Auto-Update: 2024-05-27T02:00:29.975692+00:00

This commit is contained in:
cad-safe-bot 2024-05-27 02:03:22 +00:00
parent 3b409592cc
commit 60b5318980
89 changed files with 860 additions and 3073 deletions

View File

@ -2,97 +2,14 @@
"id": "CVE-2023-33565",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-23T19:15:09.047",
"lastModified": "2024-05-17T02:24:46.420",
"vulnStatus": "Modified",
"lastModified": "2024-05-27T01:15:12.923",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "ROS2 (Robot Operating System 2) Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 are vulnerable to Denial-of-Service (DoS) attacks. A malicious user potentially exploited the vulnerability remotely and crashed the ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://dl.acm.org/doi/abs/10.1145/3573910.3573912",
"source": "cve@mitre.org",
"tags": [
"Technical Description"
]
},
{
"url": "https://github.com/16yashpatel/CVE-2023-33565",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
"metrics": {},
"references": []
}

View File

@ -2,90 +2,14 @@
"id": "CVE-2023-33566",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-27T18:15:13.463",
"lastModified": "2024-05-17T02:24:46.550",
"vulnStatus": "Modified",
"lastModified": "2024-05-27T01:15:13.207",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Foxy Fitzroy versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could allow a malicious user to inject malicious ROS2 nodes into the system remotely. Once injected, these nodes could disrupt the normal operations of the system or cause other potentially harmful behavior. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/16yashpatel/CVE-2023-33566",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
"metrics": {},
"references": []
}

View File

@ -2,90 +2,14 @@
"id": "CVE-2023-33567",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-27T18:15:13.510",
"lastModified": "2024-05-17T02:24:46.650",
"vulnStatus": "Modified",
"lastModified": "2024-05-27T01:15:13.333",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An unauthorized access vulnerability has been discovered in ROS2 Foxy Fitzroy versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/16yashpatel/CVE-2023-33567",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
"metrics": {},
"references": []
}

View File

@ -2,94 +2,14 @@
"id": "CVE-2023-51197",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-30T22:15:52.613",
"lastModified": "2024-05-17T02:32:15.297",
"vulnStatus": "Modified",
"lastModified": "2024-05-27T01:15:13.443",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue discovered in shell command execution in ROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows an attacker to run arbitrary commands and cause other impacts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Un problema descubierto en la ejecuci\u00f3n de comandos de shell en ROS2 (Robot Operating System 2) Foxy Fitzroy, con ROS_VERSION=2 y ROS_PYTHON_VERSION=3 permite a un atacante ejecutar comandos arbitrarios y causar otros impactos."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/16yashpatel/CVE-2023-51197",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
"metrics": {},
"references": []
}

View File

@ -2,94 +2,14 @@
"id": "CVE-2023-51198",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-30T22:15:52.670",
"lastModified": "2024-05-17T02:32:15.383",
"vulnStatus": "Modified",
"lastModified": "2024-05-27T01:15:13.587",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue in the permission and access control components within ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to gain escalate privileges. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Un problema en los componentes de permiso y control de acceso dentro de ROS2 Foxy Fitzroy ROS_VERSION=2 y ROS_PYTHON_VERSION=3 permite a los atacantes obtener privilegios elevados."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/16yashpatel/CVE-2023-51198",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
"metrics": {},
"references": []
}

View File

@ -2,94 +2,14 @@
"id": "CVE-2023-51199",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-23T22:15:16.437",
"lastModified": "2024-05-17T02:32:15.473",
"vulnStatus": "Modified",
"lastModified": "2024-05-27T01:15:13.703",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to run arbitrary code or cause a denial of service via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en ROS2 Foxy Fitzroy ROS_VERSION=2 y ROS_PYTHON_VERSION=3 permite a atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio mediante el manejo inadecuado de matrices o cadenas."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/16yashpatel/CVE-2023-51199",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
"metrics": {},
"references": []
}

View File

@ -2,94 +2,14 @@
"id": "CVE-2023-51200",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-23T21:15:09.080",
"lastModified": "2024-05-17T02:32:15.570",
"vulnStatus": "Modified",
"lastModified": "2024-05-27T01:15:13.840",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue in the default configurations of ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows unauthenticated attackers to authenticate using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Un problema en las configuraciones predeterminadas de ROS2 Foxy Fitzroy ROS_VERSION=2 y ROS_PYTHON_VERSION=3 permite a atacantes no autenticados autenticarse usando credenciales predeterminadas."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/16yashpatel/CVE-2023-51200",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
"metrics": {},
"references": []
}

View File

@ -2,94 +2,14 @@
"id": "CVE-2023-51201",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-23T22:15:16.480",
"lastModified": "2024-05-17T02:32:15.670",
"vulnStatus": "Modified",
"lastModified": "2024-05-27T01:15:13.960",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Cleartext Transmission issue in ROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to access sensitive information via a man-in-the-middle attack. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Problema de transmisi\u00f3n de texto plano en ROS2 (sistema operativo de robot 2) Foxy Fitzroy, con ROS_VERSION=2 y ROS_PYTHON_VERSION=3 permite a los atacantes acceder a informaci\u00f3n confidencial a trav\u00e9s de un ataque man in the middle."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/16yashpatel/CVE-2023-51201",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
"metrics": {},
"references": []
}

View File

@ -2,94 +2,14 @@
"id": "CVE-2023-51202",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-30T22:15:52.720",
"lastModified": "2024-05-17T02:32:15.767",
"vulnStatus": "Modified",
"lastModified": "2024-05-27T01:15:14.070",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "OS command injection vulnerability in command processing or system call componentsROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to run arbitrary commands. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en el procesamiento de comandos o componentes de llamadas al sistema ROS2 (Robot Operating System 2) Foxy Fitzroy, con ROS_VERSION=2 y ROS_PYTHON_VERSION=3 permite a los atacantes ejecutar comandos arbitrarios."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/16yashpatel/CVE-2023-51202",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
"metrics": {},
"references": []
}

View File

@ -2,94 +2,14 @@
"id": "CVE-2023-51204",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-30T22:15:52.767",
"lastModified": "2024-05-17T02:32:15.853",
"vulnStatus": "Modified",
"lastModified": "2024-05-27T01:15:14.180",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Insecure deserialization in ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to execute arbitrary code via a crafted input. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "La deserializaci\u00f3n insegura en ROS2 Foxy Fitzroy ROS_VERSION=2 y ROS_PYTHON_VERSION=3 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de una entrada manipulada."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/16yashpatel/CVE-2023-51204",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
"metrics": {},
"references": []
}

View File

@ -2,94 +2,14 @@
"id": "CVE-2023-51208",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-23T22:15:16.533",
"lastModified": "2024-05-17T02:32:15.943",
"vulnStatus": "Modified",
"lastModified": "2024-05-27T01:15:14.283",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An Arbitrary File Upload vulnerability in ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to run arbitrary code and cause other impacts via upload of crafted file. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad de carga arbitraria de archivos en ROS2 Foxy Fitzroy ROS_VERSION=2 y ROS_PYTHON_VERSION=3 permite a los atacantes ejecutar c\u00f3digo arbitrario y causar otros impactos mediante la carga de archivos manipulados."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*",
"matchCriteriaId": "53A6F65F-8E6F-4F7E-B357-0D2E450667B1"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/16yashpatel/CVE-2023-51208",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
"metrics": {},
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-29439",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T23:15:06.753",
"lastModified": "2024-05-17T02:37:51.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:14.397",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de inyecci\u00f3n de nodo no autorizado en ROS2 Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos escalar privilegios e inyectar nodos ROS2 maliciosos en el sistema."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-29439",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-29440",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-25T21:15:47.217",
"lastModified": "2024-05-17T02:37:52.050",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:14.497",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An unauthorized access vulnerability has been discovered in ROS2 Humble Hawksbill versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de acceso no autorizado en las versiones de ROS2 Humble Hawksbill donde ROS_VERSION es 2 y ROS_PYTHON_VERSION es 3. Esta vulnerabilidad podr\u00eda permitir potencialmente que un usuario malintencionado obtenga acceso no autorizado a m\u00faltiples nodos ROS2 de forma remota. El acceso no autorizado a estos nodos podr\u00eda comprometer la integridad del sistema, la ejecuci\u00f3n de comandos arbitrarios y la divulgaci\u00f3n de informaci\u00f3n confidencial."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-29440",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-29441",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T00:15:07.223",
"lastModified": "2024-05-17T02:37:52.107",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:14.590",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ROS2 (Robot Operating System 2) Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de los nodos ROS2."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-29441",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-29442",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-25T22:37:19.797",
"lastModified": "2024-05-17T02:37:52.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:14.673",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An unauthorized access vulnerability has been discovered in ROS2 Humble Hawksbill versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de acceso no autorizado en las versiones de ROS2 Humble Hawksbill donde ROS_VERSION es 2 y ROS_PYTHON_VERSION es 3. Esta vulnerabilidad podr\u00eda permitir potencialmente que un usuario malintencionado obtenga acceso no autorizado a m\u00faltiples nodos ROS2 de forma remota. El acceso no autorizado a estos nodos podr\u00eda comprometer la integridad del sistema, la ejecuci\u00f3n de comandos arbitrarios y la divulgaci\u00f3n de informaci\u00f3n confidencial."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-29442",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-29443",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T23:15:06.810",
"lastModified": "2024-05-17T02:37:52.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:14.760",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de shell en ROS2 (Robot Operating System 2) Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial debido a la forma en que ROS2 maneja la ejecuci\u00f3n de comandos de shell en componentes como int\u00e9rpretes de comandos o interfaces que procesan entradas externas."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-29443",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-29444",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T00:15:07.283",
"lastModified": "2024-05-17T02:37:52.273",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:14.847",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability has been discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en ROS2 (Robot Operating System 2) Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de m\u00f3dulos de ejecuci\u00f3n de comandos externos, controladores de llamadas del sistema, y scripts de interfaz."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-29444",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-29445",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T23:15:06.857",
"lastModified": "2024-05-17T02:37:52.330",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:14.933",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3 where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ROS2 (Robot Operating System 2) Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3 donde el sistema transmite mensajes en texto plano, lo que permite a los atacantes acceder a informaci\u00f3n confidencial a trav\u00e9s de un ataque de intermediario."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-29445",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-29447",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T00:15:07.337",
"lastModified": "2024-05-17T02:37:52.383",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:15.013",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the default configurations of ROS2 Humble Hawksbill in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en las configuraciones predeterminadas de ROS2 Humble Hawksbill en ROS2 Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes no autenticados obtener acceso utilizando credenciales predeterminadas."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-29447",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-29448",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T04:15:08.510",
"lastModified": "2024-05-17T02:37:52.437",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:15.103",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de desbordamiento de b\u00fafer en los componentes C++ de ROS2 Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante un manejo inadecuado de matrices o cadenas."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-29448",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-29449",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T04:15:08.630",
"lastModified": "2024-05-17T02:37:52.497",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:15.200",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to obtain sensitive information via man-in-the-middle attacks due to cleartext transmission of data across the ROS2 nodes' communication channels. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ROS2 Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de ataques de intermediario debido a la transmisi\u00f3n de datos en texto plano a trav\u00e9s de los canales de comunicaci\u00f3n de los nodos ROS2."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-29449",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-29450",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T04:15:08.687",
"lastModified": "2024-05-17T02:37:52.553",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:15.293",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue has been discovered in the permission and access control components within ROS2 Humble Hawksbill, in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), escalate privileges, and obtain sensitive information via the authentication system, including protocols, processes, and checks designed to verify the identities of users or devices attempting to access the ROS2 system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en los componentes de permiso y control de acceso dentro de ROS2 Humble Hawksbill, en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, provocar una denegaci\u00f3n de servicio (DoS), escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de la autenticaci\u00f3n. sistema, incluidos protocolos, procesos y controles manipulados para verificar las identidades de los usuarios o dispositivos que intentan acceder al sistema ROS2."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-29450",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-29452",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T02:15:46.917",
"lastModified": "2024-05-17T02:37:52.603",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:15.387",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An insecure deserialization vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de deserializaci\u00f3n insegura en ROS2 Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de entradas manipuladas en los componentes de serializaci\u00f3n y deserializaci\u00f3n de datos, los mecanismos de comunicaci\u00f3n entre procesos y las interfaces de comunicaci\u00f3n de red."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-29452",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-29454",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T20:15:35.767",
"lastModified": "2024-05-17T02:37:52.660",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:15.473",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue discovered in packages or nodes in ROS2 Humble Hawksbill with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to execute arbitrary commands potentially leading to unauthorized system control, data breaches, system and network compromise, and operational disruption. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Un problema descubierto en paquetes o nodos en ROS2 Humble Hawksbill con ROS_VERSION=2 y ROS_PYTHON_VERSION=3 permite a los atacantes ejecutar comandos arbitrarios que potencialmente conducen a un control no autorizado del sistema, violaciones de datos, compromiso del sistema y la red e interrupci\u00f3n operativa."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-29454",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-29455",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T05:15:47.477",
"lastModified": "2024-05-17T02:37:52.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:15.573",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de carga de archivos arbitraria en ROS2 Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, provocar una denegaci\u00f3n de servicio (DoS) y obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado para el mecanismo de carga de archivos de ROS2 sistema, incluida la funcionalidad del servidor para manejar la carga de archivos y los procesos de validaci\u00f3n asociados."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-29455",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2024-30657",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-27T00:15:08.743",
"lastModified": "2024-05-27T00:15:08.743",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2024-30658",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-27T00:15:09.013",
"lastModified": "2024-05-27T00:15:09.013",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30659",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T07:15:09.143",
"lastModified": "2024-05-17T02:38:52.657",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:15.650",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Shell Injection vulnerability in ROS (Robot Operating System) Melodic Morenia versions ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n de Shell en ROS (Robot Operating System) Melodic Morenia versiones ROS_VERSION 1 y ROS_PYTHON_VERSION 3, permite a atacantes ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30659",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30661",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T07:15:09.370",
"lastModified": "2024-05-17T02:38:52.723",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:15.757",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An unauthorized access vulnerability has been discovered in ROS Melodic Morenia versions where ROS_VERSION is 1 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized information access to multiple ROS nodes remotely. Unauthorized information access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de acceso no autorizado en las versiones de ROS Melodic Morenia donde ROS_VERSION es 1 y ROS_PYTHON_VERSION es 3. Esta vulnerabilidad podr\u00eda permitir potencialmente que un usuario malintencionado obtenga acceso a informaci\u00f3n no autorizada a m\u00faltiples nodos ROS de forma remota. El acceso no autorizado a la informaci\u00f3n a estos nodos podr\u00eda comprometer la integridad del sistema, la ejecuci\u00f3n de comandos arbitrarios y la divulgaci\u00f3n de informaci\u00f3n confidencial."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30661",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30662",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T07:15:09.493",
"lastModified": "2024-05-17T02:38:52.780",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:15.843",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to easily intercept and access this data. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ROS (Robot Operating System) Melodic Morenia en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, donde el sistema transmite mensajes en texto plano. Esta falla expone informaci\u00f3n confidencial, haci\u00e9ndola vulnerable a ataques de intermediario (MitM) y permitiendo a los atacantes interceptar y acceder f\u00e1cilmente a estos datos."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30662",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30663",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T07:15:09.570",
"lastModified": "2024-05-17T02:38:52.837",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:15.930",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the default configurations of ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3. This vulnerability allows unauthenticated attackers to gain access using default credentials, posing a serious threat to the integrity and security of the system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en las configuraciones predeterminadas de ROS (Robot Operating System) Melodic Morenia en ROS_VERSION 1 y ROS_PYTHON_VERSION 3. Esta vulnerabilidad permite a atacantes no autenticados obtener acceso utilizando credenciales predeterminadas, lo que representa una grave amenaza para la integridad y seguridad del sistema."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30663",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30665",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T07:15:09.643",
"lastModified": "2024-05-17T02:38:52.903",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:16.010",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability has been discovered in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3. This vulnerability primarily affects the command processing or system call components in ROS, making them susceptible to manipulation by malicious entities. Through this, unauthorized commands can be executed, leading to remote code execution (RCE), data theft, and malicious activities. The affected components include External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en ROS (Robot Operating System) Melodic Morenia en ROS_VERSION 1 y ROS_PYTHON_VERSION 3. Esta vulnerabilidad afecta principalmente a los componentes de procesamiento de comandos o llamadas al sistema en ROS, haci\u00e9ndolos susceptibles a la manipulaci\u00f3n por parte de entidades maliciosas. A trav\u00e9s de esto, se pueden ejecutar comandos no autorizados, lo que lleva a la ejecuci\u00f3n remota de c\u00f3digo (RCE), el robo de datos y actividades maliciosas. Los componentes afectados incluyen m\u00f3dulos de ejecuci\u00f3n de comandos externos, controladores de llamadas del sistema y scripts de interfaz."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30665",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30666",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T07:15:09.713",
"lastModified": "2024-05-17T02:38:52.970",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:16.093",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via improper handling of arrays or strings within these components. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de desbordamiento de b\u00fafer en los componentes C++ de ROS (Robot Operating System) Melodic Morenia en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario mediante el manejo inadecuado de matrices o cadenas dentro de estos componentes."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30666",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30667",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T08:15:11.390",
"lastModified": "2024-05-17T02:38:53.033",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:16.173",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Insecure deserialization vulnerability in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or obtain sensitive information via crafted input to the data handling components. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Vulnerabilidad de deserializaci\u00f3n insegura en ROS (sistema operativo de robot) Melodic Morenia en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, permite a atacantes ejecutar c\u00f3digo arbitrario u obtener informaci\u00f3n confidencial a trav\u00e9s de entradas manipuladas en los componentes de manejo de datos."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30667",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30672",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T08:15:11.517",
"lastModified": "2024-05-17T02:38:53.093",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:16.250",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Arbitrary file upload vulnerability in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via the file upload component. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Vulnerabilidad de carga arbitraria de archivos en ROS (Robot Operating System) Melodic Morenia en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, permite a atacantes ejecutar c\u00f3digo arbitrario, provocar una denegaci\u00f3n de servicio (DoS) y obtener informaci\u00f3n confidencial a trav\u00e9s del componente de carga de archivos."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30672",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30674",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T08:15:11.570",
"lastModified": "2024-05-17T02:38:53.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:16.347",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Unauthorized access vulnerability in ROS2 Iron Irwini in ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to gain control of multiple ROS2 nodes. Unauthorized information access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Vulnerabilidad de acceso no autorizado en ROS2 Iron Irwini en ROS_VERSION es 2 y ROS_PYTHON_VERSION es 3, permite a atacantes remotos obtener el control de m\u00faltiples nodos ROS2. El acceso no autorizado a la informaci\u00f3n a estos nodos podr\u00eda comprometer la integridad del sistema, la ejecuci\u00f3n de comandos arbitrarios y la divulgaci\u00f3n de informaci\u00f3n confidencial."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30674",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30675",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T08:15:11.627",
"lastModified": "2024-05-17T02:38:53.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:16.433",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Unauthorized node injection vulnerability in ROS2 Iron Irwini in ROS_VERSION 2 and ROS_PYTHON_VERSION 3. This vulnerability could allow a malicious user to escalate privileges by injecting malicious ROS2 nodes into the system remotely. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n de nodo no autorizado en ROS2 Iron Irwini en ROS_VERSION 2 y ROS_PYTHON_VERSION 3. Esta vulnerabilidad podr\u00eda permitir a un usuario malintencionado escalar privilegios inyectando nodos ROS2 maliciosos en el sistema de forma remota."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30675",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30676",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T03:15:07.763",
"lastModified": "2024-05-17T02:38:53.287",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:16.523",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "A Denial-of-Service (DoS) vulnerability exists in ROS2 Iron Irwini versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. A malicious user could potentially exploit this vulnerability remotely to crash the ROS2 nodes, thereby causing a denial of service. The flaw allows an attacker to cause unexpected behavior in the operation of ROS2 nodes, which leads to their failure and interrupts the regular operation of the system, thus making it unavailable for its intended users. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en las versiones de ROS2 Iron Irwini donde ROS_VERSION es 2 y ROS_PYTHON_VERSION es 3. Un usuario malintencionado podr\u00eda explotar esta vulnerabilidad de forma remota para bloquear los nodos ROS2, provocando as\u00ed una denegaci\u00f3n de servicio. La falla permite a un atacante provocar un comportamiento inesperado en el funcionamiento de los nodos ROS2, lo que provoca su falla e interrumpe el funcionamiento normal del sistema, haci\u00e9ndolo no disponible para los usuarios previstos."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30676",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30678",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T03:15:07.830",
"lastModified": "2024-05-17T02:38:53.350",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:16.610",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue has been discovered in ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to intercept and access this data. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, donde el sistema transmite mensajes en texto plano. Esta falla expone informaci\u00f3n confidencial, haci\u00e9ndola vulnerable a ataques de intermediario (MitM) y permitiendo a los atacantes interceptar y acceder a estos datos."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30678",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30679",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T04:15:10.087",
"lastModified": "2024-05-17T02:38:53.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:16.687",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the default configurations of ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to authenticate using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en las configuraciones predeterminadas de ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes no autenticados autenticarse utilizando credenciales predeterminadas."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30679",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30680",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T04:15:10.583",
"lastModified": "2024-05-17T02:38:53.470",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:16.763",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Iron Irwini in versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "La vulnerabilidad de inyecci\u00f3n de Shell fue descubierta en ROS2 (Robot Operating System 2) Iron Irwini en las versiones ROS_VERSION 2 y ROS_PYTHON_VERSION 3, permite a los atacantes ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial debido a la forma en que ROS2 maneja la ejecuci\u00f3n de comandos de Shell en componentes como int\u00e9rpretes de comandos o interfaces que procesan entradas externas."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30680",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30681",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T04:15:10.747",
"lastModified": "2024-05-17T02:38:53.530",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:16.847",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability has been discovered in ROS2 Iron Irwini version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en ROS2 Iron Irwini versi\u00f3n ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s del procesamiento de comandos o componentes de llamadas al sistema en ROS2."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30681",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30683",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T04:15:10.877",
"lastModified": "2024-05-17T02:38:53.587",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:16.937",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de desbordamiento de b\u00fafer en los componentes C++ de ROS2 Iron Irwini versiones ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante el manejo inadecuado de matrices o cadenas."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30683",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30684",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T05:15:47.807",
"lastModified": "2024-05-17T02:38:53.640",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:17.020",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An insecure logging vulnerability has been identified within ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to access sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de registro inseguro en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes acceder a informaci\u00f3n confidencial a trav\u00e9s de medidas de seguridad inadecuadas implementadas dentro de los mecanismos de registro de ROS2."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30684",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30686",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T05:15:47.853",
"lastModified": "2024-05-17T02:38:53.697",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:17.100",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes o nodos dentro del sistema ROS2."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30686",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30687",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T05:15:47.920",
"lastModified": "2024-05-17T02:38:53.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:17.183",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An insecure deserialization vulnerability has been identified in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de deserializaci\u00f3n insegura en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de una entrada manipulada para los componentes de serializaci\u00f3n y deserializaci\u00f3n de datos, los mecanismos de comunicaci\u00f3n entre procesos y las interfaces de comunicaci\u00f3n de red."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30687",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30688",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T05:15:47.980",
"lastModified": "2024-05-17T02:38:53.803",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:17.260",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de carga de archivos arbitraria en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para el mecanismo de carga de archivos del sistema ROS2, incluida la funcionalidad del servidor para manejar la carga de archivos y los procesos de validaci\u00f3n asociados."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30688",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30690",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T06:15:08.963",
"lastModified": "2024-05-17T02:38:53.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:17.340",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Galactic Geochelone versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to escalate privileges. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de inyecci\u00f3n de nodo no autorizada en las versiones ROS2 Galactic Geochelone donde ROS_VERSION es 2 y ROS_PYTHON_VERSION es 3, lo que permite a atacantes remotos escalar privilegios."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30690",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30691",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T07:15:08.467",
"lastModified": "2024-05-17T02:38:53.920",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:17.417",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 Galactic Geochelone in version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ROS2 Galactic Geochelone en la versi\u00f3n ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios, obtener informaci\u00f3n confidencial y obtener acceso no autorizado a m\u00faltiples nodos ROS2."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30691",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30692",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T07:15:08.560",
"lastModified": "2024-05-17T02:38:53.977",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:17.500",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "A issue was discovered in ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) in the ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en las versiones ROS2 Galactic Geochelone ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (DoS) en los nodos ROS2."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30692",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30694",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.420",
"lastModified": "2024-05-17T02:38:54.033",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:17.590",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de shell en ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial debido a la forma en que ROS2 maneja la ejecuci\u00f3n de comandos de shell en componentes como int\u00e9rpretes de comandos o interfaces que procesan entradas externas. NOTA: esto es cuestionado por varios terceros que creen que no hab\u00eda pruebas razonables para determinar la existencia de una vulnerabilidad."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30691",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30695",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.530",
"lastModified": "2024-05-17T02:38:54.097",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:17.673",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the default configurations of ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en las configuraciones predeterminadas de ROS2 Galactic Geochelone versiones ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes no autenticados obtener acceso utilizando credenciales predeterminadas. NOTA: esto es cuestionado por varios terceros que creen que no hab\u00eda pruebas razonables para determinar la existencia de una vulnerabilidad."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30695",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30696",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.587",
"lastModified": "2024-05-17T02:38:54.153",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:17.767",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "OS command injection vulnerability in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2, including External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en ROS2 Galactic Geochelone en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s del procesamiento de comandos o componentes de llamadas al sistema en ROS2, incluidos m\u00f3dulos de ejecuci\u00f3n de comandos externos, controladores de llamadas del sistema y scripts de interfaz. NOTA: esto es cuestionado por varios terceros que creen que no hab\u00eda pruebas razonables para determinar la existencia de una vulnerabilidad."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30696",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30697",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.663",
"lastModified": "2024-05-17T02:38:54.210",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:17.843",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ROS2 Galactic Geochelone en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, donde el sistema transmite mensajes en texto sin formato, lo que permite a los atacantes acceder a informaci\u00f3n confidencial a trav\u00e9s de un ataque de intermediario. NOTA: esto es cuestionado por varios terceros que creen que no hab\u00eda pruebas razonables para determinar la existencia de una vulnerabilidad."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30697",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30699",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.717",
"lastModified": "2024-05-17T02:38:54.260",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:17.920",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de desbordamiento de b\u00fafer en los componentes C++ de ROS2 Galactic Geochelone ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante un manejo inadecuado de matrices o cadenas. NOTA: esto es cuestionado por varios terceros que creen que no hab\u00eda pruebas razonables para determinar la existencia de una vulnerabilidad."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30699",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30701",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.770",
"lastModified": "2024-05-17T02:38:54.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:18.000",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An insecure logging vulnerability in ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to obtain sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad de registro inseguro en ROS2 Galactic Geochelone ROS_VERSION 2 y ROS_PYTHON_VERSION 3 permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de medidas de seguridad inadecuadas implementadas dentro de los mecanismos de registro de ROS2. NOTA: esto es cuestionado por varios terceros que creen que no hab\u00eda pruebas razonables para determinar la existencia de una vulnerabilidad."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30701",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30702",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T18:15:09.680",
"lastModified": "2024-05-17T02:38:54.440",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:18.083",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ROS2 Galactic Geochelone en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes o nodos dentro del sistema ROS2."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30702",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30703",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T18:15:09.743",
"lastModified": "2024-05-17T02:38:54.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:18.163",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de carga de archivos arbitrarios en ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, provocar una denegaci\u00f3n de servicio (DoS) y obtener informaci\u00f3n confidencial a trav\u00e9s de una carga \u00fatil manipulada para el Mecanismo de carga de archivos del sistema ROS2, incluida la funcionalidad del servidor para manejar la carga de archivos y los procesos de validaci\u00f3n asociados."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30703",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30704",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T18:15:09.800",
"lastModified": "2024-05-17T02:38:54.577",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:18.253",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An insecure deserialization vulnerability has been identified in ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de deserializaci\u00f3n insegura en ROS2 Galactic Geochelone ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de entradas manipuladas en los componentes de serializaci\u00f3n y deserializaci\u00f3n de datos, los mecanismos de comunicaci\u00f3n entre procesos y las interfaces de comunicaci\u00f3n de red."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30704",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30706",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T19:15:38.980",
"lastModified": "2024-05-17T02:38:54.640",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:18.333",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 Dashing Diademata versions ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en las versiones ROS2 Dashing Diademata ROS_VERSION es 2 y ROS_PYTHON_VERSION es 3, permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios, obtener informaci\u00f3n confidencial y obtener acceso no autorizado a m\u00faltiples nodos ROS2."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30706",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30707",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T01:15:19.053",
"lastModified": "2024-05-17T02:38:54.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T00:15:09.080",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Unauthorized node injection vulnerability in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n de nodo no autorizado en ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, permite a atacantes remotos escalar privilegios e inyectar nodos ROS2 maliciosos en el sistema."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30707",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30708",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T01:15:19.110",
"lastModified": "2024-05-17T02:38:54.763",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:18.560",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de los nodos ROS2."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30708",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30710",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T01:15:19.160",
"lastModified": "2024-05-17T02:38:54.813",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:18.640",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to easily intercept and access this data. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, donde el sistema transmite mensajes en texto plano. Esta falla expone informaci\u00f3n confidencial, haci\u00e9ndola vulnerable a ataques de intermediario (MitM) y permitiendo a los atacantes interceptar y acceder f\u00e1cilmente a estos datos."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30710",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30711",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T02:15:10.300",
"lastModified": "2024-05-17T02:38:54.870",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:18.727",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the default configurations of ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en las configuraciones predeterminadas de ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes no autenticados obtener acceso utilizando las credenciales predeterminadas."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30711",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30712",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T02:15:10.400",
"lastModified": "2024-05-17T02:38:54.930",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:18.823",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de shell en ROS2 (Robot Operating System 2) Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial debido a la forma en que ROS2 maneja la ejecuci\u00f3n de comandos de shell en componentes como int\u00e9rpretes de comandos o interfaces que procesan entradas externas."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30712",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30713",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T02:15:10.473",
"lastModified": "2024-05-17T02:38:54.997",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:18.910",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability has been discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de los m\u00f3dulos de ejecuci\u00f3n de comandos externos, los controladores de llamadas del sistema y los scripts de interfaz."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30713",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30715",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T02:15:10.527",
"lastModified": "2024-05-17T02:38:55.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:18.987",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de desbordamiento de b\u00fafer en los componentes C++ de ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante el manejo inadecuado de matrices o cadenas."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30715",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30716",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T02:15:10.590",
"lastModified": "2024-05-17T02:38:55.283",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:19.070",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An insecure logging vulnerability in ROS2 Dashing Diademata ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attacks to obtain sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad de registro inseguro en ROS2 Dashing Diademata ROS_VERSION 2 y ROS_PYTHON_VERSION 3 permite que los ataques obtengan informaci\u00f3n confidencial a trav\u00e9s de medidas de seguridad inadecuadas implementadas dentro de los mecanismos de registro de ROS2."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30716",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30718",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T03:15:06.680",
"lastModified": "2024-05-17T02:38:55.357",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:19.147",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION=2 and ROS_PYTHON_VERSION=3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ROS2 Dashing Diademata en ROS_VERSION=2 y ROS_PYTHON_VERSION=3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes o nodos dentro del sistema ROS2."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30718",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30719",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T03:15:06.740",
"lastModified": "2024-05-17T02:38:55.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:19.223",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An insecure deserialization vulnerability has been identified in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de deserializaci\u00f3n insegura en ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de componentes de serializaci\u00f3n y deserializaci\u00f3n de datos, mecanismos de comunicaci\u00f3n entre procesos e interfaces de comunicaci\u00f3n de red."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30719",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30721",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T03:15:06.797",
"lastModified": "2024-05-17T02:38:55.467",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:19.310",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de carga de archivos arbitraria en ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, provocar una denegaci\u00f3n de servicio (DoS) y obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado para el mecanismo de carga de archivos del Sistema ROS2, incluida la funcionalidad del servidor para manejar la carga de archivos y los procesos de validaci\u00f3n asociados."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30721",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30722",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T03:15:06.853",
"lastModified": "2024-05-17T02:38:55.557",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:19.390",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de los nodos ROS."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30722",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30723",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T03:15:06.907",
"lastModified": "2024-05-17T02:38:55.617",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:19.477",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An unauthorized node injection vulnerability has been identified in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS nodes into the system due to insecure permissions. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de inyecci\u00f3n de nodo no autorizado en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos escalar privilegios e inyectar nodos ROS maliciosos en el sistema debido a permisos inseguros."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30723",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30724",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T04:15:09.960",
"lastModified": "2024-05-17T02:38:55.680",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:19.553",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios, obtener informaci\u00f3n confidencial y obtener acceso no autorizado a m\u00faltiples nodos ROS."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30724",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30726",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T04:15:10.040",
"lastModified": "2024-05-17T02:38:55.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:19.633",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "A shell injection vulnerability was discovered in ROS (Robot Operating System) Kinetic Kame in ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de shell en ROS (Robot Operating System) Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial debido a la forma en que ROS maneja la ejecuci\u00f3n de comandos de shell en componentes como int\u00e9rpretes de comandos o interfaces que procesan entradas externas."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30726",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30727",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T04:15:10.213",
"lastModified": "2024-05-17T02:38:55.813",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:19.710",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS Kinetic Kame in Kinetic Kame ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, where the system transmits messages in plaintext, allowing attackers to obtain sensitive information via a man-in-the-middle attack. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ROS Kinetic Kame en Kinetic Kame ROS_VERSION 1 y ROS_ PYTHON_VERSION 3, donde el sistema transmite mensajes en texto plano, lo que permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de un ataque de intermediario."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30727",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30728",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T23:15:07.317",
"lastModified": "2024-05-17T02:38:55.927",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:19.790",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the default configurations of ROS (Robot Operating System) Kinetic Kame ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en las configuraciones predeterminadas de ROS (sistema operativo de robot) Kinetic Kame ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes no autenticados obtener acceso utilizando las credenciales predeterminadas."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30728",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,43 +2,14 @@
"id": "CVE-2024-30729",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T05:15:49.863",
"lastModified": "2024-05-17T02:38:55.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:19.870",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability has been discovered in ROS Kinetic Kame in ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de m\u00f3dulos de ejecuci\u00f3n de comandos externos, controladores de llamadas del sistema y scripts de interfaz."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://ros.com",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30729",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30730",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T05:15:49.920",
"lastModified": "2024-05-17T02:38:56.073",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:19.953",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An insecure logging vulnerability has been identified within ROS Kinetic Kame in ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, allows attackers to obtain sensitive information via inadequate security measures implemented within the logging mechanisms of ROS. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de registro inseguro dentro de ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de medidas de seguridad inadecuadas implementadas dentro de los mecanismos de registro de ROS."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30730",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30733",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T05:15:49.983",
"lastModified": "2024-05-17T02:38:56.127",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:20.033",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS Kinetic Kame in ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings within these components. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de desbordamiento de b\u00fafer en los componentes C++ de ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante el manejo inadecuado de matrices o cadenas dentro de estos componentes."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30733",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30735",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T05:15:50.040",
"lastModified": "2024-05-17T02:38:56.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:20.110",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability has been discovered in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via crafted payload to the file upload mechanism of the ROS system, including the server\u2019s functionality for handling file uploads and the associated validation processes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de carga de archivos arbitraria en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, provocar una denegaci\u00f3n de servicio (DoS) y obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado para el mecanismo de carga de archivos de ROS. sistema, incluida la funcionalidad del servidor para manejar la carga de archivos y los procesos de validaci\u00f3n asociados."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30735",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30736",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T05:15:50.090",
"lastModified": "2024-05-17T02:38:56.377",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:20.203",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An insecure deserialization vulnerability has been identified in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de deserializaci\u00f3n insegura en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de los componentes de serializaci\u00f3n y deserializaci\u00f3n de datos, los mecanismos de comunicaci\u00f3n entre procesos y las interfaces de comunicaci\u00f3n de red."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30736",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,39 +2,14 @@
"id": "CVE-2024-30737",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T05:15:50.147",
"lastModified": "2024-05-17T02:38:56.433",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T01:15:20.303",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes o nodos dentro del sistema ROS."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yashpatelphd/CVE-2024-30737",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-5384",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-27T00:15:09.280",
"lastModified": "2024-05-27T00:15:09.280",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in SourceCodester Facebook News Feed Like 1.0. This vulnerability affects unknown code of the file index.php. The manipulation of the argument page leads to sql injection. The attack can be initiated remotely. VDB-266302 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.266302",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.266302",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.344502",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-5385",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-27T00:15:09.570",
"lastModified": "2024-05-27T00:15:09.570",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in oretnom23 Online Car Wash Booking System 1.0. This issue affects some unknown processing of the file /admin/?page=user/list. The manipulation of the argument First Name/Last Name with the input <script>confirm (document.cookie)</script> leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-266303."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.266303",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.266303",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.344504",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-5390",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-27T01:15:20.410",
"lastModified": "2024-05-27T01:15:20.410",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in itsourcecode Online Student Enrollment System 1.0. Affected is an unknown function of the file listofstudent.php. The manipulation of the argument lname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266304."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/3",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.266304",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.266304",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.344603",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-5391",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-27T01:15:20.693",
"lastModified": "2024-05-27T01:15:20.693",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in itsourcecode Online Student Enrollment System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file listofsubject.php. The manipulation of the argument subjcode leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266305 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/4",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.266305",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.266305",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.344605",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-26T23:55:29.970342+00:00
2024-05-27T02:00:29.975692+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-26T23:15:22.423000+00:00
2024-05-27T01:15:20.693000+00:00
```
### Last Data Feed Release
@ -27,36 +27,56 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-05-26T00:00:20.237087+00:00
2024-05-27T00:00:20.286924+00:00
```
### Total Number of included CVEs
```plain
251826
251832
```
### CVEs added in the last Commit
Recently added CVEs: `10`
Recently added CVEs: `6`
- [CVE-2024-34454](CVE-2024/CVE-2024-344xx/CVE-2024-34454.json) (`2024-05-26T22:15:08.650`)
- [CVE-2024-36054](CVE-2024/CVE-2024-360xx/CVE-2024-36054.json) (`2024-05-26T23:15:21.370`)
- [CVE-2024-36055](CVE-2024/CVE-2024-360xx/CVE-2024-36055.json) (`2024-05-26T23:15:21.457`)
- [CVE-2024-36056](CVE-2024/CVE-2024-360xx/CVE-2024-36056.json) (`2024-05-26T23:15:21.520`)
- [CVE-2024-4286](CVE-2024/CVE-2024-42xx/CVE-2024-4286.json) (`2024-05-26T23:15:21.600`)
- [CVE-2024-5378](CVE-2024/CVE-2024-53xx/CVE-2024-5378.json) (`2024-05-26T22:15:08.747`)
- [CVE-2024-5379](CVE-2024/CVE-2024-53xx/CVE-2024-5379.json) (`2024-05-26T22:15:09.020`)
- [CVE-2024-5380](CVE-2024/CVE-2024-53xx/CVE-2024-5380.json) (`2024-05-26T23:15:21.887`)
- [CVE-2024-5381](CVE-2024/CVE-2024-53xx/CVE-2024-5381.json) (`2024-05-26T23:15:22.150`)
- [CVE-2024-5383](CVE-2024/CVE-2024-53xx/CVE-2024-5383.json) (`2024-05-26T23:15:22.423`)
- [CVE-2024-30657](CVE-2024/CVE-2024-306xx/CVE-2024-30657.json) (`2024-05-27T00:15:08.743`)
- [CVE-2024-30658](CVE-2024/CVE-2024-306xx/CVE-2024-30658.json) (`2024-05-27T00:15:09.013`)
- [CVE-2024-5384](CVE-2024/CVE-2024-53xx/CVE-2024-5384.json) (`2024-05-27T00:15:09.280`)
- [CVE-2024-5385](CVE-2024/CVE-2024-53xx/CVE-2024-5385.json) (`2024-05-27T00:15:09.570`)
- [CVE-2024-5390](CVE-2024/CVE-2024-53xx/CVE-2024-5390.json) (`2024-05-27T01:15:20.410`)
- [CVE-2024-5391](CVE-2024/CVE-2024-53xx/CVE-2024-5391.json) (`2024-05-27T01:15:20.693`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `81`
- [CVE-2024-33427](CVE-2024/CVE-2024-334xx/CVE-2024-33427.json) (`2024-05-26T22:15:08.427`)
- [CVE-2024-30704](CVE-2024/CVE-2024-307xx/CVE-2024-30704.json) (`2024-05-27T01:15:18.253`)
- [CVE-2024-30706](CVE-2024/CVE-2024-307xx/CVE-2024-30706.json) (`2024-05-27T01:15:18.333`)
- [CVE-2024-30707](CVE-2024/CVE-2024-307xx/CVE-2024-30707.json) (`2024-05-27T00:15:09.080`)
- [CVE-2024-30708](CVE-2024/CVE-2024-307xx/CVE-2024-30708.json) (`2024-05-27T01:15:18.560`)
- [CVE-2024-30710](CVE-2024/CVE-2024-307xx/CVE-2024-30710.json) (`2024-05-27T01:15:18.640`)
- [CVE-2024-30711](CVE-2024/CVE-2024-307xx/CVE-2024-30711.json) (`2024-05-27T01:15:18.727`)
- [CVE-2024-30712](CVE-2024/CVE-2024-307xx/CVE-2024-30712.json) (`2024-05-27T01:15:18.823`)
- [CVE-2024-30713](CVE-2024/CVE-2024-307xx/CVE-2024-30713.json) (`2024-05-27T01:15:18.910`)
- [CVE-2024-30715](CVE-2024/CVE-2024-307xx/CVE-2024-30715.json) (`2024-05-27T01:15:18.987`)
- [CVE-2024-30716](CVE-2024/CVE-2024-307xx/CVE-2024-30716.json) (`2024-05-27T01:15:19.070`)
- [CVE-2024-30718](CVE-2024/CVE-2024-307xx/CVE-2024-30718.json) (`2024-05-27T01:15:19.147`)
- [CVE-2024-30719](CVE-2024/CVE-2024-307xx/CVE-2024-30719.json) (`2024-05-27T01:15:19.223`)
- [CVE-2024-30721](CVE-2024/CVE-2024-307xx/CVE-2024-30721.json) (`2024-05-27T01:15:19.310`)
- [CVE-2024-30722](CVE-2024/CVE-2024-307xx/CVE-2024-30722.json) (`2024-05-27T01:15:19.390`)
- [CVE-2024-30723](CVE-2024/CVE-2024-307xx/CVE-2024-30723.json) (`2024-05-27T01:15:19.477`)
- [CVE-2024-30724](CVE-2024/CVE-2024-307xx/CVE-2024-30724.json) (`2024-05-27T01:15:19.553`)
- [CVE-2024-30726](CVE-2024/CVE-2024-307xx/CVE-2024-30726.json) (`2024-05-27T01:15:19.633`)
- [CVE-2024-30727](CVE-2024/CVE-2024-307xx/CVE-2024-30727.json) (`2024-05-27T01:15:19.710`)
- [CVE-2024-30728](CVE-2024/CVE-2024-307xx/CVE-2024-30728.json) (`2024-05-27T01:15:19.790`)
- [CVE-2024-30729](CVE-2024/CVE-2024-307xx/CVE-2024-30729.json) (`2024-05-27T01:15:19.870`)
- [CVE-2024-30730](CVE-2024/CVE-2024-307xx/CVE-2024-30730.json) (`2024-05-27T01:15:19.953`)
- [CVE-2024-30733](CVE-2024/CVE-2024-307xx/CVE-2024-30733.json) (`2024-05-27T01:15:20.033`)
- [CVE-2024-30735](CVE-2024/CVE-2024-307xx/CVE-2024-30735.json) (`2024-05-27T01:15:20.110`)
- [CVE-2024-30736](CVE-2024/CVE-2024-307xx/CVE-2024-30736.json) (`2024-05-27T01:15:20.203`)
- [CVE-2024-30737](CVE-2024/CVE-2024-307xx/CVE-2024-30737.json) (`2024-05-27T01:15:20.303`)
## Download and Usage

View File

@ -224813,9 +224813,9 @@ CVE-2023-33561,0,0,7d7270ac1ff79133ddaf63e3919229ff4117e702565f7588fe0652c2af7ee
CVE-2023-33562,0,0,93ca40959e3c7c5363a1d165b8c8e7a2a8997b6b7fa9c80635dff7a8db780cff,2023-11-07T04:15:02.310000
CVE-2023-33563,0,0,2bf0bb84a4bc7f64f91b799953743cb871207baae5873f68deede9053cd3005c,2023-11-07T04:15:03.383000
CVE-2023-33564,0,0,ec84ea26aaf2dcb3b9661f384bad9240a076dacca630dc70980effeff0964e71,2023-11-07T04:15:04.680000
CVE-2023-33565,0,0,a284ddb304e925e80b9dfc8c802b6a4c6dfec6b6aff32d4c2b9d7bb0aab0da19,2024-05-17T02:24:46.420000
CVE-2023-33566,0,0,36eb4bc084fb5978c171d8d5f34c42a05b8fc4da974b001adc8718eb9dbefd94,2024-05-17T02:24:46.550000
CVE-2023-33567,0,0,5af1b35a07d7ae2f11ddcb1743b681758733050d9b1070e70f637ba07c11186c,2024-05-17T02:24:46.650000
CVE-2023-33565,0,1,4b44492d02684e3818a43db3b9a019e33bd2d090fc3358811dba7bedbf0d848b,2024-05-27T01:15:12.923000
CVE-2023-33566,0,1,1ad2c6794364a2fa5d040a81a6f50b414d78e245f45db979f17d633f4db820f8,2024-05-27T01:15:13.207000
CVE-2023-33567,0,1,802f34481cdb1bc2f5692188496f8bbcf084d8ee40f2577f89c61a8d19504d8c,2024-05-27T01:15:13.333000
CVE-2023-33568,0,0,9abd2c0080f8890623fd1ef22b3158ba405bb6796b357a4a7743a12bd9fbf687,2023-06-23T19:22:43.680000
CVE-2023-33569,0,0,45131024b6b9cedaeb3b0384be615a9c63428a7f85e26f1982e9efc95b235e43,2023-06-13T15:17:31.487000
CVE-2023-3357,0,0,1795badf23992d8257da46aa6b4ec132f0faaa631a40ad67acb153f32fe5caf6,2023-07-06T17:45:06.373000
@ -237091,15 +237091,15 @@ CVE-2023-5116,0,0,d922ad8efb7c4092dfcc67df369758f2993af13c7f9bf47b3c79997ce8f376
CVE-2023-5118,0,0,47d5b7062846878e0011ff2a12fd5f062c384abc19e7acc1db2a397062d6e3c7,2024-01-18T16:01:37.653000
CVE-2023-5119,0,0,455e9f236dbff01f8e8bc2e276d6d6b0e6e7ce4bb8696bfeb9b59080374876f8,2023-11-27T16:33:20.673000
CVE-2023-51195,0,0,c6bcd636c7b5d9416e056ae1443369d1f2faa536267864b89f54dfc132468fa2,2024-01-10T20:15:45.393000
CVE-2023-51197,0,0,c7c6a1d04c416270a01f6fbd3b071cabffba6d98ebd01fbc48b540b8a976da73,2024-05-17T02:32:15.297000
CVE-2023-51198,0,0,26b0169e164851c1fda51f0f888c88877a5c8bd2e5dff8a48c89745c8cf1442e,2024-05-17T02:32:15.383000
CVE-2023-51199,0,0,ae12cfd76c69323f3ccc341b4ae0bcdb81fd745662b579e5f085bfc23401ca4f,2024-05-17T02:32:15.473000
CVE-2023-51197,0,1,8f4e4176f5affe78106e74bab92f697f7dc8533d995fda35bf4939dd3ac25cd8,2024-05-27T01:15:13.443000
CVE-2023-51198,0,1,6622b4daa4cb761096fc36c4c1993f07b042a2d15aceb56e48c6d21d145cdb81,2024-05-27T01:15:13.587000
CVE-2023-51199,0,1,ea21b96cbff887e3a291c54a0eb2a8905e2c15b25ab6b5807fbd4a0f06f16be0,2024-05-27T01:15:13.703000
CVE-2023-5120,0,0,274c6e59a1c326935c917735ea0c01d2c7f3eaf0117080f7a1fe00dea446abc2,2023-11-07T04:23:28.620000
CVE-2023-51200,0,0,c88e15c1c72afc794b8720a36d2c9a6aed86335734ab41b3499fc7162313b308,2024-05-17T02:32:15.570000
CVE-2023-51201,0,0,ed10729f0ef9d6836d6f4765236f2dc56954a5b2cafd1dbf3f92c3a1b85202ff,2024-05-17T02:32:15.670000
CVE-2023-51202,0,0,e5add73dd3a15cbd04f3f54f88fd20d61190be4083da2b87d3543a2c9db074cc,2024-05-17T02:32:15.767000
CVE-2023-51204,0,0,8fde8eb9cc8e1477b7e164e9e11055e242584ce62df045967996e290f14c6f87,2024-05-17T02:32:15.853000
CVE-2023-51208,0,0,48db0803a48bf2e1dbc1b7d41d812b63e12b58e1b1b0d829e3eb359ba48e7a90,2024-05-17T02:32:15.943000
CVE-2023-51200,0,1,0542aaccbedaec19ab8e3670cab621795a4d359ef3acdc57b65d7ee39ba3e922,2024-05-27T01:15:13.840000
CVE-2023-51201,0,1,b268d0d1519dcd8d57483fb9d40fe8e94a09e81116e4f7022ba110b895d98ae3,2024-05-27T01:15:13.960000
CVE-2023-51202,0,1,f42db584d4d047fa4e5a992bf063337e1b8bafd9c74cf48b2162e38c25bf2888,2024-05-27T01:15:14.070000
CVE-2023-51204,0,1,cb5ccb15859b7d1663a795ff0026c09fba256fef95fb062659af9f52b44baa64,2024-05-27T01:15:14.180000
CVE-2023-51208,0,1,e261de9355cad864421170cb3b3ffb379d74ac3894a1acccef17b77f99d2bf56,2024-05-27T01:15:14.283000
CVE-2023-5121,0,0,5134c4a98b2fbb366eaa7660e6d7aecc00f15fa4685ab925e722a2daeab513d4,2023-11-07T04:23:28.827000
CVE-2023-51210,0,0,ae23e1dd56bc994975ad1cf5f43a03ff833adca03d4acec46183d1f35028673b,2024-01-29T19:38:28.213000
CVE-2023-51217,0,0,609ce02576608b7bece0fa3e03a269d7ff1a0d343c7aa4770e1650d18ab2f9db,2024-01-26T14:40:49.700000
@ -247388,22 +247388,22 @@ CVE-2024-29432,0,0,935ce59b23319f15478ff1d005b1786853efcea9f20ed5b78b83dcf1879a3
CVE-2024-29433,0,0,b10a666a979afbf6ffc25b1ef458e1d0fb9c766493f3b32e8a3cbc2c3e4a9e2b,2024-04-02T12:50:42.233000
CVE-2024-29434,0,0,e2dd739e4fe1b524f01d6355aa24f60868a619e4b33fdd429c31c5ef2f0acc1e,2024-04-03T12:38:04.840000
CVE-2024-29435,0,0,4d03d83d8cb615246ed4e783c1ea07f9aee9ed7e6aa6133cefbb15bfb0a5c168,2024-04-02T12:50:42.233000
CVE-2024-29439,0,0,bb972609e982cc2c7c58917698ad9a0bc1ee3ff8e4ac0fb30c6f619ed778adef,2024-05-17T02:37:51.987000
CVE-2024-29439,0,1,5f33d479d792b88dc65e07dae14916156f97ff2d574fe6b752d04d58cd17848f,2024-05-27T01:15:14.397000
CVE-2024-2944,0,0,28a5ed5a313327b41fbf4d15081236d8d2af310b8671b60b5fd47063cbcc4770,2024-05-17T02:38:38.893000
CVE-2024-29440,0,0,f9f4f940cc942e481a727f419828d56f454a2f914e0f99eb994397268df4bcd9,2024-05-17T02:37:52.050000
CVE-2024-29441,0,0,7e08d9c94c95459c4704198a67060125627cb2cc67309fc02c628f87b139ce50,2024-05-17T02:37:52.107000
CVE-2024-29442,0,0,fca3b1fdb675778d7e5e8fdcaabb89ab1194684a41f447d436dac8e24d40b0ac,2024-05-17T02:37:52.163000
CVE-2024-29443,0,0,232e1a2b5c17c718b3ffe20285378d8535b00af05fd113aeaf188db0ce7a55e5,2024-05-17T02:37:52.220000
CVE-2024-29444,0,0,0aa8b39052a0f16a7a24e6f74e9b967ac0ce8b20c48376c5ed34a945631066f0,2024-05-17T02:37:52.273000
CVE-2024-29445,0,0,cccc5db5a69e2a46b367864f196a942a273d00bb6e0d3b00ab21815745b4830c,2024-05-17T02:37:52.330000
CVE-2024-29447,0,0,51a8fa1c4998d0d1c428ce8c9146853636cae0f15868e961a36879ebc50ae398,2024-05-17T02:37:52.383000
CVE-2024-29448,0,0,a7eb80602d315f3770ee772a141c627905693bff6fab0e179b75ab8f7ae6d05c,2024-05-17T02:37:52.437000
CVE-2024-29449,0,0,bcf572dd58eb7b996a19c15079d7152d267a53b8ab9b584136de5d78fd0057d8,2024-05-17T02:37:52.497000
CVE-2024-29440,0,1,536ce1355c4ff21d9eb5d18aa27903a4d5cfd52ff39a55ad14e35ab52a2b3d34,2024-05-27T01:15:14.497000
CVE-2024-29441,0,1,6c01779b032b5a151287f52a91932196b97e2a24d6dd604623cbfc55998cff00,2024-05-27T01:15:14.590000
CVE-2024-29442,0,1,5577e99142b02eb31dd7c68e0ffcf024d2bb2cefb70dc861b3ea34ab62fd01a1,2024-05-27T01:15:14.673000
CVE-2024-29443,0,1,8b3af897e0d54f97df78d5f695d658a20f1a1d4541d15f75d5052c2cfc1822a6,2024-05-27T01:15:14.760000
CVE-2024-29444,0,1,08be83f043d947d2397ae77f59b82fbaff0a2986d15e6e310434dcba5d226c83,2024-05-27T01:15:14.847000
CVE-2024-29445,0,1,85e5b627f65440765fa80d961e313f55a73af3749e31b09b423fb125c85de873,2024-05-27T01:15:14.933000
CVE-2024-29447,0,1,797493894c73e0788ea1b0675e91568cc1b1cffb6d8c5ee42881f3e276113f1e,2024-05-27T01:15:15.013000
CVE-2024-29448,0,1,bd7279bc396ccb746015d98e9d257c196122e683b0fbcafc8f411b10fd1be7a6,2024-05-27T01:15:15.103000
CVE-2024-29449,0,1,ea90fd1cc3726264bb0a33c176590aa1b45ebee0e168abdff93b4bfaaad394d5,2024-05-27T01:15:15.200000
CVE-2024-2945,0,0,8689450ab0009c5d4d63f7d3640c91cff84d45d6a1250d9459c62f7180058fd7,2024-05-17T02:38:38.987000
CVE-2024-29450,0,0,d888d4597fa2ebcc912c8fe72954b3685bc672cee9db9360113293ff7f473dbd,2024-05-17T02:37:52.553000
CVE-2024-29452,0,0,f81d4dfaf74b303859ed7e8b360d4e5549fb0ece5c2f13ac1aa06cd51e01fa19,2024-05-17T02:37:52.603000
CVE-2024-29454,0,0,16984211295f8bd8a7cd210f46251831e17dc8969eb73498d223c32704f5fde8,2024-05-17T02:37:52.660000
CVE-2024-29455,0,0,283fbacb6ad6238f8a71000402182860d84f283aac110f3d6f4337183232242c,2024-05-17T02:37:52.713000
CVE-2024-29450,0,1,2cfac1fd27828253e5917a28615c8e4f1b234c2a793ef5df4a6e9bf3d7c82962,2024-05-27T01:15:15.293000
CVE-2024-29452,0,1,0b6086fde432e35bdd64ca6ef2a9a853eee149b4cde2f1d09d9c8b4eec3ee628,2024-05-27T01:15:15.387000
CVE-2024-29454,0,1,aa15960195507983d36d6e2ba6fe52c5783793504e2d3e8d91a9bb9866998c45,2024-05-27T01:15:15.473000
CVE-2024-29455,0,1,34e13e15e8ba1247bab4074112a2a8e07941c50f23ef976a2aa4934ef2701aea,2024-05-27T01:15:15.573000
CVE-2024-2946,0,0,b86288fa77fb47b4b83be2e46631f0944d38df3dbc98c9ee65a2d9324fa3b190,2024-04-10T13:23:38.787000
CVE-2024-29460,0,0,b846dd78dc5e35e9b0ddcbf6b64c6fe8dd169ef35be60b3c712c2dd2787cb070,2024-04-11T12:47:44.137000
CVE-2024-29461,0,0,0ea3979c495137b90acde4ca36a0a99c570c5e7619fef41ff59b36c98cf5a199,2024-04-15T13:15:51.577000
@ -248187,68 +248187,70 @@ CVE-2024-3064,0,0,150d2695d7eeb315cec549f12d6c6ef3f6e02daaf223b84571983b190cdbdb
CVE-2024-30645,0,0,00b9821a66dbca80d2d2c9c63858e19e8817ea8f49dc6578caf9fd20dddfbebc,2024-04-01T01:12:59.077000
CVE-2024-3065,0,0,b61f01dabfbfeec829c2b81f152d714ccf536ed8346282686b7cf0c8b5486e49,2024-05-24T01:15:30.977000
CVE-2024-30656,0,0,c800b352c15d86c6b7538edefbe50a56ea126bd7af414b5024084888358a8802,2024-04-16T13:24:07.103000
CVE-2024-30659,0,0,5ebf34ef5301500333f12d205c33075783bdc7dbc5af4530638bd854345f163a,2024-05-17T02:38:52.657000
CVE-2024-30657,1,1,585f7e2848bf503d5422cb1dd7e0346d7ca1c3aad5ef72e83d31139f80ff60cd,2024-05-27T00:15:08.743000
CVE-2024-30658,1,1,1e3e9ee4bef53a9461f98315e54fc9a85c79a3a7a0b5f257971911bbc371ffcc,2024-05-27T00:15:09.013000
CVE-2024-30659,0,1,a92cf3f153e28f676099dbfee74930eb22cd5acb32aa75ca390c336b74232a86,2024-05-27T01:15:15.650000
CVE-2024-3066,0,0,a435028a5d7598a92054eb3093db9c4c779b7421b23d7afed7784d55b0153283,2024-05-22T12:46:53.887000
CVE-2024-30661,0,0,88961c68164195d32bc65e56a0bbd80e308ffd2aa77a21587735d569b05581db,2024-05-17T02:38:52.723000
CVE-2024-30662,0,0,b421ff83822b51cda6c460942ac276618f034952deca1b4e59ee97e2130b1138,2024-05-17T02:38:52.780000
CVE-2024-30663,0,0,760682cd809c7d496d8de12f2d757101acf8f3470f03e2930af8b29338d9ca50,2024-05-17T02:38:52.837000
CVE-2024-30665,0,0,0f10bdfbccc4c49c82541739ad789a42ad1e1370c9cfdb6871b1055cbc7ccd35,2024-05-17T02:38:52.903000
CVE-2024-30666,0,0,69dbdd961c21404f6e1fad530af274bcf5da884b0497e2a285e80045ea32998e,2024-05-17T02:38:52.970000
CVE-2024-30667,0,0,a287394e96855ecb2992479e91843c521de9d7e9bdace5680eaefbae569d62fd,2024-05-17T02:38:53.033000
CVE-2024-30661,0,1,90ed1de506113e6de30bfddf49586791fbd86c6969df5315123273d18e7c526e,2024-05-27T01:15:15.757000
CVE-2024-30662,0,1,ec42c7267b8836b24e1d552e10421d50cc3c53077c04b49bbb9e908298fe5a2a,2024-05-27T01:15:15.843000
CVE-2024-30663,0,1,714b3fe59424c2476b503ca9801887e4407db94f3f470cdbad5a15d04e56a3de,2024-05-27T01:15:15.930000
CVE-2024-30665,0,1,1cb87b727e729d97e5d8d0b7623b85bcfbfae97f30ccd6903db8d6eb70bad78c,2024-05-27T01:15:16.010000
CVE-2024-30666,0,1,36f1aba96f78822899fc682b6c33babcc91454815147f5b0cf4172d1353b573b,2024-05-27T01:15:16.093000
CVE-2024-30667,0,1,ff94011519580c340f2cec76520b1057abfe8374eb32195c92e04c23c01382f6,2024-05-27T01:15:16.173000
CVE-2024-3067,0,0,583df5bf9514ea78fe346bb52f08143b4414e3b07f49a1ca00cb0a4ce95ab3f7,2024-04-16T13:24:07.103000
CVE-2024-30672,0,0,c5ca4e8da59e1ed717ad0e3275d67229ae696cdd53d1b0c905eb7a572c19b7e7,2024-05-17T02:38:53.093000
CVE-2024-30674,0,0,e02b6891d7a4bd8a45d4032ec3a866bada7240f75c9d493af6f4534f6d6a72f8,2024-05-17T02:38:53.160000
CVE-2024-30675,0,0,a9114bd90ee39955a67798a759a0e426ac624afe71f3caf485e35bb27a486caa,2024-05-17T02:38:53.220000
CVE-2024-30676,0,0,7d4060c8bf27a611da143f11109a4f08a9a3ea1e8b1dcf7f54898a16d706a6d5,2024-05-17T02:38:53.287000
CVE-2024-30678,0,0,0a912776d7d04c3487e0f7ab00df2657d6461a3b3991f78976cb4fcf78f076f0,2024-05-17T02:38:53.350000
CVE-2024-30679,0,0,31ef3cd3ff2bbd52aa46619a947be5e41233852b892d3e3f7e5aaf070c3deab9,2024-05-17T02:38:53.410000
CVE-2024-30672,0,1,077b9a700b807eb0e14d2db7cda25cb224a478ee7086ae9c2cb95db53c51d2fc,2024-05-27T01:15:16.250000
CVE-2024-30674,0,1,437e4e67c37f80747df887f90336a94a9ec86b622d0825ad3dd1550cd38928c5,2024-05-27T01:15:16.347000
CVE-2024-30675,0,1,58970cb4485b373062089530e092dffb88ac118f26e24b46961502da67830efc,2024-05-27T01:15:16.433000
CVE-2024-30676,0,1,358a01f728e50e107f66c2be09bc79ef8235917dfd7c8bfe0207abbed4d29168,2024-05-27T01:15:16.523000
CVE-2024-30678,0,1,b6df40ca1e9284c5e0ee64aa5b548aa0c3268412dbdf918fec0d49fead1ecf48,2024-05-27T01:15:16.610000
CVE-2024-30679,0,1,1c9183aada13e24ef935b6492178d3ed466835bce66b2e360bba44090d9c2658,2024-05-27T01:15:16.687000
CVE-2024-3068,0,0,7d4c4dd07274181628b10eb37f134c3767ade13a815d92210bd65fbdd6b7b487,2024-05-14T16:11:39.510000
CVE-2024-30680,0,0,ea6143a81d3030a64e670c6f10fc32534c40b5a17101d6c00d6f60780c315c1a,2024-05-17T02:38:53.470000
CVE-2024-30681,0,0,a17ddd064bde5fb2f23bbf715986061a105fd1d679965e8739b87f11d1814eee,2024-05-17T02:38:53.530000
CVE-2024-30683,0,0,289249d43addcba3a67b62860fbf73188bc77b39983955ebadd77abbc251cc00,2024-05-17T02:38:53.587000
CVE-2024-30684,0,0,d6aa94d38dd5fd3b91067ba0527bc3fecfea914e5a739db5454d76a0dd2d86f1,2024-05-17T02:38:53.640000
CVE-2024-30686,0,0,2fd8088f44e7e35c5b9845194bfc123575e2b8381ba388c8d2b5c62124d86699,2024-05-17T02:38:53.697000
CVE-2024-30687,0,0,f1afdd19adb43dd08e4949df7c760cb8a7fa545cdc0410b9fb58cef54f84f48c,2024-05-17T02:38:53.750000
CVE-2024-30688,0,0,0f24020a903a82af883b564e90b2df39950abef708ed46ec572c4ab454de65b5,2024-05-17T02:38:53.803000
CVE-2024-30690,0,0,75dc812c1b05e5c3ede5fe5db7151174ceac1a03a53e29aa5f171ed60633c5aa,2024-05-17T02:38:53.863000
CVE-2024-30691,0,0,c35da0fd6575ad793dfe21bed43a29e90e819fc030e81c2e45646257370e51f7,2024-05-17T02:38:53.920000
CVE-2024-30692,0,0,5bbb12a9a84540e4aeea6f5de532c339c1a7df861ed8e484196173e0c09c9477,2024-05-17T02:38:53.977000
CVE-2024-30694,0,0,7bf9a67292158e11f6aba8c01fe10b7e66ab4320f584767783aab3b81c8f5e53,2024-05-17T02:38:54.033000
CVE-2024-30695,0,0,1ffb0d4820299334f4e88f9b35042a7f19ed51a0157f79304bc86cfa3d1f00b5,2024-05-17T02:38:54.097000
CVE-2024-30696,0,0,0b891f997b1230f665923a4b3ead3dc20701563c54946eb27e8fe2925b2649e7,2024-05-17T02:38:54.153000
CVE-2024-30697,0,0,8d0b6b204b55068deb1ce02c3a447c57fd05d73a38364219b7d06e447564e099,2024-05-17T02:38:54.210000
CVE-2024-30699,0,0,62a4cbbc667015c8b8336a3f901e1c3ff3b4fbd89fd9ac7ba68eac82f6c63a61,2024-05-17T02:38:54.260000
CVE-2024-30680,0,1,3aea967c3a7d2066259cca64cd0f09c96d1540c292b77989917f64e548c59fd5,2024-05-27T01:15:16.763000
CVE-2024-30681,0,1,977eb23112e7d63cf586cb0cbc8076ef268031377d32839b2addc6fb260d25e4,2024-05-27T01:15:16.847000
CVE-2024-30683,0,1,b38ed51ff77d4ec07296481839db695cc36c4294f55a795d02dd4da1bea4401d,2024-05-27T01:15:16.937000
CVE-2024-30684,0,1,81776e6e63b69bcc917d54bb22772043aab3bddf6e7a6c8d2d94e75db4441185,2024-05-27T01:15:17.020000
CVE-2024-30686,0,1,ec692989dcec9cea6dec0b2b6b46b65bcf0852cdec529068d09059e0410951b1,2024-05-27T01:15:17.100000
CVE-2024-30687,0,1,46c562debb3af5bb308b16027cef829d12ebc855c3e2d73bcea01a6a81f4cb79,2024-05-27T01:15:17.183000
CVE-2024-30688,0,1,24d5c0a5389d55e03bedb3b0914236102d0522cb166a9e3c0f69a2d71809c3ec,2024-05-27T01:15:17.260000
CVE-2024-30690,0,1,862c1084f265adc5ab4ec87ee5601b4e758d925e8ce97690b77466a97e87e7d6,2024-05-27T01:15:17.340000
CVE-2024-30691,0,1,772ab87bbc3e00e1e86b0104e72d099be20f3447d10af3933225699c9f9fe770,2024-05-27T01:15:17.417000
CVE-2024-30692,0,1,6268b374d41d0c6c099474013c1be591a52fd6520d0efe9af8d98c535dd7b438,2024-05-27T01:15:17.500000
CVE-2024-30694,0,1,4b6174606e5fd01744d9a4a988bbc66bd2f28574123563c4b1d5960932b8a34a,2024-05-27T01:15:17.590000
CVE-2024-30695,0,1,52c5b1418b3583dcbddeba5f2fc2db6047dc3c0aa30db4b8893b79dc5527e2aa,2024-05-27T01:15:17.673000
CVE-2024-30696,0,1,cd1edb56c1a732937e5c74d7ff615dd7475f095290ef695cc751200ea51befa1,2024-05-27T01:15:17.767000
CVE-2024-30697,0,1,24b0dddde04a6c6300537a3b1813dd71a3bbb842b06afcae073a6a348fefb6d8,2024-05-27T01:15:17.843000
CVE-2024-30699,0,1,7e89615e22210caedcd00467ebf3f16bfd1f155b29594f5f029adef669ab0418,2024-05-27T01:15:17.920000
CVE-2024-3070,0,0,9fb220221043e1c7ea67a6c822d7a5170c8bc9c2d0f9db52643db5c1ee273e31,2024-05-14T16:11:39.510000
CVE-2024-30701,0,0,351431b378bae6d2f942a392b1b322fdfa5883fae026745b0d59ace641b58188,2024-05-17T02:38:54.353000
CVE-2024-30702,0,0,8575d89e6ad33f9ba0bc01343c54e5c5435aa37b0bc9e680c36f392600fcfac8,2024-05-17T02:38:54.440000
CVE-2024-30703,0,0,16452a3d56e77aec162a3c1268fae656d8990a10799615be1f3d8f721392a01d,2024-05-17T02:38:54.517000
CVE-2024-30704,0,0,315b61cb303a863452cf70f2c42ba06c5d303b2e1584321f8d199ee09290b66d,2024-05-17T02:38:54.577000
CVE-2024-30706,0,0,08a23ea6c9a48311a4affc64e221de42e147c44ec781073e3feb2af8e0fb3d14,2024-05-17T02:38:54.640000
CVE-2024-30707,0,0,89b1d9cf5ed176118da7ef50b51811151d5f4bb57a22b777115beee13105edb2,2024-05-17T02:38:54.703000
CVE-2024-30708,0,0,d3f271a0516cdc7943d843bb0105ca0e5bf5c2f29f3d3f4e9dc3fea0fe1e6950,2024-05-17T02:38:54.763000
CVE-2024-30701,0,1,b335ed0000e3d4a04a21b71e7fe6edd6f2400cf86f9fdb54e60dee2f3dfd16db,2024-05-27T01:15:18
CVE-2024-30702,0,1,27d823c384ddacb31ab69990bc08028b98deb18a99c7016f40c89d03c5faccc6,2024-05-27T01:15:18.083000
CVE-2024-30703,0,1,f972f3fcd9b3c07c5600e3ffe2fe502acbb89e12091763b18f670c2632655e7f,2024-05-27T01:15:18.163000
CVE-2024-30704,0,1,c88a28bc94f162d44959e2e3753a9d1127b2c923c68f4bdf31f9317e0f6d4095,2024-05-27T01:15:18.253000
CVE-2024-30706,0,1,b19eb58da4f7d752dbdce7a54186ad82a1f0f0c34bfe245b642327a6d3937566,2024-05-27T01:15:18.333000
CVE-2024-30707,0,1,2eae7b941e0e896416aa2ffba7ed5b7176027ad12bfae0bbd34ea3928d413486,2024-05-27T00:15:09.080000
CVE-2024-30708,0,1,ff215a70213c70057419b4f253330c4e2093c0d3cac4623572c5740e81377ee7,2024-05-27T01:15:18.560000
CVE-2024-3071,0,0,04481f247a4c00ea4a81ade13b4895bd0fcd6c4b710a28da01afe7d166d3f313,2024-05-02T18:00:37.360000
CVE-2024-30710,0,0,40054b6485f8af10769e73f8d2df82fef13831e0f08fc0ff057c8af61227f20c,2024-05-17T02:38:54.813000
CVE-2024-30711,0,0,974ee1154b6405b987d24033891d592568c031b66fc512d83253a42d2dfd2dcc,2024-05-17T02:38:54.870000
CVE-2024-30712,0,0,986c678a735651587fe887e66bf40431d19924755c570a2bfa6923cb88caaf8f,2024-05-17T02:38:54.930000
CVE-2024-30713,0,0,8cffbfe9927f25977cb402897df81730d866baadcf07d71b2b8aa1ebefd143bb,2024-05-17T02:38:54.997000
CVE-2024-30715,0,0,6d79e0e301bcc27e6b5c999937a91b8313fa2e8dbe247791abb50d12dc1a0ace,2024-05-17T02:38:55.053000
CVE-2024-30716,0,0,a5eb32810ded305f1b509d6048e92d32630bd82c99bdaafdc60f7b4ea8ee2e3a,2024-05-17T02:38:55.283000
CVE-2024-30718,0,0,bc13d77c2146e697a17218f06a008681357e5e426b5a45c8b0f5dadd0a955994,2024-05-17T02:38:55.357000
CVE-2024-30719,0,0,0ee8c1ae9d60da30e09fa600605c33af7f535953a323bc9f73d0cdd8532ae1d6,2024-05-17T02:38:55.410000
CVE-2024-30710,0,1,6a0fc579b7b00911ee1d4c3b9a44b53e92e8297e9743d4053fcb8b236e62821a,2024-05-27T01:15:18.640000
CVE-2024-30711,0,1,a30d6472f4fcd78085126ab1c190f14955666130a64b51ea157d9ecd3979f730,2024-05-27T01:15:18.727000
CVE-2024-30712,0,1,8fe04f434588890425c5fc5cfb129e4a0182333b732273a7d9cfe8c51a5ad884,2024-05-27T01:15:18.823000
CVE-2024-30713,0,1,5d224b63284d4997ccc94a8cceb73e4e44946499c5a971d091476f0425a113d6,2024-05-27T01:15:18.910000
CVE-2024-30715,0,1,d0ed8ac7b9ba4fed82efeae3452ebf4c7f681feb8b402854dda5ca037fd85b0d,2024-05-27T01:15:18.987000
CVE-2024-30716,0,1,657bd99db3bbc9cda68ce9d030ae7075a892ba133d9bb00ab71a5a9e470d0da2,2024-05-27T01:15:19.070000
CVE-2024-30718,0,1,79d11abcc2e62af334403c89616d3fe39da88ae8a0cbb6b67f4b1d27882ba47b,2024-05-27T01:15:19.147000
CVE-2024-30719,0,1,8ccc29610167f3bd94c3611fb5f21383262e11fa5c514d4f0a25e6a402720ec7,2024-05-27T01:15:19.223000
CVE-2024-3072,0,0,a527c7eafea7f28c744bb9dda2936e732815b969b2af47bf924c6b1711e83002,2024-04-30T13:11:16.690000
CVE-2024-30721,0,0,a3c49b1800ce6cf833892dfaad5c9ae3328ffe8f8b8a8a0278c7871e5993c54a,2024-05-17T02:38:55.467000
CVE-2024-30722,0,0,698f669266f5c9adc43823fd75261dfb4f9d25179dd3e2d68828cc63968eee3e,2024-05-17T02:38:55.557000
CVE-2024-30723,0,0,0359aaae5ceab7604b1e31e0b517e81007787791d3e35871a2a66402fcd75c25,2024-05-17T02:38:55.617000
CVE-2024-30724,0,0,66ddb9062072e92322b8c5ca1d7f6fcde86ee303f3183e9c342113c5dfddfe26,2024-05-17T02:38:55.680000
CVE-2024-30726,0,0,c488eeaa5734880ca4207fa81d86895117ce9056686045156fd00e831a965f4b,2024-05-17T02:38:55.750000
CVE-2024-30727,0,0,6b8b4809a2dd17b963e283f4c01fe270747f74cd66fa2cdbe4b461c6c38d7212,2024-05-17T02:38:55.813000
CVE-2024-30728,0,0,ae0e67baca60cfcbc3d262680139c1d665201b6a9c02ce96a9968eccc23ceb7e,2024-05-17T02:38:55.927000
CVE-2024-30729,0,0,c43e568ca3c4f842805328e3a6c2f60212412bbc79434fb196459bebf923ee06,2024-05-17T02:38:55.990000
CVE-2024-30730,0,0,787ee77ca0679e66ec2714c4e869a45492b780d9b1cc6eb8b784b123dde96f24,2024-05-17T02:38:56.073000
CVE-2024-30733,0,0,6508f7bd0958dd51f5ec1d04d7772dbcea03dcd30607222d21ee991dc5c667cd,2024-05-17T02:38:56.127000
CVE-2024-30735,0,0,f7520b4815f997164249c6f66fb8ff482d7284b7f21c5a4586d20d825cf344bc,2024-05-17T02:38:56.187000
CVE-2024-30736,0,0,9d7d7b61becd3100c2de31165540c1c086c8f8db9f47aa745d0dd5c202922447,2024-05-17T02:38:56.377000
CVE-2024-30737,0,0,6252bfea24c1ed14245ab084bb25cdd041082a302319f3c3721661f72a0611ff,2024-05-17T02:38:56.433000
CVE-2024-30721,0,1,ce176217e4237a47216f1a4d4b45d02eb7dcfd1a4a7c89ff500b69d330bb1c75,2024-05-27T01:15:19.310000
CVE-2024-30722,0,1,76ba4e61f509c3624c60ab4ae08a0909e80b5a5389ecd77f321053f4cd94c179,2024-05-27T01:15:19.390000
CVE-2024-30723,0,1,3337f17a019ab1973ca3c47170cd104659ddb85b48514c024914497c3e878038,2024-05-27T01:15:19.477000
CVE-2024-30724,0,1,23d9c61a7b8c7174ff553d6a257c1fb61e510074d2c76c453cdf09e6131f45ec,2024-05-27T01:15:19.553000
CVE-2024-30726,0,1,bc703cc80dc7cafa3326305f84a215a50ad3bf35e8eb56ba15fd86f487521609,2024-05-27T01:15:19.633000
CVE-2024-30727,0,1,28bde6e4081437d2c84fe54483783fbd7ad3bdc6789ee01076f51dd975fd7e1e,2024-05-27T01:15:19.710000
CVE-2024-30728,0,1,803d29dcc163764437b6038a1b41fb730d21aca3d32242e99d3298af8a09ffeb,2024-05-27T01:15:19.790000
CVE-2024-30729,0,1,82ecdb8ca84c9918e850c28045de4efaa5660ca0a78571b556876bfa559fbb92,2024-05-27T01:15:19.870000
CVE-2024-30730,0,1,7788647860e7de3bb500e0b5997ce5c4b73b2fa030b0a4eae1dc8de2f3956763,2024-05-27T01:15:19.953000
CVE-2024-30733,0,1,6b250eeb1623bd7db6c895c77e8ea5b61ecbd14708c86ebebc989b7859564a27,2024-05-27T01:15:20.033000
CVE-2024-30735,0,1,9abd255c1b85dbe41db5272fa5bbc9ae95a99258d2bc21da4e714a51623affc8,2024-05-27T01:15:20.110000
CVE-2024-30736,0,1,a197a3bb85ae935d16d5c000ca96eb805a49d4303085eb6fbdb3995315437b85,2024-05-27T01:15:20.203000
CVE-2024-30737,0,1,23ff24475df73ae35645736c831626bc6de164efe784df602ac4ce4b292ff293,2024-05-27T01:15:20.303000
CVE-2024-3074,0,0,37f60d9fe997e60c2aa97ad581356bf44643e113f390b63abcc68884cd98a10a,2024-05-02T18:00:37.360000
CVE-2024-3075,0,0,5616ddf2d80857a322d6e0f6fa7d8c0737f6830a4b1728fbd3d30ea1d6b09ab6,2024-04-26T12:58:17.720000
CVE-2024-3076,0,0,b2ddfdf17526511f9ad04f6248546e0c8d288852cffe59b222a3e4004ceea7ef,2024-04-26T15:32:22.523000
@ -249620,7 +249622,7 @@ CVE-2024-33411,0,0,e5bc355b8080ec9331df6160965a62e9fcb33bc746eac8017085df54dac9b
CVE-2024-3342,0,0,2c3ca8d5c3061bb507c26662d038cd059db385c42ff804757be4b5dbd68c1d0b,2024-04-29T12:42:03.667000
CVE-2024-33423,0,0,8f1fa788450514658e193af05941c337fea69ba60eb865ed38aa69b9043ad774,2024-05-02T13:27:25.103000
CVE-2024-33424,0,0,f9f5a67bdb9ba9357f3c3d02a83c0c0f74287739a2e767e9629394effd459f52,2024-05-01T19:50:25.633000
CVE-2024-33427,0,1,9476c5f9c8988b26166fe9f7a357839b1651ce10bb12a768ec8d4e52b65e45a2,2024-05-26T22:15:08.427000
CVE-2024-33427,0,0,9476c5f9c8988b26166fe9f7a357839b1651ce10bb12a768ec8d4e52b65e45a2,2024-05-26T22:15:08.427000
CVE-2024-33428,0,0,405c7d4470f1c4c6a9da4790ad16769be5bbee6bc7cbd31bcf2800f3281bb40b,2024-05-01T19:50:25.633000
CVE-2024-33429,0,0,a8c998123b524ea49b295a5500fc8c6d4ba14ca4f9af69ccfbc5cd4926bf1c96,2024-05-01T19:50:25.633000
CVE-2024-3343,0,0,c7ada54a8973c3f80fc415b1484b0c0d7aeb75e458012c05cd3c69dcc6f0e33f,2024-04-11T12:47:44.137000
@ -250164,7 +250166,7 @@ CVE-2024-34448,0,0,2ee47d576d9de678e8b37edc8c4fb672f63b76bc5fc5740404718a42f40a4
CVE-2024-34449,0,0,28da5cfb8215143a3847fc37f7163047e3e2e183b8d6abcf511553c3cec5bb16,2024-05-17T02:39:35.457000
CVE-2024-3445,0,0,2031eee497e177f244890449ab10d2f196dd08d103f846fc9b20779b1f74d465,2024-05-17T02:39:56.830000
CVE-2024-34453,0,0,9363deaf6a5ec68194d671cadb0973a2ba23402d3e2800c4f9eea6dbd677c5cd,2024-05-06T12:44:56.377000
CVE-2024-34454,1,1,d9d2c5475f68dc1f08844d29c96bd5cf1b31e2fa0f4c8685dccad604ffef3f53,2024-05-26T22:15:08.650000
CVE-2024-34454,0,0,d9d2c5475f68dc1f08844d29c96bd5cf1b31e2fa0f4c8685dccad604ffef3f53,2024-05-26T22:15:08.650000
CVE-2024-34455,0,0,cf6832f7361884f15470d2143d9f538281f7bb0657fc697433a93775fe331b3f,2024-05-07T18:15:08.417000
CVE-2024-34459,0,0,b45ed88b76afaef9cbd4911e21faf8d189bfb9c8f6ba422504b06e12e3f2ae4c,2024-05-14T16:12:23.490000
CVE-2024-3446,0,0,d41b6ff09ba21a5a975268b5a0441447c6b2bcfd6bedfe0914b9c96867cd290f,2024-04-18T08:15:38.340000
@ -250774,9 +250776,9 @@ CVE-2024-36049,0,0,d511d3e9dcb3e3f3c67c3b19b4715aae92e771d6a1271dee36aaa0460f656
CVE-2024-36050,0,0,4c307008c713c918a6e3b84da1e5e49b2b2247354b7102850872f2f1076c6edc,2024-05-22T16:15:10.777000
CVE-2024-36052,0,0,8db219128822e3b435341a720fec4da51967df08eb27bb5fb0af45f420ce346c,2024-05-22T12:46:53.887000
CVE-2024-36053,0,0,672a3b34a9bdb19210396687438a3a5963248f4f357ce5db05db5d249614922b,2024-05-20T13:00:04.957000
CVE-2024-36054,1,1,6400a2883cdde6c0a3fd8d204fc488efe33be1eb564d7d5968a1db346212affb,2024-05-26T23:15:21.370000
CVE-2024-36055,1,1,3ed3958f5e6d6cc7b9fca16c82b960bbee873db440bf413f4b8bb4446aea24a4,2024-05-26T23:15:21.457000
CVE-2024-36056,1,1,1ddcb1f3d533fe81222569791e7c6f87f5666060a8987be878285ea0267eeef5,2024-05-26T23:15:21.520000
CVE-2024-36054,0,0,6400a2883cdde6c0a3fd8d204fc488efe33be1eb564d7d5968a1db346212affb,2024-05-26T23:15:21.370000
CVE-2024-36055,0,0,3ed3958f5e6d6cc7b9fca16c82b960bbee873db440bf413f4b8bb4446aea24a4,2024-05-26T23:15:21.457000
CVE-2024-36056,0,0,1ddcb1f3d533fe81222569791e7c6f87f5666060a8987be878285ea0267eeef5,2024-05-26T23:15:21.520000
CVE-2024-3606,0,0,aad549bdf5ff1831d91b9701456650bb1ccc1938c3f938f0c7eb426394ab8356,2024-05-02T18:00:37.360000
CVE-2024-3607,0,0,af4721086df8378a380a0243b924575fce7196863af6b8319186a0a7c6039e9f,2024-05-02T18:00:37.360000
CVE-2024-36070,0,0,eb4d689c0fd52dc71530686149db340f07354ff188ce53f7ebe9b94f9b8be928,2024-05-20T13:00:04.957000
@ -251232,7 +251234,7 @@ CVE-2024-4279,0,0,d3b17e17d1b5650487c2ef2a762ae7d90400bd6e48ec29863d7d603500f64a
CVE-2024-4280,0,0,822fb2b67d813f28d851bea5074e022fd3fb44cbbe8e0abea23d2c25f8583cfd,2024-05-14T16:11:39.510000
CVE-2024-4281,0,0,f2f6c94941e4ed7f1c98ab6351686f1d868a8657bf9b3ff2bb73d7d016e69d14,2024-05-08T13:15:00.690000
CVE-2024-4284,0,0,28d78a67b7d6c9b0a1827199abde0e8a6df7d8ad9cc9c4d0f1befa23f8062d5f,2024-05-20T13:00:04.957000
CVE-2024-4286,1,1,3d6b3a3af2b729ad9d87c6ecde6ba858682d36369219dcb6bdc160e2f4d7ff57,2024-05-26T23:15:21.600000
CVE-2024-4286,0,0,3d6b3a3af2b729ad9d87c6ecde6ba858682d36369219dcb6bdc160e2f4d7ff57,2024-05-26T23:15:21.600000
CVE-2024-4287,0,0,048bae39f58d60d42f1a986a979513f5c9cfb08eeca89126761e78c7c68ed3b9,2024-05-20T15:17:54.513000
CVE-2024-4288,0,0,9367649ffe77365cb201f95bc69986ffb5e481ba50542c3f0953c5f2e0eb0d2a,2024-05-16T13:03:05.353000
CVE-2024-4289,0,0,76ba9be3eab9b673a4fa73a49b34a9d170f584667b3b959e9ff27923d52b8ed4,2024-05-21T12:37:59.687000
@ -251820,8 +251822,12 @@ CVE-2024-5374,0,0,9d0065534d8f28e9f95cc9b288a36b0fef6c4b6e4f9eadc9d4bcf7d5cd9e3a
CVE-2024-5375,0,0,22a41a52f8127cf77fc020e1d70df40b755fd718f0ea7badc1f1a2263c1c56df,2024-05-26T20:15:08.600000
CVE-2024-5376,0,0,62e4bc8dd75ff4cdd6ef1f13aab45fd1bcdcb1cf5634972b5ef9a9151eb8f9c4,2024-05-26T21:15:08.383000
CVE-2024-5377,0,0,b1ce75d7f9d5fb37a90a7deae75307c4f1b1b656098d91fdd5e339c026682071,2024-05-26T21:15:08.673000
CVE-2024-5378,1,1,5e852526d0a01069edb00140f01f6ec019ea67bd59f9e967913307f04621acff,2024-05-26T22:15:08.747000
CVE-2024-5379,1,1,522e2119af5cb6f07c118846e82f6889b87257a924542dbdeb3410e4fff96e20,2024-05-26T22:15:09.020000
CVE-2024-5380,1,1,ed9f85a2572bd3d07fcdeaee478915fac7bf969771e7e2c8ffcdcc8187fb26ec,2024-05-26T23:15:21.887000
CVE-2024-5381,1,1,0194906d6ece10623fd40ce03db1e61d961ba4d26cd48d03482977224791ed14,2024-05-26T23:15:22.150000
CVE-2024-5383,1,1,ad9f0aefef03acc764aab5a53e033c9ccb4535ae2cb48604a1b9d4c8e9a604d0,2024-05-26T23:15:22.423000
CVE-2024-5378,0,0,5e852526d0a01069edb00140f01f6ec019ea67bd59f9e967913307f04621acff,2024-05-26T22:15:08.747000
CVE-2024-5379,0,0,522e2119af5cb6f07c118846e82f6889b87257a924542dbdeb3410e4fff96e20,2024-05-26T22:15:09.020000
CVE-2024-5380,0,0,ed9f85a2572bd3d07fcdeaee478915fac7bf969771e7e2c8ffcdcc8187fb26ec,2024-05-26T23:15:21.887000
CVE-2024-5381,0,0,0194906d6ece10623fd40ce03db1e61d961ba4d26cd48d03482977224791ed14,2024-05-26T23:15:22.150000
CVE-2024-5383,0,0,ad9f0aefef03acc764aab5a53e033c9ccb4535ae2cb48604a1b9d4c8e9a604d0,2024-05-26T23:15:22.423000
CVE-2024-5384,1,1,f4500262362ef3583d43791733167333f027a4b71744522134957852ac361d91,2024-05-27T00:15:09.280000
CVE-2024-5385,1,1,f2b8a921bbbae5377903f2b5f2e8fc9f12b1f4bf6825effcea83dae7c13f56f0,2024-05-27T00:15:09.570000
CVE-2024-5390,1,1,d8283129f1cafec514f6fe49089f9b638013dcc5faa8abc843fb9872a7a41e6b,2024-05-27T01:15:20.410000
CVE-2024-5391,1,1,d2f147fe931420ac482bb09887180ed160ed96b2a789c9d61e87da26ad5a9d7d,2024-05-27T01:15:20.693000

Can't render this file because it is too large.