Auto-Update: 2024-09-24T14:00:18.875915+00:00

This commit is contained in:
cad-safe-bot 2024-09-24 14:03:18 +00:00
parent 6b0619cb82
commit 631eff7e0e
8 changed files with 850 additions and 45 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1879",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-06T18:15:12.827",
"lastModified": "2024-06-07T14:56:05.647",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-24T13:54:22.813",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -51,14 +73,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:agpt:autogpt:0.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B98DD1CE-42D9-4C1D-A00B-98E0B92B7D07"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/significant-gravitas/autogpt/commit/26324f29849967fa72c207da929af612f1740669",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/125c2d0c-0481-4e5c-ae90-fec263acdf32",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30368",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-06-06T18:15:13.443",
"lastModified": "2024-06-07T14:56:05.647",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-24T13:54:11.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -40,6 +62,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -51,14 +83,268 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:-:*:*:*:*:*:*",
"matchCriteriaId": "9631578F-ECEA-4215-B00E-79E89E191A09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1:*:*:*:*:*:*",
"matchCriteriaId": "B958B188-D5AF-44C9-9BCC-2CCA005B98A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p1:*:*:*:*:*:*",
"matchCriteriaId": "0883D4AC-8C5B-458A-876F-CF570EEB0146"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p10:*:*:*:*:*:*",
"matchCriteriaId": "6DFFBBF2-E1FC-4B42-A1CD-B3FB67906D4D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p11:*:*:*:*:*:*",
"matchCriteriaId": "AC015A07-1951-46AB-8466-27BA76060E3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p12:*:*:*:*:*:*",
"matchCriteriaId": "EF8058B1-CA56-4DAD-9655-7EF7B16430B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p13:*:*:*:*:*:*",
"matchCriteriaId": "0DBCE7ED-3E64-4976-915C-5BA16C2DACDF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p2:*:*:*:*:*:*",
"matchCriteriaId": "BAF71588-C4F2-48F5-8D0C-D5B5E073D435"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p3:*:*:*:*:*:*",
"matchCriteriaId": "54E848B1-5691-4724-BD9F-0734ED3203DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p4:*:*:*:*:*:*",
"matchCriteriaId": "CDAFED8E-268B-417B-ACB0-DD13B0B4F98E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p5:*:*:*:*:*:*",
"matchCriteriaId": "40FDFFC6-6CA9-4A9B-9B5F-8060A17F3B61"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p6:*:*:*:*:*:*",
"matchCriteriaId": "AFE9F160-FEEE-4541-AED2-2596E66B3232"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p7:*:*:*:*:*:*",
"matchCriteriaId": "9FA649CA-A839-4226-86D5-054A4866E0A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p8:*:*:*:*:*:*",
"matchCriteriaId": "20693C67-0BA2-492D-BEF5-D030ADE01BD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p9:*:*:*:*:*:*",
"matchCriteriaId": "6245D321-25B0-4A6B-9B3F-77B7FE36FCA3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p1:*:*:*:*:*:*",
"matchCriteriaId": "F993C993-D118-45A3-9F95-382B54E25439"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p2:*:*:*:*:*:*",
"matchCriteriaId": "A07BA640-B5C1-43AF-8AF9-949A46CB01B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p3:*:*:*:*:*:*",
"matchCriteriaId": "C51A689A-8334-4997-ADB9-3420B40D4366"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:-:*:*:*:*:*:*",
"matchCriteriaId": "B414EAFE-FB76-4B64-8781-E2653A38D9F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "912D9FD6-D52E-42FA-9CF3-D84955E9907D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "B3A46FE8-F0F5-4E28-A161-53F38FABD96B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "ED63FC6B-4925-47BE-A41D-9DD3C45A2393"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "9D0CA74D-733A-4F6B-A524-A55E1FBEE390"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.0:-:*:*:*:*:*:*",
"matchCriteriaId": "295BC404-0D55-4CCD-B560-F09660A1EBA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "EC60D936-4B5A-4CB1-B026-5E53A9CBA9A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:-:*:*:*:*:*:*",
"matchCriteriaId": "17DC4C4E-CEE1-436A-B72F-91CE78465004"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p1:*:*:*:*:*:*",
"matchCriteriaId": "C0FFF9D4-4301-45E8-B3F2-585322FA5EF1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p2:*:*:*:*:*:*",
"matchCriteriaId": "855FA85C-0BAE-404A-B23B-2A4B0044304B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p3:*:*:*:*:*:*",
"matchCriteriaId": "96DEFC5B-F240-4614-881C-B0D0C5B61D24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p4:*:*:*:*:*:*",
"matchCriteriaId": "3C458DFE-C29E-4B23-8190-056DC60961CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p5:*:*:*:*:*:*",
"matchCriteriaId": "1BF8645F-FAEF-4B80-879E-9E5BB90194C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p6:*:*:*:*:*:*",
"matchCriteriaId": "FA988842-7A35-4FDE-8A49-3886317DD562"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p7:*:*:*:*:*:*",
"matchCriteriaId": "E9E299E7-5509-4A39-99DA-5E25751C7598"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p8:*:*:*:*:*:*",
"matchCriteriaId": "AC39BD39-6DE5-44F7-9EB3-7CE6A3C3788A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p9:*:*:*:*:*:*",
"matchCriteriaId": "A3894037-A372-4333-8F67-1FE3C051F4FD"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "BF4A10A8-6188-4A78-B9D8-81860AE5DE87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "AA78B990-1FAF-44C6-B3D9-0D8B5BD43E66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "5D97ECCE-3444-4C6B-A762-DFEFC258B7E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.0:p2-sp1:*:*:*:*:*:*",
"matchCriteriaId": "7DC9B659-3801-451A-9F91-BB24B4B9DA4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0563C77A-38A5-4A57-A861-C343F04A0246"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.2:-:*:*:*:*:*:*",
"matchCriteriaId": "F0E9CC13-3322-4125-BC9B-3BDE06CAEE34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.2:p1:*:*:*:*:*:*",
"matchCriteriaId": "B44E3F7E-6960-4C1A-B741-039382EAA335"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.3:-:*:*:*:*:*:*",
"matchCriteriaId": "ED618378-2172-4835-AF85-3C9327EC36EF"
}
]
}
]
}
],
"references": [
{
"url": "https://support.a10networks.com/support/security_advisory/cve-2024-30368-cve-2024-30369",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-524/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30369",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-06-06T18:15:13.720",
"lastModified": "2024-06-07T14:56:05.647",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-24T13:55:20.847",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -40,6 +62,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -51,14 +83,268 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:-:*:*:*:*:*:*",
"matchCriteriaId": "9631578F-ECEA-4215-B00E-79E89E191A09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1:*:*:*:*:*:*",
"matchCriteriaId": "B958B188-D5AF-44C9-9BCC-2CCA005B98A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p1:*:*:*:*:*:*",
"matchCriteriaId": "0883D4AC-8C5B-458A-876F-CF570EEB0146"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p10:*:*:*:*:*:*",
"matchCriteriaId": "6DFFBBF2-E1FC-4B42-A1CD-B3FB67906D4D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p11:*:*:*:*:*:*",
"matchCriteriaId": "AC015A07-1951-46AB-8466-27BA76060E3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p12:*:*:*:*:*:*",
"matchCriteriaId": "EF8058B1-CA56-4DAD-9655-7EF7B16430B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p13:*:*:*:*:*:*",
"matchCriteriaId": "0DBCE7ED-3E64-4976-915C-5BA16C2DACDF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p2:*:*:*:*:*:*",
"matchCriteriaId": "BAF71588-C4F2-48F5-8D0C-D5B5E073D435"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p3:*:*:*:*:*:*",
"matchCriteriaId": "54E848B1-5691-4724-BD9F-0734ED3203DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p4:*:*:*:*:*:*",
"matchCriteriaId": "CDAFED8E-268B-417B-ACB0-DD13B0B4F98E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p5:*:*:*:*:*:*",
"matchCriteriaId": "40FDFFC6-6CA9-4A9B-9B5F-8060A17F3B61"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p6:*:*:*:*:*:*",
"matchCriteriaId": "AFE9F160-FEEE-4541-AED2-2596E66B3232"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p7:*:*:*:*:*:*",
"matchCriteriaId": "9FA649CA-A839-4226-86D5-054A4866E0A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p8:*:*:*:*:*:*",
"matchCriteriaId": "20693C67-0BA2-492D-BEF5-D030ADE01BD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p9:*:*:*:*:*:*",
"matchCriteriaId": "6245D321-25B0-4A6B-9B3F-77B7FE36FCA3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p1:*:*:*:*:*:*",
"matchCriteriaId": "F993C993-D118-45A3-9F95-382B54E25439"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p2:*:*:*:*:*:*",
"matchCriteriaId": "A07BA640-B5C1-43AF-8AF9-949A46CB01B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p3:*:*:*:*:*:*",
"matchCriteriaId": "C51A689A-8334-4997-ADB9-3420B40D4366"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:-:*:*:*:*:*:*",
"matchCriteriaId": "B414EAFE-FB76-4B64-8781-E2653A38D9F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "912D9FD6-D52E-42FA-9CF3-D84955E9907D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "B3A46FE8-F0F5-4E28-A161-53F38FABD96B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "ED63FC6B-4925-47BE-A41D-9DD3C45A2393"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "9D0CA74D-733A-4F6B-A524-A55E1FBEE390"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.0:-:*:*:*:*:*:*",
"matchCriteriaId": "295BC404-0D55-4CCD-B560-F09660A1EBA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "EC60D936-4B5A-4CB1-B026-5E53A9CBA9A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:-:*:*:*:*:*:*",
"matchCriteriaId": "17DC4C4E-CEE1-436A-B72F-91CE78465004"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p1:*:*:*:*:*:*",
"matchCriteriaId": "C0FFF9D4-4301-45E8-B3F2-585322FA5EF1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p2:*:*:*:*:*:*",
"matchCriteriaId": "855FA85C-0BAE-404A-B23B-2A4B0044304B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p3:*:*:*:*:*:*",
"matchCriteriaId": "96DEFC5B-F240-4614-881C-B0D0C5B61D24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p4:*:*:*:*:*:*",
"matchCriteriaId": "3C458DFE-C29E-4B23-8190-056DC60961CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p5:*:*:*:*:*:*",
"matchCriteriaId": "1BF8645F-FAEF-4B80-879E-9E5BB90194C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p6:*:*:*:*:*:*",
"matchCriteriaId": "FA988842-7A35-4FDE-8A49-3886317DD562"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p7:*:*:*:*:*:*",
"matchCriteriaId": "E9E299E7-5509-4A39-99DA-5E25751C7598"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p8:*:*:*:*:*:*",
"matchCriteriaId": "AC39BD39-6DE5-44F7-9EB3-7CE6A3C3788A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p9:*:*:*:*:*:*",
"matchCriteriaId": "A3894037-A372-4333-8F67-1FE3C051F4FD"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "BF4A10A8-6188-4A78-B9D8-81860AE5DE87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "AA78B990-1FAF-44C6-B3D9-0D8B5BD43E66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "5D97ECCE-3444-4C6B-A762-DFEFC258B7E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.0:p2-sp1:*:*:*:*:*:*",
"matchCriteriaId": "7DC9B659-3801-451A-9F91-BB24B4B9DA4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0563C77A-38A5-4A57-A861-C343F04A0246"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.2:-:*:*:*:*:*:*",
"matchCriteriaId": "F0E9CC13-3322-4125-BC9B-3BDE06CAEE34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.2:p1:*:*:*:*:*:*",
"matchCriteriaId": "B44E3F7E-6960-4C1A-B741-039382EAA335"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.3:-:*:*:*:*:*:*",
"matchCriteriaId": "ED618378-2172-4835-AF85-3C9327EC36EF"
}
]
}
]
}
],
"references": [
{
"url": "https://support.a10networks.com/support/security_advisory/cve-2024-30368-cve-2024-30369",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-525/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36399",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-06T16:15:12.573",
"lastModified": "2024-06-07T14:56:05.647",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-24T13:59:59.243",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -59,14 +89,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kanboard:kanboard:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2.37",
"matchCriteriaId": "FF8A13B9-1EFA-484F-82D7-DEAF65D20165"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/kanboard/kanboard/commit/b6703688aac8187f5ea4d4d704fc7afeeffeafa7",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-x8v7-3ghx-65cv",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8946",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-17T19:15:29.220",
"lastModified": "2024-09-20T12:30:51.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-24T13:11:17.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -110,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -120,30 +150,67 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:micropython:micropython:1.23.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC6A30E-745D-4C20-B482-1358929743FA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/micropython/micropython/commit/29943546343c92334e8518695a11fc0e2ceea68b",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/micropython/micropython/issues/13006",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://github.com/micropython/micropython/issues/13006#issuecomment-1820309455",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.277764",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.277764",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.409312",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8947",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-17T19:15:29.483",
"lastModified": "2024-09-20T12:30:51.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-24T13:17:52.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,34 +140,74 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:micropython:micropython:1.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F367A317-2420-445C-B455-21BAFD6E2064"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/micropython/micropython/commit/4bed614e707c0644c06e117f848fa12605c711cd",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/micropython/micropython/issues/13283",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/micropython/micropython/issues/13283#issuecomment-1918479709",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/micropython/micropython/releases/tag/v1.23.0",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://vuldb.com/?ctiid.277765",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.277765",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.409316",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-24T12:00:19.045453+00:00
2024-09-24T14:00:18.875915+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-24T11:11:06.247000+00:00
2024-09-24T13:59:59.243000+00:00
```
### Last Data Feed Release
@ -44,9 +44,14 @@ Recently added CVEs: `0`
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `6`
- [CVE-2024-38016](CVE-2024/CVE-2024-380xx/CVE-2024-38016.json) (`2024-09-24T11:11:06.247`)
- [CVE-2024-1879](CVE-2024/CVE-2024-18xx/CVE-2024-1879.json) (`2024-09-24T13:54:22.813`)
- [CVE-2024-30368](CVE-2024/CVE-2024-303xx/CVE-2024-30368.json) (`2024-09-24T13:54:11.827`)
- [CVE-2024-30369](CVE-2024/CVE-2024-303xx/CVE-2024-30369.json) (`2024-09-24T13:55:20.847`)
- [CVE-2024-36399](CVE-2024/CVE-2024-363xx/CVE-2024-36399.json) (`2024-09-24T13:59:59.243`)
- [CVE-2024-8946](CVE-2024/CVE-2024-89xx/CVE-2024-8946.json) (`2024-09-24T13:11:17.417`)
- [CVE-2024-8947](CVE-2024/CVE-2024-89xx/CVE-2024-8947.json) (`2024-09-24T13:17:52.397`)
## Download and Usage

View File

@ -242919,7 +242919,7 @@ CVE-2024-1875,0,0,a69a70937681edd3d5184a4fd13b8b71713c44ac42ff9a8634ede759dab371
CVE-2024-1876,0,0,e8e0571c659b0fa787427894c4b874422cd76362527c553c866da3c23dcf7847,2024-05-17T02:35:39.867000
CVE-2024-1877,0,0,09157f9013db70d521489400dd1dde0f5e6230674417516b655a173f324787df,2024-05-17T02:35:39.957000
CVE-2024-1878,0,0,000003838e237dba5dd43a619ef99a4488543c4c7093fec65257742365e28ce9,2024-05-17T02:35:40.047000
CVE-2024-1879,0,0,04e0463d4e4ddeaf3c981997b488b3ee919a4ef9f7034783d16e2bea60737d0c,2024-06-07T14:56:05.647000
CVE-2024-1879,0,1,01f8ee5b9df6ab7642ee2bd3dfb26155544416292db09c2b712346021c0ed07c,2024-09-24T13:54:22.813000
CVE-2024-1880,0,0,a638a0a4fe4a06eeb9f755c8ae4735f10d15423b185eb3a04c8edbccbb768c9d,2024-06-07T14:56:05.647000
CVE-2024-1881,0,0,a497720a99ff5759c849add098b229c482f6759bc88538b88834b08336954a8e,2024-06-07T14:56:05.647000
CVE-2024-1882,0,0,b95eb7832d301218d4e36799cc3e87874eda05a45e80c7ec0e4977e71d4a51c8,2024-03-14T12:52:09.877000
@ -250377,8 +250377,8 @@ CVE-2024-30364,0,0,517dffa208513ab056bce3fd7a2402df764f086d58c30aad86dd8d89142c2
CVE-2024-30365,0,0,10d10d98d6ea2bc624b07ae369fe4794dec746936f4423eecc2c52bdc547e945,2024-04-03T12:38:04.840000
CVE-2024-30366,0,0,017638cacc63c5bca1e49a36bd6cf624199b21049716a909c39259050ef5a19b,2024-04-03T17:24:18.150000
CVE-2024-30367,0,0,e20ca596e010b38b51bc04c9fe579d6549936485a2ebf8759f46c93b9baf83db,2024-04-03T12:38:04.840000
CVE-2024-30368,0,0,35c6ac9b37b7e9e1483491f5da6c588895f97c87c16751f192dd4a7b8087d08a,2024-06-07T14:56:05.647000
CVE-2024-30369,0,0,ff0b63603e7dc0ce45ba8e3a343973ed83b516a765d5878eb8ae2f7ff0229568,2024-06-07T14:56:05.647000
CVE-2024-30368,0,1,955d719f80aef3f3fce89226b635f4c0f3197824431ae3f1b9a52be812680c97,2024-09-24T13:54:11.827000
CVE-2024-30369,0,1,084ebabb6bba6f65e3a665faf08cf2442ac42f59e1585ca47c68653967d4e7cb,2024-09-24T13:55:20.847000
CVE-2024-3037,0,0,a1c986f823ccde3b89d50b9d6f5cf759926d2d4da5503398101b7b91b06d035b,2024-05-14T16:11:39.510000
CVE-2024-30370,0,0,6207ecfb3ab83effd5b69f8ad0454d61dd1c4b620444f7bf5bed75b59a7e9bf2,2024-04-03T12:38:04.840000
CVE-2024-30371,0,0,5cb1f88df7d7d6dd29afc1f981808ff71d5fa01260db76282c78c8209c6570fc,2024-04-03T12:38:04.840000
@ -254670,7 +254670,7 @@ CVE-2024-36395,0,0,f89c2edf8412c7a856779bf7bdcd2dc639ea5537dbb90aaf5a59ca64c6252
CVE-2024-36396,0,0,6296e5e5abad58fd92610447f6d594c40593fdd339b1a18f1de671640ea0ec15,2024-08-07T17:40:12.830000
CVE-2024-36397,0,0,397d32bfdb09c2d3f9db35c1f7589cf3773b581a432802ae94747ca8dbab95df,2024-08-08T14:52:17.297000
CVE-2024-36398,0,0,a017912eaa359ccb64abc99a5eaf9e72ec22d15a9aaa14311e3308a01f19c086,2024-08-14T18:34:45.950000
CVE-2024-36399,0,0,472641d2d2bb4ff77f5aece23542ab1839d3af84ca5d3ef16cbdb8fcd2936faf,2024-06-07T14:56:05.647000
CVE-2024-36399,0,1,c7ed7ab098785a5683d2c97a727166f68dcba37830b5786dc0593a492c6ddde9,2024-09-24T13:59:59.243000
CVE-2024-3640,0,0,634a3a61b60e4b6447ed9849adb2e8bddc05031ce5f2169a17d54b538992fc1b,2024-05-17T18:36:31.297000
CVE-2024-36400,0,0,47a38d468bfeafda14a4695dfbafb860220a66750f81a96f50551b5447b95aa6,2024-06-10T19:39:21.660000
CVE-2024-36401,0,0,7b961e16e8c76d966a8d4e4c01c4b1bb9e6f5fd7f69da9cc9d7ed38678bd1ea3,2024-07-16T01:00:01.567000
@ -255707,7 +255707,7 @@ CVE-2024-38011,0,0,dfdf39bbdcd434b41a8000e4746e5893d04cf4219e333c27df414f4801f5d
CVE-2024-38013,0,0,0a18606eaff9f516ff72b6e0417c94b62f282527a7fb5284ff29917a0162ad77,2024-07-11T16:17:38.197000
CVE-2024-38014,0,0,667a2ca3aa42729c9c1f636c1bc19b21cfc3cbfc4eb15603accaad3e335421c5,2024-09-12T01:00:01.133000
CVE-2024-38015,0,0,5b1426585b115ad720503cf293b548c59cb7459bc19ab9bc440800c3121fe7f4,2024-07-11T16:18:10.113000
CVE-2024-38016,0,1,dc4309b24537bb37ac1fe3b705cf246818a96036d85989936f98e2311dd80081,2024-09-24T11:11:06.247000
CVE-2024-38016,0,0,dc4309b24537bb37ac1fe3b705cf246818a96036d85989936f98e2311dd80081,2024-09-24T11:11:06.247000
CVE-2024-38017,0,0,b2da9df045e49b65d6e2e15b7cfe34dfa17f558263037e08e7692bad9d214937,2024-07-11T16:20:51.827000
CVE-2024-38018,0,0,60b7566e82c4496b0dca7d4fdef697c13c6221141b8468138e42395de75492a1,2024-09-18T15:04:58.240000
CVE-2024-38019,0,0,da6757aee92bad96249ea36fde1018805a15808ac2fa25fa1dd2f958ebdbe19f,2024-07-11T16:21:19.367000
@ -263573,8 +263573,8 @@ CVE-2024-8909,0,0,164deeef11f6495a80d20f0aa7bd15b53f984d767860039b14665a9aa77c7c
CVE-2024-8939,0,0,1f70befe339fdb31af424859012581aeb13e8f518e2f8da7bf31e05da17f11bc,2024-09-20T12:30:51.220000
CVE-2024-8944,0,0,163e8bd42c52d6cb1f3f0fdfff8b3db24acfd0dba8d50b29b1780d64b55bd42a,2024-09-23T16:56:34.637000
CVE-2024-8945,0,0,77e57cc0daafb23c488a0c254aeafd8124ae9f6ed721201729c1012ac6f99983,2024-09-20T12:30:51.220000
CVE-2024-8946,0,0,8a2f766ae082e9686bc904f91757f583dbd8f4889c15271f098ce61a6bcf6338,2024-09-20T12:30:51.220000
CVE-2024-8947,0,0,142b334351315d973b23e9fa2b46ea48efa60f68fe36d29240dd8efb3a41145c,2024-09-20T12:30:51.220000
CVE-2024-8946,0,1,0afc0efb5414dac2f435cdc08456c904eb9a65ac4dd275170da7c9549741129d,2024-09-24T13:11:17.417000
CVE-2024-8947,0,1,fa8f2931eb3cc3227c4368bc2d0acc447f8ab4457d14e0b4f963ede80d72b017,2024-09-24T13:17:52.397000
CVE-2024-8948,0,0,9c6f9cb8e4db15ba128fb335581583f7336c55d3eb33de97652aae50240564a1,2024-09-23T18:10:28.273000
CVE-2024-8949,0,0,94f40160361f975c890254d75f4744160f14879e40b4ff8ccedc3965bc21b6f3,2024-09-23T18:05:07.043000
CVE-2024-8951,0,0,888c97aa442d5e8c89ae77387b914cd3981839dfe932748e6b429d09cccb70f1,2024-09-23T18:12:37.380000

Can't render this file because it is too large.