro GET \"position\" en el script tilt.php. Un atacante puede aprovechar esto enviando datos de entrada creados que incluyen secuencias de comandos maliciosas, lo que permite ejecutar comandos arbitrarios en el servidor con los privilegios del usuario del servidor web. Esta vulnerabilidad se puede explotar de forma remota y plantea un riesgo significativo si la aplicaci\u00f3n se expone a redes que no son de confianza."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44930",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-29T18:15:14.830",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T12:59:00.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,74 @@
"value": "Se descubri\u00f3 que Serilog anterior a v2.1.0 conten\u00eda una vulnerabilidad de suplantaci\u00f3n de IP de cliente, que permite a los atacantes falsificar sus direcciones IP especificando una IP arbitraria como valor de los encabezados X-Forwarded-For o Client-Ip mientras realizan solicitudes HTTP."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:serilog-contrib:serilog-enrichers-clientinfo:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.1.0",
"matchCriteriaId": "88E20775-E328-4A4C-AA68-7AC7BF303C43"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/serilog-contrib/serilog-enrichers-clientinfo/issues/29",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/serilog-contrib/serilog-enrichers-clientinfo/releases/tag/v2.1.0",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44946",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-31T14:15:04.320",
"lastModified": "2024-09-04T10:30:42.877",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T12:15:05.150",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -112,6 +112,10 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6633b17840bf828921254d788ccd15602843fe9b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/72da240aafb142630cf16adc803ccdacb3780849",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
@ -126,12 +130,24 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8c9cdbf600143bd6835c8b8351e5ac956da79aec",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9c8d544ed619f704e2b70e63e08ab75630c2ea23",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/eb06c8d3022ce6738711191c89f9b3e9cfb91914",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fa6c23fe6dcac8c8bd63920ee8681292a2bd544e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44947",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-02T18:15:36.577",
"lastModified": "2024-09-03T12:59:02.453",
"lastModified": "2024-09-04T12:15:05.240",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -21,14 +21,30 @@
"url": "https://git.kernel.org/stable/c/18a067240817bee8a9360539af5d79a4bf5398a5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/33168db352c7b56ae18aa55c2cae1a1c5905d30e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3c0da3d163eb32f1f91891efaade027fa9b245b9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/4690e2171f651e2b415e3941ce17f2f7b813aff6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/49934861514d36d0995be8e81bb3312a499d8d9a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/831433527773e665bdb635ab5783d0b95d1246f4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8c78303eafbf85a728dd84d1750e89240c677dd9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ac42e0f0eb66af966015ee33fd355bc6f5d80cd6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45180",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T20:15:08.097",
"lastModified": "2024-09-03T20:15:08.097",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SquaredUp DS for SCOM 6.2.1.11104 allows XSS."
},
{
"lang": "es",
"value": "SquaredUp DS para SCOM 6.2.1.11104 permite XSS."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45195",
"sourceIdentifier": "security@apache.org",
"published": "2024-09-04T09:15:04.397",
"lastModified": "2024-09-04T09:15:04.397",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Direct Request ('Forced Browsing') vulnerability in Apache OFBiz.\n\nThis issue affects Apache OFBiz: before 18.12.16.\n\nUsers are recommended to upgrade to version 18.12.16, which fixes the issue."
},
{
"lang": "es",
"value": "Vulnerabilidad Direct Request (\"Navegaci\u00f3n forzada\") en Apache OFBiz. Este problema afecta a Apache OFBiz: anterior a la versi\u00f3n 18.12.16. Se recomienda a los usuarios que actualicen a la versi\u00f3n 18.12.16, que soluciona el problema."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45389",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-03T20:15:08.217",
"lastModified": "2024-09-03T20:15:08.217",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Pagefind, a fully static search library, initializes its dynamic JavaScript and WebAssembly files relative to the location of the first script the user loads. This information is gathered by looking up the value of `document.currentScript.src`. Prior to Pagefind version 1.1.1, it is possible to \"clobber\" this lookup with otherwise benign HTML on the page. This will cause `document.currentScript.src` to resolve as an external domain, which will then be used by Pagefind to load dependencies. This exploit would only work in the case that an attacker could inject HTML to a live, hosted, website. In these cases, this would act as a way to escalate the privilege available to an attacker. This assumes they have the ability to add some elements to the page (for example, `img` tags with a `name` attribute), but not others, as adding a `script` to the page would itself be the cross-site scripting vector. Pagefind has tightened this resolution in version 1.1.1 by ensuring the source is loaded from a valid script element. There are no reports of this being exploited in the wild via Pagefind."
},
{
"lang": "es",
"value": "Pagefind, una librer\u00eda de b\u00fasqueda completamente est\u00e1tica, inicializa sus archivos din\u00e1micos de JavaScript y WebAssembly en relaci\u00f3n con la ubicaci\u00f3n del primer script que carga el usuario. Esta informaci\u00f3n se obtiene buscando el valor de `document.currentScript.src`. Antes de la versi\u00f3n 1.1.1 de Pagefind, era posible \"bloquear\" esta b\u00fasqueda con HTML benigno en la p\u00e1gina. Esto har\u00e1 que `document.currentScript.src` se resuelva como un dominio externo, que luego ser\u00e1 utilizado por Pagefind para cargar dependencias. Esta vulnerabilidad solo funcionar\u00eda en el caso de que un atacante pudiera inyectar HTML en un sitio web alojado y en vivo. En estos casos, esto actuar\u00eda como una forma de escalar el privilegio disponible para un atacante. Esto supone que tienen la capacidad de agregar algunos elementos a la p\u00e1gina (por ejemplo, etiquetas `img` con un atributo `name`), pero no otros, ya que agregar un `script` a la p\u00e1gina ser\u00eda en s\u00ed mismo el vector de cross-site scripting. Pagefind ha mejorado esta resoluci\u00f3n en la versi\u00f3n 1.1.1 al garantizar que la fuente se cargue desde un elemento de script v\u00e1lido. No hay informes de que esto se haya explotado en la pr\u00e1ctica a trav\u00e9s de Pagefind."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45390",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-03T20:15:08.423",
"lastModified": "2024-09-03T20:15:08.423",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "@blakeembrey/template is a string template library. Prior to version 1.2.0, it is possible to inject and run code within the template if the attacker has access to write the template name. Version 1.2.0 contains a patch. As a workaround, don't pass untrusted input as the template display name, or don't use the display name feature."
},
{
"lang": "es",
"value": "@blakeembrey/template es una librer\u00eda de plantillas de cadenas. Antes de la versi\u00f3n 1.2.0, era posible inyectar y ejecutar c\u00f3digo dentro de la plantilla si el atacante ten\u00eda acceso para escribir el nombre de la plantilla. La versi\u00f3n 1.2.0 contiene un parche. Como workaround, no pase una entrada que no sea de confianza como nombre para mostrar de la plantilla o no use la funci\u00f3n de nombre para mostrar."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45391",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-03T20:15:08.627",
"lastModified": "2024-09-03T20:15:08.627",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tina is an open-source content management system (CMS). Sites building with Tina CMS's command line interface (CLI) prior to version 1.6.2 that use a search token may be vulnerable to the search token being leaked via lock file (tina-lock.json). Administrators of Tina-enabled websites with search setup should rotate their key immediately. This issue has been patched in @tinacms/cli version 1.6.2. Upgrading and rotating the search token is required for the proper fix."
},
{
"lang": "es",
"value": "Tina es un sistema de gesti\u00f3n de contenido (CMS) de c\u00f3digo abierto. Los sitios creados con la interfaz de l\u00ednea de comandos (CLI) de Tina CMS anterior a la versi\u00f3n 1.6.2 que utilizan un token de b\u00fasqueda pueden ser vulnerables a que el token de b\u00fasqueda se filtre a trav\u00e9s del archivo de bloqueo (tina-lock.json). Los administradores de sitios web habilitados para Tina con configuraci\u00f3n de b\u00fasqueda deben rotar su clave de inmediato. Este problema se ha corregido en la versi\u00f3n 1.6.2 de @tinacms/cli. Es necesario actualizar y rotar el token de b\u00fasqueda para solucionarlo correctamente."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45394",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-03T21:15:16.350",
"lastModified": "2024-09-03T21:15:16.350",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Authenticator is a browser extensions that generates two-step verification codes. In versions 7.0.0 and below, encryption keys for user data were stored encrypted at-rest using only AES-256 and the EVP_BytesToKey KDF. Therefore, attackers with a copy of a user's data are able to brute-force the user's encryption key. Users on version 8.0.0 and above are automatically migrated away from the weak encoding on first login. Users should destroy encrypted backups made with versions prior to 8.0.0."
},
{
"lang": "es",
"value": "Authenticator es una extensi\u00f3n del navegador que genera c\u00f3digos de verificaci\u00f3n en dos pasos. En las versiones 7.0.0 y anteriores, las claves de cifrado de los datos de los usuarios se almacenaban cifradas en reposo utilizando \u00fanicamente AES-256 y el KDF EVP_BytesToKey. Por lo tanto, los atacantes con una copia de los datos de un usuario pueden forzar la clave de cifrado del usuario. Los usuarios de la versi\u00f3n 8.0.0 y posteriores se migran autom\u00e1ticamente de la codificaci\u00f3n d\u00e9bil en el primer inicio de sesi\u00f3n. Los usuarios deben destruir las copias de seguridad cifradas realizadas con versiones anteriores a la 8.0.0."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45441",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-04T02:15:03.983",
"lastModified": "2024-09-04T02:15:03.983",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Input verification vulnerability in the system service module\nImpact: Successful exploitation of this vulnerability will affect availability."
},
{
"lang": "es",
"value": "Vulnerabilidad de verificaci\u00f3n de entrada en el m\u00f3dulo de servicio del sistema Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la disponibilidad."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45442",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-04T02:15:04.180",
"lastModified": "2024-09-04T02:15:04.180",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of permission verification for APIs in the DownloadProviderMain module\nImpact: Successful exploitation of this vulnerability will affect availability."
},
{
"lang": "es",
"value": "Vulnerabilidad de verificaci\u00f3n de permisos para API en el m\u00f3dulo DownloadProviderMain Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la disponibilidad."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45443",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-04T03:15:03.377",
"lastModified": "2024-09-04T03:15:03.377",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in the cust module\nImpact: Successful exploitation of this vulnerability will affect availability and confidentiality."
},
{
"lang": "es",
"value": "Vulnerabilidad de directory traversal en el m\u00f3dulo cust Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la disponibilidad y la confidencialidad."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45444",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-04T03:15:03.597",
"lastModified": "2024-09-04T03:15:03.597",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Access permission verification vulnerability in the WMS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
},
{
"lang": "es",
"value": "Vulnerabilidad de verificaci\u00f3n de permisos de acceso en el m\u00f3dulo WMS Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45445",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-04T03:15:03.800",
"lastModified": "2024-09-04T03:15:03.800",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of resources not being closed or released in the keystore module\nImpact: Successful exploitation of this vulnerability will affect availability."
},
{
"lang": "es",
"value": "Vulnerabilidad de que los recursos no se cierren o liberen en el m\u00f3dulo de almac\u00e9n de claves Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la disponibilidad."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45446",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-04T03:15:04.010",
"lastModified": "2024-09-04T03:15:04.010",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Access permission verification vulnerability in the camera driver module\nImpact: Successful exploitation of this vulnerability will affect availability."
},
{
"lang": "es",
"value": "Vulnerabilidad de verificaci\u00f3n de permisos de acceso en el m\u00f3dulo del controlador de la c\u00e1mara Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la disponibilidad."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45447",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-04T03:15:04.210",
"lastModified": "2024-09-04T03:15:04.210",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Access control vulnerability in the camera framework module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
},
{
"lang": "es",
"value": "Vulnerabilidad de control de acceso en el m\u00f3dulo del framework de la c\u00e1mara Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45448",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-04T03:15:04.413",
"lastModified": "2024-09-04T03:15:04.413",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Page table protection configuration vulnerability in the trusted firmware module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
},
{
"lang": "es",
"value": "Vulnerabilidad de configuraci\u00f3n de protecci\u00f3n de tabla de p\u00e1ginas en el m\u00f3dulo de firmware confiable Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45449",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-04T03:15:04.610",
"lastModified": "2024-09-04T03:15:04.610",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Access permission verification vulnerability in the ringtone setting module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
},
{
"lang": "es",
"value": "Vulnerabilidad de verificaci\u00f3n de permisos de acceso en el m\u00f3dulo de configuraci\u00f3n de tonos de llamada Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45450",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-04T02:15:04.363",
"lastModified": "2024-09-04T02:15:04.363",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Permission control vulnerability in the software update module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
},
{
"lang": "es",
"value": "Vulnerabilidad de control de permisos en el m\u00f3dulo de actualizaci\u00f3n de software. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45507",
"sourceIdentifier": "security@apache.org",
"published": "2024-09-04T09:15:04.520",
"lastModified": "2024-09-04T09:15:04.520",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF), Improper Control of Generation of Code ('Code Injection') vulnerability in Apache OFBiz.\n\nThis issue affects Apache OFBiz: before 18.12.16.\n\nUsers are recommended to upgrade to version 18.12.16, which fixes the issue."
},
{
"lang": "es",
"value": "Vulnerabilidad de Server-Side Request Forgery (SSRF) y control inadecuado de la generaci\u00f3n de c\u00f3digo ('inyecci\u00f3n de c\u00f3digo') en Apache OFBiz. Este problema afecta a Apache OFBiz: anterior a la versi\u00f3n 18.12.16. Se recomienda a los usuarios que actualicen a la versi\u00f3n 18.12.16, que soluciona el problema."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45586",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-09-03T10:15:06.180",
"lastModified": "2024-09-03T19:55:47.997",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T12:15:05.320",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This vulnerability exists due to improper access controls on APIs in the Authentication module of Symphony XTS Web Trading and Mobile Trading platforms (version 2.0.0.1_P160). An authenticated remote attacker could exploit this vulnerability by manipulating parameters through HTTP request which could lead to unauthorized account take over belonging to other users."
},
{
"lang": "es",
"value": "Esta vulnerabilidad existe debido a controles de acceso inadecuados en las API del m\u00f3dulo de autenticaci\u00f3n de las plataformas Symphony XTS Web Trading y Mobile Trading (versi\u00f3n 2.0.0.1_P160). Un atacante remoto autenticado podr\u00eda aprovechar esta vulnerabilidad manipulando par\u00e1metros a trav\u00e9s de una solicitud HTTP, lo que podr\u00eda provocar la apropiaci\u00f3n no autorizada de cuentas pertenecientes a otros usuarios."
}
],
"metrics": {
@ -18,11 +22,11 @@
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "HIGH",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
@ -51,8 +55,8 @@
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"baseScore": 9.2,
"baseSeverity": "CRITICAL"
}
}
],

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45587",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-09-03T10:15:06.373",
"lastModified": "2024-09-03T19:55:46.413",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T12:15:05.530",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This vulnerability exists in Symphony XTS Web Trading platform version 2.0.0.1_P160 due to improper access controls on APIs in the Transaction module of vulnerable application. An authenticated remote attacker could exploit this vulnerability by manipulating parameters through HTTP request which could lead to compromise of other user accounts."
},
{
"lang": "es",
"value": "Esta vulnerabilidad existe en la plataforma Symphony XTS Web Trading versi\u00f3n 2.0.0.1_P160 debido a controles de acceso inadecuados en las API del m\u00f3dulo Transacci\u00f3n de la aplicaci\u00f3n vulnerable. Un atacante remoto autenticado podr\u00eda aprovechar esta vulnerabilidad manipulando par\u00e1metros a trav\u00e9s de una solicitud HTTP, lo que podr\u00eda provocar la vulneraci\u00f3n de otras cuentas de usuario."
}
],
"metrics": {
@ -18,15 +22,15 @@
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "HIGH",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
@ -51,8 +55,8 @@
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
}
}
],

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45588",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-09-03T11:15:15.333",
"lastModified": "2024-09-03T19:46:35.080",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T12:15:05.673",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This vulnerability exists in Symphony XTS Web Trading platform version 2.0.0.1_P160 due to improper access controls on APIs in the Preference module of the application. An authenticated remote attacker could exploit this vulnerability by manipulating parameters through HTTP request which could lead to unauthorized access and modification of sensitive information belonging to other users."
},
{
"lang": "es",
"value": "Esta vulnerabilidad existe en la plataforma Symphony XTS Web Trading versi\u00f3n 2.0.0.1_P160 debido a controles de acceso inadecuados a las API en el m\u00f3dulo de preferencias de la aplicaci\u00f3n. Un atacante remoto autenticado podr\u00eda explotar esta vulnerabilidad manipulando par\u00e1metros a trav\u00e9s de una solicitud HTTP, lo que podr\u00eda provocar el acceso no autorizado y la modificaci\u00f3n de informaci\u00f3n confidencial perteneciente a otros usuarios."
}
],
"metrics": {
@ -18,15 +22,15 @@
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "HIGH",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
@ -51,8 +55,8 @@
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
}
}
],

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45615",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-03T22:15:04.687",
"lastModified": "2024-09-03T22:15:04.687",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en OpenSC, herramientas OpenSC, m\u00f3dulo PKCS#11, minidriver y CTK. Un atacante podr\u00eda usar un dispositivo USB o una tarjeta inteligente manipulada espec\u00edficamente para presentar al sistema una respuesta especialmente manipulada a las APDU. Cuando los b\u00faferes est\u00e1n parcialmente llenos de datos, se puede acceder incorrectamente a las partes inicializadas del b\u00fafer."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45616",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-03T22:15:04.893",
"lastModified": "2024-09-03T22:15:04.893",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en OpenSC, herramientas OpenSC, m\u00f3dulo PKCS#11, minidriver y CTK. Un atacante podr\u00eda usar un dispositivo USB o una tarjeta inteligente manipulada espec\u00edficamente para presentar al sistema una respuesta especialmente manipulada a las APDU. Cuando los b\u00faferes est\u00e1n parcialmente llenos de datos, se puede acceder incorrectamente a las partes inicializadas del b\u00fafer."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45617",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-03T22:15:05.107",
"lastModified": "2024-09-03T22:15:05.107",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en OpenSC, herramientas OpenSC, m\u00f3dulo PKCS#11, minidriver y CTK. Un atacante podr\u00eda usar un dispositivo USB o una tarjeta inteligente manipulada espec\u00edficamente para presentar al sistema una respuesta especialmente manipulada a las APDU. Cuando los b\u00faferes est\u00e1n parcialmente llenos de datos, se puede acceder incorrectamente a las partes inicializadas del b\u00fafer."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45618",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-03T22:15:05.313",
"lastModified": "2024-09-03T22:15:05.313",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in pkcs15-init in OpenSC. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en pkcs15-init en OpenSC. Un atacante podr\u00eda usar un dispositivo USB o una tarjeta inteligente manipulada espec\u00edficamente para presentar al sistema una respuesta especialmente manipulada a las APDU. Cuando los b\u00faferes est\u00e1n parcialmente llenos de datos, se puede acceder incorrectamente a las partes inicializadas del b\u00fafer."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45619",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-03T22:15:05.527",
"lastModified": "2024-09-03T22:15:05.527",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en OpenSC, herramientas OpenSC, m\u00f3dulo PKCS#11, minidriver y CTK. Un atacante podr\u00eda usar un dispositivo USB o una tarjeta inteligente manipulada espec\u00edficamente para presentar al sistema una respuesta especialmente manipulada a las APDU. Cuando los b\u00faferes est\u00e1n parcialmente llenos de datos, se puede acceder incorrectamente a las partes inicializadas del b\u00fafer."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45620",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-03T22:15:05.743",
"lastModified": "2024-09-03T22:15:05.743",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in the pkcs15-init tool in OpenSC. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en la herramienta pkcs15-init de OpenSC. Un atacante podr\u00eda usar un dispositivo USB o una tarjeta inteligente manipulada espec\u00edficamente para presentar al sistema una respuesta a las APDU especialmente manipulada. Cuando los b\u00faferes est\u00e1n parcialmente llenos de datos, se puede acceder incorrectamente a las partes inicializadas del b\u00fafer."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45678",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T20:15:08.860",
"lastModified": "2024-09-03T20:15:08.860",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Yubico YubiKey 5 Series devices with firmware before 5.7.0 and YubiHSM 2 devices with firmware before 2.4.0 allow an ECDSA secret-key extraction attack (that requires physical access and expensive equipment) in which an electromagnetic side channel is present because of a non-constant-time modular inversion for the Extended Euclidean Algorithm, aka the EUCLEAK issue. Other uses of an Infineon cryptographic library may also be affected."
},
{
"lang": "es",
"value": "Los dispositivos Yubico YubiKey 5 Series con firmware anterior a la versi\u00f3n 5.7.0 y los dispositivos YubiHSM 2 con firmware anterior a la versi\u00f3n 2.4.0 permiten un ataque de extracci\u00f3n de clave secreta ECDSA (que requiere acceso f\u00edsico y equipo costoso) en el que est\u00e1 presente un canal lateral electromagn\u00e9tico debido a una inversi\u00f3n modular de tiempo no constante para el algoritmo euclidiano extendido, tambi\u00e9n conocido como el problema EUCLEAK. Tambi\u00e9n pueden verse afectados otros usos de una librer\u00eda criptogr\u00e1fica de Infineon."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-4629",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-03T20:15:09.003",
"lastModified": "2024-09-03T20:15:09.003",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed attempts before the system locks them out. This timing loophole enables attackers to make more guesses at passwords than intended, potentially compromising account security on affected systems."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en Keycloak. Esta falla permite a los atacantes eludir la protecci\u00f3n por fuerza bruta al explotar el tiempo de los intentos de inicio de sesi\u00f3n. Al iniciar m\u00faltiples solicitudes de inicio de sesi\u00f3n simult\u00e1neamente, los atacantes pueden superar los l\u00edmites configurados para intentos fallidos antes de que el sistema los bloquee. Esta falla de tiempo permite a los atacantes realizar m\u00e1s intentos de adivinar contrase\u00f1as de lo previsto, lo que podr\u00eda comprometer la seguridad de las cuentas en los sistemas afectados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-6020",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-04T06:15:17.260",
"lastModified": "2024-09-04T06:15:17.260",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Sign-up Sheets WordPress plugin before 2.2.13 does not escape some generated URLs, as well as the $_SERVER['REQUEST_URI'] parameter before outputting them back in attributes, which could lead to Reflected Cross-Site Scripting."
},
{
"lang": "es",
"value": "El complemento Sign-up Sheets de WordPress anterior a la versi\u00f3n 2.2.13 no escapa a algunas URL generadas, as\u00ed como tampoco al par\u00e1metro $_SERVER['REQUEST_URI'] antes de mostrarlas nuevamente en atributos, lo que podr\u00eda generar un error de cross-site scripting reflejado."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-6722",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-04T06:15:17.327",
"lastModified": "2024-09-04T06:15:17.327",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Chatbot Support AI: Free ChatGPT Chatbot, Woocommerce Chatbot WordPress plugin through 1.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
},
{
"lang": "es",
"value": "El complemento Chatbot Support AI: Free ChatGPT Chatbot, Woocommerce Chatbot de WordPress hasta 1.0.2 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de cross-site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)"
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-6888",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-04T06:15:17.407",
"lastModified": "2024-09-04T06:15:17.407",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Secure Copy Content Protection and Content Locking WordPress plugin before 4.1.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
},
{
"lang": "es",
"value": "El complemento Secure Copy Content Protection y Content Locking de WordPress anterior a la versi\u00f3n 4.1.7 no desinfecta ni evita algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de cross-site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-6889",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-04T06:15:17.470",
"lastModified": "2024-09-04T06:15:17.470",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Secure Copy Content Protection and Content Locking WordPress plugin before 4.1.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
},
{
"lang": "es",
"value": "El complemento Secure Copy Content Protection y Content Locking de WordPress anterior a la versi\u00f3n 4.1.7 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de cross-site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-6926",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-04T06:15:17.537",
"lastModified": "2024-09-04T06:15:17.537",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Viral Signup WordPress plugin through 2.1 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection"
},
{
"lang": "es",
"value": "El complemento Viral Signup de WordPress hasta la versi\u00f3n 2.1 no desinfecta ni escapa correctamente un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL a trav\u00e9s de una acci\u00f3n AJAX disponible para usuarios no autenticados, lo que genera una inyecci\u00f3n SQL."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-7786",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-04T06:15:17.600",
"lastModified": "2024-09-04T06:15:17.600",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Sensei LMS WordPress plugin before 4.24.2 does not properly protect some its REST API routes, allowing unauthenticated attackers to leak email templates."
},
{
"lang": "es",
"value": "El complemento Sensei LMS para WordPress anterior a la versi\u00f3n 4.24.2 no protege adecuadamente algunas de sus rutas de API REST, lo que permite que atacantes no autenticados filtren plantillas de correo electr\u00f3nico."
}
],
"metrics": {},

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7834",
"sourceIdentifier": "a341c0d1-ebf7-493f-a84e-38cf86618674",
"published": "2024-09-04T13:15:07.030",
"lastModified": "2024-09-04T13:15:07.030",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A local privilege escalation is caused by Overwolf\nloading and executing certain dynamic link library files from a user-writeable\nfolder in SYSTEM context on launch. This allows an attacker with unprivileged\naccess to the system to run arbitrary code with SYSTEM privileges by placing a\nmalicious .dll file in the respective location."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "a341c0d1-ebf7-493f-a84e-38cf86618674",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "a341c0d1-ebf7-493f-a84e-38cf86618674",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"references": [
{
"url": "https://www.cirosec.de/sa/sa-2024-004",
"source": "a341c0d1-ebf7-493f-a84e-38cf86618674"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-7870",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-04T09:15:04.660",
"lastModified": "2024-09-04T09:15:04.660",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The PixelYourSite \u2013 Your smart PIXEL (TAG) & API Manager and the PixelYourSite PRO plugins for WordPress are vulnerable to Sensitive Information Exposure in all versions up to, and including, 9.7.1 and 10.4.2, respectively, through publicly exposed log files. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed log files, and to delete log files."
},
{
"lang": "es",
"value": "Los complementos PixelYourSite \u2013 Your smart PIXEL (TAG) & API Manager y PixelYourSite PRO para WordPress son vulnerables a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 9.7.1 y la 10.4.2, respectivamente, incluida, a trav\u00e9s de archivos de registro expuestos p\u00fablicamente. Esto permite que atacantes no autenticados vean informaci\u00f3n potencialmente confidencial contenida en los archivos de registro expuestos y eliminen archivos de registro."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-7950",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-04T03:15:04.817",
"lastModified": "2024-09-04T03:15:04.817",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP Job Portal \u2013 A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Local File Inclusion, Arbitrary Settings Update, and User Creation in all versions up to, and including, 2.1.6 via several functions called by the 'checkFormRequest' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included. Attackers can also update arbitrary settings and create user accounts even when registration is disabled, leading to user creation with a default role of Administrator."
},
{
"lang": "es",
"value": "El complemento WP Job Portal \u2013 A Complete Recruitment System for Company or Job Board website para WordPress es vulnerable a la inclusi\u00f3n de archivos locales, actualizaci\u00f3n de configuraciones arbitrarias y creaci\u00f3n de usuarios en todas las versiones hasta la 2.1.6 incluida a trav\u00e9s de varias funciones llamadas por la funci\u00f3n 'checkFormRequest'. Esto hace posible que atacantes no autenticados incluyan y ejecuten archivos arbitrarios en el servidor, lo que permite la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en casos en los que se puedan cargar e incluir im\u00e1genes y otros tipos de archivos \"seguros\". Los atacantes tambi\u00e9n pueden actualizar configuraciones arbitrarias y crear cuentas de usuario incluso cuando el registro est\u00e1 deshabilitado, lo que lleva a la creaci\u00f3n de usuarios con un rol predeterminado de Administrador."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-7970",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-09-03T23:15:23.830",
"lastModified": "2024-09-03T23:15:23.830",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out of bounds write in V8 in Google Chrome prior to 128.0.6613.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
},
{
"lang": "es",
"value": "La escritura fuera de los l\u00edmites en la versi\u00f3n 8 de Google Chrome anterior a la 128.0.6613.119 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)"
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-8102",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-04T07:15:03.580",
"lastModified": "2024-09-04T07:15:03.580",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the module_all_toggle_ajax() function in all versions up to, and including, 3.0.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site."
},
{
"lang": "es",
"value": "El complemento The Ultimate WordPress Toolkit \u2013 WP Extended para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos que puede provocar una escalada de privilegios debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n module_all_toggle_ajax() en todas las versiones hasta la 3.0.8 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen opciones arbitrarias en el sitio de WordPress. Esto se puede aprovechar para actualizar el rol predeterminado para el registro como administrador y habilitar el registro de usuarios para que los atacantes obtengan acceso de usuario administrativo a un sitio vulnerable."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-8104",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-04T07:15:03.943",
"lastModified": "2024-09-04T07:15:03.943",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.0.8 via the download_file_ajax function. This makes it possible for authenticated attackers, with subscriber access and above, to read the contents of arbitrary files on the server, which can contain sensitive information."
},
{
"lang": "es",
"value": "El complemento The Ultimate WordPress Toolkit \u2013 WP Extended para WordPress es vulnerable a Directory Traversal en todas las versiones hasta la 3.0.8 incluida a trav\u00e9s de la funci\u00f3n download_file_ajax. Esto permite que atacantes autenticados, con acceso de suscriptor o superior, lean el contenido de archivos arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-8106",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-04T07:15:04.180",
"lastModified": "2024-09-04T07:15:04.180",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.0.8 via the download_user_ajax function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract sensitive data including usernames, hashed passwords, and emails."
},
{
"lang": "es",
"value": "El complemento The Ultimate WordPress Toolkit \u2013 WP Extended para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 3.0.8 incluida a trav\u00e9s de la funci\u00f3n download_user_ajax. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor o superior, extraigan datos confidenciales, incluidos nombres de usuario, contrase\u00f1as cifradas y correos electr\u00f3nicos."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-8117",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-04T07:15:04.407",
"lastModified": "2024-09-04T07:15:04.407",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018selected_option\u2019 parameter in all versions up to, and including, 3.0.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento The Ultimate WordPress Toolkit \u2013 WP Extended para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'selected_option' en todas las versiones hasta la 3.0.8 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-8119",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-04T07:15:04.650",
"lastModified": "2024-09-04T07:15:04.650",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the page parameter in all versions up to, and including, 3.0.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento The Ultimate WordPress Toolkit \u2013 WP Extended para WordPress es vulnerable a ataques de Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro de p\u00e1gina en todas las versiones hasta la 3.0.8 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-8121",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-04T07:15:04.887",
"lastModified": "2024-09-04T07:15:04.887",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordPress is vulnerable to unauthorized modification of user names due to a missing capability check on the wpext_change_admin_name() function in all versions up to, and including, 3.0.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change an admin's username to a username of their liking as long as the default 'admin' was used."
},
{
"lang": "es",
"value": "El complemento The Ultimate WordPress Toolkit \u2013 WP Extended para WordPress es vulnerable a la modificaci\u00f3n no autorizada de nombres de usuario debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n wpext_change_admin_name() en todas las versiones hasta la 3.0.8 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, cambien el nombre de usuario de un administrador por un nombre de usuario de su agrado siempre que se haya utilizado el valor predeterminado \"admin\"."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-8123",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-04T07:15:05.130",
"lastModified": "2024-09-04T07:15:05.130",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.0.8 via the duplicate_post function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Contributor-level access and above, to duplicate posts written by other authors including admins. This includes the ability to duplicate password-protected posts, which reveals their contents."
},
{
"lang": "es",
"value": "El complemento The Ultimate WordPress Toolkit \u2013 WP Extended para WordPress es vulnerable a la referencia directa a objetos inseguros en todas las versiones hasta la 3.0.8 incluida a trav\u00e9s de la funci\u00f3n duplicate_post debido a la falta de validaci\u00f3n en una clave controlada por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, dupliquen publicaciones escritas por otros autores, incluidos los administradores. Esto incluye la capacidad de duplicar publicaciones protegidas con contrase\u00f1a, lo que revela su contenido."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8181",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2024-08-27T13:15:06.820",
"lastModified": "2024-08-30T13:53:29.953",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T12:15:05.833",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -42,20 +42,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.3,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.1,
"impactScore": 5.2
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -90,11 +90,8 @@
],
"references": [
{
"url": "https://tenable.com/security/research/tra-2024-22-0",
"source": "vulnreport@tenable.com",
"tags": [
"Third Party Advisory"
]
"url": "https://tenable.com/security/research/tra-2024-33",
"source": "vulnreport@tenable.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-8289",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-04T09:15:04.977",
"lastModified": "2024-09-04T09:15:04.977",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MultiVendorX \u2013 The Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to privilege escalation/de-escalation and account takeover due to an insufficient capability check on the update_item_permissions_check and create_item_permissions_check functions in all versions up to, and including, 4.2.0. This makes it possible for unauthenticated attackers to change the password of any user with the vendor role, create new users with the vendor role, and demote other users like administrators to the vendor role."
},
{
"lang": "es",
"value": "El complemento MultiVendorX \u2013 The Ultimate WooCommerce Multivendor Marketplace Solution para WordPress es vulnerable a la escalada/desescalada de privilegios y a la apropiaci\u00f3n de cuentas debido a una comprobaci\u00f3n de capacidad insuficiente en las funciones update_item_permissions_check y create_item_permissions_check en todas las versiones hasta la 4.2.0 incluida. Esto permite que atacantes no autenticados cambien la contrase\u00f1a de cualquier usuario con el rol de vendedor, creen nuevos usuarios con el rol de vendedor y degraden a otros usuarios, como administradores, al rol de vendedor."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-8298",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-04T03:15:05.047",
"lastModified": "2024-09-04T03:15:05.047",
"vulnStatus": "Received",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory request vulnerability in the memory management module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
},
{
"lang": "es",
"value": "Vulnerabilidad de solicitud de memoria en el m\u00f3dulo de gesti\u00f3n de memoria Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
}
],
"metrics": {

Some files were not shown because too many files have changed in this diff Show More