mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-05-27T02:00:29.975692+00:00
This commit is contained in:
parent
3b409592cc
commit
60b5318980
@ -2,97 +2,14 @@
|
||||
"id": "CVE-2023-33565",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-23T19:15:09.047",
|
||||
"lastModified": "2024-05-17T02:24:46.420",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-05-27T01:15:12.923",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ROS2 (Robot Operating System 2) Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 are vulnerable to Denial-of-Service (DoS) attacks. A malicious user potentially exploited the vulnerability remotely and crashed the ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://dl.acm.org/doi/abs/10.1145/3573910.3573912",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Technical Description"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/16yashpatel/CVE-2023-33565",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,90 +2,14 @@
|
||||
"id": "CVE-2023-33566",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-27T18:15:13.463",
|
||||
"lastModified": "2024-05-17T02:24:46.550",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-05-27T01:15:13.207",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Foxy Fitzroy versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could allow a malicious user to inject malicious ROS2 nodes into the system remotely. Once injected, these nodes could disrupt the normal operations of the system or cause other potentially harmful behavior. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/16yashpatel/CVE-2023-33566",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,90 +2,14 @@
|
||||
"id": "CVE-2023-33567",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-27T18:15:13.510",
|
||||
"lastModified": "2024-05-17T02:24:46.650",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-05-27T01:15:13.333",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthorized access vulnerability has been discovered in ROS2 Foxy Fitzroy versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/16yashpatel/CVE-2023-33567",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,94 +2,14 @@
|
||||
"id": "CVE-2023-51197",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-30T22:15:52.613",
|
||||
"lastModified": "2024-05-17T02:32:15.297",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-05-27T01:15:13.443",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue discovered in shell command execution in ROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows an attacker to run arbitrary commands and cause other impacts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema descubierto en la ejecuci\u00f3n de comandos de shell en ROS2 (Robot Operating System 2) Foxy Fitzroy, con ROS_VERSION=2 y ROS_PYTHON_VERSION=3 permite a un atacante ejecutar comandos arbitrarios y causar otros impactos."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/16yashpatel/CVE-2023-51197",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,94 +2,14 @@
|
||||
"id": "CVE-2023-51198",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-30T22:15:52.670",
|
||||
"lastModified": "2024-05-17T02:32:15.383",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-05-27T01:15:13.587",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the permission and access control components within ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to gain escalate privileges. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en los componentes de permiso y control de acceso dentro de ROS2 Foxy Fitzroy ROS_VERSION=2 y ROS_PYTHON_VERSION=3 permite a los atacantes obtener privilegios elevados."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/16yashpatel/CVE-2023-51198",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,94 +2,14 @@
|
||||
"id": "CVE-2023-51199",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-23T22:15:16.437",
|
||||
"lastModified": "2024-05-17T02:32:15.473",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-05-27T01:15:13.703",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to run arbitrary code or cause a denial of service via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en ROS2 Foxy Fitzroy ROS_VERSION=2 y ROS_PYTHON_VERSION=3 permite a atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio mediante el manejo inadecuado de matrices o cadenas."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/16yashpatel/CVE-2023-51199",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,94 +2,14 @@
|
||||
"id": "CVE-2023-51200",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-23T21:15:09.080",
|
||||
"lastModified": "2024-05-17T02:32:15.570",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-05-27T01:15:13.840",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the default configurations of ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows unauthenticated attackers to authenticate using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en las configuraciones predeterminadas de ROS2 Foxy Fitzroy ROS_VERSION=2 y ROS_PYTHON_VERSION=3 permite a atacantes no autenticados autenticarse usando credenciales predeterminadas."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/16yashpatel/CVE-2023-51200",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,94 +2,14 @@
|
||||
"id": "CVE-2023-51201",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-23T22:15:16.480",
|
||||
"lastModified": "2024-05-17T02:32:15.670",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-05-27T01:15:13.960",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cleartext Transmission issue in ROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to access sensitive information via a man-in-the-middle attack. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Problema de transmisi\u00f3n de texto plano en ROS2 (sistema operativo de robot 2) Foxy Fitzroy, con ROS_VERSION=2 y ROS_PYTHON_VERSION=3 permite a los atacantes acceder a informaci\u00f3n confidencial a trav\u00e9s de un ataque man in the middle."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/16yashpatel/CVE-2023-51201",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,94 +2,14 @@
|
||||
"id": "CVE-2023-51202",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-30T22:15:52.720",
|
||||
"lastModified": "2024-05-17T02:32:15.767",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-05-27T01:15:14.070",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OS command injection vulnerability in command processing or system call componentsROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to run arbitrary commands. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en el procesamiento de comandos o componentes de llamadas al sistema ROS2 (Robot Operating System 2) Foxy Fitzroy, con ROS_VERSION=2 y ROS_PYTHON_VERSION=3 permite a los atacantes ejecutar comandos arbitrarios."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/16yashpatel/CVE-2023-51202",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,94 +2,14 @@
|
||||
"id": "CVE-2023-51204",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-30T22:15:52.767",
|
||||
"lastModified": "2024-05-17T02:32:15.853",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-05-27T01:15:14.180",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure deserialization in ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to execute arbitrary code via a crafted input. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La deserializaci\u00f3n insegura en ROS2 Foxy Fitzroy ROS_VERSION=2 y ROS_PYTHON_VERSION=3 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de una entrada manipulada."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/16yashpatel/CVE-2023-51204",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,94 +2,14 @@
|
||||
"id": "CVE-2023-51208",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-23T22:15:16.533",
|
||||
"lastModified": "2024-05-17T02:32:15.943",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-05-27T01:15:14.283",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Arbitrary File Upload vulnerability in ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to run arbitrary code and cause other impacts via upload of crafted file. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de carga arbitraria de archivos en ROS2 Foxy Fitzroy ROS_VERSION=2 y ROS_PYTHON_VERSION=3 permite a los atacantes ejecutar c\u00f3digo arbitrario y causar otros impactos mediante la carga de archivos manipulados."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/16yashpatel/CVE-2023-51208",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-29439",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T23:15:06.753",
|
||||
"lastModified": "2024-05-17T02:37:51.987",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:14.397",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad de inyecci\u00f3n de nodo no autorizado en ROS2 Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos escalar privilegios e inyectar nodos ROS2 maliciosos en el sistema."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-29439",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-29440",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-25T21:15:47.217",
|
||||
"lastModified": "2024-05-17T02:37:52.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:14.497",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthorized access vulnerability has been discovered in ROS2 Humble Hawksbill versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de acceso no autorizado en las versiones de ROS2 Humble Hawksbill donde ROS_VERSION es 2 y ROS_PYTHON_VERSION es 3. Esta vulnerabilidad podr\u00eda permitir potencialmente que un usuario malintencionado obtenga acceso no autorizado a m\u00faltiples nodos ROS2 de forma remota. El acceso no autorizado a estos nodos podr\u00eda comprometer la integridad del sistema, la ejecuci\u00f3n de comandos arbitrarios y la divulgaci\u00f3n de informaci\u00f3n confidencial."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-29440",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-29441",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T00:15:07.223",
|
||||
"lastModified": "2024-05-17T02:37:52.107",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:14.590",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en ROS2 (Robot Operating System 2) Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de los nodos ROS2."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-29441",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-29442",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-25T22:37:19.797",
|
||||
"lastModified": "2024-05-17T02:37:52.163",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:14.673",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthorized access vulnerability has been discovered in ROS2 Humble Hawksbill versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de acceso no autorizado en las versiones de ROS2 Humble Hawksbill donde ROS_VERSION es 2 y ROS_PYTHON_VERSION es 3. Esta vulnerabilidad podr\u00eda permitir potencialmente que un usuario malintencionado obtenga acceso no autorizado a m\u00faltiples nodos ROS2 de forma remota. El acceso no autorizado a estos nodos podr\u00eda comprometer la integridad del sistema, la ejecuci\u00f3n de comandos arbitrarios y la divulgaci\u00f3n de informaci\u00f3n confidencial."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-29442",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-29443",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T23:15:06.810",
|
||||
"lastModified": "2024-05-17T02:37:52.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:14.760",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de shell en ROS2 (Robot Operating System 2) Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial debido a la forma en que ROS2 maneja la ejecuci\u00f3n de comandos de shell en componentes como int\u00e9rpretes de comandos o interfaces que procesan entradas externas."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-29443",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-29444",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T00:15:07.283",
|
||||
"lastModified": "2024-05-17T02:37:52.273",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:14.847",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability has been discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en ROS2 (Robot Operating System 2) Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de m\u00f3dulos de ejecuci\u00f3n de comandos externos, controladores de llamadas del sistema, y scripts de interfaz."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-29444",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-29445",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T23:15:06.857",
|
||||
"lastModified": "2024-05-17T02:37:52.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:14.933",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3 where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en ROS2 (Robot Operating System 2) Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3 donde el sistema transmite mensajes en texto plano, lo que permite a los atacantes acceder a informaci\u00f3n confidencial a trav\u00e9s de un ataque de intermediario."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-29445",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-29447",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T00:15:07.337",
|
||||
"lastModified": "2024-05-17T02:37:52.383",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:15.013",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the default configurations of ROS2 Humble Hawksbill in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en las configuraciones predeterminadas de ROS2 Humble Hawksbill en ROS2 Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes no autenticados obtener acceso utilizando credenciales predeterminadas."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-29447",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-29448",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T04:15:08.510",
|
||||
"lastModified": "2024-05-17T02:37:52.437",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:15.103",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de desbordamiento de b\u00fafer en los componentes C++ de ROS2 Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante un manejo inadecuado de matrices o cadenas."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-29448",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-29449",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T04:15:08.630",
|
||||
"lastModified": "2024-05-17T02:37:52.497",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:15.200",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to obtain sensitive information via man-in-the-middle attacks due to cleartext transmission of data across the ROS2 nodes' communication channels. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en ROS2 Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de ataques de intermediario debido a la transmisi\u00f3n de datos en texto plano a trav\u00e9s de los canales de comunicaci\u00f3n de los nodos ROS2."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-29449",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-29450",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T04:15:08.687",
|
||||
"lastModified": "2024-05-17T02:37:52.553",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:15.293",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue has been discovered in the permission and access control components within ROS2 Humble Hawksbill, in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), escalate privileges, and obtain sensitive information via the authentication system, including protocols, processes, and checks designed to verify the identities of users or devices attempting to access the ROS2 system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto un problema en los componentes de permiso y control de acceso dentro de ROS2 Humble Hawksbill, en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, provocar una denegaci\u00f3n de servicio (DoS), escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de la autenticaci\u00f3n. sistema, incluidos protocolos, procesos y controles manipulados para verificar las identidades de los usuarios o dispositivos que intentan acceder al sistema ROS2."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-29450",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-29452",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T02:15:46.917",
|
||||
"lastModified": "2024-05-17T02:37:52.603",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:15.387",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An insecure deserialization vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad de deserializaci\u00f3n insegura en ROS2 Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de entradas manipuladas en los componentes de serializaci\u00f3n y deserializaci\u00f3n de datos, los mecanismos de comunicaci\u00f3n entre procesos y las interfaces de comunicaci\u00f3n de red."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-29452",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-29454",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T20:15:35.767",
|
||||
"lastModified": "2024-05-17T02:37:52.660",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:15.473",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue discovered in packages or nodes in ROS2 Humble Hawksbill with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to execute arbitrary commands potentially leading to unauthorized system control, data breaches, system and network compromise, and operational disruption. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema descubierto en paquetes o nodos en ROS2 Humble Hawksbill con ROS_VERSION=2 y ROS_PYTHON_VERSION=3 permite a los atacantes ejecutar comandos arbitrarios que potencialmente conducen a un control no autorizado del sistema, violaciones de datos, compromiso del sistema y la red e interrupci\u00f3n operativa."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-29454",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-29455",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T05:15:47.477",
|
||||
"lastModified": "2024-05-17T02:37:52.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:15.573",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de carga de archivos arbitraria en ROS2 Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, provocar una denegaci\u00f3n de servicio (DoS) y obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado para el mecanismo de carga de archivos de ROS2 sistema, incluida la funcionalidad del servidor para manejar la carga de archivos y los procesos de validaci\u00f3n asociados."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-29455",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
15
CVE-2024/CVE-2024-306xx/CVE-2024-30657.json
Normal file
15
CVE-2024/CVE-2024-306xx/CVE-2024-30657.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2024-30657",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-27T00:15:08.743",
|
||||
"lastModified": "2024-05-27T00:15:08.743",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
15
CVE-2024/CVE-2024-306xx/CVE-2024-30658.json
Normal file
15
CVE-2024/CVE-2024-306xx/CVE-2024-30658.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2024-30658",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-27T00:15:09.013",
|
||||
"lastModified": "2024-05-27T00:15:09.013",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30659",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T07:15:09.143",
|
||||
"lastModified": "2024-05-17T02:38:52.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:15.650",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Shell Injection vulnerability in ROS (Robot Operating System) Melodic Morenia versions ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n de Shell en ROS (Robot Operating System) Melodic Morenia versiones ROS_VERSION 1 y ROS_PYTHON_VERSION 3, permite a atacantes ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30659",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30661",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T07:15:09.370",
|
||||
"lastModified": "2024-05-17T02:38:52.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:15.757",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthorized access vulnerability has been discovered in ROS Melodic Morenia versions where ROS_VERSION is 1 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized information access to multiple ROS nodes remotely. Unauthorized information access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de acceso no autorizado en las versiones de ROS Melodic Morenia donde ROS_VERSION es 1 y ROS_PYTHON_VERSION es 3. Esta vulnerabilidad podr\u00eda permitir potencialmente que un usuario malintencionado obtenga acceso a informaci\u00f3n no autorizada a m\u00faltiples nodos ROS de forma remota. El acceso no autorizado a la informaci\u00f3n a estos nodos podr\u00eda comprometer la integridad del sistema, la ejecuci\u00f3n de comandos arbitrarios y la divulgaci\u00f3n de informaci\u00f3n confidencial."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30661",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30662",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T07:15:09.493",
|
||||
"lastModified": "2024-05-17T02:38:52.780",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:15.843",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to easily intercept and access this data. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en ROS (Robot Operating System) Melodic Morenia en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, donde el sistema transmite mensajes en texto plano. Esta falla expone informaci\u00f3n confidencial, haci\u00e9ndola vulnerable a ataques de intermediario (MitM) y permitiendo a los atacantes interceptar y acceder f\u00e1cilmente a estos datos."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30662",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30663",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T07:15:09.570",
|
||||
"lastModified": "2024-05-17T02:38:52.837",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:15.930",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the default configurations of ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3. This vulnerability allows unauthenticated attackers to gain access using default credentials, posing a serious threat to the integrity and security of the system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en las configuraciones predeterminadas de ROS (Robot Operating System) Melodic Morenia en ROS_VERSION 1 y ROS_PYTHON_VERSION 3. Esta vulnerabilidad permite a atacantes no autenticados obtener acceso utilizando credenciales predeterminadas, lo que representa una grave amenaza para la integridad y seguridad del sistema."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30663",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30665",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T07:15:09.643",
|
||||
"lastModified": "2024-05-17T02:38:52.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:16.010",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability has been discovered in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3. This vulnerability primarily affects the command processing or system call components in ROS, making them susceptible to manipulation by malicious entities. Through this, unauthorized commands can be executed, leading to remote code execution (RCE), data theft, and malicious activities. The affected components include External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en ROS (Robot Operating System) Melodic Morenia en ROS_VERSION 1 y ROS_PYTHON_VERSION 3. Esta vulnerabilidad afecta principalmente a los componentes de procesamiento de comandos o llamadas al sistema en ROS, haci\u00e9ndolos susceptibles a la manipulaci\u00f3n por parte de entidades maliciosas. A trav\u00e9s de esto, se pueden ejecutar comandos no autorizados, lo que lleva a la ejecuci\u00f3n remota de c\u00f3digo (RCE), el robo de datos y actividades maliciosas. Los componentes afectados incluyen m\u00f3dulos de ejecuci\u00f3n de comandos externos, controladores de llamadas del sistema y scripts de interfaz."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30665",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30666",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T07:15:09.713",
|
||||
"lastModified": "2024-05-17T02:38:52.970",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:16.093",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via improper handling of arrays or strings within these components. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de desbordamiento de b\u00fafer en los componentes C++ de ROS (Robot Operating System) Melodic Morenia en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario mediante el manejo inadecuado de matrices o cadenas dentro de estos componentes."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30666",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30667",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T08:15:11.390",
|
||||
"lastModified": "2024-05-17T02:38:53.033",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:16.173",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure deserialization vulnerability in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or obtain sensitive information via crafted input to the data handling components. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de deserializaci\u00f3n insegura en ROS (sistema operativo de robot) Melodic Morenia en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, permite a atacantes ejecutar c\u00f3digo arbitrario u obtener informaci\u00f3n confidencial a trav\u00e9s de entradas manipuladas en los componentes de manejo de datos."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30667",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30672",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T08:15:11.517",
|
||||
"lastModified": "2024-05-17T02:38:53.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:16.250",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Arbitrary file upload vulnerability in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via the file upload component. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de carga arbitraria de archivos en ROS (Robot Operating System) Melodic Morenia en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, permite a atacantes ejecutar c\u00f3digo arbitrario, provocar una denegaci\u00f3n de servicio (DoS) y obtener informaci\u00f3n confidencial a trav\u00e9s del componente de carga de archivos."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30672",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30674",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T08:15:11.570",
|
||||
"lastModified": "2024-05-17T02:38:53.160",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:16.347",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauthorized access vulnerability in ROS2 Iron Irwini in ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to gain control of multiple ROS2 nodes. Unauthorized information access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de acceso no autorizado en ROS2 Iron Irwini en ROS_VERSION es 2 y ROS_PYTHON_VERSION es 3, permite a atacantes remotos obtener el control de m\u00faltiples nodos ROS2. El acceso no autorizado a la informaci\u00f3n a estos nodos podr\u00eda comprometer la integridad del sistema, la ejecuci\u00f3n de comandos arbitrarios y la divulgaci\u00f3n de informaci\u00f3n confidencial."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30674",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30675",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T08:15:11.627",
|
||||
"lastModified": "2024-05-17T02:38:53.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:16.433",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauthorized node injection vulnerability in ROS2 Iron Irwini in ROS_VERSION 2 and ROS_PYTHON_VERSION 3. This vulnerability could allow a malicious user to escalate privileges by injecting malicious ROS2 nodes into the system remotely. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n de nodo no autorizado en ROS2 Iron Irwini en ROS_VERSION 2 y ROS_PYTHON_VERSION 3. Esta vulnerabilidad podr\u00eda permitir a un usuario malintencionado escalar privilegios inyectando nodos ROS2 maliciosos en el sistema de forma remota."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30675",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30676",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T03:15:07.763",
|
||||
"lastModified": "2024-05-17T02:38:53.287",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:16.523",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Denial-of-Service (DoS) vulnerability exists in ROS2 Iron Irwini versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. A malicious user could potentially exploit this vulnerability remotely to crash the ROS2 nodes, thereby causing a denial of service. The flaw allows an attacker to cause unexpected behavior in the operation of ROS2 nodes, which leads to their failure and interrupts the regular operation of the system, thus making it unavailable for its intended users. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en las versiones de ROS2 Iron Irwini donde ROS_VERSION es 2 y ROS_PYTHON_VERSION es 3. Un usuario malintencionado podr\u00eda explotar esta vulnerabilidad de forma remota para bloquear los nodos ROS2, provocando as\u00ed una denegaci\u00f3n de servicio. La falla permite a un atacante provocar un comportamiento inesperado en el funcionamiento de los nodos ROS2, lo que provoca su falla e interrumpe el funcionamiento normal del sistema, haci\u00e9ndolo no disponible para los usuarios previstos."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30676",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30678",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T03:15:07.830",
|
||||
"lastModified": "2024-05-17T02:38:53.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:16.610",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue has been discovered in ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to intercept and access this data. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, donde el sistema transmite mensajes en texto plano. Esta falla expone informaci\u00f3n confidencial, haci\u00e9ndola vulnerable a ataques de intermediario (MitM) y permitiendo a los atacantes interceptar y acceder a estos datos."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30678",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30679",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T04:15:10.087",
|
||||
"lastModified": "2024-05-17T02:38:53.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:16.687",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the default configurations of ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to authenticate using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en las configuraciones predeterminadas de ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes no autenticados autenticarse utilizando credenciales predeterminadas."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30679",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30680",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T04:15:10.583",
|
||||
"lastModified": "2024-05-17T02:38:53.470",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:16.763",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Iron Irwini in versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de inyecci\u00f3n de Shell fue descubierta en ROS2 (Robot Operating System 2) Iron Irwini en las versiones ROS_VERSION 2 y ROS_PYTHON_VERSION 3, permite a los atacantes ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial debido a la forma en que ROS2 maneja la ejecuci\u00f3n de comandos de Shell en componentes como int\u00e9rpretes de comandos o interfaces que procesan entradas externas."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30680",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30681",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T04:15:10.747",
|
||||
"lastModified": "2024-05-17T02:38:53.530",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:16.847",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability has been discovered in ROS2 Iron Irwini version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en ROS2 Iron Irwini versi\u00f3n ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s del procesamiento de comandos o componentes de llamadas al sistema en ROS2."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30681",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30683",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T04:15:10.877",
|
||||
"lastModified": "2024-05-17T02:38:53.587",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:16.937",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de desbordamiento de b\u00fafer en los componentes C++ de ROS2 Iron Irwini versiones ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante el manejo inadecuado de matrices o cadenas."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30683",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30684",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T05:15:47.807",
|
||||
"lastModified": "2024-05-17T02:38:53.640",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:17.020",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An insecure logging vulnerability has been identified within ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to access sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad de registro inseguro en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes acceder a informaci\u00f3n confidencial a trav\u00e9s de medidas de seguridad inadecuadas implementadas dentro de los mecanismos de registro de ROS2."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30684",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30686",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T05:15:47.853",
|
||||
"lastModified": "2024-05-17T02:38:53.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:17.100",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes o nodos dentro del sistema ROS2."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30686",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30687",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T05:15:47.920",
|
||||
"lastModified": "2024-05-17T02:38:53.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:17.183",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An insecure deserialization vulnerability has been identified in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad de deserializaci\u00f3n insegura en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de una entrada manipulada para los componentes de serializaci\u00f3n y deserializaci\u00f3n de datos, los mecanismos de comunicaci\u00f3n entre procesos y las interfaces de comunicaci\u00f3n de red."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30687",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30688",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T05:15:47.980",
|
||||
"lastModified": "2024-05-17T02:38:53.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:17.260",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de carga de archivos arbitraria en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para el mecanismo de carga de archivos del sistema ROS2, incluida la funcionalidad del servidor para manejar la carga de archivos y los procesos de validaci\u00f3n asociados."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30688",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30690",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T06:15:08.963",
|
||||
"lastModified": "2024-05-17T02:38:53.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:17.340",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Galactic Geochelone versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to escalate privileges. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad de inyecci\u00f3n de nodo no autorizada en las versiones ROS2 Galactic Geochelone donde ROS_VERSION es 2 y ROS_PYTHON_VERSION es 3, lo que permite a atacantes remotos escalar privilegios."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30690",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30691",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T07:15:08.467",
|
||||
"lastModified": "2024-05-17T02:38:53.920",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:17.417",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 Galactic Geochelone in version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en ROS2 Galactic Geochelone en la versi\u00f3n ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios, obtener informaci\u00f3n confidencial y obtener acceso no autorizado a m\u00faltiples nodos ROS2."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30691",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30692",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T07:15:08.560",
|
||||
"lastModified": "2024-05-17T02:38:53.977",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:17.500",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A issue was discovered in ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) in the ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en las versiones ROS2 Galactic Geochelone ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (DoS) en los nodos ROS2."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30692",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30694",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T08:15:07.420",
|
||||
"lastModified": "2024-05-17T02:38:54.033",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:17.590",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de shell en ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial debido a la forma en que ROS2 maneja la ejecuci\u00f3n de comandos de shell en componentes como int\u00e9rpretes de comandos o interfaces que procesan entradas externas. NOTA: esto es cuestionado por varios terceros que creen que no hab\u00eda pruebas razonables para determinar la existencia de una vulnerabilidad."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30691",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30695",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T08:15:07.530",
|
||||
"lastModified": "2024-05-17T02:38:54.097",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:17.673",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the default configurations of ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en las configuraciones predeterminadas de ROS2 Galactic Geochelone versiones ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes no autenticados obtener acceso utilizando credenciales predeterminadas. NOTA: esto es cuestionado por varios terceros que creen que no hab\u00eda pruebas razonables para determinar la existencia de una vulnerabilidad."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30695",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30696",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T08:15:07.587",
|
||||
"lastModified": "2024-05-17T02:38:54.153",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:17.767",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OS command injection vulnerability in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2, including External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en ROS2 Galactic Geochelone en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s del procesamiento de comandos o componentes de llamadas al sistema en ROS2, incluidos m\u00f3dulos de ejecuci\u00f3n de comandos externos, controladores de llamadas del sistema y scripts de interfaz. NOTA: esto es cuestionado por varios terceros que creen que no hab\u00eda pruebas razonables para determinar la existencia de una vulnerabilidad."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30696",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30697",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T08:15:07.663",
|
||||
"lastModified": "2024-05-17T02:38:54.210",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:17.843",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en ROS2 Galactic Geochelone en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, donde el sistema transmite mensajes en texto sin formato, lo que permite a los atacantes acceder a informaci\u00f3n confidencial a trav\u00e9s de un ataque de intermediario. NOTA: esto es cuestionado por varios terceros que creen que no hab\u00eda pruebas razonables para determinar la existencia de una vulnerabilidad."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30697",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30699",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T08:15:07.717",
|
||||
"lastModified": "2024-05-17T02:38:54.260",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:17.920",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de desbordamiento de b\u00fafer en los componentes C++ de ROS2 Galactic Geochelone ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante un manejo inadecuado de matrices o cadenas. NOTA: esto es cuestionado por varios terceros que creen que no hab\u00eda pruebas razonables para determinar la existencia de una vulnerabilidad."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30699",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30701",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T08:15:07.770",
|
||||
"lastModified": "2024-05-17T02:38:54.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:18.000",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An insecure logging vulnerability in ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to obtain sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de registro inseguro en ROS2 Galactic Geochelone ROS_VERSION 2 y ROS_PYTHON_VERSION 3 permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de medidas de seguridad inadecuadas implementadas dentro de los mecanismos de registro de ROS2. NOTA: esto es cuestionado por varios terceros que creen que no hab\u00eda pruebas razonables para determinar la existencia de una vulnerabilidad."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30701",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30702",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T18:15:09.680",
|
||||
"lastModified": "2024-05-17T02:38:54.440",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:18.083",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en ROS2 Galactic Geochelone en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes o nodos dentro del sistema ROS2."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30702",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30703",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T18:15:09.743",
|
||||
"lastModified": "2024-05-17T02:38:54.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:18.163",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de carga de archivos arbitrarios en ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, provocar una denegaci\u00f3n de servicio (DoS) y obtener informaci\u00f3n confidencial a trav\u00e9s de una carga \u00fatil manipulada para el Mecanismo de carga de archivos del sistema ROS2, incluida la funcionalidad del servidor para manejar la carga de archivos y los procesos de validaci\u00f3n asociados."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30703",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30704",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T18:15:09.800",
|
||||
"lastModified": "2024-05-17T02:38:54.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:18.253",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An insecure deserialization vulnerability has been identified in ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad de deserializaci\u00f3n insegura en ROS2 Galactic Geochelone ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de entradas manipuladas en los componentes de serializaci\u00f3n y deserializaci\u00f3n de datos, los mecanismos de comunicaci\u00f3n entre procesos y las interfaces de comunicaci\u00f3n de red."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30704",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30706",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T19:15:38.980",
|
||||
"lastModified": "2024-05-17T02:38:54.640",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:18.333",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 Dashing Diademata versions ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en las versiones ROS2 Dashing Diademata ROS_VERSION es 2 y ROS_PYTHON_VERSION es 3, permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios, obtener informaci\u00f3n confidencial y obtener acceso no autorizado a m\u00faltiples nodos ROS2."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30706",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30707",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T01:15:19.053",
|
||||
"lastModified": "2024-05-17T02:38:54.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T00:15:09.080",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauthorized node injection vulnerability in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n de nodo no autorizado en ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, permite a atacantes remotos escalar privilegios e inyectar nodos ROS2 maliciosos en el sistema."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30707",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30708",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T01:15:19.110",
|
||||
"lastModified": "2024-05-17T02:38:54.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:18.560",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de los nodos ROS2."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30708",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30710",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T01:15:19.160",
|
||||
"lastModified": "2024-05-17T02:38:54.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:18.640",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to easily intercept and access this data. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, donde el sistema transmite mensajes en texto plano. Esta falla expone informaci\u00f3n confidencial, haci\u00e9ndola vulnerable a ataques de intermediario (MitM) y permitiendo a los atacantes interceptar y acceder f\u00e1cilmente a estos datos."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30710",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30711",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T02:15:10.300",
|
||||
"lastModified": "2024-05-17T02:38:54.870",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:18.727",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the default configurations of ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en las configuraciones predeterminadas de ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes no autenticados obtener acceso utilizando las credenciales predeterminadas."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30711",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30712",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T02:15:10.400",
|
||||
"lastModified": "2024-05-17T02:38:54.930",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:18.823",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de shell en ROS2 (Robot Operating System 2) Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial debido a la forma en que ROS2 maneja la ejecuci\u00f3n de comandos de shell en componentes como int\u00e9rpretes de comandos o interfaces que procesan entradas externas."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30712",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30713",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T02:15:10.473",
|
||||
"lastModified": "2024-05-17T02:38:54.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:18.910",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability has been discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de los m\u00f3dulos de ejecuci\u00f3n de comandos externos, los controladores de llamadas del sistema y los scripts de interfaz."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30713",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30715",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T02:15:10.527",
|
||||
"lastModified": "2024-05-17T02:38:55.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:18.987",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de desbordamiento de b\u00fafer en los componentes C++ de ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante el manejo inadecuado de matrices o cadenas."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30715",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30716",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T02:15:10.590",
|
||||
"lastModified": "2024-05-17T02:38:55.283",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:19.070",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An insecure logging vulnerability in ROS2 Dashing Diademata ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attacks to obtain sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de registro inseguro en ROS2 Dashing Diademata ROS_VERSION 2 y ROS_PYTHON_VERSION 3 permite que los ataques obtengan informaci\u00f3n confidencial a trav\u00e9s de medidas de seguridad inadecuadas implementadas dentro de los mecanismos de registro de ROS2."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30716",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30718",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T03:15:06.680",
|
||||
"lastModified": "2024-05-17T02:38:55.357",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:19.147",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION=2 and ROS_PYTHON_VERSION=3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en ROS2 Dashing Diademata en ROS_VERSION=2 y ROS_PYTHON_VERSION=3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes o nodos dentro del sistema ROS2."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30718",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30719",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T03:15:06.740",
|
||||
"lastModified": "2024-05-17T02:38:55.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:19.223",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An insecure deserialization vulnerability has been identified in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad de deserializaci\u00f3n insegura en ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de componentes de serializaci\u00f3n y deserializaci\u00f3n de datos, mecanismos de comunicaci\u00f3n entre procesos e interfaces de comunicaci\u00f3n de red."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30719",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30721",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T03:15:06.797",
|
||||
"lastModified": "2024-05-17T02:38:55.467",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:19.310",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de carga de archivos arbitraria en ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, provocar una denegaci\u00f3n de servicio (DoS) y obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado para el mecanismo de carga de archivos del Sistema ROS2, incluida la funcionalidad del servidor para manejar la carga de archivos y los procesos de validaci\u00f3n asociados."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30721",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30722",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T03:15:06.853",
|
||||
"lastModified": "2024-05-17T02:38:55.557",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:19.390",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de los nodos ROS."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30722",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30723",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T03:15:06.907",
|
||||
"lastModified": "2024-05-17T02:38:55.617",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:19.477",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthorized node injection vulnerability has been identified in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS nodes into the system due to insecure permissions. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad de inyecci\u00f3n de nodo no autorizado en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos escalar privilegios e inyectar nodos ROS maliciosos en el sistema debido a permisos inseguros."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30723",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30724",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T04:15:09.960",
|
||||
"lastModified": "2024-05-17T02:38:55.680",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:19.553",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios, obtener informaci\u00f3n confidencial y obtener acceso no autorizado a m\u00faltiples nodos ROS."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30724",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30726",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T04:15:10.040",
|
||||
"lastModified": "2024-05-17T02:38:55.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:19.633",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A shell injection vulnerability was discovered in ROS (Robot Operating System) Kinetic Kame in ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de shell en ROS (Robot Operating System) Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial debido a la forma en que ROS maneja la ejecuci\u00f3n de comandos de shell en componentes como int\u00e9rpretes de comandos o interfaces que procesan entradas externas."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30726",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30727",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T04:15:10.213",
|
||||
"lastModified": "2024-05-17T02:38:55.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:19.710",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS Kinetic Kame in Kinetic Kame ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, where the system transmits messages in plaintext, allowing attackers to obtain sensitive information via a man-in-the-middle attack. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en ROS Kinetic Kame en Kinetic Kame ROS_VERSION 1 y ROS_ PYTHON_VERSION 3, donde el sistema transmite mensajes en texto plano, lo que permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de un ataque de intermediario."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30727",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30728",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T23:15:07.317",
|
||||
"lastModified": "2024-05-17T02:38:55.927",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:19.790",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the default configurations of ROS (Robot Operating System) Kinetic Kame ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en las configuraciones predeterminadas de ROS (sistema operativo de robot) Kinetic Kame ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes no autenticados obtener acceso utilizando las credenciales predeterminadas."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30728",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,43 +2,14 @@
|
||||
"id": "CVE-2024-30729",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T05:15:49.863",
|
||||
"lastModified": "2024-05-17T02:38:55.990",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:19.870",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability has been discovered in ROS Kinetic Kame in ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de m\u00f3dulos de ejecuci\u00f3n de comandos externos, controladores de llamadas del sistema y scripts de interfaz."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://ros.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30729",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30730",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T05:15:49.920",
|
||||
"lastModified": "2024-05-17T02:38:56.073",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:19.953",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An insecure logging vulnerability has been identified within ROS Kinetic Kame in ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, allows attackers to obtain sensitive information via inadequate security measures implemented within the logging mechanisms of ROS. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad de registro inseguro dentro de ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de medidas de seguridad inadecuadas implementadas dentro de los mecanismos de registro de ROS."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30730",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30733",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T05:15:49.983",
|
||||
"lastModified": "2024-05-17T02:38:56.127",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:20.033",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS Kinetic Kame in ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings within these components. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de desbordamiento de b\u00fafer en los componentes C++ de ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante el manejo inadecuado de matrices o cadenas dentro de estos componentes."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30733",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30735",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T05:15:50.040",
|
||||
"lastModified": "2024-05-17T02:38:56.187",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:20.110",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability has been discovered in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via crafted payload to the file upload mechanism of the ROS system, including the server\u2019s functionality for handling file uploads and the associated validation processes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de carga de archivos arbitraria en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, provocar una denegaci\u00f3n de servicio (DoS) y obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado para el mecanismo de carga de archivos de ROS. sistema, incluida la funcionalidad del servidor para manejar la carga de archivos y los procesos de validaci\u00f3n asociados."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30735",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30736",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T05:15:50.090",
|
||||
"lastModified": "2024-05-17T02:38:56.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:20.203",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An insecure deserialization vulnerability has been identified in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad de deserializaci\u00f3n insegura en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de los componentes de serializaci\u00f3n y deserializaci\u00f3n de datos, los mecanismos de comunicaci\u00f3n entre procesos y las interfaces de comunicaci\u00f3n de red."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30736",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-30737",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T05:15:50.147",
|
||||
"lastModified": "2024-05-17T02:38:56.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T01:15:20.303",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes o nodos dentro del sistema ROS."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30737",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
88
CVE-2024/CVE-2024-53xx/CVE-2024-5384.json
Normal file
88
CVE-2024/CVE-2024-53xx/CVE-2024-5384.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-5384",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-27T00:15:09.280",
|
||||
"lastModified": "2024-05-27T00:15:09.280",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in SourceCodester Facebook News Feed Like 1.0. This vulnerability affects unknown code of the file index.php. The manipulation of the argument page leads to sql injection. The attack can be initiated remotely. VDB-266302 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.266302",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.266302",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.344502",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-53xx/CVE-2024-5385.json
Normal file
88
CVE-2024/CVE-2024-53xx/CVE-2024-5385.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-5385",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-27T00:15:09.570",
|
||||
"lastModified": "2024-05-27T00:15:09.570",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in oretnom23 Online Car Wash Booking System 1.0. This issue affects some unknown processing of the file /admin/?page=user/list. The manipulation of the argument First Name/Last Name with the input <script>confirm (document.cookie)</script> leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-266303."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.4,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.3
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.266303",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.266303",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.344504",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-53xx/CVE-2024-5390.json
Normal file
92
CVE-2024/CVE-2024-53xx/CVE-2024-5390.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-5390",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-27T01:15:20.410",
|
||||
"lastModified": "2024-05-27T01:15:20.410",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in itsourcecode Online Student Enrollment System 1.0. Affected is an unknown function of the file listofstudent.php. The manipulation of the argument lname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266304."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.266304",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.266304",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.344603",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-53xx/CVE-2024-5391.json
Normal file
92
CVE-2024/CVE-2024-53xx/CVE-2024-5391.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-5391",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-27T01:15:20.693",
|
||||
"lastModified": "2024-05-27T01:15:20.693",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in itsourcecode Online Student Enrollment System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file listofsubject.php. The manipulation of the argument subjcode leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266305 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/4",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.266305",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.266305",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.344605",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
54
README.md
54
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-26T23:55:29.970342+00:00
|
||||
2024-05-27T02:00:29.975692+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-26T23:15:22.423000+00:00
|
||||
2024-05-27T01:15:20.693000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,36 +27,56 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-05-26T00:00:20.237087+00:00
|
||||
2024-05-27T00:00:20.286924+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
251826
|
||||
251832
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `10`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2024-34454](CVE-2024/CVE-2024-344xx/CVE-2024-34454.json) (`2024-05-26T22:15:08.650`)
|
||||
- [CVE-2024-36054](CVE-2024/CVE-2024-360xx/CVE-2024-36054.json) (`2024-05-26T23:15:21.370`)
|
||||
- [CVE-2024-36055](CVE-2024/CVE-2024-360xx/CVE-2024-36055.json) (`2024-05-26T23:15:21.457`)
|
||||
- [CVE-2024-36056](CVE-2024/CVE-2024-360xx/CVE-2024-36056.json) (`2024-05-26T23:15:21.520`)
|
||||
- [CVE-2024-4286](CVE-2024/CVE-2024-42xx/CVE-2024-4286.json) (`2024-05-26T23:15:21.600`)
|
||||
- [CVE-2024-5378](CVE-2024/CVE-2024-53xx/CVE-2024-5378.json) (`2024-05-26T22:15:08.747`)
|
||||
- [CVE-2024-5379](CVE-2024/CVE-2024-53xx/CVE-2024-5379.json) (`2024-05-26T22:15:09.020`)
|
||||
- [CVE-2024-5380](CVE-2024/CVE-2024-53xx/CVE-2024-5380.json) (`2024-05-26T23:15:21.887`)
|
||||
- [CVE-2024-5381](CVE-2024/CVE-2024-53xx/CVE-2024-5381.json) (`2024-05-26T23:15:22.150`)
|
||||
- [CVE-2024-5383](CVE-2024/CVE-2024-53xx/CVE-2024-5383.json) (`2024-05-26T23:15:22.423`)
|
||||
- [CVE-2024-30657](CVE-2024/CVE-2024-306xx/CVE-2024-30657.json) (`2024-05-27T00:15:08.743`)
|
||||
- [CVE-2024-30658](CVE-2024/CVE-2024-306xx/CVE-2024-30658.json) (`2024-05-27T00:15:09.013`)
|
||||
- [CVE-2024-5384](CVE-2024/CVE-2024-53xx/CVE-2024-5384.json) (`2024-05-27T00:15:09.280`)
|
||||
- [CVE-2024-5385](CVE-2024/CVE-2024-53xx/CVE-2024-5385.json) (`2024-05-27T00:15:09.570`)
|
||||
- [CVE-2024-5390](CVE-2024/CVE-2024-53xx/CVE-2024-5390.json) (`2024-05-27T01:15:20.410`)
|
||||
- [CVE-2024-5391](CVE-2024/CVE-2024-53xx/CVE-2024-5391.json) (`2024-05-27T01:15:20.693`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `81`
|
||||
|
||||
- [CVE-2024-33427](CVE-2024/CVE-2024-334xx/CVE-2024-33427.json) (`2024-05-26T22:15:08.427`)
|
||||
- [CVE-2024-30704](CVE-2024/CVE-2024-307xx/CVE-2024-30704.json) (`2024-05-27T01:15:18.253`)
|
||||
- [CVE-2024-30706](CVE-2024/CVE-2024-307xx/CVE-2024-30706.json) (`2024-05-27T01:15:18.333`)
|
||||
- [CVE-2024-30707](CVE-2024/CVE-2024-307xx/CVE-2024-30707.json) (`2024-05-27T00:15:09.080`)
|
||||
- [CVE-2024-30708](CVE-2024/CVE-2024-307xx/CVE-2024-30708.json) (`2024-05-27T01:15:18.560`)
|
||||
- [CVE-2024-30710](CVE-2024/CVE-2024-307xx/CVE-2024-30710.json) (`2024-05-27T01:15:18.640`)
|
||||
- [CVE-2024-30711](CVE-2024/CVE-2024-307xx/CVE-2024-30711.json) (`2024-05-27T01:15:18.727`)
|
||||
- [CVE-2024-30712](CVE-2024/CVE-2024-307xx/CVE-2024-30712.json) (`2024-05-27T01:15:18.823`)
|
||||
- [CVE-2024-30713](CVE-2024/CVE-2024-307xx/CVE-2024-30713.json) (`2024-05-27T01:15:18.910`)
|
||||
- [CVE-2024-30715](CVE-2024/CVE-2024-307xx/CVE-2024-30715.json) (`2024-05-27T01:15:18.987`)
|
||||
- [CVE-2024-30716](CVE-2024/CVE-2024-307xx/CVE-2024-30716.json) (`2024-05-27T01:15:19.070`)
|
||||
- [CVE-2024-30718](CVE-2024/CVE-2024-307xx/CVE-2024-30718.json) (`2024-05-27T01:15:19.147`)
|
||||
- [CVE-2024-30719](CVE-2024/CVE-2024-307xx/CVE-2024-30719.json) (`2024-05-27T01:15:19.223`)
|
||||
- [CVE-2024-30721](CVE-2024/CVE-2024-307xx/CVE-2024-30721.json) (`2024-05-27T01:15:19.310`)
|
||||
- [CVE-2024-30722](CVE-2024/CVE-2024-307xx/CVE-2024-30722.json) (`2024-05-27T01:15:19.390`)
|
||||
- [CVE-2024-30723](CVE-2024/CVE-2024-307xx/CVE-2024-30723.json) (`2024-05-27T01:15:19.477`)
|
||||
- [CVE-2024-30724](CVE-2024/CVE-2024-307xx/CVE-2024-30724.json) (`2024-05-27T01:15:19.553`)
|
||||
- [CVE-2024-30726](CVE-2024/CVE-2024-307xx/CVE-2024-30726.json) (`2024-05-27T01:15:19.633`)
|
||||
- [CVE-2024-30727](CVE-2024/CVE-2024-307xx/CVE-2024-30727.json) (`2024-05-27T01:15:19.710`)
|
||||
- [CVE-2024-30728](CVE-2024/CVE-2024-307xx/CVE-2024-30728.json) (`2024-05-27T01:15:19.790`)
|
||||
- [CVE-2024-30729](CVE-2024/CVE-2024-307xx/CVE-2024-30729.json) (`2024-05-27T01:15:19.870`)
|
||||
- [CVE-2024-30730](CVE-2024/CVE-2024-307xx/CVE-2024-30730.json) (`2024-05-27T01:15:19.953`)
|
||||
- [CVE-2024-30733](CVE-2024/CVE-2024-307xx/CVE-2024-30733.json) (`2024-05-27T01:15:20.033`)
|
||||
- [CVE-2024-30735](CVE-2024/CVE-2024-307xx/CVE-2024-30735.json) (`2024-05-27T01:15:20.110`)
|
||||
- [CVE-2024-30736](CVE-2024/CVE-2024-307xx/CVE-2024-30736.json) (`2024-05-27T01:15:20.203`)
|
||||
- [CVE-2024-30737](CVE-2024/CVE-2024-307xx/CVE-2024-30737.json) (`2024-05-27T01:15:20.303`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
190
_state.csv
190
_state.csv
@ -224813,9 +224813,9 @@ CVE-2023-33561,0,0,7d7270ac1ff79133ddaf63e3919229ff4117e702565f7588fe0652c2af7ee
|
||||
CVE-2023-33562,0,0,93ca40959e3c7c5363a1d165b8c8e7a2a8997b6b7fa9c80635dff7a8db780cff,2023-11-07T04:15:02.310000
|
||||
CVE-2023-33563,0,0,2bf0bb84a4bc7f64f91b799953743cb871207baae5873f68deede9053cd3005c,2023-11-07T04:15:03.383000
|
||||
CVE-2023-33564,0,0,ec84ea26aaf2dcb3b9661f384bad9240a076dacca630dc70980effeff0964e71,2023-11-07T04:15:04.680000
|
||||
CVE-2023-33565,0,0,a284ddb304e925e80b9dfc8c802b6a4c6dfec6b6aff32d4c2b9d7bb0aab0da19,2024-05-17T02:24:46.420000
|
||||
CVE-2023-33566,0,0,36eb4bc084fb5978c171d8d5f34c42a05b8fc4da974b001adc8718eb9dbefd94,2024-05-17T02:24:46.550000
|
||||
CVE-2023-33567,0,0,5af1b35a07d7ae2f11ddcb1743b681758733050d9b1070e70f637ba07c11186c,2024-05-17T02:24:46.650000
|
||||
CVE-2023-33565,0,1,4b44492d02684e3818a43db3b9a019e33bd2d090fc3358811dba7bedbf0d848b,2024-05-27T01:15:12.923000
|
||||
CVE-2023-33566,0,1,1ad2c6794364a2fa5d040a81a6f50b414d78e245f45db979f17d633f4db820f8,2024-05-27T01:15:13.207000
|
||||
CVE-2023-33567,0,1,802f34481cdb1bc2f5692188496f8bbcf084d8ee40f2577f89c61a8d19504d8c,2024-05-27T01:15:13.333000
|
||||
CVE-2023-33568,0,0,9abd2c0080f8890623fd1ef22b3158ba405bb6796b357a4a7743a12bd9fbf687,2023-06-23T19:22:43.680000
|
||||
CVE-2023-33569,0,0,45131024b6b9cedaeb3b0384be615a9c63428a7f85e26f1982e9efc95b235e43,2023-06-13T15:17:31.487000
|
||||
CVE-2023-3357,0,0,1795badf23992d8257da46aa6b4ec132f0faaa631a40ad67acb153f32fe5caf6,2023-07-06T17:45:06.373000
|
||||
@ -237091,15 +237091,15 @@ CVE-2023-5116,0,0,d922ad8efb7c4092dfcc67df369758f2993af13c7f9bf47b3c79997ce8f376
|
||||
CVE-2023-5118,0,0,47d5b7062846878e0011ff2a12fd5f062c384abc19e7acc1db2a397062d6e3c7,2024-01-18T16:01:37.653000
|
||||
CVE-2023-5119,0,0,455e9f236dbff01f8e8bc2e276d6d6b0e6e7ce4bb8696bfeb9b59080374876f8,2023-11-27T16:33:20.673000
|
||||
CVE-2023-51195,0,0,c6bcd636c7b5d9416e056ae1443369d1f2faa536267864b89f54dfc132468fa2,2024-01-10T20:15:45.393000
|
||||
CVE-2023-51197,0,0,c7c6a1d04c416270a01f6fbd3b071cabffba6d98ebd01fbc48b540b8a976da73,2024-05-17T02:32:15.297000
|
||||
CVE-2023-51198,0,0,26b0169e164851c1fda51f0f888c88877a5c8bd2e5dff8a48c89745c8cf1442e,2024-05-17T02:32:15.383000
|
||||
CVE-2023-51199,0,0,ae12cfd76c69323f3ccc341b4ae0bcdb81fd745662b579e5f085bfc23401ca4f,2024-05-17T02:32:15.473000
|
||||
CVE-2023-51197,0,1,8f4e4176f5affe78106e74bab92f697f7dc8533d995fda35bf4939dd3ac25cd8,2024-05-27T01:15:13.443000
|
||||
CVE-2023-51198,0,1,6622b4daa4cb761096fc36c4c1993f07b042a2d15aceb56e48c6d21d145cdb81,2024-05-27T01:15:13.587000
|
||||
CVE-2023-51199,0,1,ea21b96cbff887e3a291c54a0eb2a8905e2c15b25ab6b5807fbd4a0f06f16be0,2024-05-27T01:15:13.703000
|
||||
CVE-2023-5120,0,0,274c6e59a1c326935c917735ea0c01d2c7f3eaf0117080f7a1fe00dea446abc2,2023-11-07T04:23:28.620000
|
||||
CVE-2023-51200,0,0,c88e15c1c72afc794b8720a36d2c9a6aed86335734ab41b3499fc7162313b308,2024-05-17T02:32:15.570000
|
||||
CVE-2023-51201,0,0,ed10729f0ef9d6836d6f4765236f2dc56954a5b2cafd1dbf3f92c3a1b85202ff,2024-05-17T02:32:15.670000
|
||||
CVE-2023-51202,0,0,e5add73dd3a15cbd04f3f54f88fd20d61190be4083da2b87d3543a2c9db074cc,2024-05-17T02:32:15.767000
|
||||
CVE-2023-51204,0,0,8fde8eb9cc8e1477b7e164e9e11055e242584ce62df045967996e290f14c6f87,2024-05-17T02:32:15.853000
|
||||
CVE-2023-51208,0,0,48db0803a48bf2e1dbc1b7d41d812b63e12b58e1b1b0d829e3eb359ba48e7a90,2024-05-17T02:32:15.943000
|
||||
CVE-2023-51200,0,1,0542aaccbedaec19ab8e3670cab621795a4d359ef3acdc57b65d7ee39ba3e922,2024-05-27T01:15:13.840000
|
||||
CVE-2023-51201,0,1,b268d0d1519dcd8d57483fb9d40fe8e94a09e81116e4f7022ba110b895d98ae3,2024-05-27T01:15:13.960000
|
||||
CVE-2023-51202,0,1,f42db584d4d047fa4e5a992bf063337e1b8bafd9c74cf48b2162e38c25bf2888,2024-05-27T01:15:14.070000
|
||||
CVE-2023-51204,0,1,cb5ccb15859b7d1663a795ff0026c09fba256fef95fb062659af9f52b44baa64,2024-05-27T01:15:14.180000
|
||||
CVE-2023-51208,0,1,e261de9355cad864421170cb3b3ffb379d74ac3894a1acccef17b77f99d2bf56,2024-05-27T01:15:14.283000
|
||||
CVE-2023-5121,0,0,5134c4a98b2fbb366eaa7660e6d7aecc00f15fa4685ab925e722a2daeab513d4,2023-11-07T04:23:28.827000
|
||||
CVE-2023-51210,0,0,ae23e1dd56bc994975ad1cf5f43a03ff833adca03d4acec46183d1f35028673b,2024-01-29T19:38:28.213000
|
||||
CVE-2023-51217,0,0,609ce02576608b7bece0fa3e03a269d7ff1a0d343c7aa4770e1650d18ab2f9db,2024-01-26T14:40:49.700000
|
||||
@ -247388,22 +247388,22 @@ CVE-2024-29432,0,0,935ce59b23319f15478ff1d005b1786853efcea9f20ed5b78b83dcf1879a3
|
||||
CVE-2024-29433,0,0,b10a666a979afbf6ffc25b1ef458e1d0fb9c766493f3b32e8a3cbc2c3e4a9e2b,2024-04-02T12:50:42.233000
|
||||
CVE-2024-29434,0,0,e2dd739e4fe1b524f01d6355aa24f60868a619e4b33fdd429c31c5ef2f0acc1e,2024-04-03T12:38:04.840000
|
||||
CVE-2024-29435,0,0,4d03d83d8cb615246ed4e783c1ea07f9aee9ed7e6aa6133cefbb15bfb0a5c168,2024-04-02T12:50:42.233000
|
||||
CVE-2024-29439,0,0,bb972609e982cc2c7c58917698ad9a0bc1ee3ff8e4ac0fb30c6f619ed778adef,2024-05-17T02:37:51.987000
|
||||
CVE-2024-29439,0,1,5f33d479d792b88dc65e07dae14916156f97ff2d574fe6b752d04d58cd17848f,2024-05-27T01:15:14.397000
|
||||
CVE-2024-2944,0,0,28a5ed5a313327b41fbf4d15081236d8d2af310b8671b60b5fd47063cbcc4770,2024-05-17T02:38:38.893000
|
||||
CVE-2024-29440,0,0,f9f4f940cc942e481a727f419828d56f454a2f914e0f99eb994397268df4bcd9,2024-05-17T02:37:52.050000
|
||||
CVE-2024-29441,0,0,7e08d9c94c95459c4704198a67060125627cb2cc67309fc02c628f87b139ce50,2024-05-17T02:37:52.107000
|
||||
CVE-2024-29442,0,0,fca3b1fdb675778d7e5e8fdcaabb89ab1194684a41f447d436dac8e24d40b0ac,2024-05-17T02:37:52.163000
|
||||
CVE-2024-29443,0,0,232e1a2b5c17c718b3ffe20285378d8535b00af05fd113aeaf188db0ce7a55e5,2024-05-17T02:37:52.220000
|
||||
CVE-2024-29444,0,0,0aa8b39052a0f16a7a24e6f74e9b967ac0ce8b20c48376c5ed34a945631066f0,2024-05-17T02:37:52.273000
|
||||
CVE-2024-29445,0,0,cccc5db5a69e2a46b367864f196a942a273d00bb6e0d3b00ab21815745b4830c,2024-05-17T02:37:52.330000
|
||||
CVE-2024-29447,0,0,51a8fa1c4998d0d1c428ce8c9146853636cae0f15868e961a36879ebc50ae398,2024-05-17T02:37:52.383000
|
||||
CVE-2024-29448,0,0,a7eb80602d315f3770ee772a141c627905693bff6fab0e179b75ab8f7ae6d05c,2024-05-17T02:37:52.437000
|
||||
CVE-2024-29449,0,0,bcf572dd58eb7b996a19c15079d7152d267a53b8ab9b584136de5d78fd0057d8,2024-05-17T02:37:52.497000
|
||||
CVE-2024-29440,0,1,536ce1355c4ff21d9eb5d18aa27903a4d5cfd52ff39a55ad14e35ab52a2b3d34,2024-05-27T01:15:14.497000
|
||||
CVE-2024-29441,0,1,6c01779b032b5a151287f52a91932196b97e2a24d6dd604623cbfc55998cff00,2024-05-27T01:15:14.590000
|
||||
CVE-2024-29442,0,1,5577e99142b02eb31dd7c68e0ffcf024d2bb2cefb70dc861b3ea34ab62fd01a1,2024-05-27T01:15:14.673000
|
||||
CVE-2024-29443,0,1,8b3af897e0d54f97df78d5f695d658a20f1a1d4541d15f75d5052c2cfc1822a6,2024-05-27T01:15:14.760000
|
||||
CVE-2024-29444,0,1,08be83f043d947d2397ae77f59b82fbaff0a2986d15e6e310434dcba5d226c83,2024-05-27T01:15:14.847000
|
||||
CVE-2024-29445,0,1,85e5b627f65440765fa80d961e313f55a73af3749e31b09b423fb125c85de873,2024-05-27T01:15:14.933000
|
||||
CVE-2024-29447,0,1,797493894c73e0788ea1b0675e91568cc1b1cffb6d8c5ee42881f3e276113f1e,2024-05-27T01:15:15.013000
|
||||
CVE-2024-29448,0,1,bd7279bc396ccb746015d98e9d257c196122e683b0fbcafc8f411b10fd1be7a6,2024-05-27T01:15:15.103000
|
||||
CVE-2024-29449,0,1,ea90fd1cc3726264bb0a33c176590aa1b45ebee0e168abdff93b4bfaaad394d5,2024-05-27T01:15:15.200000
|
||||
CVE-2024-2945,0,0,8689450ab0009c5d4d63f7d3640c91cff84d45d6a1250d9459c62f7180058fd7,2024-05-17T02:38:38.987000
|
||||
CVE-2024-29450,0,0,d888d4597fa2ebcc912c8fe72954b3685bc672cee9db9360113293ff7f473dbd,2024-05-17T02:37:52.553000
|
||||
CVE-2024-29452,0,0,f81d4dfaf74b303859ed7e8b360d4e5549fb0ece5c2f13ac1aa06cd51e01fa19,2024-05-17T02:37:52.603000
|
||||
CVE-2024-29454,0,0,16984211295f8bd8a7cd210f46251831e17dc8969eb73498d223c32704f5fde8,2024-05-17T02:37:52.660000
|
||||
CVE-2024-29455,0,0,283fbacb6ad6238f8a71000402182860d84f283aac110f3d6f4337183232242c,2024-05-17T02:37:52.713000
|
||||
CVE-2024-29450,0,1,2cfac1fd27828253e5917a28615c8e4f1b234c2a793ef5df4a6e9bf3d7c82962,2024-05-27T01:15:15.293000
|
||||
CVE-2024-29452,0,1,0b6086fde432e35bdd64ca6ef2a9a853eee149b4cde2f1d09d9c8b4eec3ee628,2024-05-27T01:15:15.387000
|
||||
CVE-2024-29454,0,1,aa15960195507983d36d6e2ba6fe52c5783793504e2d3e8d91a9bb9866998c45,2024-05-27T01:15:15.473000
|
||||
CVE-2024-29455,0,1,34e13e15e8ba1247bab4074112a2a8e07941c50f23ef976a2aa4934ef2701aea,2024-05-27T01:15:15.573000
|
||||
CVE-2024-2946,0,0,b86288fa77fb47b4b83be2e46631f0944d38df3dbc98c9ee65a2d9324fa3b190,2024-04-10T13:23:38.787000
|
||||
CVE-2024-29460,0,0,b846dd78dc5e35e9b0ddcbf6b64c6fe8dd169ef35be60b3c712c2dd2787cb070,2024-04-11T12:47:44.137000
|
||||
CVE-2024-29461,0,0,0ea3979c495137b90acde4ca36a0a99c570c5e7619fef41ff59b36c98cf5a199,2024-04-15T13:15:51.577000
|
||||
@ -248187,68 +248187,70 @@ CVE-2024-3064,0,0,150d2695d7eeb315cec549f12d6c6ef3f6e02daaf223b84571983b190cdbdb
|
||||
CVE-2024-30645,0,0,00b9821a66dbca80d2d2c9c63858e19e8817ea8f49dc6578caf9fd20dddfbebc,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3065,0,0,b61f01dabfbfeec829c2b81f152d714ccf536ed8346282686b7cf0c8b5486e49,2024-05-24T01:15:30.977000
|
||||
CVE-2024-30656,0,0,c800b352c15d86c6b7538edefbe50a56ea126bd7af414b5024084888358a8802,2024-04-16T13:24:07.103000
|
||||
CVE-2024-30659,0,0,5ebf34ef5301500333f12d205c33075783bdc7dbc5af4530638bd854345f163a,2024-05-17T02:38:52.657000
|
||||
CVE-2024-30657,1,1,585f7e2848bf503d5422cb1dd7e0346d7ca1c3aad5ef72e83d31139f80ff60cd,2024-05-27T00:15:08.743000
|
||||
CVE-2024-30658,1,1,1e3e9ee4bef53a9461f98315e54fc9a85c79a3a7a0b5f257971911bbc371ffcc,2024-05-27T00:15:09.013000
|
||||
CVE-2024-30659,0,1,a92cf3f153e28f676099dbfee74930eb22cd5acb32aa75ca390c336b74232a86,2024-05-27T01:15:15.650000
|
||||
CVE-2024-3066,0,0,a435028a5d7598a92054eb3093db9c4c779b7421b23d7afed7784d55b0153283,2024-05-22T12:46:53.887000
|
||||
CVE-2024-30661,0,0,88961c68164195d32bc65e56a0bbd80e308ffd2aa77a21587735d569b05581db,2024-05-17T02:38:52.723000
|
||||
CVE-2024-30662,0,0,b421ff83822b51cda6c460942ac276618f034952deca1b4e59ee97e2130b1138,2024-05-17T02:38:52.780000
|
||||
CVE-2024-30663,0,0,760682cd809c7d496d8de12f2d757101acf8f3470f03e2930af8b29338d9ca50,2024-05-17T02:38:52.837000
|
||||
CVE-2024-30665,0,0,0f10bdfbccc4c49c82541739ad789a42ad1e1370c9cfdb6871b1055cbc7ccd35,2024-05-17T02:38:52.903000
|
||||
CVE-2024-30666,0,0,69dbdd961c21404f6e1fad530af274bcf5da884b0497e2a285e80045ea32998e,2024-05-17T02:38:52.970000
|
||||
CVE-2024-30667,0,0,a287394e96855ecb2992479e91843c521de9d7e9bdace5680eaefbae569d62fd,2024-05-17T02:38:53.033000
|
||||
CVE-2024-30661,0,1,90ed1de506113e6de30bfddf49586791fbd86c6969df5315123273d18e7c526e,2024-05-27T01:15:15.757000
|
||||
CVE-2024-30662,0,1,ec42c7267b8836b24e1d552e10421d50cc3c53077c04b49bbb9e908298fe5a2a,2024-05-27T01:15:15.843000
|
||||
CVE-2024-30663,0,1,714b3fe59424c2476b503ca9801887e4407db94f3f470cdbad5a15d04e56a3de,2024-05-27T01:15:15.930000
|
||||
CVE-2024-30665,0,1,1cb87b727e729d97e5d8d0b7623b85bcfbfae97f30ccd6903db8d6eb70bad78c,2024-05-27T01:15:16.010000
|
||||
CVE-2024-30666,0,1,36f1aba96f78822899fc682b6c33babcc91454815147f5b0cf4172d1353b573b,2024-05-27T01:15:16.093000
|
||||
CVE-2024-30667,0,1,ff94011519580c340f2cec76520b1057abfe8374eb32195c92e04c23c01382f6,2024-05-27T01:15:16.173000
|
||||
CVE-2024-3067,0,0,583df5bf9514ea78fe346bb52f08143b4414e3b07f49a1ca00cb0a4ce95ab3f7,2024-04-16T13:24:07.103000
|
||||
CVE-2024-30672,0,0,c5ca4e8da59e1ed717ad0e3275d67229ae696cdd53d1b0c905eb7a572c19b7e7,2024-05-17T02:38:53.093000
|
||||
CVE-2024-30674,0,0,e02b6891d7a4bd8a45d4032ec3a866bada7240f75c9d493af6f4534f6d6a72f8,2024-05-17T02:38:53.160000
|
||||
CVE-2024-30675,0,0,a9114bd90ee39955a67798a759a0e426ac624afe71f3caf485e35bb27a486caa,2024-05-17T02:38:53.220000
|
||||
CVE-2024-30676,0,0,7d4060c8bf27a611da143f11109a4f08a9a3ea1e8b1dcf7f54898a16d706a6d5,2024-05-17T02:38:53.287000
|
||||
CVE-2024-30678,0,0,0a912776d7d04c3487e0f7ab00df2657d6461a3b3991f78976cb4fcf78f076f0,2024-05-17T02:38:53.350000
|
||||
CVE-2024-30679,0,0,31ef3cd3ff2bbd52aa46619a947be5e41233852b892d3e3f7e5aaf070c3deab9,2024-05-17T02:38:53.410000
|
||||
CVE-2024-30672,0,1,077b9a700b807eb0e14d2db7cda25cb224a478ee7086ae9c2cb95db53c51d2fc,2024-05-27T01:15:16.250000
|
||||
CVE-2024-30674,0,1,437e4e67c37f80747df887f90336a94a9ec86b622d0825ad3dd1550cd38928c5,2024-05-27T01:15:16.347000
|
||||
CVE-2024-30675,0,1,58970cb4485b373062089530e092dffb88ac118f26e24b46961502da67830efc,2024-05-27T01:15:16.433000
|
||||
CVE-2024-30676,0,1,358a01f728e50e107f66c2be09bc79ef8235917dfd7c8bfe0207abbed4d29168,2024-05-27T01:15:16.523000
|
||||
CVE-2024-30678,0,1,b6df40ca1e9284c5e0ee64aa5b548aa0c3268412dbdf918fec0d49fead1ecf48,2024-05-27T01:15:16.610000
|
||||
CVE-2024-30679,0,1,1c9183aada13e24ef935b6492178d3ed466835bce66b2e360bba44090d9c2658,2024-05-27T01:15:16.687000
|
||||
CVE-2024-3068,0,0,7d4c4dd07274181628b10eb37f134c3767ade13a815d92210bd65fbdd6b7b487,2024-05-14T16:11:39.510000
|
||||
CVE-2024-30680,0,0,ea6143a81d3030a64e670c6f10fc32534c40b5a17101d6c00d6f60780c315c1a,2024-05-17T02:38:53.470000
|
||||
CVE-2024-30681,0,0,a17ddd064bde5fb2f23bbf715986061a105fd1d679965e8739b87f11d1814eee,2024-05-17T02:38:53.530000
|
||||
CVE-2024-30683,0,0,289249d43addcba3a67b62860fbf73188bc77b39983955ebadd77abbc251cc00,2024-05-17T02:38:53.587000
|
||||
CVE-2024-30684,0,0,d6aa94d38dd5fd3b91067ba0527bc3fecfea914e5a739db5454d76a0dd2d86f1,2024-05-17T02:38:53.640000
|
||||
CVE-2024-30686,0,0,2fd8088f44e7e35c5b9845194bfc123575e2b8381ba388c8d2b5c62124d86699,2024-05-17T02:38:53.697000
|
||||
CVE-2024-30687,0,0,f1afdd19adb43dd08e4949df7c760cb8a7fa545cdc0410b9fb58cef54f84f48c,2024-05-17T02:38:53.750000
|
||||
CVE-2024-30688,0,0,0f24020a903a82af883b564e90b2df39950abef708ed46ec572c4ab454de65b5,2024-05-17T02:38:53.803000
|
||||
CVE-2024-30690,0,0,75dc812c1b05e5c3ede5fe5db7151174ceac1a03a53e29aa5f171ed60633c5aa,2024-05-17T02:38:53.863000
|
||||
CVE-2024-30691,0,0,c35da0fd6575ad793dfe21bed43a29e90e819fc030e81c2e45646257370e51f7,2024-05-17T02:38:53.920000
|
||||
CVE-2024-30692,0,0,5bbb12a9a84540e4aeea6f5de532c339c1a7df861ed8e484196173e0c09c9477,2024-05-17T02:38:53.977000
|
||||
CVE-2024-30694,0,0,7bf9a67292158e11f6aba8c01fe10b7e66ab4320f584767783aab3b81c8f5e53,2024-05-17T02:38:54.033000
|
||||
CVE-2024-30695,0,0,1ffb0d4820299334f4e88f9b35042a7f19ed51a0157f79304bc86cfa3d1f00b5,2024-05-17T02:38:54.097000
|
||||
CVE-2024-30696,0,0,0b891f997b1230f665923a4b3ead3dc20701563c54946eb27e8fe2925b2649e7,2024-05-17T02:38:54.153000
|
||||
CVE-2024-30697,0,0,8d0b6b204b55068deb1ce02c3a447c57fd05d73a38364219b7d06e447564e099,2024-05-17T02:38:54.210000
|
||||
CVE-2024-30699,0,0,62a4cbbc667015c8b8336a3f901e1c3ff3b4fbd89fd9ac7ba68eac82f6c63a61,2024-05-17T02:38:54.260000
|
||||
CVE-2024-30680,0,1,3aea967c3a7d2066259cca64cd0f09c96d1540c292b77989917f64e548c59fd5,2024-05-27T01:15:16.763000
|
||||
CVE-2024-30681,0,1,977eb23112e7d63cf586cb0cbc8076ef268031377d32839b2addc6fb260d25e4,2024-05-27T01:15:16.847000
|
||||
CVE-2024-30683,0,1,b38ed51ff77d4ec07296481839db695cc36c4294f55a795d02dd4da1bea4401d,2024-05-27T01:15:16.937000
|
||||
CVE-2024-30684,0,1,81776e6e63b69bcc917d54bb22772043aab3bddf6e7a6c8d2d94e75db4441185,2024-05-27T01:15:17.020000
|
||||
CVE-2024-30686,0,1,ec692989dcec9cea6dec0b2b6b46b65bcf0852cdec529068d09059e0410951b1,2024-05-27T01:15:17.100000
|
||||
CVE-2024-30687,0,1,46c562debb3af5bb308b16027cef829d12ebc855c3e2d73bcea01a6a81f4cb79,2024-05-27T01:15:17.183000
|
||||
CVE-2024-30688,0,1,24d5c0a5389d55e03bedb3b0914236102d0522cb166a9e3c0f69a2d71809c3ec,2024-05-27T01:15:17.260000
|
||||
CVE-2024-30690,0,1,862c1084f265adc5ab4ec87ee5601b4e758d925e8ce97690b77466a97e87e7d6,2024-05-27T01:15:17.340000
|
||||
CVE-2024-30691,0,1,772ab87bbc3e00e1e86b0104e72d099be20f3447d10af3933225699c9f9fe770,2024-05-27T01:15:17.417000
|
||||
CVE-2024-30692,0,1,6268b374d41d0c6c099474013c1be591a52fd6520d0efe9af8d98c535dd7b438,2024-05-27T01:15:17.500000
|
||||
CVE-2024-30694,0,1,4b6174606e5fd01744d9a4a988bbc66bd2f28574123563c4b1d5960932b8a34a,2024-05-27T01:15:17.590000
|
||||
CVE-2024-30695,0,1,52c5b1418b3583dcbddeba5f2fc2db6047dc3c0aa30db4b8893b79dc5527e2aa,2024-05-27T01:15:17.673000
|
||||
CVE-2024-30696,0,1,cd1edb56c1a732937e5c74d7ff615dd7475f095290ef695cc751200ea51befa1,2024-05-27T01:15:17.767000
|
||||
CVE-2024-30697,0,1,24b0dddde04a6c6300537a3b1813dd71a3bbb842b06afcae073a6a348fefb6d8,2024-05-27T01:15:17.843000
|
||||
CVE-2024-30699,0,1,7e89615e22210caedcd00467ebf3f16bfd1f155b29594f5f029adef669ab0418,2024-05-27T01:15:17.920000
|
||||
CVE-2024-3070,0,0,9fb220221043e1c7ea67a6c822d7a5170c8bc9c2d0f9db52643db5c1ee273e31,2024-05-14T16:11:39.510000
|
||||
CVE-2024-30701,0,0,351431b378bae6d2f942a392b1b322fdfa5883fae026745b0d59ace641b58188,2024-05-17T02:38:54.353000
|
||||
CVE-2024-30702,0,0,8575d89e6ad33f9ba0bc01343c54e5c5435aa37b0bc9e680c36f392600fcfac8,2024-05-17T02:38:54.440000
|
||||
CVE-2024-30703,0,0,16452a3d56e77aec162a3c1268fae656d8990a10799615be1f3d8f721392a01d,2024-05-17T02:38:54.517000
|
||||
CVE-2024-30704,0,0,315b61cb303a863452cf70f2c42ba06c5d303b2e1584321f8d199ee09290b66d,2024-05-17T02:38:54.577000
|
||||
CVE-2024-30706,0,0,08a23ea6c9a48311a4affc64e221de42e147c44ec781073e3feb2af8e0fb3d14,2024-05-17T02:38:54.640000
|
||||
CVE-2024-30707,0,0,89b1d9cf5ed176118da7ef50b51811151d5f4bb57a22b777115beee13105edb2,2024-05-17T02:38:54.703000
|
||||
CVE-2024-30708,0,0,d3f271a0516cdc7943d843bb0105ca0e5bf5c2f29f3d3f4e9dc3fea0fe1e6950,2024-05-17T02:38:54.763000
|
||||
CVE-2024-30701,0,1,b335ed0000e3d4a04a21b71e7fe6edd6f2400cf86f9fdb54e60dee2f3dfd16db,2024-05-27T01:15:18
|
||||
CVE-2024-30702,0,1,27d823c384ddacb31ab69990bc08028b98deb18a99c7016f40c89d03c5faccc6,2024-05-27T01:15:18.083000
|
||||
CVE-2024-30703,0,1,f972f3fcd9b3c07c5600e3ffe2fe502acbb89e12091763b18f670c2632655e7f,2024-05-27T01:15:18.163000
|
||||
CVE-2024-30704,0,1,c88a28bc94f162d44959e2e3753a9d1127b2c923c68f4bdf31f9317e0f6d4095,2024-05-27T01:15:18.253000
|
||||
CVE-2024-30706,0,1,b19eb58da4f7d752dbdce7a54186ad82a1f0f0c34bfe245b642327a6d3937566,2024-05-27T01:15:18.333000
|
||||
CVE-2024-30707,0,1,2eae7b941e0e896416aa2ffba7ed5b7176027ad12bfae0bbd34ea3928d413486,2024-05-27T00:15:09.080000
|
||||
CVE-2024-30708,0,1,ff215a70213c70057419b4f253330c4e2093c0d3cac4623572c5740e81377ee7,2024-05-27T01:15:18.560000
|
||||
CVE-2024-3071,0,0,04481f247a4c00ea4a81ade13b4895bd0fcd6c4b710a28da01afe7d166d3f313,2024-05-02T18:00:37.360000
|
||||
CVE-2024-30710,0,0,40054b6485f8af10769e73f8d2df82fef13831e0f08fc0ff057c8af61227f20c,2024-05-17T02:38:54.813000
|
||||
CVE-2024-30711,0,0,974ee1154b6405b987d24033891d592568c031b66fc512d83253a42d2dfd2dcc,2024-05-17T02:38:54.870000
|
||||
CVE-2024-30712,0,0,986c678a735651587fe887e66bf40431d19924755c570a2bfa6923cb88caaf8f,2024-05-17T02:38:54.930000
|
||||
CVE-2024-30713,0,0,8cffbfe9927f25977cb402897df81730d866baadcf07d71b2b8aa1ebefd143bb,2024-05-17T02:38:54.997000
|
||||
CVE-2024-30715,0,0,6d79e0e301bcc27e6b5c999937a91b8313fa2e8dbe247791abb50d12dc1a0ace,2024-05-17T02:38:55.053000
|
||||
CVE-2024-30716,0,0,a5eb32810ded305f1b509d6048e92d32630bd82c99bdaafdc60f7b4ea8ee2e3a,2024-05-17T02:38:55.283000
|
||||
CVE-2024-30718,0,0,bc13d77c2146e697a17218f06a008681357e5e426b5a45c8b0f5dadd0a955994,2024-05-17T02:38:55.357000
|
||||
CVE-2024-30719,0,0,0ee8c1ae9d60da30e09fa600605c33af7f535953a323bc9f73d0cdd8532ae1d6,2024-05-17T02:38:55.410000
|
||||
CVE-2024-30710,0,1,6a0fc579b7b00911ee1d4c3b9a44b53e92e8297e9743d4053fcb8b236e62821a,2024-05-27T01:15:18.640000
|
||||
CVE-2024-30711,0,1,a30d6472f4fcd78085126ab1c190f14955666130a64b51ea157d9ecd3979f730,2024-05-27T01:15:18.727000
|
||||
CVE-2024-30712,0,1,8fe04f434588890425c5fc5cfb129e4a0182333b732273a7d9cfe8c51a5ad884,2024-05-27T01:15:18.823000
|
||||
CVE-2024-30713,0,1,5d224b63284d4997ccc94a8cceb73e4e44946499c5a971d091476f0425a113d6,2024-05-27T01:15:18.910000
|
||||
CVE-2024-30715,0,1,d0ed8ac7b9ba4fed82efeae3452ebf4c7f681feb8b402854dda5ca037fd85b0d,2024-05-27T01:15:18.987000
|
||||
CVE-2024-30716,0,1,657bd99db3bbc9cda68ce9d030ae7075a892ba133d9bb00ab71a5a9e470d0da2,2024-05-27T01:15:19.070000
|
||||
CVE-2024-30718,0,1,79d11abcc2e62af334403c89616d3fe39da88ae8a0cbb6b67f4b1d27882ba47b,2024-05-27T01:15:19.147000
|
||||
CVE-2024-30719,0,1,8ccc29610167f3bd94c3611fb5f21383262e11fa5c514d4f0a25e6a402720ec7,2024-05-27T01:15:19.223000
|
||||
CVE-2024-3072,0,0,a527c7eafea7f28c744bb9dda2936e732815b969b2af47bf924c6b1711e83002,2024-04-30T13:11:16.690000
|
||||
CVE-2024-30721,0,0,a3c49b1800ce6cf833892dfaad5c9ae3328ffe8f8b8a8a0278c7871e5993c54a,2024-05-17T02:38:55.467000
|
||||
CVE-2024-30722,0,0,698f669266f5c9adc43823fd75261dfb4f9d25179dd3e2d68828cc63968eee3e,2024-05-17T02:38:55.557000
|
||||
CVE-2024-30723,0,0,0359aaae5ceab7604b1e31e0b517e81007787791d3e35871a2a66402fcd75c25,2024-05-17T02:38:55.617000
|
||||
CVE-2024-30724,0,0,66ddb9062072e92322b8c5ca1d7f6fcde86ee303f3183e9c342113c5dfddfe26,2024-05-17T02:38:55.680000
|
||||
CVE-2024-30726,0,0,c488eeaa5734880ca4207fa81d86895117ce9056686045156fd00e831a965f4b,2024-05-17T02:38:55.750000
|
||||
CVE-2024-30727,0,0,6b8b4809a2dd17b963e283f4c01fe270747f74cd66fa2cdbe4b461c6c38d7212,2024-05-17T02:38:55.813000
|
||||
CVE-2024-30728,0,0,ae0e67baca60cfcbc3d262680139c1d665201b6a9c02ce96a9968eccc23ceb7e,2024-05-17T02:38:55.927000
|
||||
CVE-2024-30729,0,0,c43e568ca3c4f842805328e3a6c2f60212412bbc79434fb196459bebf923ee06,2024-05-17T02:38:55.990000
|
||||
CVE-2024-30730,0,0,787ee77ca0679e66ec2714c4e869a45492b780d9b1cc6eb8b784b123dde96f24,2024-05-17T02:38:56.073000
|
||||
CVE-2024-30733,0,0,6508f7bd0958dd51f5ec1d04d7772dbcea03dcd30607222d21ee991dc5c667cd,2024-05-17T02:38:56.127000
|
||||
CVE-2024-30735,0,0,f7520b4815f997164249c6f66fb8ff482d7284b7f21c5a4586d20d825cf344bc,2024-05-17T02:38:56.187000
|
||||
CVE-2024-30736,0,0,9d7d7b61becd3100c2de31165540c1c086c8f8db9f47aa745d0dd5c202922447,2024-05-17T02:38:56.377000
|
||||
CVE-2024-30737,0,0,6252bfea24c1ed14245ab084bb25cdd041082a302319f3c3721661f72a0611ff,2024-05-17T02:38:56.433000
|
||||
CVE-2024-30721,0,1,ce176217e4237a47216f1a4d4b45d02eb7dcfd1a4a7c89ff500b69d330bb1c75,2024-05-27T01:15:19.310000
|
||||
CVE-2024-30722,0,1,76ba4e61f509c3624c60ab4ae08a0909e80b5a5389ecd77f321053f4cd94c179,2024-05-27T01:15:19.390000
|
||||
CVE-2024-30723,0,1,3337f17a019ab1973ca3c47170cd104659ddb85b48514c024914497c3e878038,2024-05-27T01:15:19.477000
|
||||
CVE-2024-30724,0,1,23d9c61a7b8c7174ff553d6a257c1fb61e510074d2c76c453cdf09e6131f45ec,2024-05-27T01:15:19.553000
|
||||
CVE-2024-30726,0,1,bc703cc80dc7cafa3326305f84a215a50ad3bf35e8eb56ba15fd86f487521609,2024-05-27T01:15:19.633000
|
||||
CVE-2024-30727,0,1,28bde6e4081437d2c84fe54483783fbd7ad3bdc6789ee01076f51dd975fd7e1e,2024-05-27T01:15:19.710000
|
||||
CVE-2024-30728,0,1,803d29dcc163764437b6038a1b41fb730d21aca3d32242e99d3298af8a09ffeb,2024-05-27T01:15:19.790000
|
||||
CVE-2024-30729,0,1,82ecdb8ca84c9918e850c28045de4efaa5660ca0a78571b556876bfa559fbb92,2024-05-27T01:15:19.870000
|
||||
CVE-2024-30730,0,1,7788647860e7de3bb500e0b5997ce5c4b73b2fa030b0a4eae1dc8de2f3956763,2024-05-27T01:15:19.953000
|
||||
CVE-2024-30733,0,1,6b250eeb1623bd7db6c895c77e8ea5b61ecbd14708c86ebebc989b7859564a27,2024-05-27T01:15:20.033000
|
||||
CVE-2024-30735,0,1,9abd255c1b85dbe41db5272fa5bbc9ae95a99258d2bc21da4e714a51623affc8,2024-05-27T01:15:20.110000
|
||||
CVE-2024-30736,0,1,a197a3bb85ae935d16d5c000ca96eb805a49d4303085eb6fbdb3995315437b85,2024-05-27T01:15:20.203000
|
||||
CVE-2024-30737,0,1,23ff24475df73ae35645736c831626bc6de164efe784df602ac4ce4b292ff293,2024-05-27T01:15:20.303000
|
||||
CVE-2024-3074,0,0,37f60d9fe997e60c2aa97ad581356bf44643e113f390b63abcc68884cd98a10a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3075,0,0,5616ddf2d80857a322d6e0f6fa7d8c0737f6830a4b1728fbd3d30ea1d6b09ab6,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3076,0,0,b2ddfdf17526511f9ad04f6248546e0c8d288852cffe59b222a3e4004ceea7ef,2024-04-26T15:32:22.523000
|
||||
@ -249620,7 +249622,7 @@ CVE-2024-33411,0,0,e5bc355b8080ec9331df6160965a62e9fcb33bc746eac8017085df54dac9b
|
||||
CVE-2024-3342,0,0,2c3ca8d5c3061bb507c26662d038cd059db385c42ff804757be4b5dbd68c1d0b,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33423,0,0,8f1fa788450514658e193af05941c337fea69ba60eb865ed38aa69b9043ad774,2024-05-02T13:27:25.103000
|
||||
CVE-2024-33424,0,0,f9f5a67bdb9ba9357f3c3d02a83c0c0f74287739a2e767e9629394effd459f52,2024-05-01T19:50:25.633000
|
||||
CVE-2024-33427,0,1,9476c5f9c8988b26166fe9f7a357839b1651ce10bb12a768ec8d4e52b65e45a2,2024-05-26T22:15:08.427000
|
||||
CVE-2024-33427,0,0,9476c5f9c8988b26166fe9f7a357839b1651ce10bb12a768ec8d4e52b65e45a2,2024-05-26T22:15:08.427000
|
||||
CVE-2024-33428,0,0,405c7d4470f1c4c6a9da4790ad16769be5bbee6bc7cbd31bcf2800f3281bb40b,2024-05-01T19:50:25.633000
|
||||
CVE-2024-33429,0,0,a8c998123b524ea49b295a5500fc8c6d4ba14ca4f9af69ccfbc5cd4926bf1c96,2024-05-01T19:50:25.633000
|
||||
CVE-2024-3343,0,0,c7ada54a8973c3f80fc415b1484b0c0d7aeb75e458012c05cd3c69dcc6f0e33f,2024-04-11T12:47:44.137000
|
||||
@ -250164,7 +250166,7 @@ CVE-2024-34448,0,0,2ee47d576d9de678e8b37edc8c4fb672f63b76bc5fc5740404718a42f40a4
|
||||
CVE-2024-34449,0,0,28da5cfb8215143a3847fc37f7163047e3e2e183b8d6abcf511553c3cec5bb16,2024-05-17T02:39:35.457000
|
||||
CVE-2024-3445,0,0,2031eee497e177f244890449ab10d2f196dd08d103f846fc9b20779b1f74d465,2024-05-17T02:39:56.830000
|
||||
CVE-2024-34453,0,0,9363deaf6a5ec68194d671cadb0973a2ba23402d3e2800c4f9eea6dbd677c5cd,2024-05-06T12:44:56.377000
|
||||
CVE-2024-34454,1,1,d9d2c5475f68dc1f08844d29c96bd5cf1b31e2fa0f4c8685dccad604ffef3f53,2024-05-26T22:15:08.650000
|
||||
CVE-2024-34454,0,0,d9d2c5475f68dc1f08844d29c96bd5cf1b31e2fa0f4c8685dccad604ffef3f53,2024-05-26T22:15:08.650000
|
||||
CVE-2024-34455,0,0,cf6832f7361884f15470d2143d9f538281f7bb0657fc697433a93775fe331b3f,2024-05-07T18:15:08.417000
|
||||
CVE-2024-34459,0,0,b45ed88b76afaef9cbd4911e21faf8d189bfb9c8f6ba422504b06e12e3f2ae4c,2024-05-14T16:12:23.490000
|
||||
CVE-2024-3446,0,0,d41b6ff09ba21a5a975268b5a0441447c6b2bcfd6bedfe0914b9c96867cd290f,2024-04-18T08:15:38.340000
|
||||
@ -250774,9 +250776,9 @@ CVE-2024-36049,0,0,d511d3e9dcb3e3f3c67c3b19b4715aae92e771d6a1271dee36aaa0460f656
|
||||
CVE-2024-36050,0,0,4c307008c713c918a6e3b84da1e5e49b2b2247354b7102850872f2f1076c6edc,2024-05-22T16:15:10.777000
|
||||
CVE-2024-36052,0,0,8db219128822e3b435341a720fec4da51967df08eb27bb5fb0af45f420ce346c,2024-05-22T12:46:53.887000
|
||||
CVE-2024-36053,0,0,672a3b34a9bdb19210396687438a3a5963248f4f357ce5db05db5d249614922b,2024-05-20T13:00:04.957000
|
||||
CVE-2024-36054,1,1,6400a2883cdde6c0a3fd8d204fc488efe33be1eb564d7d5968a1db346212affb,2024-05-26T23:15:21.370000
|
||||
CVE-2024-36055,1,1,3ed3958f5e6d6cc7b9fca16c82b960bbee873db440bf413f4b8bb4446aea24a4,2024-05-26T23:15:21.457000
|
||||
CVE-2024-36056,1,1,1ddcb1f3d533fe81222569791e7c6f87f5666060a8987be878285ea0267eeef5,2024-05-26T23:15:21.520000
|
||||
CVE-2024-36054,0,0,6400a2883cdde6c0a3fd8d204fc488efe33be1eb564d7d5968a1db346212affb,2024-05-26T23:15:21.370000
|
||||
CVE-2024-36055,0,0,3ed3958f5e6d6cc7b9fca16c82b960bbee873db440bf413f4b8bb4446aea24a4,2024-05-26T23:15:21.457000
|
||||
CVE-2024-36056,0,0,1ddcb1f3d533fe81222569791e7c6f87f5666060a8987be878285ea0267eeef5,2024-05-26T23:15:21.520000
|
||||
CVE-2024-3606,0,0,aad549bdf5ff1831d91b9701456650bb1ccc1938c3f938f0c7eb426394ab8356,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3607,0,0,af4721086df8378a380a0243b924575fce7196863af6b8319186a0a7c6039e9f,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36070,0,0,eb4d689c0fd52dc71530686149db340f07354ff188ce53f7ebe9b94f9b8be928,2024-05-20T13:00:04.957000
|
||||
@ -251232,7 +251234,7 @@ CVE-2024-4279,0,0,d3b17e17d1b5650487c2ef2a762ae7d90400bd6e48ec29863d7d603500f64a
|
||||
CVE-2024-4280,0,0,822fb2b67d813f28d851bea5074e022fd3fb44cbbe8e0abea23d2c25f8583cfd,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4281,0,0,f2f6c94941e4ed7f1c98ab6351686f1d868a8657bf9b3ff2bb73d7d016e69d14,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4284,0,0,28d78a67b7d6c9b0a1827199abde0e8a6df7d8ad9cc9c4d0f1befa23f8062d5f,2024-05-20T13:00:04.957000
|
||||
CVE-2024-4286,1,1,3d6b3a3af2b729ad9d87c6ecde6ba858682d36369219dcb6bdc160e2f4d7ff57,2024-05-26T23:15:21.600000
|
||||
CVE-2024-4286,0,0,3d6b3a3af2b729ad9d87c6ecde6ba858682d36369219dcb6bdc160e2f4d7ff57,2024-05-26T23:15:21.600000
|
||||
CVE-2024-4287,0,0,048bae39f58d60d42f1a986a979513f5c9cfb08eeca89126761e78c7c68ed3b9,2024-05-20T15:17:54.513000
|
||||
CVE-2024-4288,0,0,9367649ffe77365cb201f95bc69986ffb5e481ba50542c3f0953c5f2e0eb0d2a,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4289,0,0,76ba9be3eab9b673a4fa73a49b34a9d170f584667b3b959e9ff27923d52b8ed4,2024-05-21T12:37:59.687000
|
||||
@ -251820,8 +251822,12 @@ CVE-2024-5374,0,0,9d0065534d8f28e9f95cc9b288a36b0fef6c4b6e4f9eadc9d4bcf7d5cd9e3a
|
||||
CVE-2024-5375,0,0,22a41a52f8127cf77fc020e1d70df40b755fd718f0ea7badc1f1a2263c1c56df,2024-05-26T20:15:08.600000
|
||||
CVE-2024-5376,0,0,62e4bc8dd75ff4cdd6ef1f13aab45fd1bcdcb1cf5634972b5ef9a9151eb8f9c4,2024-05-26T21:15:08.383000
|
||||
CVE-2024-5377,0,0,b1ce75d7f9d5fb37a90a7deae75307c4f1b1b656098d91fdd5e339c026682071,2024-05-26T21:15:08.673000
|
||||
CVE-2024-5378,1,1,5e852526d0a01069edb00140f01f6ec019ea67bd59f9e967913307f04621acff,2024-05-26T22:15:08.747000
|
||||
CVE-2024-5379,1,1,522e2119af5cb6f07c118846e82f6889b87257a924542dbdeb3410e4fff96e20,2024-05-26T22:15:09.020000
|
||||
CVE-2024-5380,1,1,ed9f85a2572bd3d07fcdeaee478915fac7bf969771e7e2c8ffcdcc8187fb26ec,2024-05-26T23:15:21.887000
|
||||
CVE-2024-5381,1,1,0194906d6ece10623fd40ce03db1e61d961ba4d26cd48d03482977224791ed14,2024-05-26T23:15:22.150000
|
||||
CVE-2024-5383,1,1,ad9f0aefef03acc764aab5a53e033c9ccb4535ae2cb48604a1b9d4c8e9a604d0,2024-05-26T23:15:22.423000
|
||||
CVE-2024-5378,0,0,5e852526d0a01069edb00140f01f6ec019ea67bd59f9e967913307f04621acff,2024-05-26T22:15:08.747000
|
||||
CVE-2024-5379,0,0,522e2119af5cb6f07c118846e82f6889b87257a924542dbdeb3410e4fff96e20,2024-05-26T22:15:09.020000
|
||||
CVE-2024-5380,0,0,ed9f85a2572bd3d07fcdeaee478915fac7bf969771e7e2c8ffcdcc8187fb26ec,2024-05-26T23:15:21.887000
|
||||
CVE-2024-5381,0,0,0194906d6ece10623fd40ce03db1e61d961ba4d26cd48d03482977224791ed14,2024-05-26T23:15:22.150000
|
||||
CVE-2024-5383,0,0,ad9f0aefef03acc764aab5a53e033c9ccb4535ae2cb48604a1b9d4c8e9a604d0,2024-05-26T23:15:22.423000
|
||||
CVE-2024-5384,1,1,f4500262362ef3583d43791733167333f027a4b71744522134957852ac361d91,2024-05-27T00:15:09.280000
|
||||
CVE-2024-5385,1,1,f2b8a921bbbae5377903f2b5f2e8fc9f12b1f4bf6825effcea83dae7c13f56f0,2024-05-27T00:15:09.570000
|
||||
CVE-2024-5390,1,1,d8283129f1cafec514f6fe49089f9b638013dcc5faa8abc843fb9872a7a41e6b,2024-05-27T01:15:20.410000
|
||||
CVE-2024-5391,1,1,d2f147fe931420ac482bb09887180ed160ed96b2a789c9d61e87da26ad5a9d7d,2024-05-27T01:15:20.693000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user