Auto-Update: 2024-07-17T14:00:19.078627+00:00

This commit is contained in:
cad-safe-bot 2024-07-17 14:03:16 +00:00
parent 61cf16d7c7
commit 538c471f64
168 changed files with 1246 additions and 582 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-25154",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T23:15:10.407",
"lastModified": "2024-07-16T23:15:10.407",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-25836",
"sourceIdentifier": "security@opentext.com",
"published": "2024-07-16T22:15:02.773",
"lastModified": "2024-07-16T22:15:02.773",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-36765",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T23:15:10.497",
"lastModified": "2024-07-16T23:15:10.497",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-35640",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-07-16T23:15:10.737",
"lastModified": "2024-07-16T23:15:10.737",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-31456",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-16T18:15:06.873",
"lastModified": "2024-07-16T18:15:06.873",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is an SSRF vulnerability in the Fluid Topics platform that affects versions prior to 4.3, where the server can be forced to make arbitrary requests to internal and external resources by an authenticated user."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad SSRF en la plataforma Fluid Topics que afecta a las versiones anteriores a la 4.3, donde un usuario autenticado puede obligar al servidor a realizar solicitudes arbitrarias a recursos internos y externos."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4860",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T23:15:11.070",
"lastModified": "2024-07-16T23:15:11.070",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-52291",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-17T09:15:02.410",
"lastModified": "2024-07-17T09:15:02.410",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the streampark system and have system-level permissions. Generally, only users of that system have the authorization to log in, and users would not manually input a dangerous operation command. Therefore, the risk level of this vulnerability is very low.\n\nBackground:\n\nIn the \"Project\" module, the maven build args\u00a0\u00a0\u201c<\u201d operator causes command injection. e.g : \u201c< (curl\u00a0 http://xxx.com )\u201d will be executed as a command injection,\n\nMitigation:\n\nall users should upgrade to 2.1.4,\u00a0 The \"<\" operator will blocked\u3002\n\n"
"value": "In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the streampark system and have system-level permissions. Generally, only users of that system have the authorization to log in, and users would not manually input a dangerous operation command. Therefore, the risk level of this vulnerability is very low.\n\nBackground:\n\nIn the \"Project\" module, the maven build args\u00a0\u00a0\u201c<\u201d operator causes command injection. e.g : \u201c< (curl\u00a0 http://xxx.com )\u201d will be executed as a command injection,\n\nMitigation:\n\nall users should upgrade to 2.1.4,\u00a0 The \"<\" operator will blocked?\n\n"
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7010",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T23:15:11.140",
"lastModified": "2024-07-16T23:15:11.140",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7011",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T23:15:11.210",
"lastModified": "2024-07-16T23:15:11.210",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7012",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T23:15:11.270",
"lastModified": "2024-07-16T23:15:11.270",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7013",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T23:15:11.340",
"lastModified": "2024-07-16T23:15:11.340",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1639",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-21T02:15:10.117",
"lastModified": "2024-06-21T11:22:01.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-17T13:57:55.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpexperts:license_manager_for_woocommerce:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.0.7",
"matchCriteriaId": "8F7F205E-2E9E-4D2E-8D7C-D5308E5FA758"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/license-manager-for-woocommerce/tags/3.0.5/includes/Controllers/License.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/92e444db-72d5-444f-811e-ade0bc097769?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20996",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:11.403",
"lastModified": "2024-07-16T23:15:11.403",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21122",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:11.613",
"lastModified": "2024-07-16T23:15:11.613",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21123",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:11.810",
"lastModified": "2024-07-16T23:15:11.810",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21125",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:11.990",
"lastModified": "2024-07-16T23:15:11.990",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21126",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:12.177",
"lastModified": "2024-07-16T23:15:12.177",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21127",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:12.370",
"lastModified": "2024-07-16T23:15:12.370",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21128",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:12.553",
"lastModified": "2024-07-16T23:15:12.553",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21129",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:12.783",
"lastModified": "2024-07-16T23:15:12.783",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21130",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:13.020",
"lastModified": "2024-07-16T23:15:13.020",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21131",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:13.210",
"lastModified": "2024-07-16T23:15:13.210",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21132",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:13.403",
"lastModified": "2024-07-16T23:15:13.403",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21133",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:13.683",
"lastModified": "2024-07-16T23:15:13.683",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21134",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:13.870",
"lastModified": "2024-07-16T23:15:13.870",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21135",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:14.057",
"lastModified": "2024-07-16T23:15:14.057",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21136",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:14.243",
"lastModified": "2024-07-16T23:15:14.243",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21137",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:14.437",
"lastModified": "2024-07-16T23:15:14.437",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21138",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:14.620",
"lastModified": "2024-07-16T23:15:14.620",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21139",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:14.847",
"lastModified": "2024-07-16T23:15:14.847",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21140",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:15.043",
"lastModified": "2024-07-16T23:15:15.043",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21141",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:15.230",
"lastModified": "2024-07-16T23:15:15.230",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21142",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:15.407",
"lastModified": "2024-07-16T23:15:15.407",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21143",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:15.587",
"lastModified": "2024-07-16T23:15:15.587",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21144",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:15.810",
"lastModified": "2024-07-16T23:15:15.810",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21145",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:15.993",
"lastModified": "2024-07-16T23:15:15.993",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21146",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:16.190",
"lastModified": "2024-07-16T23:15:16.190",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21147",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:16.377",
"lastModified": "2024-07-16T23:15:16.377",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21148",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:16.590",
"lastModified": "2024-07-16T23:15:16.590",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21149",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:16.840",
"lastModified": "2024-07-16T23:15:16.840",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21150",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:17.023",
"lastModified": "2024-07-16T23:15:17.023",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21151",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:17.210",
"lastModified": "2024-07-16T23:15:17.210",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21152",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:17.397",
"lastModified": "2024-07-16T23:15:17.397",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21153",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:17.587",
"lastModified": "2024-07-16T23:15:17.587",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21154",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:17.767",
"lastModified": "2024-07-16T23:15:17.767",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21155",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:17.970",
"lastModified": "2024-07-16T23:15:17.970",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21157",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:18.153",
"lastModified": "2024-07-16T23:15:18.153",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21158",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:18.333",
"lastModified": "2024-07-16T23:15:18.333",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21159",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:18.517",
"lastModified": "2024-07-16T23:15:18.517",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21160",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:18.740",
"lastModified": "2024-07-16T23:15:18.740",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21161",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:18.930",
"lastModified": "2024-07-16T23:15:18.930",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21162",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:19.113",
"lastModified": "2024-07-16T23:15:19.113",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21163",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:19.300",
"lastModified": "2024-07-16T23:15:19.300",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21164",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:19.490",
"lastModified": "2024-07-16T23:15:19.490",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21165",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:19.700",
"lastModified": "2024-07-16T23:15:19.700",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21166",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:19.880",
"lastModified": "2024-07-16T23:15:19.880",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21167",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:20.073",
"lastModified": "2024-07-16T23:15:20.073",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21168",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:20.253",
"lastModified": "2024-07-16T23:15:20.253",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21169",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:20.430",
"lastModified": "2024-07-16T23:15:20.430",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21170",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:20.610",
"lastModified": "2024-07-16T23:15:20.610",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21171",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:20.790",
"lastModified": "2024-07-16T23:15:20.790",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21173",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:20.973",
"lastModified": "2024-07-16T23:15:20.973",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21174",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:21.157",
"lastModified": "2024-07-16T23:15:21.157",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21175",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:21.337",
"lastModified": "2024-07-16T23:15:21.337",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21176",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:21.520",
"lastModified": "2024-07-16T23:15:21.520",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21177",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:21.700",
"lastModified": "2024-07-16T23:15:21.700",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21178",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:21.893",
"lastModified": "2024-07-16T23:15:21.893",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21179",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:22.090",
"lastModified": "2024-07-16T23:15:22.090",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21180",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:22.273",
"lastModified": "2024-07-16T23:15:22.273",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21181",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:22.460",
"lastModified": "2024-07-16T23:15:22.460",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21182",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:22.660",
"lastModified": "2024-07-16T23:15:22.660",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21183",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:22.847",
"lastModified": "2024-07-16T23:15:22.847",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21184",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:23.077",
"lastModified": "2024-07-16T23:15:23.077",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21185",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:23.260",
"lastModified": "2024-07-16T23:15:23.260",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21188",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:23.443",
"lastModified": "2024-07-16T23:15:23.443",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21686",
"sourceIdentifier": "security@atlassian.com",
"published": "2024-07-16T20:15:02.900",
"lastModified": "2024-07-16T20:15:02.900",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This High severity Stored XSS vulnerability was introduced in versions 7.13 of Confluence Data Center and Server.\n\nThis Stored XSS vulnerability, with a CVSS Score of 7.3, allows an authenticated attacker to execute arbitrary HTML or JavaScript code on a victims browser which has high impact to confidentiality, high impact to integrity, no impact to availability, and requires user interaction.\n\nAtlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions listed on this CVE\n\nSee the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives).\n\nThis vulnerability was reported via our Bug Bounty program."
},
{
"lang": "es",
"value": "Esta vulnerabilidad XSS almacenado de alta gravedad se introdujo en las versiones 7.13 de Confluence Data Center y Server. Esta vulnerabilidad XSS almacenado, con una puntuaci\u00f3n CVSS de 7,3, permite a un atacante autenticado ejecutar c\u00f3digo HTML o JavaScript arbitrario en el navegador de una v\u00edctima, lo que tiene un alto impacto en la confidencialidad, un alto impacto en la integridad, ning\u00fan impacto en la disponibilidad y requiere la interacci\u00f3n del usuario. Atlassian recomienda que los clientes de Confluence Data Center y Server actualicen a la \u00faltima versi\u00f3n; si no puede hacerlo, actualice su instancia a una de las versiones correctoras admitidas especificadas que se enumeran en este CVE. Consulte las notas de la versi\u00f3n (https://confluence.atlassian.es/doc/confluence-release-notes-327.html). Puede descargar la \u00faltima versi\u00f3n de Confluence Data Center and Server desde el centro de descargas (https://www.atlassian.com/software/confluence/download-archives). Esta vulnerabilidad fue reportada a trav\u00e9s de nuestro programa Bug Bounty."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21687",
"sourceIdentifier": "security@atlassian.com",
"published": "2024-07-16T21:15:10.257",
"lastModified": "2024-07-16T21:15:10.257",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This High severity File Inclusion vulnerability was introduced in versions 9.0.0, 9.1.0, 9.2.0, 9.3.0, 9.4.0, 9.5.0 and 9.6.0 of Bamboo Data Center and Server.\n\nThis File Inclusion vulnerability, with a CVSS Score of 8.1, allows an authenticated attacker to get the application to display the contents of a local file, or execute a different files already stored locally on the server which has high impact to confidentiality, high impact to integrity, no impact to availability, and requires no user interaction.\n\nAtlassian recommends that Bamboo Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions listed on this CVE\n\nSee the release notes (https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html). You can download the latest version of Bamboo Data Center and Server from the download center (https://www.atlassian.com/software/bamboo/download-archives).\n\nThis vulnerability was reported via our Bug Bounty program."
},
{
"lang": "es",
"value": "Esta vulnerabilidad de inclusi\u00f3n de archivos de alta gravedad se introdujo en las versiones 9.0.0, 9.1.0, 9.2.0, 9.3.0, 9.4.0, 9.5.0 y 9.6.0 de Bamboo Data Center and Server. Esta vulnerabilidad de inclusi\u00f3n de archivos, con una puntuaci\u00f3n CVSS de 8,1, permite a un atacante autenticado hacer que la aplicaci\u00f3n muestre el contenido de un archivo local o ejecutar archivos diferentes ya almacenados localmente en el servidor, lo que tiene un alto impacto en la confidencialidad y un alto impacto en la integridad de la privacidad, no afecta la disponibilidad y no requiere interacci\u00f3n del usuario. Atlassian recomienda que los clientes de Bamboo Data Center y Server actualicen a la \u00faltima versi\u00f3n; si no puede hacerlo, actualice su instancia a una de las versiones correctoras admitidas especificadas que se enumeran en este CVE. Consulte las notas de la versi\u00f3n (https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html). Puede descargar la \u00faltima versi\u00f3n de Bamboo Data Center and Server desde el centro de descargas (https://www.atlassian.com/software/bamboo/download-archives). Esta vulnerabilidad se inform\u00f3 a trav\u00e9s de nuestro programa Bug Bounty."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27311",
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
"published": "2024-07-17T11:15:09.863",
"lastModified": "2024-07-17T11:15:09.863",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2884",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T23:15:23.637",
"lastModified": "2024-07-16T23:15:23.637",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29737",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-17T09:15:02.527",
"lastModified": "2024-07-17T09:15:02.527",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30471",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-17T09:15:02.640",
"lastModified": "2024-07-17T09:15:02.640",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31070",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-07-17T09:15:02.813",
"lastModified": "2024-07-17T09:15:02.813",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31411",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-17T10:15:01.810",
"lastModified": "2024-07-17T10:15:01.810",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31979",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-17T09:15:02.907",
"lastModified": "2024-07-17T09:15:02.907",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3168",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T23:15:23.703",
"lastModified": "2024-07-16T23:15:23.703",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3169",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T23:15:23.773",
"lastModified": "2024-07-16T23:15:23.773",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3170",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T23:15:23.837",
"lastModified": "2024-07-16T23:15:23.837",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3171",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T23:15:23.903",
"lastModified": "2024-07-16T23:15:23.903",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3172",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T23:15:23.970",
"lastModified": "2024-07-16T23:15:23.970",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-3173",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T23:15:24.027",
"lastModified": "2024-07-16T23:15:24.027",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient data validation in Updater in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to perform OS-level privilege escalation via a malicious file. (Chromium security severity: High)"
},
{
"lang": "es",
"value": "La validaci\u00f3n de datos insuficiente en Updater en Google Chrome anterior a 120.0.6099.62 permiti\u00f3 a un atacante remoto realizar una escalada de privilegios a nivel del sistema operativo a trav\u00e9s de un archivo malicioso. (Severidad de seguridad de Chrome: alta)"
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-3174",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T23:15:24.087",
"lastModified": "2024-07-16T23:15:24.087",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in V8 in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)"
},
{
"lang": "es",
"value": "La implementaci\u00f3n inadecuada en V8 en Google Chrome anterior a 119.0.6045.105 permiti\u00f3 a un atacante remoto explotar potencialmente la corrupci\u00f3n de objetos a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-3175",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T23:15:24.147",
"lastModified": "2024-07-16T23:15:24.147",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient data validation in Extensions in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to perform privilege escalation via a crafted Chrome Extension. (Chromium security severity: Low)"
},
{
"lang": "es",
"value": "La validaci\u00f3n de datos insuficiente en las Extensiones de Google Chrome anteriores a 120.0.6099.62 permiti\u00f3 a un atacante remoto realizar una escalada de privilegios a trav\u00e9s de una Extensi\u00f3n de Chrome manipulada. (Severidad de seguridad de Chrome: baja)"
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-3176",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T23:15:24.200",
"lastModified": "2024-07-16T23:15:24.200",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out of bounds write in SwiftShader in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)"
},
{
"lang": "es",
"value": "La escritura fuera de los l\u00edmites en SwiftShader en Google Chrome anterior a 117.0.5938.62 permit\u00eda a un atacante remoto realizar una escritura en memoria fuera de los l\u00edmites a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33181",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-16T18:15:07.617",
"lastModified": "2024-07-16T18:15:07.617",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnerability via the deviceMac parameter at ip/goform/addWifiMacFilter."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Tenda AC18 V15.03.3.10_EN contiene una vulnerabilidad de desbordamiento del b\u00fafer basada en pila a trav\u00e9s del par\u00e1metro deviceMac en ip/goform/addWifiMacFilter."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36475",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-07-17T09:15:03.013",
"lastModified": "2024-07-17T09:15:03.013",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36491",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-07-17T09:15:03.090",
"lastModified": "2024-07-17T09:15:03.090",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-39036",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-16T19:15:12.460",
"lastModified": "2024-07-16T19:15:12.460",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SeaCMS v12.9 is vulnerable to Arbitrary File Read via admin_safe.php."
},
{
"lang": "es",
"value": "SeaCMS v12.9 es vulnerable a la lectura arbitraria de archivos a trav\u00e9s de admin_safe.php."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-39700",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-16T18:15:07.857",
"lastModified": "2024-07-16T18:15:07.857",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "JupyterLab extension template is a `copier` template for JupyterLab extensions. Repositories created using this template with `test` option include `update-integration-tests.yml` workflow which has an RCE vulnerability. Extension authors hosting their code on GitHub are urged to upgrade the template to the latest version. Users who made changes to `update-integration-tests.yml`, accept overwriting of this file and re-apply your changes later. Users may wish to temporarily disable GitHub Actions while working on the upgrade. We recommend rebasing all open pull requests from untrusted users as actions may run using the version from the `main` branch at the time when the pull request was created. Users who are upgrading from template version prior to 4.3.0 may wish to leave out proposed changes to the release workflow for now as it requires additional configuration."
},
{
"lang": "es",
"value": "La plantilla de extensi\u00f3n de JupyterLab es una plantilla de \"copiadora\" para las extensiones de JupyterLab. Los repositorios creados usando esta plantilla con la opci\u00f3n `test` incluyen el flujo de trabajo `update-integration-tests.yml` que tiene una vulnerabilidad RCE. Se insta a los autores de extensiones que alojan su c\u00f3digo en GitHub a actualizar la plantilla a la \u00faltima versi\u00f3n. Los usuarios que realizaron cambios en `update-integration-tests.yml` aceptan la sobrescritura de este archivo y vuelven a aplicar los cambios m\u00e1s tarde. Es posible que los usuarios deseen deshabilitar temporalmente las acciones de GitHub mientras trabajan en la actualizaci\u00f3n. Recomendamos cambiar la base de todas las solicitudes de extracci\u00f3n abiertas de usuarios que no son de confianza, ya que las acciones pueden ejecutarse usando la versi\u00f3n de la rama \"principal\" en el momento en que se cre\u00f3 la solicitud de extracci\u00f3n. Es posible que los usuarios que est\u00e9n actualizando desde una versi\u00f3n de plantilla anterior a la 4.3.0 deseen omitir los cambios propuestos en el flujo de trabajo de la versi\u00f3n por ahora, ya que requiere una configuraci\u00f3n adicional."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39863",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-17T08:15:01.933",
"lastModified": "2024-07-17T08:15:01.933",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39877",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-17T08:15:02.073",
"lastModified": "2024-07-17T08:15:02.073",
"vulnStatus": "Received",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

Some files were not shown because too many files have changed in this diff Show More