Auto-Update: 2024-10-15T14:00:18.621893+00:00

This commit is contained in:
cad-safe-bot 2024-10-15 14:03:18 +00:00
parent ae54cc0b5b
commit 5ab0c2e030
361 changed files with 3591 additions and 1121 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-22644",
"sourceIdentifier": "meissner@suse.de",
"published": "2023-09-20T09:15:12.837",
"lastModified": "2024-10-15T11:15:10.860",
"lastModified": "2024-10-15T12:15:02.520",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified which may lead to sensitive data being leaked into Rancher's audit logs. [Rancher Audit Logging](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log) is an opt-in feature, only deployments that have it enabled and have [AUDIT_LEVEL](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log#audit-log-levels) set to `1 or above` are impacted by this issue."
"value": "A vulnerability has been identified in which Rancher does not automatically clean up a user which has been deleted from the configured authentication provider (AP). This characteristic also applies to disabled or revoked users, Rancher will not reflect these modifications which may leave the user\u2019s tokens still usable."
},
{
"lang": "es",
@ -22,18 +22,18 @@
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
@ -55,7 +55,7 @@
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.4,
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "meissner@suse.de",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -90,7 +110,7 @@
"description": [
{
"lang": "en",
"value": "CWE-532"
"value": "CWE-287"
}
]
}
@ -123,11 +143,11 @@
],
"references": [
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22649",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22650",
"source": "meissner@suse.de"
},
{
"url": "https://github.com/rancher/rancher/security/advisories/GHSA-xfj7-qf8w-2gcr",
"url": "https://github.com/rancher/rancher/security/advisories/GHSA-9ghh-mmcq-8phc",
"source": "meissner@suse.de"
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25581",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-10T16:15:04.923",
"lastModified": "2024-10-10T16:15:04.923",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-42133",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-10-11T13:15:15.190",
"lastModified": "2024-10-11T13:15:15.190",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PAX Android based POS devices allow for escalation of privilege via improperly configured scripts.\n\nAn attacker must have shell access with system account privileges in order to exploit this vulnerability.\nA patch addressing this issue was included in firmware version PayDroid_8.1.0_Sagittarius_V11.1.61_20240226."
},
{
"lang": "es",
"value": "Los dispositivos POS basados en Android PAX permiten la escalada de privilegios a trav\u00e9s de scripts configurados incorrectamente. Un atacante debe tener acceso al shell con privilegios de cuenta del sistema para poder explotar esta vulnerabilidad. Se incluy\u00f3 un parche que soluciona este problema en la versi\u00f3n de firmware PayDroid_8.1.0_Sagittarius_V11.1.61_20240226."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-48082",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T19:15:10.780",
"lastModified": "2024-10-14T19:15:10.780",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nagios XI before 5.11.3 2024R1 was discovered to improperly handle API keys generation (randomly-generated), allowing attackers to possibly generate the same set of API keys for all users and utilize them to authenticate."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Nagios XI anterior a 5.11.3 2024R1 manejaba incorrectamente la generaci\u00f3n de claves API (generadas aleatoriamente), lo que permit\u00eda a los atacantes generar posiblemente el mismo conjunto de claves API para todos los usuarios y utilizarlas para autenticarse."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-50780",
"sourceIdentifier": "security@apache.org",
"published": "2024-10-14T16:15:03.477",
"lastModified": "2024-10-14T16:15:03.477",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Apache ActiveMQ Artemis allows access to diagnostic information and controls through MBeans, which are also exposed through the authenticated Jolokia endpoint. Before version 2.29.0, this also included the Log4J2 MBean. This MBean is not meant for exposure to non-administrative users. This could eventually allow an authenticated attacker to write arbitrary files to the filesystem and indirectly achieve RCE.\n\n\nUsers are recommended to upgrade to version 2.29.0 or later, which fixes the issue."
},
{
"lang": "es",
"value": "Apache ActiveMQ Artemis permite el acceso a informaci\u00f3n de diagn\u00f3stico y controles a trav\u00e9s de MBeans, que tambi\u00e9n se exponen a trav\u00e9s del endpoint autenticado Jolokia. Antes de la versi\u00f3n 2.29.0, esto tambi\u00e9n inclu\u00eda el MBean Log4J2. Este MBean no est\u00e1 pensado para exponerlo a usuarios no administrativos. Esto podr\u00eda eventualmente permitir que un atacante autenticado escriba archivos arbitrarios en el sistema de archivos y logre RCE indirectamente. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.29.0 o posterior, que soluciona el problema."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-0129",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-10-15T06:15:02.520",
"lastModified": "2024-10-15T06:15:02.520",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA NeMo contains a vulnerability in SaveRestoreConnector where a user may cause a path traversal issue via an unsafe .tar file extraction. A successful exploit of this vulnerability may lead to code execution and data tampering."
},
{
"lang": "es",
"value": "NVIDIA NeMo contiene una vulnerabilidad en SaveRestoreConnector que puede provocar un problema de path traversal mediante una extracci\u00f3n de archivo .tar no segura. Una explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar la ejecuci\u00f3n de c\u00f3digo y la manipulaci\u00f3n de datos."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21534",
"sourceIdentifier": "report@snyk.io",
"published": "2024-10-11T13:15:15.667",
"lastModified": "2024-10-11T21:36:23.557",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Versions of the package jsonpath-plus before 10.0.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node.\r\r**Note:**\r\rThe unsafe behavior is still available after applying the fix but it is not turned on by default."
},
{
"lang": "es",
"value": "Las versiones del paquete jsonpath-plus anteriores a la 10.0.0 son vulnerables a la ejecuci\u00f3n remota de c\u00f3digo (RCE) debido a una desinfecci\u00f3n de entrada incorrecta. Un atacante puede ejecutar c\u00f3digo arbitrario en el sistema aprovechando el uso inseguro predeterminado de vm en Node. **Nota:** El comportamiento inseguro sigue estando disponible despu\u00e9s de aplicar la correcci\u00f3n, pero no est\u00e1 activado de forma predeterminada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21535",
"sourceIdentifier": "report@snyk.io",
"published": "2024-10-15T05:15:11.530",
"lastModified": "2024-10-15T05:15:11.530",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Versions of the package markdown-to-jsx before 7.4.0 are vulnerable to Cross-site Scripting (XSS) via the src property due to improper input sanitization. An attacker can execute arbitrary code by injecting a malicious iframe element in the markdown."
},
{
"lang": "es",
"value": "Las versiones del paquete markdown-to-jsx anteriores a la 7.4.0 son vulnerables a ataques de Cross Site Scripting (XSS) a trav\u00e9s de la propiedad src debido a una desinfecci\u00f3n incorrecta de la entrada. Un atacante puede ejecutar c\u00f3digo arbitrario inyectando un elemento iframe malicioso en el paquete markdown."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-25622",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-11T15:15:03.947",
"lastModified": "2024-10-11T15:15:03.947",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. The configuration directives provided by the headers handler allows users to modify the response headers being sent by h2o. The configuration file of h2o has scopes, and the inner scopes (e.g., path level) are expected to inherit the configuration defined in outer scopes (e.g., global level). However, if a header directive is used in the inner scope, all the definition in outer scopes are ignored. This can lead to headers not being modified as expected. Depending on the headers being added or removed unexpectedly, this behavior could lead to unexpected client behavior. This vulnerability is fixed in commit 123f5e2b65dcdba8f7ef659a00d24bd1249141be."
},
{
"lang": "es",
"value": "h2o es un servidor HTTP compatible con HTTP/1.x, HTTP/2 y HTTP/3. Las directivas de configuraci\u00f3n proporcionadas por el controlador de encabezados permiten a los usuarios modificar los encabezados de respuesta que env\u00eda h2o. El archivo de configuraci\u00f3n de h2o tiene \u00e1mbitos y se espera que los \u00e1mbitos internos (por ejemplo, nivel de ruta) hereden la configuraci\u00f3n definida en los \u00e1mbitos externos (por ejemplo, nivel global). Sin embargo, si se utiliza una directiva de encabezado en el \u00e1mbito interno, se ignoran todas las definiciones en los \u00e1mbitos externos. Esto puede provocar que los encabezados no se modifiquen como se esperaba. Seg\u00fan si los encabezados se agregan o eliminan inesperadamente, este comportamiento podr\u00eda provocar un comportamiento inesperado del cliente. Esta vulnerabilidad se corrigi\u00f3 en el commit 123f5e2b65dcdba8f7ef659a00d24bd1249141be."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28709",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-07T16:15:05.117",
"lastModified": "2024-10-07T17:47:48.410",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-15T13:19:03.740",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,74 @@
"value": "La vulnerabilidad de cross-site scripting en LimeSurvey anterior a 6.5.12+240611 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una secuencia de comandos manipulado espec\u00edficamente para los campos de t\u00edtulo y comentarios."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.12\\+240611",
"matchCriteriaId": "AFFFAE49-01BB-4F70-B4A7-714B29C7AEE0"
}
]
}
]
}
],
"references": [
{
"url": "http://limesurvey.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/LimeSurvey/LimeSurvey/commit/c844c4fba81cc26ffe6544bf095bad6252910bc0",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28710",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-07T16:15:05.190",
"lastModified": "2024-10-07T17:47:48.410",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-15T13:18:44.027",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,74 @@
"value": "Una vulnerabilidad de cross-site scripting en LimeSurvey anterior a la versi\u00f3n 6.5.0+240319 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una falta de validaci\u00f3n de entrada y codificaci\u00f3n de salida en el componente de mensaje del widget de alerta."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.0\\+240319",
"matchCriteriaId": "0B9CA71A-6962-4051-A253-FE653900E30B"
}
]
}
]
}
],
"references": [
{
"url": "http://limesurvey.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/LimeSurvey/LimeSurvey/commit/c2fd60f94bc1db275f20cbb27a3135a9bdfb7f10",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-30117",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-10-14T23:15:11.407",
"lastModified": "2024-10-14T23:15:11.407",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A dynamic search for a prerequisite library could allow the possibility for an attacker to replace the correct file under some circumstances."
},
{
"lang": "es",
"value": "Una b\u00fasqueda din\u00e1mica de una librer\u00eda de requisitos previos podr\u00eda permitir que un atacante reemplace el archivo correcto en algunas circunstancias."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33578",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-10-11T16:15:05.277",
"lastModified": "2024-10-11T16:15:05.277",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A DLL hijack vulnerability was reported in Lenovo Leyun that could allow a local attacker to execute code with elevated privileges."
},
{
"lang": "es",
"value": "Se inform\u00f3 de una vulnerabilidad de secuestro de DLL en Lenovo Leyun que podr\u00eda permitir a un atacante local ejecutar c\u00f3digo con privilegios elevados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33579",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-10-11T16:15:05.523",
"lastModified": "2024-10-11T16:15:05.523",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A DLL hijack vulnerability was reported in Lenovo Baiying that could allow a local attacker to execute code with elevated privileges."
},
{
"lang": "es",
"value": "Se inform\u00f3 de una vulnerabilidad de secuestro de DLL en Lenovo Baiying que podr\u00eda permitir a un atacante local ejecutar c\u00f3digo con privilegios elevados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33580",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-10-11T16:15:05.730",
"lastModified": "2024-10-11T16:15:05.730",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A DLL hijack vulnerability was reported in Lenovo Personal Cloud that could allow a local attacker to execute code with elevated privileges."
},
{
"lang": "es",
"value": "Se inform\u00f3 de una vulnerabilidad de secuestro de DLL en Lenovo Personal Cloud que podr\u00eda permitir que un atacante local ejecute c\u00f3digo con privilegios elevados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33581",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-10-11T16:15:05.943",
"lastModified": "2024-10-11T16:15:05.943",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A DLL hijack vulnerability was reported in Lenovo PC Manager AI intelligent scenario that could allow a local attacker to execute code with elevated privileges."
},
{
"lang": "es",
"value": "Se inform\u00f3 de una vulnerabilidad de secuestro de DLL en el escenario inteligente de Lenovo PC Manager AI que podr\u00eda permitir que un atacante local ejecute c\u00f3digo con privilegios elevados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33582",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-10-11T16:15:06.147",
"lastModified": "2024-10-11T16:15:06.147",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A DLL hijack vulnerability was reported in Lenovo Service Framework that could allow a local attacker to execute code with elevated privileges."
},
{
"lang": "es",
"value": "Se inform\u00f3 de una vulnerabilidad de secuestro de DLL en Lenovo Service Framework que podr\u00eda permitir que un atacante local ejecute c\u00f3digo con privilegios elevados."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35202",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-10T13:15:14.077",
"lastModified": "2024-10-10T16:35:11.390",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-35517",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T22:15:03.930",
"lastModified": "2024-10-11T22:15:03.930",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Netgear XR1000 v1.0.0.64 is vulnerable to command injection in usb_remote_smb_conf.cgi via the share_name parameter."
},
{
"lang": "es",
"value": "Netgear XR1000 v1.0.0.64 es vulnerable a la inyecci\u00f3n de comandos en usb_remote_smb_conf.cgi a trav\u00e9s del par\u00e1metro share_name."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-35518",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T22:15:03.320",
"lastModified": "2024-10-14T22:15:03.320",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Netgear EX6120 v1.0.0.68 is vulnerable to Command Injection in genie_fix2.cgi via the wan_dns1_pri parameter."
},
{
"lang": "es",
"value": "Netgear EX6120 v1.0.0.68 es vulnerable a la inyecci\u00f3n de comandos en genie_fix2.cgi a trav\u00e9s del par\u00e1metro wan_dns1_pri."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-35519",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T22:15:03.543",
"lastModified": "2024-10-14T22:15:03.543",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Netgear EX6120 v1.0.0.68, Netgear EX6100 v1.0.2.28, and Netgear EX3700 v1.0.0.96 are vulnerable to command injection in operating_mode.cgi via the ap_mode parameter."
},
{
"lang": "es",
"value": "Netgear EX6120 v1.0.0.68, Netgear EX6100 v1.0.2.28 y Netgear EX3700 v1.0.0.96 son vulnerables a la inyecci\u00f3n de comandos en operating_mode.cgi a trav\u00e9s del par\u00e1metro ap_mode."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-35520",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T22:15:03.727",
"lastModified": "2024-10-14T22:15:03.727",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Netgear R7000 1.0.11.136 is vulnerable to Command Injection in RMT_invite.cgi via device_name2 parameter."
},
{
"lang": "es",
"value": "Netgear R7000 1.0.11.136 es vulnerable a la inyecci\u00f3n de comandos en RMT_invite.cgi a trav\u00e9s del par\u00e1metro device_name2."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-35522",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T22:15:04.117",
"lastModified": "2024-10-11T22:15:04.117",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Netgear EX3700 ' AC750 WiFi Range Extender Essentials Edition before 1.0.0.98 contains an authenticated command injection in operating_mode.cgi via the ap_mode parameter with ap_24g_manual set to 1 and ap_24g_manual_sec set to NotNone."
},
{
"lang": "es",
"value": "El extensor de rango WiFi Netgear EX3700 ' AC750 WiFi Essentials Edition anterior a 1.0.0.98 contiene una inyecci\u00f3n de comando autenticada en operating_mode.cgi a trav\u00e9s del par\u00e1metro ap_mode con ap_24g_manual establecido en 1 y ap_24g_manual_sec establecido en NotNone."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38365",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-11T20:15:04.733",
"lastModified": "2024-10-11T20:15:04.733",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "btcd is an alternative full node bitcoin implementation written in Go (golang). The btcd Bitcoin client (versions 0.10 to 0.24) did not correctly re-implement Bitcoin Core's \"FindAndDelete()\" functionality. This logic is consensus-critical: the difference in behavior with the other Bitcoin clients can lead to btcd clients accepting an invalid Bitcoin block (or rejecting a valid one). This consensus failure can be leveraged to cause a chain split (accepting an invalid Bitcoin block) or be exploited to DoS the btcd nodes (rejecting a valid Bitcoin block). An attacker can create a standard transaction where FindAndDelete doesn't return a match but removeOpCodeByData does making btcd get a different sighash, leading to a chain split. Importantly, this vulnerability can be exploited remotely by any Bitcoin user and does not require any hash power. This is because the difference in behavior can be triggered by a \"standard\" Bitcoin transaction, that is a transaction which gets relayed through the P2P network before it gets included in a Bitcoin block. `removeOpcodeByData(script []byte, dataToRemove []byte)` removes any data pushes from `script` that contain `dataToRemove`. However, `FindAndDelete` only removes exact matches. So for example, with `script = \"<data> <data||foo>\"` and `dataToRemove = \"data\"` btcd will remove both data pushes but Bitcoin Core's `FindAndDelete` only removes the first `<data>` push. This has been patched in btcd version v0.24.2. Users are advised to upgrade. There are no known workarounds for this issue."
},
{
"lang": "es",
"value": "btcd es una implementaci\u00f3n alternativa de nodo completo de bitcoin escrita en Go (golang). El cliente de Bitcoin btcd (versiones 0.10 a 0.24) no volvi\u00f3 a implementar correctamente la funcionalidad \"FindAndDelete()\" de Bitcoin Core. Esta l\u00f3gica es cr\u00edtica para el consenso: la diferencia de comportamiento con los otros clientes de Bitcoin puede llevar a que los clientes de btcd acepten un bloque de Bitcoin no v\u00e1lido (o rechacen uno v\u00e1lido). Esta falla de consenso se puede aprovechar para causar una divisi\u00f3n de la cadena (aceptando un bloque de Bitcoin no v\u00e1lido) o se puede explotar para atacar los nodos de btcd (rechazando un bloque de Bitcoin v\u00e1lido). Un atacante puede crear una transacci\u00f3n est\u00e1ndar donde FindAndDelete no devuelva una coincidencia pero removeOpCodeByData s\u00ed, lo que hace que btcd obtenga un signo diferente, lo que lleva a una divisi\u00f3n de la cadena. Es importante destacar que esta vulnerabilidad puede ser explotada de forma remota por cualquier usuario de Bitcoin y no requiere ning\u00fan poder de hash. Esto se debe a que la diferencia en el comportamiento puede ser provocada por una transacci\u00f3n \"est\u00e1ndar\" de Bitcoin, es decir, una transacci\u00f3n que se retransmite a trav\u00e9s de la red P2P antes de que se incluya en un bloque de Bitcoin. `removeOpcodeByData(script []byte, dataToRemove []byte)` elimina cualquier env\u00edo de datos de `script` que contenga `dataToRemove`. Sin embargo, `FindAndDelete` solo elimina las coincidencias exactas. Entonces, por ejemplo, con `script = \" \"` y `dataToRemove = \"data\"` btcd eliminar\u00e1 ambos env\u00edos de datos, pero `FindAndDelete` de Bitcoin Core solo elimina el primer env\u00edo ``. Esto se ha corregido en la versi\u00f3n v0.24.2 de btcd. Se recomienda a los usuarios que actualicen. No hay workarounds para este problema."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38862",
"sourceIdentifier": "security@checkmk.com",
"published": "2024-10-14T08:15:02.563",
"lastModified": "2024-10-14T08:15:02.563",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p18, <2.2.0p35, <2.1.0p48 and <=2.0.0p39 (EOL) causes SNMP and IMPI secrets of host and folder properties to be written to audit log files accessible to administrators."
},
{
"lang": "es",
"value": "La inserci\u00f3n de informaci\u00f3n confidencial en el archivo de registro en las versiones de Checkmk de Checkmk GmbH &lt;2.3.0p18, &lt;2.2.0p35, &lt;2.1.0p48 y &lt;=2.0.0p39 (EOL) hace que los secretos SNMP e IMPI de las propiedades del host y de la carpeta se escriban en archivos de registro de auditor\u00eda accesibles para los administradores."
}
],
"metrics": {
@ -51,8 +55,8 @@
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
"baseScore": 2.0,
"baseSeverity": "LOW"
}
}
]

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38863",
"sourceIdentifier": "security@checkmk.com",
"published": "2024-10-14T08:15:02.823",
"lastModified": "2024-10-14T08:15:02.823",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Exposure of CSRF tokens in query parameters on specific requests in Checkmk GmbH's Checkmk versions <2.3.0p18, <2.2.0p35 and <2.1.0p48 could lead to a leak of the token to facilitate targeted phishing attacks."
},
{
"lang": "es",
"value": "La exposici\u00f3n de tokens CSRF en par\u00e1metros de consulta en solicitudes espec\u00edficas en las versiones de Checkmk de Checkmk GmbH &lt;2.3.0p18, &lt;2.2.0p35 y &lt;2.1.0p48 podr\u00eda provocar una fuga del token para facilitar ataques de phishing dirigidos."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-39526",
"sourceIdentifier": "sirt@juniper.net",
"published": "2024-10-11T16:15:06.440",
"lastModified": "2024-10-11T16:15:06.440",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series with MPC10/MPC11/LC9600 line cards, EX9200 with EX9200-15C lines cards, MX304 devices, and Juniper Networks Junos OS Evolved on PTX Series, allows an attacker sending malformed DHCP packets to cause ingress packet processing to stop, leading to a Denial of Service (DoS).\u00a0 Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition.\n\nThis issue only occurs if DHCP snooping is enabled. See configuration below.\n\nThis issue can be detected using following commands. Their output will display the interface status going down:\n\n\nuser@device>show interfaces <if--x/x/x>\nuser@device>show log messages | match <if--x/x/x>\nuser@device>show log messages ==> will display the \"[Error] Wedge-Detect : Host Loopback Wedge Detected: PFE: no,\" logs.\n\nThis issue affects:\nJunos OS on \n\nMX Series \n\nwith MPC10/MPC11/LC9600 line cards, EX9200 with EX9200-15C line cards, and MX304: \n\n\n * All versions before 21.2R3-S7, \n * from 21.4 before 21.4R3-S6, \n * from 22.2 before 22.2R3-S3, \n * all versions of 22.3,\n * from 22.4 before 22.4R3, \n * from 23.2 before 23.2R2; \n\n\n\nJunos OS Evolved on PTX Series: \n * from 19.3R1-EVO before 21.2R3-S8-EVO,\n\n * from 21.4-EVO before 21.4R3-S7-EVO, \n * from 22.1-EVO before 22.1R3-S6-EVO, \n * from 22.2-EVO before 22.2R3-S5-EVO, \n * from 22.3-EVO before 22.3R3-S3-EVO, \n * from 22.4-EVO before 22.4R3-S1-EVO, \n * from 23.2-EVO before 23.2R2-S2-EVO, \n * from 23.4-EVO before 23.4R2-EVO.\n\n\n\nJunos OS Evolved releases prior to 19.3R1-EVO are unaffected by this vulnerability"
},
{
"lang": "es",
"value": "Una vulnerabilidad de manejo inadecuado de condiciones excepcionales en el procesamiento de paquetes de Juniper Networks Junos OS en MX Series con tarjetas de l\u00ednea MPC10/MPC11/LC9600, EX9200 con tarjetas de l\u00ednea EX9200-15C, dispositivos MX304 y Juniper Networks Junos OS Evolved en PTX Series, permite que un atacante que env\u00ede paquetes DHCP malformados haga que se detenga el procesamiento de paquetes de entrada, lo que genera una denegaci\u00f3n de servicio (DoS). La recepci\u00f3n y el procesamiento continuos de estos paquetes crear\u00e1n una condici\u00f3n de denegaci\u00f3n de servicio (DoS) sostenida. Este problema solo ocurre si est\u00e1 habilitado el espionaje de DHCP. Consulte la configuraci\u00f3n a continuaci\u00f3n. Este problema se puede detectar con los siguientes comandos. Su salida mostrar\u00e1 el estado de la interfaz que se est\u00e1 desconectando: user@device&gt;show interfaces user@device&gt;show log messages | match user@device&gt;show log messages ==&gt; mostrar\u00e1 los registros \"[Error] Wedge-Detect : Host Loopback Wedge Detected: PFE: no\". Este problema afecta a: Junos OS en la serie MX con tarjetas de l\u00ednea MPC10/MPC11/LC9600, EX9200 con tarjetas de l\u00ednea EX9200-15C y MX304: * Todas las versiones anteriores a 21.2R3-S7, * desde 21.4 hasta 21.4R3-S6, * desde 22.2 hasta 22.2R3-S3, * todas las versiones de 22.3, * desde 22.4 hasta 22.4R3, * desde 23.2 hasta 23.2R2; Junos OS Evolved en la serie PTX: * desde 19.3R1-EVO hasta 21.2R3-S8-EVO, * desde 21.4-EVO hasta 21.4R3-S7-EVO, * desde 22.1-EVO hasta 22.1R3-S6-EVO, * desde 22.2-EVO hasta 22.2R3-S5-EVO, * desde 22.3-EVO hasta 22.3R3-S3-EVO, * desde 22.4-EVO hasta 22.4R3-S1-EVO, * desde 23.2-EVO hasta 23.2R2-S2-EVO, * desde 23.4-EVO hasta 23.4R2-EVO. Las versiones de Junos OS Evolved anteriores a 19.3R1-EVO no se ven afectadas por esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-39527",
"sourceIdentifier": "sirt@juniper.net",
"published": "2024-10-11T16:15:06.707",
"lastModified": "2024-10-11T16:15:06.707",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An\u00a0Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the command-line interface (CLI) of Juniper Networks Junos OS on SRX Series devices allows a local, low-privileged user with access to the Junos CLI to view the contents of protected files on the file system.\n\nThrough the execution of crafted CLI commands, a user with limited permissions (e.g., a low privilege login class user) can access protected files that should not be accessible to the user. These files may contain sensitive information that can be used to cause further impact to the system.\n\nThis issue affects Junos OS on SRX Series:\u00a0\n\n\n\n * All versions before\u00a021.4R3-S8,\u00a0\n * 22.2 before 22.2R3-S5,\u00a0\n * 22.3 before 22.3R3-S4,\u00a0\n * 22.4 before 22.4R3-S4,\u00a0\n * 23.2 before 23.2R2-S2,\u00a0\n * 23.4 before 23.4R2."
},
{
"lang": "es",
"value": "Una vulnerabilidad de exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en la interfaz de l\u00ednea de comandos (CLI) de Juniper Networks Junos OS en dispositivos de la serie SRX permite que un usuario local con pocos privilegios y acceso a la CLI de Junos vea el contenido de archivos protegidos en el sistema de archivos. Mediante la ejecuci\u00f3n de comandos CLI dise\u00f1ados, un usuario con permisos limitados (por ejemplo, un usuario de clase de inicio de sesi\u00f3n con pocos privilegios) puede acceder a archivos protegidos a los que no deber\u00eda tener acceso. Estos archivos pueden contener informaci\u00f3n confidencial que se puede utilizar para causar un mayor impacto en el sistema. Este problema afecta a Junos OS en la serie SRX: * Todas las versiones anteriores a 21.4R3-S8, * 22.2 anteriores a 22.2R3-S5, * 22.3 anteriores a 22.3R3-S4, * 22.4 anteriores a 22.4R3-S4, * 23.2 anteriores a 23.2R2-S2, * 23.4 anteriores a 23.4R2."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-39534",
"sourceIdentifier": "sirt@juniper.net",
"published": "2024-10-11T16:15:06.970",
"lastModified": "2024-10-11T16:15:06.970",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An\u00a0Incorrect Comparison vulnerability in the local address verification API of Juniper Networks Junos OS Evolved allows an unauthenticated network-adjacent attacker to create sessions or send traffic to the device using the network and broadcast address of the subnet assigned to an interface. This is unintended and unexpected behavior and can allow an attacker to bypass certain compensating controls, such as stateless firewall filters.\n\nThis issue affects Junos OS Evolved:\u00a0\n\n\n\n * All versions before 21.4R3-S8-EVO,\u00a0\n * 22.2-EVO before 22.2R3-S4-EVO,\u00a0\n * 22.3-EVO before 22.3R3-S4-EVO,\u00a0\n * 22.4-EVO before 22.4R3-S3-EVO,\u00a0\n * 23.2-EVO before 23.2R2-S1-EVO,\u00a0\n * 23.4-EVO before 23.4R1-S2-EVO, 23.4R2-EVO."
},
{
"lang": "es",
"value": "Una vulnerabilidad de comparaci\u00f3n incorrecta en la API de verificaci\u00f3n de direcci\u00f3n local de Juniper Networks Junos OS Evolved permite que un atacante no autenticado adyacente a la red cree sesiones o env\u00ede tr\u00e1fico al dispositivo utilizando la direcci\u00f3n de red y de difusi\u00f3n de la subred asignada a una interfaz. Este es un comportamiento no deseado e inesperado y puede permitir que un atacante eluda ciertos controles de compensaci\u00f3n, como filtros de firewall sin estado. Este problema afecta a Junos OS Evolved: * Todas las versiones anteriores a 21.4R3-S8-EVO, * 22.2-EVO anteriores a 22.2R3-S4-EVO, * 22.3-EVO anteriores a 22.3R3-S4-EVO, * 22.4-EVO anteriores a 22.4R3-S3-EVO, * 23.2-EVO anteriores a 23.2R2-S1-EVO, * 23.4-EVO anteriores a 23.4R1-S2-EVO, 23.4R2-EVO."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-39544",
"sourceIdentifier": "sirt@juniper.net",
"published": "2024-10-11T16:15:07.240",
"lastModified": "2024-10-11T16:15:07.240",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An\u00a0Incorrect Default Permissions vulnerability in the command line interface (CLI) of Juniper Networks Junos OS Evolved allows a low privileged local attacker to view NETCONF traceoptions files, representing an exposure of sensitive information.\n\n\n\nOn all Junos OS Evolved platforms, when NETCONF traceoptions are configured, NETCONF traceoptions files get created with an incorrect group permission, which allows \n\na low-privileged user can access sensitive information compromising the confidentiality of the system.\n\n\n\nJunos OS Evolved:\u00a0\n\n\n\n\n * All versions before 20.4R3-S9-EVO,\u00a0\n * 21.2-EVO before 21.2R3-S7-EVO,\u00a0\n * 21.4-EVO before 21.4R3-S5-EVO,\u00a0\n * 22.1-EVO before 22.1R3-S5-EVO,\u00a0\n * 22.2-EVO before 22.2R3-S3-EVO,\u00a0\n * 22.3-EVO before 22.3R3-EVO, 22.3R3-S2-EVO,\u00a0\n * 22.4-EVO before 22.4R3-EVO,\u00a0\n * 23.2-EVO before 23.2R1-S2-EVO, 23.2R2-EVO."
},
{
"lang": "es",
"value": "Una vulnerabilidad de permisos predeterminados incorrectos en la interfaz de l\u00ednea de comandos (CLI) de Juniper Networks Junos OS Evolved permite que un atacante local con pocos privilegios vea los archivos traceoptions de NETCONF, lo que representa una exposici\u00f3n de informaci\u00f3n confidencial. En todas las plataformas Junos OS Evolved, cuando se configuran los archivos traceoptions de NETCONF, se crean archivos traceoptions de NETCONF con un permiso de grupo incorrecto, lo que permite que un usuario con pocos privilegios pueda acceder a informaci\u00f3n confidencial y comprometer la confidencialidad del sistema. Junos OS Evolved: * Todas las versiones anteriores a 20.4R3-S9-EVO, * 21.2-EVO anterior a 21.2R3-S7-EVO, * 21.4-EVO anterior a 21.4R3-S5-EVO, * 22.1-EVO anterior a 22.1R3-S5-EVO, * 22.2-EVO anterior a 22.2R3-S3-EVO, * 22.3-EVO anterior a 22.3R3-EVO, 22.3R3-S2-EVO, * 22.4-EVO anterior a 22.4R3-EVO, * 23.2-EVO anterior a 23.2R1-S2-EVO, 23.2R2-EVO."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-39547",
"sourceIdentifier": "sirt@juniper.net",
"published": "2024-10-11T16:15:07.483",
"lastModified": "2024-10-11T16:15:07.483",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An\u00a0Improper Handling of Exceptional Conditions vulnerability in the rpd-server of Juniper Networks Junos OS and Junos OS Evolved within cRPD allows an unauthenticated network-based attacker sending crafted TCP traffic to the routing engine (RE) to cause a CPU-based Denial of Service (DoS).\n\nIf specially crafted TCP traffic is received by the control plane, or a TCP session terminates unexpectedly, it will cause increased control plane CPU utilization by the rpd-server process.\n\nWhile not explicitly required, the impact is more severe when RIB sharding is enabled.\n\nTask accounting shows unexpected reads by the RPD Server jobs for shards:\n\nuser@junos> show task accounting detail\n...\nread:RPD Server.0.0.0.0+780.192.168.0.78+48886 TOT:00000003.00379787 MAX:00000000.00080516 RUNS: 233888\\\nread:RPD Server.0.0.0.0+780.192.168.0.78+49144 TOT:00000004.00007565 MAX:00000000.00080360 RUNS: 233888\\\nread:RPD Server.0.0.0.0+780.192.168.0.78+49694 TOT:00000003.00600584 MAX:00000000.00080463 RUNS: 233888\\\nread:RPD Server.0.0.0.0+780.192.168.0.78+50246 TOT:00000004.00346998 MAX:00000000.00080338 RUNS: 233888\\\n\n\n\nThis issue affects:\n\nJunos OS with cRPD:\u00a0\n\n * All versions before 21.2R3-S8,\u00a0\n * 21.4 before 21.4R3-S7,\u00a0\n * 22.1 before 22.1R3-S6,\u00a0\n * 22.2 before 22.2R3-S4,\u00a0\n * 22.3 before 22.3R3-S3,\u00a0\n * 22.4 before 22.4R3-S2,\u00a0\n * 23.2 before 23.2R2-S2,\u00a0\n * 24.2 before 24.2R2;\u00a0\n\n\nJunos OS Evolved with cRPD:\u00a0\n\n * All versions before 21.4R3-S7-EVO,\u00a0\n * 22.2 before 22.2R3-S4-EVO,\u00a0\n * 22.3 before 22.3R3-S3-EVO,\u00a0\n * 22.4 before 22.4R3-S2-EVO,\u00a0\n * 23.2 before 23.2R2-EVO."
},
{
"lang": "es",
"value": "Una vulnerabilidad de manejo inadecuado de condiciones excepcionales en el servidor rpd de Juniper Networks Junos OS y Junos OS Evolved dentro de cRPD permite que un atacante no autenticado basado en la red env\u00ede tr\u00e1fico TCP manipulado al motor de enrutamiento (RE) para provocar una denegaci\u00f3n de servicio (DoS) basada en la CPU. Si el plano de control recibe tr\u00e1fico TCP especialmente manipulado o una sesi\u00f3n TCP finaliza inesperadamente, esto provocar\u00e1 un aumento en la utilizaci\u00f3n de la CPU del plano de control por parte del proceso rpd-server. Si bien no se requiere expl\u00edcitamente, el impacto es m\u00e1s grave cuando se habilita la fragmentaci\u00f3n RIB. La contabilidad de tareas muestra lecturas inesperadas de los trabajos del servidor RPD para los fragmentos: user@junos&gt; show task accounting detail ... read:RPD Server.0.0.0.0+780.192.168.0.78+48886 TOT:00000003.00379787 MAX:00000000.00080516 RUNS: 233888\\ read:RPD Server.0.0.0.0+780.192.168.0.78+49144 TOT:00000004.00007565 MAX:00000000.00080360 RUNS: 233888\\ read:RPD Server.0.0.0.0+780.192.168.0.78+49694 TOT:00000003.00600584 MAX:00000000.00080463 EJECUCIONES: 233888\\ lectura:RPD Server.0.0.0.0+780.192.168.0.78+50246 TOT:00000004.00346998 MAX:00000000.00080338 EJECUCIONES: 233888\\ Este problema afecta a: Junos OS con cRPD: * Todas las versiones anteriores a 21.2R3-S8, * 21.4 anteriores a 21.4R3-S7, * 22.1 anteriores a 22.1R3-S6, * 22.2 anteriores a 22.2R3-S4, * 22.3 anteriores a 22.3R3-S3, * 22.4 anteriores a 22.4R3-S2, * 23.2 antes de 23.2R2-S2, * 24.2 antes de 24.2R2; Junos OS evolucionado con cRPD: * Todas las versiones anteriores a 21.4R3-S7-EVO, * 22.2 antes de 22.2R3-S4-EVO, * 22.3 antes de 22.3R3-S3-EVO, * 22.4 antes de 22.4R3-S2-EVO, * 23.2 antes de 23.2R2-EVO."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-39563",
"sourceIdentifier": "sirt@juniper.net",
"published": "2024-10-11T16:15:07.740",
"lastModified": "2024-10-11T16:15:07.740",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Command Injection\u00a0vulnerability in Juniper Networks Junos Space allows an unauthenticated, network-based attacker sending a specially crafted request\u00a0to execute arbitrary shell commands on the Junos Space Appliance, leading to\u00a0remote command execution by the web application, gaining complete control of the device.\n\nA specific script in the Junos Space web application allows attacker-controlled input from a GET request without sufficient input sanitization. A specially crafted request can exploit this vulnerability to execute arbitrary shell commands on the Junos Space Appliance.\n\nThis issue affects Junos Space 24.1R1. Previous versions of Junos Space are unaffected by this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inyecci\u00f3n de comandos en Juniper Networks Junos Space permite que un atacante no autenticado basado en la red env\u00ede una solicitud especialmente dise\u00f1ada para ejecutar comandos de shell arbitrarios en el dispositivo Junos Space, lo que lleva a la ejecuci\u00f3n remota de comandos por parte de la aplicaci\u00f3n web, obteniendo as\u00ed el control total del dispositivo. Un script espec\u00edfico en la aplicaci\u00f3n web Junos Space permite la entrada controlada por el atacante desde una solicitud GET sin una desinfecci\u00f3n de entrada suficiente. Una solicitud especialmente dise\u00f1ada puede explotar esta vulnerabilidad para ejecutar comandos de shell arbitrarios en el dispositivo Junos Space. Este problema afecta a Junos Space 24.1R1. Las versiones anteriores de Junos Space no se ven afectadas por esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-4089",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-10-11T16:15:13.633",
"lastModified": "2024-10-11T16:15:13.633",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A DLL hijack vulnerability was reported in Lenovo Super File that could allow a local attacker to execute code with elevated privileges."
},
{
"lang": "es",
"value": "Se inform\u00f3 de una vulnerabilidad de secuestro de DLL en Lenovo Super File que podr\u00eda permitir a un atacante local ejecutar c\u00f3digo con privilegios elevados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-41997",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T16:15:03.640",
"lastModified": "2024-10-14T16:15:03.640",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in version of Warp Terminal prior to 2024.07.18 (v0.2024.07.16.08.02). A command injection vulnerability exists in the Docker integration functionality. An attacker can create a specially crafted hyperlink using the `warp://action/docker/open_subshell` intent that when clicked by the victim results in command execution on the victim's machine."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en la versi\u00f3n de Warp Terminal anterior a 2024.07.18 (v0.2024.07.16.08.02). Existe una vulnerabilidad de inyecci\u00f3n de comandos en la funcionalidad de integraci\u00f3n de Docker. Un atacante puede crear un hiperv\u00ednculo especialmente manipulado utilizando la intenci\u00f3n `warp://action/docker/open_subshell` que, cuando la v\u00edctima hace clic en \u00e9l, da como resultado la ejecuci\u00f3n del comando en la m\u00e1quina de la v\u00edctima."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-4130",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-10-11T16:15:13.840",
"lastModified": "2024-10-11T16:15:13.840",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A DLL hijack vulnerability was reported in Lenovo App Store that could allow a local attacker to execute code with elevated privileges."
},
{
"lang": "es",
"value": "Se inform\u00f3 de una vulnerabilidad de secuestro de DLL en Lenovo App Store que podr\u00eda permitir que un atacante local ejecute c\u00f3digo con privilegios elevados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-4131",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-10-11T16:15:14.050",
"lastModified": "2024-10-11T16:15:14.050",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A DLL hijack vulnerability was reported in Lenovo Emulator that could allow a local attacker to execute code with elevated privileges."
},
{
"lang": "es",
"value": "Se inform\u00f3 de una vulnerabilidad de secuestro de DLL en Lenovo Emulator que podr\u00eda permitir que un atacante local ejecute c\u00f3digo con privilegios elevados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-4132",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-10-11T16:15:14.243",
"lastModified": "2024-10-11T16:15:14.243",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A DLL hijack vulnerability was reported in Lenovo Lock Screen that could allow a local attacker to execute code with elevated privileges."
},
{
"lang": "es",
"value": "Se inform\u00f3 de una vulnerabilidad de secuestro de DLL en Lenovo Lock Screen que podr\u00eda permitir que un atacante local ejecute c\u00f3digo con privilegios elevados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-42018",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T17:15:03.573",
"lastModified": "2024-10-11T17:15:03.573",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Atos Eviden SMC xScale before 1.6.6. During initialization of nodes, some configuration parameters are retrieved from management nodes. These parameters embed credentials whose integrity and confidentiality may be important to the security of the HPC configuration. Because these parameters are needed for initialization, there is no available mechanism to ensure access control on the management node, and a mitigation measure is normally put in place to prevent access to unprivileged users. It was discovered that this mitigation measure does not survive a reboot of diskful nodes. (Diskless nodes are not at risk.) The mistake lies in the cloudinit configuration: the iptables configuration should have been in the bootcmd instead of the runcmd section."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en Atos Eviden SMC xScale antes de la versi\u00f3n 1.6.6. Durante la inicializaci\u00f3n de los nodos, se recuperan algunos par\u00e1metros de configuraci\u00f3n de los nodos de administraci\u00f3n. Estos par\u00e1metros incorporan credenciales cuya integridad y confidencialidad pueden ser importantes para la seguridad de la configuraci\u00f3n de HPC. Debido a que estos par\u00e1metros son necesarios para la inicializaci\u00f3n, no hay ning\u00fan mecanismo disponible para garantizar el control de acceso en el nodo de administraci\u00f3n y normalmente se implementa una medida de mitigaci\u00f3n para evitar el acceso a usuarios sin privilegios. Se descubri\u00f3 que esta medida de mitigaci\u00f3n no sobrevive al reinicio de nodos con disco lleno. (Los nodos sin disco no corren riesgo). El error se encuentra en la configuraci\u00f3n de cloudinit: la configuraci\u00f3n de iptables deber\u00eda haber estado en la secci\u00f3n bootcmd en lugar de la secci\u00f3n runcmd."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42640",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T16:15:08.040",
"lastModified": "2024-10-11T16:15:08.040",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
@ -16,6 +16,10 @@
{
"lang": "en",
"value": "angular-base64-upload prior to v0.1.21 is vulnerable to unauthenticated remote code execution via demo/server.php. Exploiting this vulnerability allows an attacker to upload arbitrary content to the server, which can subsequently be accessed through demo/uploads. This leads to the execution of previously uploaded content and enables the attacker to achieve code execution on the server. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
},
{
"lang": "es",
"value": "Las versiones angular-base64-upload anteriores a v0.1.21 son vulnerables a la ejecuci\u00f3n remota de c\u00f3digo no autenticado a trav\u00e9s de demo/server.php. Aprovechar esta vulnerabilidad permite a un atacante cargar contenido arbitrario al servidor, al que posteriormente se puede acceder a trav\u00e9s de demo/uploads. Esto lleva a la ejecuci\u00f3n de contenido cargado previamente y permite al atacante ejecutar c\u00f3digo en el servidor. NOTA: Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-43701",
"sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
"published": "2024-10-14T09:15:04.157",
"lastModified": "2024-10-14T09:15:04.157",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Software installed and run as a non-privileged user may conduct GPU system calls to read and write freed physical memory from the GPU."
},
{
"lang": "es",
"value": "El software instalado y ejecutado como un usuario sin privilegios puede realizar llamadas al sistema de GPU para leer y escribir la memoria f\u00edsica liberada de la GPU."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-44157",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-10-11T18:15:08.030",
"lastModified": "2024-10-11T18:15:08.030",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A stack buffer overflow was addressed through improved input validation. This issue is fixed in Apple TV 1.5.0.152 for Windows, iTunes 12.13.3 for Windows. Parsing a maliciously crafted video file may lead to unexpected system termination."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un desbordamiento del b\u00fafer de pila mediante una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en Apple TV 1.5.0.152 para Windows y iTunes 12.13.3 para Windows. El an\u00e1lisis de un archivo de video manipulado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada del sistema."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-44413",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T17:15:03.790",
"lastModified": "2024-10-11T17:15:03.790",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in DI_8200-16.07.26A1, which has been classified as critical. This issue affects the upgrade_filter_asp function in the upgrade_filter.asp file. Manipulation of the path parameter can lead to command injection."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad en DI_8200-16.07.26A1, que se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n upgrade_filter_asp en el archivo upgrade_filter.asp. La manipulaci\u00f3n del par\u00e1metro path puede provocar la inyecci\u00f3n de comandos."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-44414",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T17:15:03.880",
"lastModified": "2024-10-11T21:36:31.953",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in FBM_292W-21.03.10V, which has been classified as critical. This issue affects the sub_4901E0 function in the msp_info.htm file. Manipulation of the path parameter can lead to command injection."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad en FBM_292W-21.03.10V, que se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n sub_4901E0 en el archivo msp_info.htm. La manipulaci\u00f3n del par\u00e1metro path puede provocar la inyecci\u00f3n de comandos."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-44415",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T17:15:03.967",
"lastModified": "2024-10-11T17:15:03.967",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in DI_8200-16.07.26A1, There is a buffer overflow in the dbsrv_asp function; The strcpy function is executed without checking the length of the string, leading to a buffer overflow."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad en DI_8200-16.07.26A1, hay un desbordamiento de b\u00fafer en la funci\u00f3n dbsrv_asp; la funci\u00f3n strcpy se ejecuta sin verificar la longitud de la cadena, lo que genera un desbordamiento de b\u00fafer."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-44729",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T16:15:08.150",
"lastModified": "2024-10-11T16:15:08.150",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in the component app/src/server.js of Mirotalk before commit 9de226 allows unauthenticated attackers without presenter privileges to arbitrarily eject users from a meeting."
},
{
"lang": "es",
"value": "Un control de acceso incorrecto en el componente app/src/server.js de Mirotalk antes de el commit 9de226 permite que atacantes no autenticados sin privilegios de presentador expulsen arbitrariamente a los usuarios de una reuni\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-44730",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T16:15:08.250",
"lastModified": "2024-10-11T16:15:08.250",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in the function handleDataChannelChat(dataMessage) of Mirotalk before commit c21d58 allows attackers to forge chat messages using an arbitrary sender name."
},
{
"lang": "es",
"value": "Un control de acceso incorrecto en la funci\u00f3n handleDataChannelChat(dataMessage) de Mirotalk antes de el commit c21d58 permite a los atacantes falsificar mensajes de chat utilizando un nombre de remitente arbitrario."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-44731",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T17:15:04.080",
"lastModified": "2024-10-11T17:15:04.080",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mirotalk before commit 9de226 was discovered to contain a DOM-based cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary code via sending crafted payloads in messages to other users over RTC connections."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Mirotalk antes de el commit 9de226 conten\u00eda una vulnerabilidad de cross-site scripting (XSS) basada en DOM que permite a los atacantes ejecutar c\u00f3digo arbitrario mediante el env\u00edo de payloads malipulados en mensajes a otros usuarios mediante conexiones RTC."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-44734",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T17:15:04.157",
"lastModified": "2024-10-11T17:15:04.157",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in Mirotalk before commit 9de226 allows attackers to arbitrarily change usernames via sending a crafted roomAction request to the server."
},
{
"lang": "es",
"value": "Un control de acceso incorrecto en Mirotalk antes de el commit 9de226 permite a los atacantes cambiar arbitrariamente los nombres de usuario mediante el env\u00edo de una solicitud roomAction manipulada espec\u00edficamente para el servidor."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-44807",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T18:15:08.133",
"lastModified": "2024-10-11T18:15:08.133",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A directory listing issue in the baserCMS plugin in D-ZERO CO., LTD. BurgerEditor and BurgerEditor Limited Edition before 2.25.1 allows remote attackers to obtain sensitive information by exposing a list of the uploaded files."
},
{
"lang": "es",
"value": "Un problema de listado de directorios en el complemento baserCMS en D-ZERO CO., LTD. BurgerEditor y BurgerEditor Limited Edition anteriores a la versi\u00f3n 2.25.1 permite a atacantes remotos obtener informaci\u00f3n confidencial al exponer una lista de los archivos cargados."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45184",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T21:15:06.947",
"lastModified": "2024-10-11T21:15:06.947",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modems with chipset Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, Modem 5123, and Modem 5300. A USAT out-of-bounds write due to a heap buffer overflow can lead to a Denial of Service."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en Samsung Mobile Processor, Wearable Processor, and Modems with chipset 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, m\u00f3dem 5123 y Modem 5300. Una escritura fuera de los l\u00edmites de USAT debido a un desbordamiento del b\u00fafer del mont\u00f3n puede provocar una denegaci\u00f3n de servicio."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45271",
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-10-15T11:15:11.420",
"lastModified": "2024-10-15T11:15:11.420",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated local attacker can gain admin privileges by deploying a config file due to improper input validation."
},
{
"lang": "es",
"value": "Un atacante local no autenticado puede obtener privilegios de administrador al implementar un archivo de configuraci\u00f3n debido a una validaci\u00f3n de entrada incorrecta."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45272",
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-10-15T11:15:11.673",
"lastModified": "2024-10-15T11:15:11.673",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost."
},
{
"lang": "es",
"value": "Un atacante remoto no autenticado puede realizar un ataque de fuerza bruta a las credenciales del portal de servicio remoto con una alta probabilidad de \u00e9xito, lo que da como resultado la p\u00e9rdida de la conexi\u00f3n."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45273",
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-10-15T11:15:11.940",
"lastModified": "2024-10-15T11:15:11.940",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used."
},
{
"lang": "es",
"value": "Un atacante local no autenticado puede descifrar el archivo de configuraci\u00f3n del dispositivo y, por lo tanto, comprometer el dispositivo debido a una implementaci\u00f3n d\u00e9bil del cifrado utilizado."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45274",
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-10-15T11:15:12.247",
"lastModified": "2024-10-15T11:15:12.247",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated remote attacker can execute OS commands via UDP on the device due to missing authentication."
},
{
"lang": "es",
"value": "Un atacante remoto no autenticado puede ejecutar comandos del sistema operativo a trav\u00e9s de UDP en el dispositivo debido a la falta de autenticaci\u00f3n."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45275",
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-10-15T11:15:12.487",
"lastModified": "2024-10-15T11:15:12.487",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The devices contain two hard coded user accounts with hardcoded passwords that allow an unauthenticated remote attacker for full control of the affected devices."
},
{
"lang": "es",
"value": "Los dispositivos contienen dos cuentas de usuario codificadas con contrase\u00f1as codificadas que permiten a un atacante remoto no autenticado tener control total de los dispositivos afectados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45276",
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-10-15T11:15:12.760",
"lastModified": "2024-10-15T11:15:12.760",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated remote attacker can get read access to files in the \"/tmp\" directory due to missing authentication."
},
{
"lang": "es",
"value": "Un atacante remoto no autenticado puede obtener acceso de lectura a los archivos en el directorio \"/tmp\" debido a la falta de autenticaci\u00f3n."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45315",
"sourceIdentifier": "PSIRT@sonicwall.com",
"published": "2024-10-11T13:15:15.883",
"lastModified": "2024-10-11T13:15:15.883",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Improper link resolution before file access ('Link Following') vulnerability in SonicWall Connect Tunnel (version 12.4.3.271 and earlier of Windows client) allows users with standard privileges to create arbitrary folders and files, potentially leading to local Denial of Service (DoS) attack."
},
{
"lang": "es",
"value": "La vulnerabilidad de resoluci\u00f3n de enlace incorrecta antes del acceso al archivo ('Seguimiento de enlace') en SonicWall Connect Tunnel (versi\u00f3n 12.4.3.271 y anteriores del cliente de Windows) permite a los usuarios con privilegios est\u00e1ndar crear carpetas y archivos arbitrarios, lo que potencialmente conduce a un ataque de denegaci\u00f3n de servicio (DoS) local."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45316",
"sourceIdentifier": "PSIRT@sonicwall.com",
"published": "2024-10-11T13:15:16.010",
"lastModified": "2024-10-11T21:36:32.947",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Improper link resolution before file access ('Link Following') vulnerability in SonicWall Connect Tunnel (version 12.4.3.271 and earlier of Windows client) allows users with standard privileges to delete arbitrary folders and files, potentially leading to local privilege escalation attack."
},
{
"lang": "es",
"value": "La vulnerabilidad de resoluci\u00f3n de enlace incorrecta antes del acceso al archivo ('Seguimiento de enlace') en SonicWall Connect Tunnel (versi\u00f3n 12.4.3.271 y anteriores del cliente de Windows) permite a los usuarios con privilegios est\u00e1ndar eliminar carpetas y archivos arbitrarios, lo que potencialmente conduce a un ataque de escalada de privilegios locales."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45317",
"sourceIdentifier": "PSIRT@sonicwall.com",
"published": "2024-10-11T13:15:16.103",
"lastModified": "2024-10-11T13:15:16.103",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Server-Side Request Forgery (SSRF) vulnerability in SMA1000 appliance firmware versions 12.4.3-02676 and earlier allows a remote, unauthenticated attacker to cause the SMA1000 server-side application to make requests to an unintended IP address."
},
{
"lang": "es",
"value": "Una vulnerabilidad de Server-Side Request Forgery (SSRF) en las versiones de firmware 12.4.3-02676 y anteriores del dispositivo SMA1000 permite que un atacante remoto no autenticado haga que la aplicaci\u00f3n del lado del servidor SMA1000 realice solicitudes a una direcci\u00f3n IP no deseada."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45396",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-11T15:15:04.457",
"lastModified": "2024-10-11T15:15:04.457",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Quicly is an IETF QUIC protocol implementation. Quicly up to commtit d720707 is susceptible to a denial-of-service attack. A remote attacker can exploit these bugs to trigger an assertion failure that crashes process using quicly. The vulnerability is addressed with commit 2a95896104901589c495bc41460262e64ffcad5c."
},
{
"lang": "es",
"value": "Quicly es una implementaci\u00f3n del protocolo QUIC de la IETF. Hasta el commit d720707, Quicly es susceptible a un ataque de denegaci\u00f3n de servicio. Un atacante remoto puede aprovechar estos errores para desencadenar un error de aserci\u00f3n que bloquee el proceso que utiliza Quicly. La vulnerabilidad se soluciona con el commit 2a95896104901589c495bc41460262e64ffcad5c."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45397",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-11T15:15:04.690",
"lastModified": "2024-10-11T15:15:04.690",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. When an HTTP request using TLS/1.3 early data on top of TCP Fast Open or QUIC 0-RTT packets is received and the IP-address-based access control is used, the access control does not detect and prohibit HTTP requests conveyed by packets with a spoofed source address. This behavior allows attackers on the network to execute HTTP requests from addresses that are otherwise rejected by the address-based access control. The vulnerability has been addressed in commit 15ed15a. Users may disable the use of TCP FastOpen and QUIC to mitigate the issue."
},
{
"lang": "es",
"value": "h2o es un servidor HTTP compatible con HTTP/1.x, HTTP/2 y HTTP/3. Cuando se recibe una solicitud HTTP que utiliza datos tempranos TLS/1.3 sobre paquetes TCP Fast Open o QUIC 0-RTT y se utiliza el control de acceso basado en direcciones IP, el control de acceso no detecta ni proh\u00edbe las solicitudes HTTP transmitidas por paquetes con una direcci\u00f3n de origen falsificada. Este comportamiento permite a los atacantes de la red ejecutar solicitudes HTTP desde direcciones que, de otro modo, ser\u00edan rechazadas por el control de acceso basado en direcciones. La vulnerabilidad se ha abordado en el commit 15ed15a. Los usuarios pueden desactivar el uso de TCP FastOpen y QUIC para mitigar el problema."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45402",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-11T15:15:04.903",
"lastModified": "2024-10-11T15:15:04.903",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Picotls is a TLS protocol library that allows users select different crypto backends based on their use case. When parsing a spoofed TLS handshake message, picotls (specifically, bindings within picotls that call the crypto libraries) may attempt to free the same memory twice. This double free occurs during the disposal of multiple objects without any intervening calls to malloc Typically, this triggers the malloc implementation to detect the error and abort the process. However, depending on the internals of malloc and the crypto backend being used, the flaw could potentially lead to a use-after-free scenario, which might allow for arbitrary code execution. The vulnerability is addressed with commit 9b88159ce763d680e4a13b6e8f3171ae923a535d."
},
{
"lang": "es",
"value": "Picotls es una librer\u00eda de protocolo TLS que permite a los usuarios seleccionar diferentes backends criptogr\u00e1ficos seg\u00fan su caso de uso. Al analizar un mensaje de protocolo de enlace TLS falsificado, picotls (espec\u00edficamente, los enlaces dentro de picotls que llaman a las librer\u00edas criptogr\u00e1ficas) pueden intentar liberar la misma memoria dos veces. Esta doble liberaci\u00f3n ocurre durante la eliminaci\u00f3n de m\u00faltiples objetos sin ninguna llamada intermedia a malloc. Por lo general, esto activa la implementaci\u00f3n de malloc para detectar el error y abortar el proceso. Sin embargo, dependiendo de los componentes internos de malloc y el backend criptogr\u00e1fico que se use, la falla podr\u00eda potencialmente conducir a un escenario de use-after-free, lo que podr\u00eda permitir la ejecuci\u00f3n de c\u00f3digo arbitrario. La vulnerabilidad se soluciona con el commit 9b88159ce763d680e4a13b6e8f3171ae923a535d."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45403",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-11T15:15:05.123",
"lastModified": "2024-10-11T15:15:05.123",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. When h2o is configured as a reverse proxy and HTTP/3 requests are cancelled by the client, h2o might crash due to an assertion failure. The crash can be exploited by an attacker to mount a Denial-of-Service attack. By default, the h2o standalone server automatically restarts, minimizing the impact. However, HTTP requests that were served concurrently will still be disrupted. The vulnerability has been addressed in commit 1ed32b2. Users may disable the use of HTTP/3 to mitigate the issue."
},
{
"lang": "es",
"value": "h2o es un servidor HTTP compatible con HTTP/1.x, HTTP/2 y HTTP/3. Cuando h2o est\u00e1 configurado como un proxy inverso y el cliente cancela las solicitudes HTTP/3, h2o puede bloquearse debido a un error de aserci\u00f3n. Un atacante puede aprovechar el bloqueo para lanzar un ataque de denegaci\u00f3n de servicio. De forma predeterminada, el servidor independiente h2o se reinicia autom\u00e1ticamente, lo que minimiza el impacto. Sin embargo, las solicitudes HTTP que se atendieron simult\u00e1neamente seguir\u00e1n siendo interrumpidas. La vulnerabilidad se ha solucionado en el commit 1ed32b2. Los usuarios pueden desactivar el uso de HTTP/3 para mitigar el problema."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45731",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:11.177",
"lastModified": "2024-10-14T17:15:11.177",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise for Windows versions below 9.3.1, 9.2.3, and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could write a file to the Windows system root directory, which has a default location in the Windows System32 folder, when Splunk Enterprise for Windows is installed on a separate drive."
},
{
"lang": "es",
"value": "En las versiones de Splunk Enterprise para Windows anteriores a 9.3.1, 9.2.3 y 9.1.6, un usuario con privilegios bajos que no tenga los roles de \"administrador\" o \"poder\" de Splunk podr\u00eda escribir un archivo en el directorio ra\u00edz del sistema de Windows, que tiene una ubicaci\u00f3n predeterminada en la carpeta System32 de Windows, cuando Splunk Enterprise para Windows est\u00e1 instalado en una unidad separada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45732",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:11.410",
"lastModified": "2024-10-14T17:15:11.410",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could run a search as the \"nobody\" Splunk user in the SplunkDeploymentServerConfig app. This could let the low-privileged user access potentially restricted data."
},
{
"lang": "es",
"value": "En las versiones de Splunk Enterprise anteriores a 9.3.1, 9.2.0 y 9.2.3, y en las versiones de Splunk Cloud Platform anteriores a 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 y 9.1.2308.208, un usuario con privilegios bajos que no tenga los roles de Splunk \"admin\" o \"power\" podr\u00eda ejecutar una b\u00fasqueda como el usuario de Splunk \"nobody\" en la aplicaci\u00f3n SplunkDeploymentServerConfig. Esto podr\u00eda permitir que el usuario con privilegios bajos acceda a datos potencialmente restringidos."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45733",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:11.657",
"lastModified": "2024-10-14T17:15:11.657",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could perform a Remote Code Execution (RCE) due to an insecure session storage configuration."
},
{
"lang": "es",
"value": "En las versiones de Splunk Enterprise para Windows anteriores a 9.2.3 y 9.1.6, un usuario con pocos privilegios que no tenga los roles de \"administrador\" o \"poder\" de Splunk podr\u00eda realizar una ejecuci\u00f3n remota de c\u00f3digo (RCE) debido a una configuraci\u00f3n de almacenamiento de sesi\u00f3n insegura."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45734",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:11.850",
"lastModified": "2024-10-14T17:15:11.850",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions 9.3.0, 9.2.3, and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could view images on the machine that runs Splunk Enterprise by using the PDF export feature in Splunk classic dashboards. The images on the machine could be exposed by exporting the dashboard as a PDF, using the local image path in the img tag in the source extensible markup language (XML) code for the Splunk classic dashboard."
},
{
"lang": "es",
"value": "En las versiones 9.3.0, 9.2.3 y 9.1.6 de Splunk Enterprise, un usuario con pocos privilegios que no tenga los roles de \"administrador\" o \"poder\" de Splunk podr\u00eda ver im\u00e1genes en la m\u00e1quina que ejecuta Splunk Enterprise mediante la funci\u00f3n de exportaci\u00f3n a PDF en los paneles cl\u00e1sicos de Splunk. Las im\u00e1genes en la m\u00e1quina podr\u00edan exponerse exportando el panel como PDF, utilizando la ruta de la imagen local en la etiqueta img en el c\u00f3digo fuente del lenguaje de marcado extensible (XML) para el panel cl\u00e1sico de Splunk."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45735",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:12.053",
"lastModified": "2024-10-14T17:15:12.053",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.3 and 9.1.6, and Splunk Secure Gateway versions on Splunk Cloud Platform versions below 3.4.259, 3.6.17, and 3.7.0, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles can see App Key Value Store (KV Store) deployment configuration and public/private keys in the Splunk Secure Gateway App."
},
{
"lang": "es",
"value": "En las versiones de Splunk Enterprise anteriores a 9.2.3 y 9.1.6, y en las versiones de Splunk Secure Gateway en Splunk Cloud Platform anteriores a 3.4.259, 3.6.17 y 3.7.0, un usuario con privilegios bajos que no tenga los roles de \"administrador\" o \"poder\" de Splunk puede ver la configuraci\u00f3n de implementaci\u00f3n del Almac\u00e9n de valores de clave de la aplicaci\u00f3n (Almac\u00e9n KV) y las claves p\u00fablicas/privadas en la aplicaci\u00f3n Splunk Secure Gateway."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45736",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:12.253",
"lastModified": "2024-10-14T17:15:12.253",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.107, 9.1.2312.204, and 9.1.2312.111, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could craft a search query with an improperly formatted \"INGEST_EVAL\" parameter as part of a [Field Transformation](https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Managefieldtransforms) which could crash the Splunk daemon (splunkd)."
},
{
"lang": "es",
"value": "En las versiones de Splunk Enterprise anteriores a 9.3.1, 9.2.3 y 9.1.6 y en las versiones de Splunk Cloud Platform anteriores a 9.2.2403.107, 9.1.2312.204 y 9.1.2312.111, un usuario con privilegios bajos que no tenga los roles de \"administrador\" o \"poder\" de Splunk podr\u00eda crear una consulta de b\u00fasqueda con un par\u00e1metro \"INGEST_EVAL\" con formato incorrecto como parte de una [Transformaci\u00f3n de campo](https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Managefieldtransforms) que podr\u00eda bloquear el daemon de Splunk (splunkd)."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45737",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:12.453",
"lastModified": "2024-10-14T17:15:12.453",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108, and 9.1.2312.204, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could change the maintenance mode state of App Key Value Store (KVStore) through a Cross-Site Request Forgery (CSRF)."
},
{
"lang": "es",
"value": "En las versiones de Splunk Enterprise anteriores a 9.3.1, 9.2.3 y 9.1.6 y en las versiones de Splunk Cloud Platform anteriores a 9.2.2403.108 y 9.1.2312.204, un usuario con privilegios bajos que no tenga los roles de \"administrador\" o \"poder\" de Splunk podr\u00eda cambiar el estado del modo de mantenimiento de App Key Value Store (KVStore) a trav\u00e9s de un Cross-Site Request Forgery (CSRF)."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45738",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:12.660",
"lastModified": "2024-10-14T17:15:12.660",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes sensitive HTTP parameters to the `_internal` index. This exposure could happen if you configure the Splunk Enterprise `REST_Calls` log channel at the DEBUG logging level."
},
{
"lang": "es",
"value": "En las versiones de Splunk Enterprise anteriores a 9.3.1, 9.2.3 y 9.1.6, el software puede exponer par\u00e1metros HTTP confidenciales al \u00edndice `_internal`. Esta exposici\u00f3n podr\u00eda ocurrir si configura el canal de registro `REST_Calls` de Splunk Enterprise en el nivel de registro DEBUG."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45739",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:12.860",
"lastModified": "2024-10-14T17:15:12.860",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes plaintext passwords for local native authentication Splunk users. This exposure could happen when you configure the Splunk Enterprise AdminManager log channel at the DEBUG logging level."
},
{
"lang": "es",
"value": "En las versiones de Splunk Enterprise anteriores a 9.3.1, 9.2.3 y 9.1.6, el software puede exponer las contrase\u00f1as de texto plano de los usuarios de Splunk con autenticaci\u00f3n nativa local. Esta exposici\u00f3n podr\u00eda ocurrir cuando configura el canal de registro de Splunk Enterprise AdminManager en el nivel de registro DEBUG."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45740",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:13.047",
"lastModified": "2024-10-14T17:15:13.047",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could craft a malicious payload through Scheduled Views that could result in execution of unauthorized JavaScript code in the browser of a user."
},
{
"lang": "es",
"value": "En las versiones de Splunk Enterprise anteriores a 9.2.3 y 9.1.6 y en las versiones de Splunk Cloud Platform anteriores a 9.2.2403, un usuario con pocos privilegios que no tenga los roles de \"administrador\" o \"poder\" de Splunk podr\u00eda crear un payload malicioso a trav\u00e9s de Vistas programadas que podr\u00eda resultar en la ejecuci\u00f3n de c\u00f3digo JavaScript no autorizado en el navegador de un usuario."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45741",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:13.250",
"lastModified": "2024-10-14T17:15:13.250",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108 and 9.1.2312.205, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could create a malicious payload through a custom configuration file that the \"api.uri\" parameter from the \"/manager/search/apps/local\" endpoint in Splunk Web calls. This could result in execution of unauthorized JavaScript code in the browser of a user."
},
{
"lang": "es",
"value": "En las versiones de Splunk Enterprise anteriores a 9.2.3 y 9.1.6 y en las versiones de Splunk Cloud Platform anteriores a 9.2.2403.108 y 9.1.2312.205, un usuario con pocos privilegios que no tenga los roles de \"administrador\" o \"poder\" de Splunk podr\u00eda crear un payload malicioso a trav\u00e9s de un archivo de configuraci\u00f3n personalizado al que llama el par\u00e1metro \"api.uri\" del punto de conexi\u00f3n \"/manager/search/apps/local\" en Splunk Web. Esto podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo JavaScript no autorizado en el navegador de un usuario."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45754",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T22:15:04.337",
"lastModified": "2024-10-11T22:15:04.337",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the centreon-bi-server component in Centreon BI Server 24.04.x before 24.04.3, 23.10.x before 23.10.8, 23.04.x before 23.04.11, and 22.10.x before 22.10.11. SQL injection can occur in the listing of configured reporting jobs. Exploitation is only accessible to authenticated users with high-privileged access."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en el componente centreon-bi-server en Centreon BI Server 24.04.x anterior a 24.04.3, 23.10.x anterior a 23.10.8, 23.04.x anterior a 23.04.11 y 22.10.x anterior a 22.10.11. La inyecci\u00f3n de SQL puede ocurrir en la lista de trabajos de informes configurados. La explotaci\u00f3n solo es accesible para usuarios autenticados con acceso con privilegios elevados."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-46088",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T16:15:08.357",
"lastModified": "2024-10-11T21:36:35.423",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the ProductAction.entphone interface of Zhejiang University Entersoft Customer Resource Management System v2002 to v2024 allows attackers to execute arbitrary code via uploading a crafted file."
},
{
"lang": "es",
"value": "Una vulnerabilidad de carga de archivos arbitrarios en la interfaz Zhejiang University Entersoft Customer Resource Management System v2002 a v2024 de la Universidad de Zhejiang permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo manipulado espec\u00edficamente para ello."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-46215",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T17:15:04.260",
"lastModified": "2024-10-11T17:15:04.260",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in KM08-708H-v1.1, There is a buffer overflow in the sub_445BDC() function within the /usr/sbin/goahead program; The strcpy function is executed without checking the length of the string, leading to a buffer overflow."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad en KM08-708H-v1.1, hay un desbordamiento de b\u00fafer en la funci\u00f3n sub_445BDC() dentro del programa /usr/sbin/goahead; la funci\u00f3n strcpy se ejecuta sin verificar la longitud de la cadena, lo que genera un desbordamiento de b\u00fafer."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-46468",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T21:15:07.040",
"lastModified": "2024-10-11T21:15:07.040",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Server-Side Request Forgery (SSRF) vulnerability exists in the jpress <= v5.1.1, which can be exploited by an attacker to obtain sensitive information, resulting in an information disclosure."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Server-Side Request Forgery (SSRF) en jpress &lt;= v5.1.1, que puede ser explotada por un atacante para obtener informaci\u00f3n confidencial, lo que resulta en una divulgaci\u00f3n de informaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-46528",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T18:15:03.847",
"lastModified": "2024-10-14T18:15:03.847",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Insecure Direct Object Reference (IDOR) vulnerability in KubeSphere v3.4.1 and v4.1.1 allows low-privileged authenticated attackers to access sensitive resources without proper authorization checks."
},
{
"lang": "es",
"value": "Una vulnerabilidad de referencia directa de objetos insegura (IDOR) en KubeSphere v3.4.1 y v4.1.1 permite a atacantes autenticados con pocos privilegios acceder a recursos confidenciales sin las verificaciones de autorizaci\u00f3n adecuadas."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-46532",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T18:15:08.267",
"lastModified": "2024-10-11T18:15:08.267",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in OpenHIS v.1.0 allows an attacker to execute arbitrary code via the refund function in the PayController.class.php component."
},
{
"lang": "es",
"value": "La vulnerabilidad de inyecci\u00f3n SQL en OpenHIS v.1.0 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n de reembolso en el componente PayController.class.php."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-46535",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T17:15:13.440",
"lastModified": "2024-10-14T17:15:13.440",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jepaas v7.2.8 was discovered to contain a SQL injection vulnerability via the orderSQL parameter at /homePortal/loadUserMsg."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Jepaas v7.2.8 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro orderSQL en /homePortal/loadUserMsg."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-46898",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-10-15T07:15:02.267",
"lastModified": "2024-10-15T07:15:02.267",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SHIRASAGI prior to v1.19.1 processes URLs in HTTP requests improperly, resulting in a path traversal vulnerability. If this vulnerability is exploited, arbitrary files on the server may be retrieved when processing crafted HTTP requests."
},
{
"lang": "es",
"value": "Las versiones anteriores a la v1.19.1 de SHIRASAGI procesan las URL de las solicitudes HTTP de forma incorrecta, lo que genera una vulnerabilidad de path traversal. Si se explota esta vulnerabilidad, se pueden recuperar archivos arbitrarios del servidor al procesar solicitudes HTTP manipuladas."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-46911",
"sourceIdentifier": "security@apache.org",
"published": "2024-10-14T09:15:04.297",
"lastModified": "2024-10-14T09:15:04.297",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site Resource Forgery (CSRF), Privilege escalation vulnerability in Apache Roller. On multi-blog/user Roller websites, by default weblog owners are trusted to publish arbitrary weblog content and this combined with a deficiency in Roller's CSRF protections allowed an escalation of privileges attack. This issue affects Apache Roller before 6.1.4.\n\nRoller users who run multi-blog/user Roller websites are recommended to upgrade to version 6.1.4, which fixes the issue.\n\nRoller 6.1.4 release announcement:\u00a0 https://lists.apache.org/thread/3c3f6rwqptyw6wdc95654fq5vlosqdpw"
},
{
"lang": "es",
"value": "Vulnerabilidad de escalada de privilegios por Cross-site Resource Forgery (CSRF) en Apache Roller. En los sitios web de Roller con varios blogs y usuarios, por defecto, se conf\u00eda en los propietarios de los blogs para que publiquen contenido arbitrario en los blogs y esto, combinado con una deficiencia en las protecciones CSRF de Roller, permiti\u00f3 un ataque de escalada de privilegios. Este problema afecta a Apache Roller anterior a la versi\u00f3n 6.1.4. Se recomienda a los usuarios de Roller que ejecutan sitios web de Roller con varios blogs y usuarios que actualicen a la versi\u00f3n 6.1.4, que soluciona el problema. Anuncio de lanzamiento de Roller 6.1.4: https://lists.apache.org/thread/3c3f6rwqptyw6wdc95654fq5vlosqdpw"
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-46980",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-14T18:15:03.947",
"lastModified": "2024-10-14T18:15:03.947",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, a site administrator could create an artifact link type with a forward label allowing them to execute uncontrolled code (or at least achieve content injection) in a mail client. Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue."
},
{
"lang": "es",
"value": "Tuleap es una herramienta para la trazabilidad de extremo a extremo de desarrollos de aplicaciones y sistemas. Antes de Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3 y Tuleap Enterprise Edition 15.12-6, un administrador de sitio pod\u00eda crear un tipo de enlace de artefacto con una etiqueta de reenv\u00edo que le permitiera ejecutar c\u00f3digo no controlado (o al menos lograr la inyecci\u00f3n de contenido) en un cliente de correo. Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3 y Tuleap Enterprise Edition 15.12-6 solucionan este problema."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-46988",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-14T18:15:04.173",
"lastModified": "2024-10-14T18:15:04.173",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, users might receive email notification with information they should not have access to. Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue."
},
{
"lang": "es",
"value": "Tuleap es una herramienta para la trazabilidad de extremo a extremo de los desarrollos de aplicaciones y sistemas. Antes de Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3 y Tuleap Enterprise Edition 15.12-6, los usuarios pod\u00edan recibir notificaciones por correo electr\u00f3nico con informaci\u00f3n a la que no deber\u00edan tener acceso. Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3 y Tuleap Enterprise Edition 15.12-6 solucionan este problema."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4658",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-10-10T14:15:05.587",
"lastModified": "2024-10-10T14:15:05.587",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-47074",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-11T15:15:05.353",
"lastModified": "2024-10-11T15:15:05.353",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DataEase is an open source data visualization analysis tool. In Dataease, the PostgreSQL data source in the data source function can customize the JDBC connection parameters and the PG server target to be connected. In backend/src/main/java/io/dataease/provider/datasource/JdbcProvider.java, PgConfiguration class don't filter any parameters, directly concat user input. So, if the attacker adds some parameters in JDBC url, and connect to evil PG server, the attacker can trigger the PG jdbc deserialization vulnerability, and eventually the attacker can execute through the deserialization vulnerability system commands and obtain server privileges. The vulnerability has been fixed in v1.18.25."
},
{
"lang": "es",
"value": "DataEase es una herramienta de an\u00e1lisis de visualizaci\u00f3n de datos de c\u00f3digo abierto. En DataEase, la fuente de datos PostgreSQL en la funci\u00f3n de fuente de datos puede personalizar los par\u00e1metros de conexi\u00f3n JDBC y el servidor PG de destino al que se conectar\u00e1. En backend/src/main/java/io/dataease/provider/datasource/JdbcProvider.java, la clase PgConfiguration no filtra ning\u00fan par\u00e1metro, concatena directamente la entrada del usuario. Por lo tanto, si el atacante agrega algunos par\u00e1metros en la URL JDBC y se conecta al servidor PG malicioso, el atacante puede activar la vulnerabilidad de deserializaci\u00f3n de JDBC de PG y, eventualmente, el atacante puede ejecutar a trav\u00e9s de la vulnerabilidad de deserializaci\u00f3n comandos del sistema y obtener privilegios de servidor. La vulnerabilidad se ha corregido en v1.18.25."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47084",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-10T22:15:10.263",
"lastModified": "2024-10-10T22:15:10.263",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47164",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-10T22:15:10.437",
"lastModified": "2024-10-10T22:15:10.437",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47165",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-10T22:15:10.680",
"lastModified": "2024-10-10T22:15:10.680",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47166",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-10T22:15:10.833",
"lastModified": "2024-10-10T22:15:10.833",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47167",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-10T22:15:11.000",
"lastModified": "2024-10-10T22:15:11.000",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47168",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-10T22:15:11.173",
"lastModified": "2024-10-10T22:15:11.173",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-47331",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-11T19:15:09.783",
"lastModified": "2024-10-11T19:15:09.783",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NinjaTeam Multi Step for Contact Form allows SQL Injection.This issue affects Multi Step for Contact Form: from n/a through 2.7.7."
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en NinjaTeam Multi Step for Contact Form permite la inyecci\u00f3n SQL. Este problema afecta a Multi Step for Contact Form: desde n/a hasta 2.7.7."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-47353",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-11T19:15:10.003",
"lastModified": "2024-10-11T19:15:10.003",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in QuomodoSoft ElementsReady Addons for Elementor.This issue affects ElementsReady Addons for Elementor: from n/a through 6.4.2."
},
{
"lang": "es",
"value": "Vulnerabilidad de redirecci\u00f3n de URL a un sitio no confiable ('Redirecci\u00f3n abierta') en QuomodoSoft ElementsReady Addons for Elementor. Este problema afecta a los complementos ElementsReady para Elementor: desde n/a hasta 6.4.2."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47354",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-10T19:15:16.837",
"lastModified": "2024-10-10T19:15:16.837",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-47489",
"sourceIdentifier": "sirt@juniper.net",
"published": "2024-10-11T16:15:08.533",
"lastModified": "2024-10-11T16:15:08.533",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Handling of Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of the Juniper Networks Junos OS Evolved on ACX Series devices allows an unauthenticated, network based attacker sending specific transit protocol traffic to cause a partial Denial of Service (DoS) to downstream devices.\n\nReceipt of specific transit protocol packets is incorrectly processed by the Routing Engine (RE), filling up the DDoS protection queue which is shared between routing protocols.\u00a0This influx of transit protocol packets causes DDoS protection violations,\u00a0resulting in protocol flaps which can affect connectivity to networking devices.\n\nThis issue affects both IPv4 and IPv6. This issue does not require any specific routing protocol to be configured or enabled.\n\nThe following commands can be used to monitor the DDoS protection queue:\n\n\u00a0 \u00a0 \u00a0 \u00a0labuser@re0> show evo-pfemand host pkt-stats\n\n\u2003\u2003\u00a0 labuser@re0> show host-path ddos all-policers\n\nThis issue affects Junos OS Evolved:\u00a0\n\n\n\n * All versions before 21.4R3-S8-EVO,\u00a0\n * from 22.2 before 22.2R3-S4-EVO,\u00a0\n * from 22.3 before 22.3R3-S4-EVO,\u00a0\n * from 22.4 before 22.4R3-S3-EVO,\u00a0\n * from 23.2 before 23.2R2-EVO,\u00a0\n * from 23.4 before 23.4R1-S1-EVO, 23.4R2-EVO,\u00a0\n * from 24.2 before 24.2R2-EVO."
"value": "An Improper Handling of Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of the Juniper Networks Junos OS Evolved on ACX Series devices allows an unauthenticated, network based attacker sending specific transit protocol traffic to cause a partial Denial of Service (DoS) to downstream devices.\n\nReceipt of specific transit protocol packets is incorrectly processed by the Routing Engine (RE), filling up the DDoS protection queue which is shared between routing protocols.\u00a0This influx of transit protocol packets causes DDoS protection violations,\u00a0resulting in protocol flaps which can affect connectivity to networking devices.\n\nThis issue affects both IPv4 and IPv6. This issue does not require any specific routing protocol to be configured or enabled.\n\nThe following commands can be used to monitor the DDoS protection queue:\n\n\u00a0 \u00a0 \u00a0 \u00a0labuser@re0> show evo-pfemand host pkt-stats\n\n??\u00a0 labuser@re0> show host-path ddos all-policers\n\nThis issue affects Junos OS Evolved:\u00a0\n\n\n\n * All versions before 21.4R3-S8-EVO,\u00a0\n * from 22.2 before 22.2R3-S4-EVO,\u00a0\n * from 22.3 before 22.3R3-S4-EVO,\u00a0\n * from 22.4 before 22.4R3-S3-EVO,\u00a0\n * from 23.2 before 23.2R2-EVO,\u00a0\n * from 23.4 before 23.4R1-S1-EVO, 23.4R2-EVO,\u00a0\n * from 24.2 before 24.2R2-EVO."
},
{
"lang": "es",
"value": "Una vulnerabilidad de manejo inadecuado de condiciones excepcionales en el motor de reenv\u00edo de paquetes (pfe) del sistema operativo Juniper Networks Junos OS Evolved en los dispositivos de la serie ACX permite que un atacante no autenticado basado en la red env\u00ede tr\u00e1fico de protocolo de tr\u00e1nsito espec\u00edfico para provocar una denegaci\u00f3n de servicio (DoS) parcial a los dispositivos de bajada. El motor de enrutamiento (RE) procesa incorrectamente la recepci\u00f3n de paquetes de protocolo de tr\u00e1nsito espec\u00edfico, lo que llena la cola de protecci\u00f3n DDoS que se comparte entre los protocolos de enrutamiento. Esta afluencia de paquetes de protocolo de tr\u00e1nsito provoca violaciones de la protecci\u00f3n DDoS, lo que da como resultado fluctuaciones de protocolo que pueden afectar la conectividad a los dispositivos de red. Este problema afecta tanto a IPv4 como a IPv6. Este problema no requiere que se configure o habilite ning\u00fan protocolo de enrutamiento espec\u00edfico. Los siguientes comandos se pueden utilizar para monitorear la cola de protecci\u00f3n DDoS: labuser@re0&gt; show evo-pfemand host pkt-stats labuser@re0&gt; show host-path ddos all-policers Este problema afecta a Junos OS Evolved: * Todas las versiones anteriores a 21.4R3-S8-EVO, * desde 22.2 hasta 22.2R3-S4-EVO, * desde 22.3 hasta 22.3R3-S4-EVO, * desde 22.4 hasta 22.4R3-S3-EVO, * desde 23.2 hasta 23.2R2-EVO, * desde 23.4 hasta 23.4R1-S1-EVO, 23.4R2-EVO, * desde 24.2 hasta 24.2R2-EVO."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-47490",
"sourceIdentifier": "sirt@juniper.net",
"published": "2024-10-11T16:15:08.803",
"lastModified": "2024-10-11T16:15:08.803",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Packet Forwarding Engine (PFE)\u00a0of Juniper Networks Junos OS Evolved on ACX 7000 Series allows an unauthenticated, network based attacker to cause increased consumption of resources, ultimately resulting in a Denial of Service (DoS).\n\nWhen specific transit MPLS packets are received by the PFE, these packets are internally forwarded to the Routing Engine (RE), rather than being handled appropriately. Continuous receipt of these MPLS packets causes resources to be exhausted. MPLS config is not required to be affected by this issue.\u00a0\n\n\nThis issue affects Junos OS Evolved ACX 7000 Series:\u00a0\n\n\n\n * All versions before 21.4R3-S9-EVO,\n * 22.2-EVO before 22.2R3-S4-EVO,\u00a0\n * 22.3-EVO before 22.3R3-S3-EVO,\u00a0\n * 22.4-EVO before 22.4R3-S2-EVO,\u00a0\n * 23.2-EVO before 23.2R2-EVO,\u00a0\n * 23.4-EVO before 23.4R1-S1-EVO, 23.4R2-EVO."
},
{
"lang": "es",
"value": "Una vulnerabilidad de restricci\u00f3n inadecuada del canal de comunicaci\u00f3n a los endpoints previstos en el motor de reenv\u00edo de paquetes (PFE) de Juniper Networks Junos OS Evolved en la serie ACX 7000 permite que un atacante no autenticado basado en la red provoque un mayor consumo de recursos, lo que en \u00faltima instancia da como resultado una denegaci\u00f3n de servicio (DoS). Cuando el PFE recibe paquetes MPLS de tr\u00e1nsito espec\u00edficos, estos paquetes se reenv\u00edan internamente al motor de enrutamiento (RE), en lugar de manejarse adecuadamente. La recepci\u00f3n continua de estos paquetes MPLS hace que se agoten los recursos. No es necesario que la configuraci\u00f3n MPLS se vea afectada por este problema. Este problema afecta a Junos OS Evolved ACX 7000 Series: * Todas las versiones anteriores a 21.4R3-S9-EVO, * 22.2-EVO anterior a 22.2R3-S4-EVO, * 22.3-EVO anterior a 22.3R3-S3-EVO, * 22.4-EVO anterior a 22.4R3-S2-EVO, * 23.2-EVO anterior a 23.2R2-EVO, * 23.4-EVO anterior a 23.4R1-S1-EVO, 23.4R2-EVO."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-47491",
"sourceIdentifier": "sirt@juniper.net",
"published": "2024-10-11T16:15:09.060",
"lastModified": "2024-10-11T16:15:09.060",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause Denial of Service (DoS).\n\nWhen a BGP UPDATE with malformed path attribute is received over an established BGP session, rpd crashes and restarts. \n\nContinuous receipt of a BGP UPDATE with a specifically malformed path attribute will create a sustained Denial of Service (DoS) condition for impacted devices.\n\nThis issue affects:\n\n\u2003Juniper Networks Junos OS:\u00a0\n\n\n\n * All versions before 21.4R3-S8,\u00a0\n * from 22.2 before 22.2R3-S4,\u00a0\n * from 22.4 before 22.4R3-S3,\u00a0\n * from 23.2 before 23.2R2-S1,\u00a0\n * from 23.4 before 23.4R1-S2, 23.4R2.\n\n\n\u2003Juniper Networks Junos OS Evolved:\u00a0\n\n * All versions before 21.4R3-S8-EVO, \n * from 22.2 before 22.2R3-S4-EVO, \n * from 22.4 before 22.4R3-S3-EVO,\n * from 23.2 before 23.2R2-S1-EVO, \n * from 23.4 before 23.4R1-S2-EVO, 23.4R2-EVO."
"value": "An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause Denial of Service (DoS).\n\nWhen a BGP UPDATE with malformed path attribute is received over an established BGP session, rpd crashes and restarts. \n\nContinuous receipt of a BGP UPDATE with a specifically malformed path attribute will create a sustained Denial of Service (DoS) condition for impacted devices.\n\nThis issue affects:\n\n?Juniper Networks Junos OS:\u00a0\n\n\n\n * All versions before 21.4R3-S8,\u00a0\n * from 22.2 before 22.2R3-S4,\u00a0\n * from 22.4 before 22.4R3-S3,\u00a0\n * from 23.2 before 23.2R2-S1,\u00a0\n * from 23.4 before 23.4R1-S2, 23.4R2.\n\n\n?Juniper Networks Junos OS Evolved:\u00a0\n\n * All versions before 21.4R3-S8-EVO, \n * from 22.2 before 22.2R3-S4-EVO, \n * from 22.4 before 22.4R3-S3-EVO,\n * from 23.2 before 23.2R2-S1-EVO, \n * from 23.4 before 23.4R1-S2-EVO, 23.4R2-EVO."
},
{
"lang": "es",
"value": "Una vulnerabilidad de manejo inadecuado de condiciones excepcionales en el Routing Protocol Daemon (rpd) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante no autenticado basado en la red provoque una denegaci\u00f3n de servicio (DoS). Cuando se recibe una ACTUALIZACI\u00d3N BGP con un atributo de ruta malformado en una sesi\u00f3n BGP establecida, rpd se bloquea y se reinicia. La recepci\u00f3n continua de una ACTUALIZACI\u00d3N BGP con un atributo de ruta espec\u00edficamente malformado crear\u00e1 una condici\u00f3n de denegaci\u00f3n de servicio (DoS) sostenida para los dispositivos afectados. Este problema afecta a: Juniper Networks Junos OS: * Todas las versiones anteriores a 21.4R3-S8, * desde 22.2 hasta 22.2R3-S4, * desde 22.4 hasta 22.4R3-S3, * desde 23.2 hasta 23.2R2-S1, * desde 23.4 hasta 23.4R1-S2, 23.4R2. Juniper Networks Junos OS Evolved: * Todas las versiones anteriores a 21.4R3-S8-EVO, * desde 22.2 hasta 22.2R3-S4-EVO, * desde 22.4 hasta 22.4R3-S3-EVO, * desde 23.2 hasta 23.2R2-S1-EVO, * desde 23.4 hasta 23.4R1-S2-EVO, 23.4R2-EVO."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-47493",
"sourceIdentifier": "sirt@juniper.net",
"published": "2024-10-11T16:15:09.320",
"lastModified": "2024-10-11T16:15:09.320",
"vulnStatus": "Received",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of the Juniper Networks Junos OS on the SRX5K, SRX4600 and MX Series platforms with Trio-based FPCs allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).\n\nIn case of channelized Modular Interface Cards (MICs), every physical interface flap operation will leak heap memory. Over a period of time, continuous physical interface flap operations causes\u00a0local FPC to eventually run out of memory and crash.\u00a0\u00a0\n\nBelow CLI command can be used to check the memory usage over a period of time:\n\n\u2003\u2003user@host> show chassis fpc\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Temp CPU Utilization (%) \u00a0 CPU Utilization (%) Memory \u00a0 \nUtilization (%)\n\u00a0 Slot State \u00a0 \u00a0 (C)\u00a0 Total\u00a0 Interrupt \u00a0 \u00a0 1min \u00a0 5min \u00a0\n15min DRAM (MB) Heap \u00a0 \u00a0 Buffer\n\n\u00a0 0 \nOnline\u00a0 \u00a0 \u00a0 \u00a043 \u00a0 \u00a0 41 \u00a0 \u00a0 \u00a0 \u00a0 \n2 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 2048 \u00a0 \u00a0 \u00a0 49 \u00a0 \u00a0 \u00a0 \u00a0 14\n\n\u00a0 1 \nOnline\u00a0 \u00a0 \u00a0 \u00a043 \u00a0 \u00a0 41 \u00a0 \u00a0 \u00a0 \u00a0 \n2 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\n2048 \u00a0 \u00a0 \u00a0 49 \u00a0 \u00a0 \u00a0 \u00a0 14\n\n\u00a0 2 \nOnline\u00a0 \u00a0 \u00a0 \u00a043 \u00a0 \u00a0 41 \u00a0 \u00a0 \u00a0 \u00a0 \n2 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\n2048 \u00a0 \u00a0 \u00a0 49 \u00a0 \u00a0 \u00a0 \u00a0 14\n\n\n\n\n\n\n\n\n\nThis issue affects Junos OS on SRX5K, SRX4600 and MX Series:\u00a0\n\n\n\n\n * All versions before 21.2R3-S7,\u00a0\n * from 21.4 before 21.4R3-S6,\u00a0\n * from 22.1 before 22.1R3-S5,\u00a0\n * from 22.2 before 22.2R3-S3,\u00a0\n * from 22.3 before 22.3R3-S2,\u00a0\n * from 22.4 before 22.4R3,\u00a0\n * from 23.2 before 23.2R2,\u00a0\n * from 23.4 before 23.4R2."
"value": "A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of the Juniper Networks Junos OS on the SRX5K, SRX4600 and MX Series platforms with Trio-based FPCs allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).\n\nIn case of channelized Modular Interface Cards (MICs), every physical interface flap operation will leak heap memory. Over a period of time, continuous physical interface flap operations causes\u00a0local FPC to eventually run out of memory and crash.\u00a0\u00a0\n\nBelow CLI command can be used to check the memory usage over a period of time:\n\n??user@host> show chassis fpc\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Temp CPU Utilization (%) \u00a0 CPU Utilization (%) Memory \u00a0 \nUtilization (%)\n\u00a0 Slot State \u00a0 \u00a0 (C)\u00a0 Total\u00a0 Interrupt \u00a0 \u00a0 1min \u00a0 5min \u00a0\n15min DRAM (MB) Heap \u00a0 \u00a0 Buffer\n\n\u00a0 0 \nOnline\u00a0 \u00a0 \u00a0 \u00a043 \u00a0 \u00a0 41 \u00a0 \u00a0 \u00a0 \u00a0 \n2 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 2048 \u00a0 \u00a0 \u00a0 49 \u00a0 \u00a0 \u00a0 \u00a0 14\n\n\u00a0 1 \nOnline\u00a0 \u00a0 \u00a0 \u00a043 \u00a0 \u00a0 41 \u00a0 \u00a0 \u00a0 \u00a0 \n2 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\n2048 \u00a0 \u00a0 \u00a0 49 \u00a0 \u00a0 \u00a0 \u00a0 14\n\n\u00a0 2 \nOnline\u00a0 \u00a0 \u00a0 \u00a043 \u00a0 \u00a0 41 \u00a0 \u00a0 \u00a0 \u00a0 \n2 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\n2048 \u00a0 \u00a0 \u00a0 49 \u00a0 \u00a0 \u00a0 \u00a0 14\n\n\n\n\n\n\n\n\n\nThis issue affects Junos OS on SRX5K, SRX4600 and MX Series:\u00a0\n\n\n\n\n * All versions before 21.2R3-S7,\u00a0\n * from 21.4 before 21.4R3-S6,\u00a0\n * from 22.1 before 22.1R3-S5,\u00a0\n * from 22.2 before 22.2R3-S3,\u00a0\n * from 22.3 before 22.3R3-S2,\u00a0\n * from 22.4 before 22.4R3,\u00a0\n * from 23.2 before 23.2R2,\u00a0\n * from 23.4 before 23.4R2."
},
{
"lang": "es",
"value": "Una vulnerabilidad de falta de liberaci\u00f3n de memoria despu\u00e9s de la vida \u00fatil efectiva en el motor de reenv\u00edo de paquetes (PFE) del sistema operativo Junos de Juniper Networks en las plataformas de las series SRX5K, SRX4600 y MX con FPC basadas en Trio permite que un atacante adyacente no autenticado provoque una denegaci\u00f3n de servicio (DoS). En el caso de las tarjetas de interfaz modulares (MIC) canalizadas, cada operaci\u00f3n de oscilaci\u00f3n de la interfaz f\u00edsica perder\u00e1 memoria del mont\u00f3n. Con el paso del tiempo, las operaciones de oscilaci\u00f3n de la interfaz f\u00edsica continuas hacen que la FPC local se quede sin memoria y se bloquee. El siguiente comando CLI se puede utilizar para comprobar el uso de la memoria durante un per\u00edodo de tiempo: user@host&gt; show housing fpc Temp CPU Utilization (%) CPU Utilization (%) Memory Utilization (%) Slot State (C) Total Interrupt 1min 5min 15min DRAM (MB) Heap Buffer 0 Online 43 41 2 2048 49 14 1 Online 43 41 2 2048 49 14 2 Online 43 41 2 2048 49 14 Este problema afecta a Junos OS en SRX5K, SRX4600 y MX Series: * Todas las versiones anteriores a 21.2R3-S7, * desde 21.4 hasta 21.4R3-S6, * desde 22.1 hasta 22.1R3-S5, * desde 22.2 hasta 22.2R3-S3, * desde 22.3 hasta 22.3R3-S2, * de 22.4 antes de 22.4R3, * de 23.2 antes de 23.2R2, * de 23.4 antes de 23.4R2."
}
],
"metrics": {

Some files were not shown because too many files have changed in this diff Show More