mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-11-19T21:00:21.679786+00:00
This commit is contained in:
parent
dde6abae4c
commit
6bd513ee61
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-1999-0965",
|
"id": "CVE-1999-0965",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "1997-09-19T04:00:00.000",
|
"published": "1997-09-19T04:00:00.000",
|
||||||
"lastModified": "2022-08-17T10:15:16.023",
|
"lastModified": "2024-11-19T20:37:51.537",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -59,8 +59,139 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:x.org:xterm:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:x.org:x11:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6316FBBE-64CA-44AA-B47C-0F36A96806B1"
|
"versionEndExcluding": "5.0",
|
||||||
|
"matchCriteriaId": "521AF03D-6C7D-4BF0-8C28-A887F3054E56"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:-:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "12EC442A-3481-481A-8927-86771F01A58C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-01:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "13B209F8-CB94-4224-A7FD-118915BA8136"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-02:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "CC6E576D-C6FC-409C-BD48-5FC721FE3C39"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-03:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E318087C-875A-49FC-9198-B98E0622F756"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-04:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "C0747942-FA57-4FAB-91B6-BA59612C5C38"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-05:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D18A3EDB-8AF8-4AFC-BCDF-983199B16F5C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-06:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1A41167C-4BD6-41D8-B1A4-28F6A1664196"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-07:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E99C601A-2B21-4284-8FE9-AF5BE6AF2786"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-08:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "673743D8-31CD-459F-A9DA-0D3188FBCEB3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-09:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3BCE835E-101C-4929-82D4-EA0D66B03607"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-10:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D46F4C68-4462-41F4-B839-336A9AEAFB76"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-11:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "041E5856-C20F-4B9A-848C-AF64462385F2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-12:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "13147C3B-1954-4703-A5FA-32487ED63DBF"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-13:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "35CFF2E5-7F6C-4CFD-85A9-216063878251"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-14:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "CD25DE0F-A81C-4797-B66D-0645EC3486F5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-15:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "754B62CF-5B7D-4E24-A471-ADBFCF096540"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-16:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "33571663-B72B-4E53-A715-12409D67D015"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-17:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "DD503B54-9000-4BF7-B0AE-7CE9A58D1AA4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-18:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "801B1D9F-9890-446F-940F-F02A910DF4AD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-19:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "5587CAA0-BE8A-4F5B-94B1-02097090D8E5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-20:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "8DEA7068-88C1-4A3B-9A35-2E3DA940C2AA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-21:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B81E853E-2F4E-4B07-A191-9A636B868315"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-22:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "8552A4FD-5A27-41DD-9C71-6F77E2FAFDEA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-23:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "BBBDFAC9-FF27-43C1-9295-62ED2AAB3776"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-24:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "95F63320-E86F-4DDA-82B5-6958F2E5E85D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-25:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "8C01027A-7DBE-4E9D-A13E-59687BE919E0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -70,7 +201,10 @@
|
|||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0965",
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0965",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2008-3533",
|
"id": "CVE-2008-3533",
|
||||||
"sourceIdentifier": "security@ubuntu.com",
|
"sourceIdentifier": "security@ubuntu.com",
|
||||||
"published": "2008-08-18T17:41:00.000",
|
"published": "2008-08-18T17:41:00.000",
|
||||||
"lastModified": "2017-08-08T01:31:57.607",
|
"lastModified": "2024-11-19T20:25:06.450",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -71,7 +71,8 @@
|
|||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:gnome:yelp:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:gnome:yelp:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "F0711AF7-6FCD-4311-8D62-E02900BED8B5"
|
"versionEndExcluding": "2.24",
|
||||||
|
"matchCriteriaId": "7BB1D4D2-4900-45B5-BAB7-84A6EBFC0C49"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -103,7 +104,8 @@
|
|||||||
"url": "http://bugzilla.gnome.org/attachment.cgi?id=115890",
|
"url": "http://bugzilla.gnome.org/attachment.cgi?id=115890",
|
||||||
"source": "security@ubuntu.com",
|
"source": "security@ubuntu.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Exploit"
|
"Exploit",
|
||||||
|
"Issue Tracking"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -111,12 +113,17 @@
|
|||||||
"source": "security@ubuntu.com",
|
"source": "security@ubuntu.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Exploit",
|
"Exploit",
|
||||||
|
"Issue Tracking",
|
||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html",
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html",
|
||||||
"source": "security@ubuntu.com"
|
"source": "security@ubuntu.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://secunia.com/advisories/31465",
|
"url": "http://secunia.com/advisories/31465",
|
||||||
@ -127,31 +134,53 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://secunia.com/advisories/31620",
|
"url": "http://secunia.com/advisories/31620",
|
||||||
"source": "security@ubuntu.com"
|
"source": "security@ubuntu.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://secunia.com/advisories/31834",
|
"url": "http://secunia.com/advisories/31834",
|
||||||
"source": "security@ubuntu.com"
|
"source": "security@ubuntu.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://secunia.com/advisories/32629",
|
"url": "http://secunia.com/advisories/32629",
|
||||||
"source": "security@ubuntu.com"
|
"source": "security@ubuntu.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:175",
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:175",
|
||||||
"source": "security@ubuntu.com"
|
"source": "security@ubuntu.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://www.securityfocus.com/bid/30690",
|
"url": "http://www.securityfocus.com/bid/30690",
|
||||||
"source": "security@ubuntu.com"
|
"source": "security@ubuntu.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://www.ubuntu.com/usn/usn-638-1",
|
"url": "http://www.ubuntu.com/usn/usn-638-1",
|
||||||
"source": "security@ubuntu.com"
|
"source": "security@ubuntu.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://www.vupen.com/english/advisories/2008/2393",
|
"url": "http://www.vupen.com/english/advisories/2008/2393",
|
||||||
"source": "security@ubuntu.com"
|
"source": "security@ubuntu.com",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860",
|
"url": "https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860",
|
||||||
@ -163,11 +192,18 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44449",
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44449",
|
||||||
"source": "security@ubuntu.com"
|
"source": "security@ubuntu.com",
|
||||||
|
"tags": [
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00222.html",
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00222.html",
|
||||||
"source": "security@ubuntu.com"
|
"source": "security@ubuntu.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2009-0581",
|
"id": "CVE-2009-0581",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2009-03-23T14:19:12.467",
|
"published": "2009-03-23T14:19:12.467",
|
||||||
"lastModified": "2023-02-13T02:19:39.807",
|
"lastModified": "2024-11-19T20:19:32.403",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -80,7 +80,8 @@
|
|||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "0B2BA7E7-1D51-4163-8F60-80B0E473F75F"
|
"versionEndExcluding": "2.9.2",
|
||||||
|
"matchCriteriaId": "28CB30F0-E3AF-490A-B05B-0947A2BF717B"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2009-0723",
|
"id": "CVE-2009-0723",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2009-03-23T14:19:12.500",
|
"published": "2009-03-23T14:19:12.500",
|
||||||
"lastModified": "2022-02-07T18:18:53.310",
|
"lastModified": "2024-11-19T20:24:56.033",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -64,7 +64,8 @@
|
|||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "0B2BA7E7-1D51-4163-8F60-80B0E473F75F"
|
"versionEndExcluding": "2.9.2",
|
||||||
|
"matchCriteriaId": "28CB30F0-E3AF-490A-B05B-0947A2BF717B"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2009-0733",
|
"id": "CVE-2009-0733",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2009-03-23T14:19:12.517",
|
"published": "2009-03-23T14:19:12.517",
|
||||||
"lastModified": "2022-02-07T18:28:27.487",
|
"lastModified": "2024-11-19T20:25:01.847",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -64,7 +64,8 @@
|
|||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "0B2BA7E7-1D51-4163-8F60-80B0E473F75F"
|
"versionEndExcluding": "2.9.2",
|
||||||
|
"matchCriteriaId": "28CB30F0-E3AF-490A-B05B-0947A2BF717B"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2016-5118",
|
"id": "CVE-2016-5118",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2016-06-10T15:59:06.737",
|
"published": "2016-06-10T15:59:06.737",
|
||||||
"lastModified": "2023-08-01T18:21:22.910",
|
"lastModified": "2024-11-19T20:24:12.647",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -281,8 +281,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "7.0.1-7",
|
||||||
|
"matchCriteriaId": "3AA78B99-EFCC-47A8-B4F7-4AF1BD01390E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2016-7531",
|
"id": "CVE-2016-7531",
|
||||||
"sourceIdentifier": "security@debian.org",
|
"sourceIdentifier": "security@debian.org",
|
||||||
"published": "2017-04-19T14:59:00.473",
|
"published": "2017-04-19T14:59:00.473",
|
||||||
"lastModified": "2017-05-09T12:39:15.447",
|
"lastModified": "2024-11-19T20:23:57.503",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -16,13 +16,13 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV30": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.0",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "NONE",
|
"privilegesRequired": "NONE",
|
||||||
@ -85,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "7.0.1-0",
|
||||||
|
"matchCriteriaId": "3CF7D553-5B42-467A-A21D-B3AE0E97DDE8"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2017-13227",
|
"id": "CVE-2017-13227",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2024-11-14T23:15:05.013",
|
"published": "2024-11-14T23:15:05.013",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T20:25:24.913",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,11 +15,72 @@
|
|||||||
"value": "En el servicio de autocompletar, el nombre del paquete que proporciona el proceso de la aplicaci\u00f3n se considera de confianza de forma inapropiada. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
"value": "En el servicio de autocompletar, el nombre del paquete que proporciona el proceso de la aplicaci\u00f3n se considera de confianza de forma inapropiada. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B578E383-0D77-4AC7-9C81-3F0B8C18E033"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
"source": "security@android.com"
|
"source": "security@android.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
21
CVE-2018/CVE-2018-93xx/CVE-2018-9339.json
Normal file
21
CVE-2018/CVE-2018-93xx/CVE-2018-9339.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9339",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-19T19:15:05.677",
|
||||||
|
"lastModified": "2024-11-19T19:15:05.677",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In writeTypedArrayList and readTypedArrayList of Parcel.java, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-93xx/CVE-2018-9340.json
Normal file
21
CVE-2018/CVE-2018-93xx/CVE-2018-9340.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9340",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-19T19:15:05.743",
|
||||||
|
"lastModified": "2024-11-19T19:15:05.743",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In ResStringPool::setTo of ResourceTypes.cpp, it's possible for an attacker to control the value of mStringPoolSize to be out of bounds, causing information disclosure."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-93xx/CVE-2018-9341.json
Normal file
21
CVE-2018/CVE-2018-93xx/CVE-2018-9341.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9341",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-19T19:15:05.817",
|
||||||
|
"lastModified": "2024-11-19T19:15:05.817",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In impeg2d_mc_fullx_fully of impeg2d_mc.c there is a possible out of bound write due to missing bounds check. This could lead to remote arbitrary code execution with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-93xx/CVE-2018-9344.json
Normal file
21
CVE-2018/CVE-2018-93xx/CVE-2018-9344.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9344",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-19T19:15:05.877",
|
||||||
|
"lastModified": "2024-11-19T19:15:05.877",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In several functions of DescramblerImpl.cpp, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-93xx/CVE-2018-9345.json
Normal file
21
CVE-2018/CVE-2018-93xx/CVE-2018-9345.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9345",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-19T19:15:05.937",
|
||||||
|
"lastModified": "2024-11-19T19:15:05.937",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In BnAudioPolicyService::onTransact of AudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-93xx/CVE-2018-9346.json
Normal file
21
CVE-2018/CVE-2018-93xx/CVE-2018-9346.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9346",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-19T19:15:06.000",
|
||||||
|
"lastModified": "2024-11-19T19:15:06.000",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In BnAudioPolicyService::onTransact of AudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-93xx/CVE-2018-9348.json
Normal file
21
CVE-2018/CVE-2018-93xx/CVE-2018-9348.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9348",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-19T20:15:27.427",
|
||||||
|
"lastModified": "2024-11-19T20:15:27.427",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In SMF_ParseMetaEvent of eas_smf.c, there is a possible integer overflow. This could lead to remote denial of service due to resource exhaustion with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-93xx/CVE-2018-9364.json
Normal file
21
CVE-2018/CVE-2018-93xx/CVE-2018-9364.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9364",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-19T20:15:27.493",
|
||||||
|
"lastModified": "2024-11-19T20:15:27.493",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the LG LAF component, there is a special command that allowed modification of certain partitions. This could lead to bypass of secure boot. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-93xx/CVE-2018-9366.json
Normal file
21
CVE-2018/CVE-2018-93xx/CVE-2018-9366.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9366",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-19T20:15:27.550",
|
||||||
|
"lastModified": "2024-11-19T20:15:27.550",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In IMSA_Recv_Thread and VT_IMCB_Thread of ImsaClient.cpp and VideoTelephony.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-93xx/CVE-2018-9367.json
Normal file
21
CVE-2018/CVE-2018-93xx/CVE-2018-9367.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9367",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-19T20:15:27.607",
|
||||||
|
"lastModified": "2024-11-19T20:15:27.607",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In FT_ACDK_CCT_V2_OP_ISP_SET_TUNING_PARAS of Meta_CCAP_Para.cpp, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-93xx/CVE-2018-9368.json
Normal file
21
CVE-2018/CVE-2018-93xx/CVE-2018-9368.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9368",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-19T20:15:27.667",
|
||||||
|
"lastModified": "2024-11-19T20:15:27.667",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In mtkscoaudio debugfs there is a possible arbitrary kernel memory write due to missing bounds check and weakened SELinux policies. This could lead to local escalation of privilege with system \u00a0execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-93xx/CVE-2018-9369.json
Normal file
21
CVE-2018/CVE-2018-93xx/CVE-2018-9369.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9369",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-19T20:15:27.723",
|
||||||
|
"lastModified": "2024-11-19T20:15:27.723",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In bootloader there is fastboot command allowing user specified kernel command line arguments. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-93xx/CVE-2018-9370.json
Normal file
21
CVE-2018/CVE-2018-93xx/CVE-2018-9370.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9370",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-19T20:15:27.787",
|
||||||
|
"lastModified": "2024-11-19T20:15:27.787",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In download.c there is a special mode allowing user to download data into memory and causing possible memory corruptions due to missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-93xx/CVE-2018-9371.json
Normal file
21
CVE-2018/CVE-2018-93xx/CVE-2018-9371.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9371",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-19T20:15:27.843",
|
||||||
|
"lastModified": "2024-11-19T20:15:27.843",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Mediatek Preloader, there are out of bounds reads and writes due to an exposed interface that allows arbitrary peripheral memory mapping with insufficient blacklisting/whitelisting. This could lead to local elevation of privilege, given physical access to the device with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-93xx/CVE-2018-9372.json
Normal file
21
CVE-2018/CVE-2018-93xx/CVE-2018-9372.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9372",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-19T20:15:27.917",
|
||||||
|
"lastModified": "2024-11-19T20:15:27.917",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In cmd_flash_mmc_sparse_img of dl_commands.c, there is a possible out of bounds write due to a missing bounds check. This could lead to a local escalation of privilege in the bootloader with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-94xx/CVE-2018-9409.json
Normal file
21
CVE-2018/CVE-2018-94xx/CVE-2018-9409.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9409",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-19T20:15:27.970",
|
||||||
|
"lastModified": "2024-11-19T20:15:27.970",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In HWCSession::SetColorModeById of hwc_session.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2019-3821",
|
"id": "CVE-2019-3821",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2019-03-27T13:29:01.507",
|
"published": "2019-03-27T13:29:01.507",
|
||||||
"lastModified": "2020-11-13T16:15:17.057",
|
"lastModified": "2024-11-19T20:23:50.390",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -117,8 +117,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:ceph:civetweb:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:ceph:civetweb:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "684224FC-980E-41B1-9B67-4D3E91D9C20D"
|
"versionEndExcluding": "1.11",
|
||||||
|
"matchCriteriaId": "2809AE11-B574-4EC0-BBB4-E619D73E892C"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2021-35473",
|
"id": "CVE-2021-35473",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-10T23:15:04.383",
|
"published": "2024-11-10T23:15:04.383",
|
||||||
"lastModified": "2024-11-12T13:55:21.227",
|
"lastModified": "2024-11-19T20:35:13.347",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Se descubri\u00f3 un problema en LemonLDAP::NG antes de la versi\u00f3n 2.0.12. Falta una comprobaci\u00f3n de caducidad en el controlador OAuth2.0, es decir, no verifica la validez del token de acceso. Un atacante puede usar un token de acceso caducado de un cliente OIDC para acceder al controlador OAuth2. La primera versi\u00f3n afectada es la 2.0.4."
|
"value": "Se descubri\u00f3 un problema en LemonLDAP::NG antes de la versi\u00f3n 2.0.12. Falta una comprobaci\u00f3n de caducidad en el controlador OAuth2.0, es decir, no verifica la validez del token de acceso. Un atacante puede usar un token de acceso caducado de un cliente OIDC para acceder al controlador OAuth2. La primera versi\u00f3n afectada es la 2.0.4."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 9.1,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-613"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2549",
|
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2549",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2021-41737",
|
"id": "CVE-2021-41737",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-10T23:15:04.450",
|
"published": "2024-11-10T23:15:04.450",
|
||||||
"lastModified": "2024-11-12T13:55:21.227",
|
"lastModified": "2024-11-19T20:35:14.257",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "En Faust 2.23.1, un archivo de entrada con las l\u00edneas \"// r visualisation tCst\" y \"//process = +: L: abM-^Q;\" y \"process = route(3333333333333333333,2,1,2,3,1) : *;\" conduce al consumo de la pila."
|
"value": "En Faust 2.23.1, un archivo de entrada con las l\u00edneas \"// r visualisation tCst\" y \"//process = +: L: abM-^Q;\" y \"process = route(3333333333333333333,2,1,2,3,1) : *;\" conduce al consumo de la pila."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-674"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/grame-cncm/faust/issues/653",
|
"url": "https://github.com/grame-cncm/faust/issues/653",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-4900",
|
"id": "CVE-2022-4900",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2023-11-02T16:15:08.700",
|
"published": "2023-11-02T16:15:08.700",
|
||||||
"lastModified": "2023-11-30T22:15:07.600",
|
"lastModified": "2024-11-19T20:27:36.463",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -83,7 +83,6 @@
|
|||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"operator": "AND",
|
|
||||||
"nodes": [
|
"nodes": [
|
||||||
{
|
{
|
||||||
"operator": "OR",
|
"operator": "OR",
|
||||||
@ -91,181 +90,44 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:php:php:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "029B5A37-BA8D-4FEC-BE90-856BB9D0D0E1"
|
"versionEndExcluding": "8.0.22",
|
||||||
|
"matchCriteriaId": "D7897613-672B-40B3-8703-855F44666019"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
{
|
{
|
||||||
"operator": "OR",
|
"operator": "OR",
|
||||||
"negate": false,
|
"negate": false,
|
||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "749804DA-4B27-492A-9ABA-6BB562A6B3AC"
|
"matchCriteriaId": "749804DA-4B27-492A-9ABA-6BB562A6B3AC"
|
||||||
}
|
},
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"operator": "AND",
|
|
||||||
"nodes": [
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:php:php:8.1.0:-:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "58C21C07-1325-481A-A042-9806E0309013"
|
"matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC"
|
||||||
}
|
},
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:redhat:linux:9.0:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "E66F7BF0-EF7C-4695-9D67-7C1A01C6F9B9"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"operator": "AND",
|
|
||||||
"nodes": [
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:php:php:8.0.0:-:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6CC80B03-CD93-4B0F-91DC-21BCF9BA42C5"
|
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
|
||||||
}
|
},
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "038FEDE7-986F-4CA5-9003-BA68352B87D4"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"operator": "AND",
|
|
||||||
"nodes": [
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:php:php:7.4.0:-:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "A7F66C34-5BF9-4EFC-AAB0-A2E3716F4FB8"
|
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
|
||||||
}
|
},
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "038FEDE7-986F-4CA5-9003-BA68352B87D4"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"operator": "AND",
|
|
||||||
"nodes": [
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:php:php:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "029B5A37-BA8D-4FEC-BE90-856BB9D0D0E1"
|
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "2DFA94D5-0139-490C-8257-0751FE9FBAE4"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"operator": "AND",
|
|
||||||
"nodes": [
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:a:php:php:-:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "029B5A37-BA8D-4FEC-BE90-856BB9D0D0E1"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "29B186E5-7C2F-466E-AA4A-8F2B618F8A14"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"operator": "AND",
|
|
||||||
"nodes": [
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:a:php:php:-:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "029B5A37-BA8D-4FEC-BE90-856BB9D0D0E1"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:redhat:linux:9.0:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "E66F7BF0-EF7C-4695-9D67-7C1A01C6F9B9"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -289,7 +151,10 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20231130-0008/",
|
"url": "https://security.netapp.com/advisory/ntap-20231130-0008/",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-29382",
|
"id": "CVE-2023-29382",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-07-06T16:15:09.853",
|
"published": "2023-07-06T16:15:09.853",
|
||||||
"lastModified": "2023-07-12T23:00:33.740",
|
"lastModified": "2024-11-19T20:35:16.787",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -45,6 +45,16 @@
|
|||||||
"value": "NVD-CWE-noinfo"
|
"value": "NVD-CWE-noinfo"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-45715",
|
"id": "CVE-2023-45715",
|
||||||
"sourceIdentifier": "psirt@hcl.com",
|
"sourceIdentifier": "psirt@hcl.com",
|
||||||
"published": "2024-03-28T15:15:45.983",
|
"published": "2024-03-28T15:15:45.983",
|
||||||
"lastModified": "2024-03-28T16:07:30.893",
|
"lastModified": "2024-11-19T19:35:10.830",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -39,6 +39,18 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-436"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111972",
|
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111972",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-45922",
|
"id": "CVE-2023-45922",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-27T05:15:47.203",
|
"published": "2024-03-27T05:15:47.203",
|
||||||
"lastModified": "2024-08-02T21:15:46.913",
|
"lastModified": "2024-11-19T19:35:11.600",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [
|
"cveTags": [
|
||||||
{
|
{
|
||||||
@ -22,7 +22,42 @@
|
|||||||
"value": "Se descubri\u00f3 que glx_pbuffer.c en Mesa 23.0.4 conten\u00eda una infracci\u00f3n de segmentaci\u00f3n al llamar a __glXGetDrawableAttribute(). NOTA: esto est\u00e1 en disputa porque no hay situaciones comunes en las que los usuarios requieran una operaci\u00f3n ininterrumpida con un servidor controlador de atacante."
|
"value": "Se descubri\u00f3 que glx_pbuffer.c en Mesa 23.0.4 conten\u00eda una infracci\u00f3n de segmentaci\u00f3n al llamar a __glXGetDrawableAttribute(). NOTA: esto est\u00e1 en disputa porque no hay situaciones comunes en las que los usuarios requieran una operaci\u00f3n ininterrumpida con un servidor controlador de atacante."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-754"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jan/50",
|
"url": "http://seclists.org/fulldisclosure/2024/Jan/50",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-10224",
|
"id": "CVE-2024-10224",
|
||||||
"sourceIdentifier": "security@ubuntu.com",
|
"sourceIdentifier": "security@ubuntu.com",
|
||||||
"published": "2024-11-19T18:15:19.773",
|
"published": "2024-11-19T18:15:19.773",
|
||||||
"lastModified": "2024-11-19T18:15:19.773",
|
"lastModified": "2024-11-19T20:35:18.300",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -35,6 +35,18 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/rschupp/Module-ScanDeps/security/advisories/GHSA-g597-359q-v529",
|
"url": "https://github.com/rschupp/Module-ScanDeps/security/advisories/GHSA-g597-359q-v529",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-10443",
|
"id": "CVE-2024-10443",
|
||||||
"sourceIdentifier": "security@synology.com",
|
"sourceIdentifier": "security@synology.com",
|
||||||
"published": "2024-11-15T11:15:09.750",
|
"published": "2024-11-15T11:15:09.750",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T19:15:07.510",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security@synology.com",
|
"source": "security@synology.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,14 +71,122 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:synology:photos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "1.6.2-0720",
|
||||||
|
"matchCriteriaId": "9E1131A0-FD1F-4BC3-AD7A-5F18CC1DADB5"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:a:synology:diskstation_manager:7.2:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "C483310D-3166-470E-9197-1B3DA12D47E9"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:synology:beephotos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "1.1.0-10053",
|
||||||
|
"matchCriteriaId": "EE6B62EE-AF47-43F0-82A5-B5FE208CAF68"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:o:synology:beestation_os:1.1:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E456DD53-9402-48F7-98F8-8CEE480D8337"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:synology:beephotos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "1.0.2-10026",
|
||||||
|
"matchCriteriaId": "8E7F3368-950F-4D4B-B5BE-D39581A3FC4C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:o:synology:beestation_os:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "DCDD1FA9-719E-4C69-9D72-29B154E27849"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:synology:photos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "1.7.0-0795",
|
||||||
|
"matchCriteriaId": "5FF5FA84-BBF9-437D-8310-E7115EA9CEDD"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_18",
|
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_18",
|
||||||
"source": "security@synology.com"
|
"source": "security@synology.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_19",
|
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_19",
|
||||||
"source": "security@synology.com"
|
"source": "security@synology.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-10534",
|
"id": "CVE-2024-10534",
|
||||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||||
"published": "2024-11-15T11:15:10.100",
|
"published": "2024-11-15T11:15:10.100",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T19:08:44.727",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -59,6 +59,28 @@
|
|||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "HIGH"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
@ -73,10 +95,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:dataprom:personnel_attendance_control_systems_\\/_access_control_security_systems:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2024",
|
||||||
|
"matchCriteriaId": "D81D9AD6-274F-4564-AA7B-C377AC3DC41F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-1856",
|
"url": "https://www.usom.gov.tr/bildirim/tr-24-1856",
|
||||||
"source": "iletisim@usom.gov.tr"
|
"source": "iletisim@usom.gov.tr",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-1097",
|
"id": "CVE-2024-1097",
|
||||||
"sourceIdentifier": "security@huntr.dev",
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
"published": "2024-11-15T11:15:10.550",
|
"published": "2024-11-15T11:15:10.550",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T19:05:30.620",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -16,6 +16,28 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
],
|
||||||
"cvssMetricV30": [
|
"cvssMetricV30": [
|
||||||
{
|
{
|
||||||
"source": "security@huntr.dev",
|
"source": "security@huntr.dev",
|
||||||
@ -40,6 +62,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security@huntr.dev",
|
"source": "security@huntr.dev",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +83,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:k5n:webcalendar:1.3.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E08E15CF-98A9-4257-B60B-C9DC1ED2E828"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://huntr.com/bounties/6dd501f6-6047-4ddb-8b14-f0fc53cdc28e",
|
"url": "https://huntr.com/bounties/6dd501f6-6047-4ddb-8b14-f0fc53cdc28e",
|
||||||
"source": "security@huntr.dev"
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-11003",
|
"id": "CVE-2024-11003",
|
||||||
"sourceIdentifier": "security@ubuntu.com",
|
"sourceIdentifier": "security@ubuntu.com",
|
||||||
"published": "2024-11-19T18:15:19.973",
|
"published": "2024-11-19T18:15:19.973",
|
||||||
"lastModified": "2024-11-19T18:15:19.973",
|
"lastModified": "2024-11-19T20:35:19.000",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -35,6 +35,18 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/liske/needrestart/commit/0f80a348883f72279a859ee655f58da34babefb0",
|
"url": "https://github.com/liske/needrestart/commit/0f80a348883f72279a859ee655f58da34babefb0",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-11182",
|
"id": "CVE-2024-11182",
|
||||||
"sourceIdentifier": "security@eset.com",
|
"sourceIdentifier": "security@eset.com",
|
||||||
"published": "2024-11-15T11:15:10.410",
|
"published": "2024-11-15T11:15:10.410",
|
||||||
"lastModified": "2024-11-18T15:35:03.553",
|
"lastModified": "2024-11-19T19:08:15.657",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -84,6 +104,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security@eset.com",
|
"source": "security@eset.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -95,10 +125,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mdaemon:mdaemon:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "24.5.1",
|
||||||
|
"matchCriteriaId": "F4A0C049-0053-4A66-A690-905C4D1E6B79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://files.mdaemon.com/mdaemon/beta/RelNotes_en.html",
|
"url": "https://files.mdaemon.com/mdaemon/beta/RelNotes_en.html",
|
||||||
"source": "security@eset.com"
|
"source": "security@eset.com",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-11208",
|
"id": "CVE-2024-11208",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-14T14:15:17.787",
|
"published": "2024-11-14T14:15:17.787",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T19:38:51.637",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -120,26 +140,59 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:apereo:central_authentication_service:6.6.0:-:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "254B6B43-4503-439C-9151-133058335141"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gist.github.com/0xArthurSouza/ce3b89887b03cc899d5e8cb6e472b04e",
|
"url": "https://gist.github.com/0xArthurSouza/ce3b89887b03cc899d5e8cb6e472b04e",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://ibb.co/1LxSK2k",
|
"url": "https://ibb.co/1LxSK2k",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.284522",
|
"url": "https://vuldb.com/?ctiid.284522",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.284522",
|
"url": "https://vuldb.com/?id.284522",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.437211",
|
"url": "https://vuldb.com/?submit.437211",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-11209",
|
"id": "CVE-2024-11209",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-14T14:15:18.090",
|
"published": "2024-11-14T14:15:18.090",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T19:14:26.543",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -110,7 +130,7 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
@ -118,24 +138,64 @@
|
|||||||
"value": "CWE-287"
|
"value": "CWE-287"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-287"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:apereo:central_authentication_service:6.6.0:-:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "254B6B43-4503-439C-9151-133058335141"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gist.github.com/0xArthurSouza/281e8ea8a797abc8371a8ced31dc5562",
|
"url": "https://gist.github.com/0xArthurSouza/281e8ea8a797abc8371a8ced31dc5562",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.284523",
|
"url": "https://vuldb.com/?ctiid.284523",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.284523",
|
"url": "https://vuldb.com/?id.284523",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.437238",
|
"url": "https://vuldb.com/?submit.437238",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-11211",
|
"id": "CVE-2024-11211",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-14T15:15:08.077",
|
"published": "2024-11-14T15:15:08.077",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T19:01:51.667",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -110,8 +130,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-434"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -124,22 +154,55 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "1.6.7",
|
||||||
|
"matchCriteriaId": "4DB083C4-076E-442D-B984-3FAE3BC8A300"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/falling-snow1/cve/blob/main/EyouCMS_RCE.md",
|
"url": "https://github.com/falling-snow1/cve/blob/main/EyouCMS_RCE.md",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.284526",
|
"url": "https://vuldb.com/?ctiid.284526",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.284526",
|
"url": "https://vuldb.com/?id.284526",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.437600",
|
"url": "https://vuldb.com/?submit.437600",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-11237",
|
"id": "CVE-2024-11237",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-15T12:15:14.670",
|
"published": "2024-11-15T12:15:14.670",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T19:04:14.987",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -110,8 +130,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -124,30 +154,81 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:tp-link:vn020-f3v\\(t\\)_firmware:tt_v6.2.1021:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "8432B82C-D0E3-49F7-A36C-F2959E1533FE"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:tp-link:vn020-f3v\\(t\\):-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1D9A56AC-A260-41FD-97B9-6B4EF5CAF4F0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Zephkek/TP-Thumper",
|
"url": "https://github.com/Zephkek/TP-Thumper",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Zephkek/TP-Thumper/blob/main/poc.c",
|
"url": "https://github.com/Zephkek/TP-Thumper/blob/main/poc.c",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.284672",
|
"url": "https://vuldb.com/?ctiid.284672",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.284672",
|
"url": "https://vuldb.com/?id.284672",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.438408",
|
"url": "https://vuldb.com/?submit.438408",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.tp-link.com/",
|
"url": "https://www.tp-link.com/",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-11238",
|
"id": "CVE-2024-11238",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-15T13:15:03.753",
|
"published": "2024-11-15T13:15:03.753",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T19:01:13.060",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability, which was classified as critical, was found in Landray EKP up to 16.0. This affects the function delPreviewFile of the file /sys/ui/sys_ui_component/sysUiComponent.do?method=delPreviewFile. The manipulation of the argument directoryPath leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
"value": "A vulnerability, which was classified as critical, was found in Landray EKP up to 16.0. This affects the function delPreviewFile of the file /sys/ui/sys_ui_component/sysUiComponent.do?method=delPreviewFile. The manipulation of the argument directoryPath leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Landray EKP hasta la versi\u00f3n 16.0. Afecta a la funci\u00f3n delPreviewFile del archivo /sys/ui/sys_ui_component/sysUiComponent.do?method=delPreviewFile. La manipulaci\u00f3n del argumento directoryPath provoca un path traversal. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -57,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -116,22 +140,55 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:landray:landray_ekp:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "16.0",
|
||||||
|
"matchCriteriaId": "FBA90B1A-4F23-4F35-A470-6AA73B36019D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/CoinIsMoney/TempGuide/blob/main/LL-exp-02.pdf",
|
"url": "https://github.com/CoinIsMoney/TempGuide/blob/main/LL-exp-02.pdf",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.284673",
|
"url": "https://vuldb.com/?ctiid.284673",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.284673",
|
"url": "https://vuldb.com/?id.284673",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.438291",
|
"url": "https://vuldb.com/?submit.438291",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-11239",
|
"id": "CVE-2024-11239",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-15T14:15:19.693",
|
"published": "2024-11-15T14:15:19.693",
|
||||||
"lastModified": "2024-11-15T14:23:55.747",
|
"lastModified": "2024-11-19T19:00:43.230",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability has been found in Landray EKP up to 16.0 and classified as critical. This vulnerability affects the function deleteFile of the file /sys/common/import.do?method=deleteFile of the component API Interface. The manipulation of the argument folder leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
"value": "A vulnerability has been found in Landray EKP up to 16.0 and classified as critical. This vulnerability affects the function deleteFile of the file /sys/common/import.do?method=deleteFile of the component API Interface. The manipulation of the argument folder leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se ha encontrado una vulnerabilidad en Landray EKP hasta la versi\u00f3n 16.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n deleteFile del archivo /sys/common/import.do?method=deleteFile de la interfaz API del componente. La manipulaci\u00f3n de la carpeta de argumentos provoca un path traversal. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -57,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -116,22 +140,55 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:landray:landray_ekp:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "16.0",
|
||||||
|
"matchCriteriaId": "FBA90B1A-4F23-4F35-A470-6AA73B36019D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/CoinIsMoney/TempGuide/blob/main/LL-exp-03.pdf",
|
"url": "https://github.com/CoinIsMoney/TempGuide/blob/main/LL-exp-03.pdf",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.284674",
|
"url": "https://vuldb.com/?ctiid.284674",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.284674",
|
"url": "https://vuldb.com/?id.284674",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.438784",
|
"url": "https://vuldb.com/?submit.438784",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
37
CVE-2024/CVE-2024-113xx/CVE-2024-11395.json
Normal file
37
CVE-2024/CVE-2024-113xx/CVE-2024-11395.json
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-11395",
|
||||||
|
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||||
|
"published": "2024-11-19T20:15:29.917",
|
||||||
|
"lastModified": "2024-11-19T20:15:29.917",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Type Confusion in V8 in Google Chrome prior to 131.0.6778.85 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "chrome-cve-admin@google.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-843"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://chromereleases.googleblog.com/2024/11/stable-channel-update-for-desktop_19.html",
|
||||||
|
"source": "chrome-cve-admin@google.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://issues.chromium.org/issues/377384894",
|
||||||
|
"source": "chrome-cve-admin@google.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-1240",
|
"id": "CVE-2024-1240",
|
||||||
"sourceIdentifier": "security@huntr.dev",
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
"published": "2024-11-15T11:15:10.773",
|
"published": "2024-11-15T11:15:10.773",
|
||||||
"lastModified": "2024-11-15T19:35:06.063",
|
"lastModified": "2024-11-19T19:04:53.913",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -73,14 +93,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:pyload:pyload:0.5.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E5A06D79-6D64-41FB-9040-17E9630DF4E9"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/pyload/pyload/commit/fe94451dcc2be90b3889e2fd9d07b483c8a6dccd",
|
"url": "https://github.com/pyload/pyload/commit/fe94451dcc2be90b3889e2fd9d07b483c8a6dccd",
|
||||||
"source": "security@huntr.dev"
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://huntr.com/bounties/eef9513d-ccc3-4030-b574-374c5e7b887e",
|
"url": "https://huntr.com/bounties/eef9513d-ccc3-4030-b574-374c5e7b887e",
|
||||||
"source": "security@huntr.dev"
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
16
CVE-2024/CVE-2024-12xx/CVE-2024-1271.json
Normal file
16
CVE-2024/CVE-2024-12xx/CVE-2024-1271.json
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-1271",
|
||||||
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
|
"published": "2024-11-19T20:15:30.007",
|
||||||
|
"lastModified": "2024-11-19T20:15:30.007",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Rejected reason: This CVE was previously published at https://bugzilla.redhat.com/show_bug.cgi?id=2262978 but later rejected for the following reason: The flaw requires an attacker to have superuser credentials which is a condition that already permits all impacts, hence not constituing a security vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-20038",
|
"id": "CVE-2024-20038",
|
||||||
"sourceIdentifier": "security@mediatek.com",
|
"sourceIdentifier": "security@mediatek.com",
|
||||||
"published": "2024-03-04T03:15:07.800",
|
"published": "2024-03-04T03:15:07.800",
|
||||||
"lastModified": "2024-03-04T13:58:23.447",
|
"lastModified": "2024-11-19T19:35:12.580",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "En pq, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08495932; ID del problema: ALPS08495932."
|
"value": "En pq, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08495932; ID del problema: ALPS08495932."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.4,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.8,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-125"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||||
|
48
CVE-2024/CVE-2024-216xx/CVE-2024-21697.json
Normal file
48
CVE-2024/CVE-2024-216xx/CVE-2024-21697.json
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-21697",
|
||||||
|
"sourceIdentifier": "security@atlassian.com",
|
||||||
|
"published": "2024-11-19T19:15:07.937",
|
||||||
|
"lastModified": "2024-11-19T19:15:07.937",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "This High severity RCE (Remote Code Execution) vulnerability was introduced in versions 4.2.8 of Sourcetree for Mac and 3.4.19 for Sourcetree for Windows.\r\n\r\nThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.8, allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.\r\n\r\nAtlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\r\n Sourcetree for Mac 4.2: Upgrade to a release greater than or equal to 4.2.9\r\n Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.20\r\n\r\nSee the release notes ([https://www.sourcetreeapp.com/download-archives]). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center ([https://www.sourcetreeapp.com/download-archives]).\r\n\r\nThis vulnerability was reported via our Penetration Testing program."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security@atlassian.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1456179091",
|
||||||
|
"source": "security@atlassian.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://jira.atlassian.com/browse/SRCTREE-8168",
|
||||||
|
"source": "security@atlassian.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-25254",
|
"id": "CVE-2024-25254",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-11T23:15:05.460",
|
"published": "2024-11-11T23:15:05.460",
|
||||||
"lastModified": "2024-11-12T13:55:21.227",
|
"lastModified": "2024-11-19T19:35:13.453",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Se descubri\u00f3 que SuperScan v4.1 conten\u00eda un desbordamiento de b\u00fafer a trav\u00e9s del par\u00e1metro Nombre de host/IP."
|
"value": "Se descubri\u00f3 que SuperScan v4.1 conten\u00eda un desbordamiento de b\u00fafer a trav\u00e9s del par\u00e1metro Nombre de host/IP."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-120"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://exploitart.ist/exploit/2023/09/18/superscan-os-command-injection.html",
|
"url": "https://exploitart.ist/exploit/2023/09/18/superscan-os-command-injection.html",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-28013",
|
"id": "CVE-2024-28013",
|
||||||
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
|
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
|
||||||
"published": "2024-03-28T01:15:47.693",
|
"published": "2024-03-28T01:15:47.693",
|
||||||
"lastModified": "2024-04-02T06:15:15.350",
|
"lastModified": "2024-11-19T20:35:20.507",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "Uso de vulnerabilidad de valores insuficientemente aleatorios en NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W30 0P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N , WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN y MR02LN, todas las versiones permiten a un atacante cambiar la configuraci\u00f3n a trav\u00e9s de Internet."
|
"value": "Uso de vulnerabilidad de valores insuficientemente aleatorios en NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W30 0P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N , WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN y MR02LN, todas las versiones permiten a un atacante cambiar la configuraci\u00f3n a trav\u00e9s de Internet."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "psirt-info@cyber.jp.nec.com",
|
"source": "psirt-info@cyber.jp.nec.com",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-28745",
|
"id": "CVE-2024-28745",
|
||||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||||
"published": "2024-03-18T04:15:09.987",
|
"published": "2024-03-18T04:15:09.987",
|
||||||
"lastModified": "2024-03-18T12:38:25.490",
|
"lastModified": "2024-11-19T20:35:20.717",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Existe un problema de exportaci\u00f3n incorrecta de los componentes de la aplicaci\u00f3n de Android en la aplicaci\u00f3n 'ABEMA' para Android anterior a 10.65.0, lo que permite que otra aplicaci\u00f3n instalada en el dispositivo del usuario acceda a una URL arbitraria en la aplicaci\u00f3n 'ABEMA' para Android a trav\u00e9s de Intent. Si se explota esta vulnerabilidad, es posible que se muestre un sitio web arbitrario en la aplicaci\u00f3n y, como resultado, el usuario puede convertirse en v\u00edctima de un ataque de phishing."
|
"value": "Existe un problema de exportaci\u00f3n incorrecta de los componentes de la aplicaci\u00f3n de Android en la aplicaci\u00f3n 'ABEMA' para Android anterior a 10.65.0, lo que permite que otra aplicaci\u00f3n instalada en el dispositivo del usuario acceda a una URL arbitraria en la aplicaci\u00f3n 'ABEMA' para Android a trav\u00e9s de Intent. Si se explota esta vulnerabilidad, es posible que se muestre un sitio web arbitrario en la aplicaci\u00f3n y, como resultado, el usuario puede convertirse en v\u00edctima de un ataque de phishing."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.3,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-732"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://jvn.jp/en/jp/JVN70640802/",
|
"url": "https://jvn.jp/en/jp/JVN70640802/",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-31617",
|
"id": "CVE-2024-31617",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-22T18:15:10.040",
|
"published": "2024-05-22T18:15:10.040",
|
||||||
"lastModified": "2024-05-22T18:59:20.240",
|
"lastModified": "2024-11-19T20:35:21.597",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "OpenLiteSpeed anterior a 1.8.1 maneja mal la codificaci\u00f3n fragmentada."
|
"value": "OpenLiteSpeed anterior a 1.8.1 maneja mal la codificaci\u00f3n fragmentada."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-770"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/litespeedtech/openlitespeed/releases/tag/v1.8.1",
|
"url": "https://github.com/litespeedtech/openlitespeed/releases/tag/v1.8.1",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-31813",
|
"id": "CVE-2024-31813",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-08T13:15:08.840",
|
"published": "2024-04-08T13:15:08.840",
|
||||||
"lastModified": "2024-04-08T18:48:40.217",
|
"lastModified": "2024-11-19T20:35:22.397",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "TOTOLINK EX200 V4.0.3c.7646_B20201211 no contiene un mecanismo de autenticaci\u00f3n de forma predeterminada."
|
"value": "TOTOLINK EX200 V4.0.3c.7646_B20201211 no contiene un mecanismo de autenticaci\u00f3n de forma predeterminada."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.4,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.5,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/Missing_Authentication/missauth.md",
|
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/Missing_Authentication/missauth.md",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-36905",
|
"id": "CVE-2024-36905",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-05-30T16:15:14.030",
|
"published": "2024-05-30T16:15:14.030",
|
||||||
"lastModified": "2024-11-19T18:35:04.747",
|
"lastModified": "2024-11-19T20:15:30.583",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -83,6 +83,10 @@
|
|||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/f47d0d32fa94e815fdd78b8b88684873e67939f4",
|
"url": "https://git.kernel.org/stable/c/f47d0d32fa94e815fdd78b8b88684873e67939f4",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.openwall.com/lists/oss-security/2024/10/29/1",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
56
CVE-2024/CVE-2024-370xx/CVE-2024-37070.json
Normal file
56
CVE-2024/CVE-2024-370xx/CVE-2024-37070.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-37070",
|
||||||
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
|
"published": "2024-11-19T20:15:30.693",
|
||||||
|
"lastModified": "2024-11-19T20:15:30.693",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "IBM Concert Software 1.0.0, 1.0.1, 1.0.2, and 1.0.2.1 could allow an authenticated user to obtain sensitive information that could aid in further attacks against the system."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-359"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.ibm.com/support/pages/node/7176346",
|
||||||
|
"source": "psirt@us.ibm.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-38264",
|
"id": "CVE-2024-38264",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2024-11-12T18:15:21.390",
|
"published": "2024-11-12T18:15:21.390",
|
||||||
"lastModified": "2024-11-13T17:01:58.603",
|
"lastModified": "2024-11-19T20:52:32.727",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -41,8 +41,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "secure@microsoft.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -51,10 +61,74 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
|
||||||
|
"versionEndExcluding": "10.0.22621.4460",
|
||||||
|
"matchCriteriaId": "04BC0915-6F14-4D7A-951F-83CBAB47C3C4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionEndExcluding": "10.0.22621.4460",
|
||||||
|
"matchCriteriaId": "8A16CFCB-D002-4F63-B568-9D14ACE88E94"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
|
||||||
|
"versionEndExcluding": "10.0.22631.4460",
|
||||||
|
"matchCriteriaId": "B8FE14E5-7226-43CA-A57E-A81636185AD4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionEndExcluding": "10.0.22631.4460",
|
||||||
|
"matchCriteriaId": "97507261-3969-4EBF-BCED-93FBADCBB6DC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
|
||||||
|
"versionEndExcluding": "10.0.26100.2314",
|
||||||
|
"matchCriteriaId": "D32C04CA-E5BE-47CA-AF79-B39859288531"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionEndExcluding": "10.0.26100.2314",
|
||||||
|
"matchCriteriaId": "40A6B92E-21C6-4BDD-BA57-DC227FF0F998"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.25398.1251",
|
||||||
|
"matchCriteriaId": "A549BD98-3DE2-4EF3-A579-12AFCB764975"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.26100.2314",
|
||||||
|
"matchCriteriaId": "4F17FD7F-254D-4EE6-9D22-468E76D9B054"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38264",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38264",
|
||||||
"source": "secure@microsoft.com"
|
"source": "secure@microsoft.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-39609",
|
"id": "CVE-2024-39609",
|
||||||
"sourceIdentifier": "secure@intel.com",
|
"sourceIdentifier": "secure@intel.com",
|
||||||
"published": "2024-11-13T21:15:27.197",
|
"published": "2024-11-13T21:15:27.197",
|
||||||
"lastModified": "2024-11-15T14:00:09.720",
|
"lastModified": "2024-11-19T19:58:29.653",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.7,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@intel.com",
|
"source": "secure@intel.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -95,10 +115,44 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:intel:server_board_m70klp2sb_firmware:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "01.04.0030",
|
||||||
|
"matchCriteriaId": "6259299E-37EC-48AD-959D-3DE49A61B923"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:intel:server_board_m70klp2sb:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "2C473084-B18C-4307-9733-7B9CE9E2D9C4"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01175.html",
|
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01175.html",
|
||||||
"source": "secure@intel.com"
|
"source": "secure@intel.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-41167",
|
"id": "CVE-2024-41167",
|
||||||
"sourceIdentifier": "secure@intel.com",
|
"sourceIdentifier": "secure@intel.com",
|
||||||
"published": "2024-11-13T21:15:28.590",
|
"published": "2024-11-13T21:15:28.590",
|
||||||
"lastModified": "2024-11-15T14:00:09.720",
|
"lastModified": "2024-11-19T19:45:02.660",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.7,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@intel.com",
|
"source": "secure@intel.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -84,6 +104,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@intel.com",
|
"source": "secure@intel.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -95,10 +125,43 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:intel:m10jnp2sb_firmware:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "7.220",
|
||||||
|
"matchCriteriaId": "E7676079-7126-4C28-A826-64ED2E740D34"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:intel:m10jnp2sb:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "C9EF1949-8447-4D04-9808-7E6D147B4B70"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01175.html",
|
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01175.html",
|
||||||
"source": "secure@intel.com"
|
"source": "secure@intel.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-42450",
|
"id": "CVE-2024-42450",
|
||||||
"sourceIdentifier": "support@hackerone.com",
|
"sourceIdentifier": "support@hackerone.com",
|
||||||
"published": "2024-11-19T18:15:20.560",
|
"published": "2024-11-19T18:15:20.560",
|
||||||
"lastModified": "2024-11-19T18:15:20.560",
|
"lastModified": "2024-11-19T20:35:23.447",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -12,6 +12,28 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 10.0,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 6.0
|
||||||
|
}
|
||||||
|
],
|
||||||
"cvssMetricV30": [
|
"cvssMetricV30": [
|
||||||
{
|
{
|
||||||
"source": "support@hackerone.com",
|
"source": "support@hackerone.com",
|
||||||
@ -35,6 +57,18 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-798"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://security-portal.versa-networks.com/emailbulletins/6735a300415abb89e9a8a9d3",
|
"url": "https://security-portal.versa-networks.com/emailbulletins/6735a300415abb89e9a8a9d3",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-43447",
|
"id": "CVE-2024-43447",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2024-11-12T18:15:21.707",
|
"published": "2024-11-12T18:15:21.707",
|
||||||
"lastModified": "2024-11-13T17:01:58.603",
|
"lastModified": "2024-11-19T20:52:55.763",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -41,8 +41,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "secure@microsoft.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -51,10 +61,32 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.20348.2849",
|
||||||
|
"matchCriteriaId": "38D9CE84-B85F-42B0-959D-A390427A1641"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43447",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43447",
|
||||||
"source": "secure@microsoft.com"
|
"source": "secure@microsoft.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-43449",
|
"id": "CVE-2024-43449",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2024-11-12T18:15:21.977",
|
"published": "2024-11-12T18:15:21.977",
|
||||||
"lastModified": "2024-11-13T17:01:58.603",
|
"lastModified": "2024-11-19T20:49:54.423",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -41,8 +41,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "secure@microsoft.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -51,10 +61,179 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionEndExcluding": "10.0.10240.20826",
|
||||||
|
"matchCriteriaId": "94D57126-EC8D-4898-A5FE-D7EB6463B634"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
|
||||||
|
"versionEndExcluding": "10.0.10240.20826",
|
||||||
|
"matchCriteriaId": "54AA8A1F-0EAD-406A-A4AF-B86C316D1089"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionEndExcluding": "10.0.14393.7515",
|
||||||
|
"matchCriteriaId": "86F8F1B2-C206-4CD6-83C6-C450329CEE10"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||||
|
"versionEndExcluding": "10.0.14393.7515",
|
||||||
|
"matchCriteriaId": "FCBE6103-075E-4841-836D-4E0D630E99FF"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionEndExcluding": "10.0.17763.6532",
|
||||||
|
"matchCriteriaId": "81C732A1-CC0F-4633-B00D-473869E77DB9"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||||
|
"versionEndExcluding": "10.0.17763.6532",
|
||||||
|
"matchCriteriaId": "AF9C20B8-CB5E-46C9-B041-D6A42C26703B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
|
||||||
|
"versionEndExcluding": "10.0.19044.5131",
|
||||||
|
"matchCriteriaId": "71AD0B79-C3EF-4E13-AB04-D5FAEABA6954"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionEndExcluding": "10.0.19044.5131",
|
||||||
|
"matchCriteriaId": "B35413A3-DE3B-4E35-AB48-C6D5D138AC07"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
|
||||||
|
"versionEndExcluding": "10.0.19044.5131",
|
||||||
|
"matchCriteriaId": "D0558F5F-A561-41E9-9242-7F4A5D924479"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
|
||||||
|
"versionEndExcluding": "10.0.19045.5131",
|
||||||
|
"matchCriteriaId": "EA243DE7-EDB1-43DA-AD7E-541843DECB58"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionEndExcluding": "10.0.19045.5131",
|
||||||
|
"matchCriteriaId": "5D428E06-FC7C-4151-9582-D66D05D7AFE6"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
|
||||||
|
"versionEndExcluding": "10.0.19045.5131",
|
||||||
|
"matchCriteriaId": "FB49C811-F4D7-46EB-9ED6-50CB3EAAAD90"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
|
||||||
|
"versionEndExcluding": "10.0.22621.4460",
|
||||||
|
"matchCriteriaId": "04BC0915-6F14-4D7A-951F-83CBAB47C3C4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionEndExcluding": "10.0.22621.4460",
|
||||||
|
"matchCriteriaId": "8A16CFCB-D002-4F63-B568-9D14ACE88E94"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
|
||||||
|
"versionEndExcluding": "10.0.22631.4460",
|
||||||
|
"matchCriteriaId": "B8FE14E5-7226-43CA-A57E-A81636185AD4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionEndExcluding": "10.0.22631.4460",
|
||||||
|
"matchCriteriaId": "97507261-3969-4EBF-BCED-93FBADCBB6DC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
|
||||||
|
"versionEndExcluding": "10.0.26100.2314",
|
||||||
|
"matchCriteriaId": "D32C04CA-E5BE-47CA-AF79-B39859288531"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionEndExcluding": "10.0.26100.2314",
|
||||||
|
"matchCriteriaId": "40A6B92E-21C6-4BDD-BA57-DC227FF0F998"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||||
|
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.14393.7515",
|
||||||
|
"matchCriteriaId": "82E3AC46-9D0D-4381-93EE-FE87C212040A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.17763.6532",
|
||||||
|
"matchCriteriaId": "A43E1F6C-B2A7-4DEC-B4EC-04153746C42B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.20348.2849",
|
||||||
|
"matchCriteriaId": "38D9CE84-B85F-42B0-959D-A390427A1641"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.25398.1251",
|
||||||
|
"matchCriteriaId": "A549BD98-3DE2-4EF3-A579-12AFCB764975"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.26100.2314",
|
||||||
|
"matchCriteriaId": "4F17FD7F-254D-4EE6-9D22-468E76D9B054"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43449",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43449",
|
||||||
"source": "secure@microsoft.com"
|
"source": "secure@microsoft.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-43450",
|
"id": "CVE-2024-43450",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2024-11-12T18:15:22.237",
|
"published": "2024-11-12T18:15:22.237",
|
||||||
"lastModified": "2024-11-13T17:01:58.603",
|
"lastModified": "2024-11-19T20:49:26.017",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -41,8 +41,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "secure@microsoft.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -51,10 +61,71 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||||
|
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.14393.7515",
|
||||||
|
"matchCriteriaId": "82E3AC46-9D0D-4381-93EE-FE87C212040A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.17763.6532",
|
||||||
|
"matchCriteriaId": "A43E1F6C-B2A7-4DEC-B4EC-04153746C42B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.20348.2849",
|
||||||
|
"matchCriteriaId": "38D9CE84-B85F-42B0-959D-A390427A1641"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.25398.1251",
|
||||||
|
"matchCriteriaId": "A549BD98-3DE2-4EF3-A579-12AFCB764975"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.26100.2314",
|
||||||
|
"matchCriteriaId": "4F17FD7F-254D-4EE6-9D22-468E76D9B054"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43450",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43450",
|
||||||
"source": "secure@microsoft.com"
|
"source": "secure@microsoft.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-43452",
|
"id": "CVE-2024-43452",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2024-11-12T18:15:22.737",
|
"published": "2024-11-12T18:15:22.737",
|
||||||
"lastModified": "2024-11-13T17:01:58.603",
|
"lastModified": "2024-11-19T20:48:28.447",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -41,8 +41,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "secure@microsoft.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -51,10 +61,139 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionEndExcluding": "10.0.17763.6532",
|
||||||
|
"matchCriteriaId": "81C732A1-CC0F-4633-B00D-473869E77DB9"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||||
|
"versionEndExcluding": "10.0.17763.6532",
|
||||||
|
"matchCriteriaId": "AF9C20B8-CB5E-46C9-B041-D6A42C26703B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
|
||||||
|
"versionEndExcluding": "10.0.19044.5131",
|
||||||
|
"matchCriteriaId": "71AD0B79-C3EF-4E13-AB04-D5FAEABA6954"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionEndExcluding": "10.0.19044.5131",
|
||||||
|
"matchCriteriaId": "B35413A3-DE3B-4E35-AB48-C6D5D138AC07"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
|
||||||
|
"versionEndExcluding": "10.0.19044.5131",
|
||||||
|
"matchCriteriaId": "D0558F5F-A561-41E9-9242-7F4A5D924479"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
|
||||||
|
"versionEndExcluding": "10.0.19045.5131",
|
||||||
|
"matchCriteriaId": "EA243DE7-EDB1-43DA-AD7E-541843DECB58"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionEndExcluding": "10.0.19045.5131",
|
||||||
|
"matchCriteriaId": "5D428E06-FC7C-4151-9582-D66D05D7AFE6"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
|
||||||
|
"versionEndExcluding": "10.0.19045.5131",
|
||||||
|
"matchCriteriaId": "FB49C811-F4D7-46EB-9ED6-50CB3EAAAD90"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
|
||||||
|
"versionEndExcluding": "10.0.22621.4460",
|
||||||
|
"matchCriteriaId": "04BC0915-6F14-4D7A-951F-83CBAB47C3C4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionEndExcluding": "10.0.22621.4460",
|
||||||
|
"matchCriteriaId": "8A16CFCB-D002-4F63-B568-9D14ACE88E94"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
|
||||||
|
"versionEndExcluding": "10.0.22631.4460",
|
||||||
|
"matchCriteriaId": "B8FE14E5-7226-43CA-A57E-A81636185AD4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionEndExcluding": "10.0.22631.4460",
|
||||||
|
"matchCriteriaId": "97507261-3969-4EBF-BCED-93FBADCBB6DC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
|
||||||
|
"versionEndExcluding": "10.0.26100.2314",
|
||||||
|
"matchCriteriaId": "D32C04CA-E5BE-47CA-AF79-B39859288531"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionEndExcluding": "10.0.26100.2314",
|
||||||
|
"matchCriteriaId": "40A6B92E-21C6-4BDD-BA57-DC227FF0F998"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||||
|
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.17763.6532",
|
||||||
|
"matchCriteriaId": "A43E1F6C-B2A7-4DEC-B4EC-04153746C42B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.20348.2849",
|
||||||
|
"matchCriteriaId": "38D9CE84-B85F-42B0-959D-A390427A1641"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.25398.1251",
|
||||||
|
"matchCriteriaId": "A549BD98-3DE2-4EF3-A579-12AFCB764975"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.26100.2314",
|
||||||
|
"matchCriteriaId": "4F17FD7F-254D-4EE6-9D22-468E76D9B054"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43452",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43452",
|
||||||
"source": "secure@microsoft.com"
|
"source": "secure@microsoft.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-43459",
|
"id": "CVE-2024-43459",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2024-11-12T18:15:23.090",
|
"published": "2024-11-12T18:15:23.090",
|
||||||
"lastModified": "2024-11-13T17:01:58.603",
|
"lastModified": "2024-11-19T20:43:02.103",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -41,8 +41,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "secure@microsoft.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -51,10 +61,68 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionStartIncluding": "13.0.6300.2",
|
||||||
|
"versionEndExcluding": "13.0.6455.2",
|
||||||
|
"matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionStartIncluding": "13.0.7000.253",
|
||||||
|
"versionEndExcluding": "13.0.7050.2",
|
||||||
|
"matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionStartIncluding": "14.0.1000.169",
|
||||||
|
"versionEndExcluding": "14.0.2070.1",
|
||||||
|
"matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionStartIncluding": "14.0.3006.16",
|
||||||
|
"versionEndExcluding": "14.0.3485.1",
|
||||||
|
"matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionStartIncluding": "15.0.2000.5",
|
||||||
|
"versionEndExcluding": "15.0.2130.3",
|
||||||
|
"matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionStartIncluding": "15.0.4003.23",
|
||||||
|
"versionEndExcluding": "15.0.4410.1",
|
||||||
|
"matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43459",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43459",
|
||||||
"source": "secure@microsoft.com"
|
"source": "secure@microsoft.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-43462",
|
"id": "CVE-2024-43462",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2024-11-12T18:15:23.370",
|
"published": "2024-11-12T18:15:23.370",
|
||||||
"lastModified": "2024-11-13T17:01:58.603",
|
"lastModified": "2024-11-19T20:18:42.467",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -41,8 +41,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "secure@microsoft.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -51,10 +61,68 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionStartIncluding": "13.0.6300.2",
|
||||||
|
"versionEndExcluding": "13.0.6455.2",
|
||||||
|
"matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionStartIncluding": "13.0.7000.253",
|
||||||
|
"versionEndExcluding": "13.0.7050.2",
|
||||||
|
"matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionStartIncluding": "14.0.1000.169",
|
||||||
|
"versionEndExcluding": "14.0.2070.1",
|
||||||
|
"matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionStartIncluding": "14.0.3006.16",
|
||||||
|
"versionEndExcluding": "14.0.3485.1",
|
||||||
|
"matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionStartIncluding": "15.0.2000.5",
|
||||||
|
"versionEndExcluding": "15.0.2130.3",
|
||||||
|
"matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionStartIncluding": "15.0.4003.23",
|
||||||
|
"versionEndExcluding": "15.0.4410.1",
|
||||||
|
"matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43462",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43462",
|
||||||
"source": "secure@microsoft.com"
|
"source": "secure@microsoft.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-43498",
|
"id": "CVE-2024-43498",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2024-11-12T18:15:24.110",
|
"published": "2024-11-12T18:15:24.110",
|
||||||
"lastModified": "2024-11-13T17:01:58.603",
|
"lastModified": "2024-11-19T20:01:04.877",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -41,8 +41,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "secure@microsoft.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -51,10 +61,91 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:.net:9.0.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "5DFE5320-88E8-42C2-BC1C-E402FE71ECBB"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "17.6",
|
||||||
|
"versionEndExcluding": "17.6.21",
|
||||||
|
"matchCriteriaId": "480EF56E-9720-4ABD-BE13-CD68F6300482"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "17.8",
|
||||||
|
"versionEndExcluding": "17.8.16",
|
||||||
|
"matchCriteriaId": "E3974951-EE1A-47CD-B1AB-389C4BDADEB0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "17.10.0",
|
||||||
|
"versionEndExcluding": "17.10.9",
|
||||||
|
"matchCriteriaId": "B85CEE4B-546D-4DBF-8673-96859149F05F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "17.11.0",
|
||||||
|
"versionEndExcluding": "17.11.6",
|
||||||
|
"matchCriteriaId": "0FCE50CB-B8BC-4C62-86AC-4B5DC0F0A8BA"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43498",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43498",
|
||||||
"source": "secure@microsoft.com"
|
"source": "secure@microsoft.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-43499",
|
"id": "CVE-2024-43499",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2024-11-12T18:15:24.363",
|
"published": "2024-11-12T18:15:24.363",
|
||||||
"lastModified": "2024-11-14T19:15:06.850",
|
"lastModified": "2024-11-19T19:59:24.387",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -41,8 +41,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "secure@microsoft.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -55,10 +65,91 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:.net:9.0.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "5DFE5320-88E8-42C2-BC1C-E402FE71ECBB"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "17.6",
|
||||||
|
"versionEndExcluding": "17.6.21",
|
||||||
|
"matchCriteriaId": "480EF56E-9720-4ABD-BE13-CD68F6300482"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "17.8",
|
||||||
|
"versionEndExcluding": "17.8.16",
|
||||||
|
"matchCriteriaId": "E3974951-EE1A-47CD-B1AB-389C4BDADEB0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "17.10.0",
|
||||||
|
"versionEndIncluding": "17.10.9",
|
||||||
|
"matchCriteriaId": "F66E9930-468D-4637-9FAF-35C7288C6E4A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "17.11.0",
|
||||||
|
"versionEndExcluding": "17.11.6",
|
||||||
|
"matchCriteriaId": "0FCE50CB-B8BC-4C62-86AC-4B5DC0F0A8BA"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43499",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43499",
|
||||||
"source": "secure@microsoft.com"
|
"source": "secure@microsoft.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-44546",
|
"id": "CVE-2024-44546",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-11T21:15:06.360",
|
"published": "2024-11-11T21:15:06.360",
|
||||||
"lastModified": "2024-11-12T13:55:21.227",
|
"lastModified": "2024-11-19T20:35:24.240",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Powerjob >= 3.20 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro de versi\u00f3n."
|
"value": "Powerjob >= 3.20 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro de versi\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gist.github.com/jwx0539/5151f53ec497474cab6af4fa8ee6b6f7",
|
"url": "https://gist.github.com/jwx0539/5151f53ec497474cab6af4fa8ee6b6f7",
|
||||||
|
56
CVE-2024/CVE-2024-454xx/CVE-2024-45419.json
Normal file
56
CVE-2024/CVE-2024-454xx/CVE-2024-45419.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45419",
|
||||||
|
"sourceIdentifier": "security@zoom.us",
|
||||||
|
"published": "2024-11-19T20:15:30.973",
|
||||||
|
"lastModified": "2024-11-19T20:15:30.973",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper input validation in some Zoom Apps may allow an unauthenticated user to conduct a disclosure of information via network access."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@zoom.us",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 8.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@zoom.us",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-252"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24041",
|
||||||
|
"source": "security@zoom.us"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2024/CVE-2024-454xx/CVE-2024-45420.json
Normal file
56
CVE-2024/CVE-2024-454xx/CVE-2024-45420.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45420",
|
||||||
|
"sourceIdentifier": "security@zoom.us",
|
||||||
|
"published": "2024-11-19T20:15:31.200",
|
||||||
|
"lastModified": "2024-11-19T20:15:31.200",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Uncontrolled resource consumption in some Zoom Apps before version 6.2.0 may allow an authenticated user to conduct a denial of service via network access."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@zoom.us",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@zoom.us",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-400"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24042",
|
||||||
|
"source": "security@zoom.us"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2024/CVE-2024-454xx/CVE-2024-45422.json
Normal file
56
CVE-2024/CVE-2024-454xx/CVE-2024-45422.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45422",
|
||||||
|
"sourceIdentifier": "security@zoom.us",
|
||||||
|
"published": "2024-11-19T20:15:31.430",
|
||||||
|
"lastModified": "2024-11-19T20:15:31.430",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper input validation in some Zoom Apps before version 6.2.0 may allow an unauthenticated user to conduct a denial of service via network access."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@zoom.us",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@zoom.us",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-20"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24044",
|
||||||
|
"source": "security@zoom.us"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-45611",
|
"id": "CVE-2024-45611",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-11-15T21:15:09.627",
|
"published": "2024-11-15T21:15:09.627",
|
||||||
"lastModified": "2024-11-18T17:11:56.587",
|
"lastModified": "2024-11-19T20:57:21.473",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +71,32 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "0.84",
|
||||||
|
"versionEndExcluding": "10.0.17",
|
||||||
|
"matchCriteriaId": "1D7BDA2A-8E0F-41AC-B87E-9DD909B743C9"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j73h-x6j3-m479",
|
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j73h-x6j3-m479",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
37
CVE-2024/CVE-2024-486xx/CVE-2024-48694.json
Normal file
37
CVE-2024/CVE-2024-486xx/CVE-2024-48694.json
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-48694",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-11-19T19:15:08.140",
|
||||||
|
"lastModified": "2024-11-19T19:15:08.140",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "File Upload vulnerability in Xi'an Daxi Information technology OfficeWeb365 v.8.6.1.0 and v7.18.23.0 allows a remote attacker to execute arbitrary code via the pw/savedraw component."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://avd.aliyun.com/detail?id=AVD-2023-1678930",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/32024c5dbb7ff60fa7347cccf6ebb3763a513e7a/docs/wiki/webapp/OfficeWeb365/OfficeWeb365%20SaveDraw%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md?plain=1#L24",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Threekiii/Vulnerability-Wiki/blob/master/docs-base/docs/webapp/OfficeWeb365-SaveDraw-%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/luck-ying/Library-POC/blob/master/2023HW/2023.8.15/OfficeWeb365_SaveDraw%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.py",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/xuetang1125/OfficeWeb365/blob/main/OfficeWeb365%20SaveDraw%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E%20%282%29.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-48939",
|
"id": "CVE-2024-48939",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-11T01:15:04.890",
|
"published": "2024-11-11T01:15:04.890",
|
||||||
"lastModified": "2024-11-13T21:15:29.177",
|
"lastModified": "2024-11-19T20:35:25.830",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "La validaci\u00f3n insuficiente realizada en el archivo de licencia de la API REST en Paxton Net2 antes de la versi\u00f3n 6.07.14023.5015 (SR4) permite el uso de la API REST con un archivo de licencia no v\u00e1lido. Los atacantes podr\u00edan recuperar datos del registro de acceso."
|
"value": "La validaci\u00f3n insuficiente realizada en el archivo de licencia de la API REST en Paxton Net2 antes de la versi\u00f3n 6.07.14023.5015 (SR4) permite el uso de la API REST con un archivo de licencia no v\u00e1lido. Los atacantes podr\u00edan recuperar datos del registro de acceso."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-922"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/gitaware/CVE/blob/main/CVE-2024-48939/20241020_vuln_discl_paxton_API_license.pdf",
|
"url": "https://github.com/gitaware/CVE/blob/main/CVE-2024-48939/20241020_vuln_discl_paxton_API_license.pdf",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-48990",
|
"id": "CVE-2024-48990",
|
||||||
"sourceIdentifier": "security@ubuntu.com",
|
"sourceIdentifier": "security@ubuntu.com",
|
||||||
"published": "2024-11-19T18:15:21.530",
|
"published": "2024-11-19T18:15:21.530",
|
||||||
"lastModified": "2024-11-19T18:15:21.530",
|
"lastModified": "2024-11-19T20:35:26.633",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -35,6 +35,18 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-427"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/liske/needrestart/commit/fcc9a4401392231bef4ef5ed026a0d7a275149ab",
|
"url": "https://github.com/liske/needrestart/commit/fcc9a4401392231bef4ef5ed026a0d7a275149ab",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-48992",
|
"id": "CVE-2024-48992",
|
||||||
"sourceIdentifier": "security@ubuntu.com",
|
"sourceIdentifier": "security@ubuntu.com",
|
||||||
"published": "2024-11-19T18:15:21.897",
|
"published": "2024-11-19T18:15:21.897",
|
||||||
"lastModified": "2024-11-19T18:15:21.897",
|
"lastModified": "2024-11-19T20:35:27.427",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -35,6 +35,18 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-427"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/liske/needrestart/commit/b5f25f6ec6e7dd0c5be249e4e45de4ee9ffe594f",
|
"url": "https://github.com/liske/needrestart/commit/b5f25f6ec6e7dd0c5be249e4e45de4ee9ffe594f",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-48993",
|
"id": "CVE-2024-48993",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2024-11-12T18:15:35.840",
|
"published": "2024-11-12T18:15:35.840",
|
||||||
"lastModified": "2024-11-13T17:01:58.603",
|
"lastModified": "2024-11-19T19:06:50.177",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -41,8 +41,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "secure@microsoft.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -51,10 +61,68 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionStartIncluding": "13.0.6300.2",
|
||||||
|
"versionEndExcluding": "13.0.6455.2",
|
||||||
|
"matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionStartIncluding": "13.0.7000.253",
|
||||||
|
"versionEndExcluding": "13.0.7050.2",
|
||||||
|
"matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionStartIncluding": "14.0.1000.169",
|
||||||
|
"versionEndExcluding": "14.0.2070.1",
|
||||||
|
"matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionStartIncluding": "14.0.3006.16",
|
||||||
|
"versionEndExcluding": "14.0.3485.1",
|
||||||
|
"matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionStartIncluding": "15.0.2000.5",
|
||||||
|
"versionEndExcluding": "15.0.2130.3",
|
||||||
|
"matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
|
||||||
|
"versionStartIncluding": "15.0.4003.23",
|
||||||
|
"versionEndExcluding": "15.0.4410.1",
|
||||||
|
"matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48993",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48993",
|
||||||
"source": "secure@microsoft.com"
|
"source": "secure@microsoft.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
56
CVE-2024/CVE-2024-504xx/CVE-2024-50430.json
Normal file
56
CVE-2024/CVE-2024-504xx/CVE-2024-50430.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-50430",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-11-19T19:15:08.240",
|
||||||
|
"lastModified": "2024-11-19T19:15:08.240",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Beaver Builder Team Beaver Builder allows Stored XSS.This issue affects Beaver Builder: from n/a through 2.8.3.7."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/beaver-builder-lite-version/wordpress-beaver-builder-plugin-2-8-3-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-50636",
|
"id": "CVE-2024-50636",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-11T23:15:05.833",
|
"published": "2024-11-11T23:15:05.833",
|
||||||
"lastModified": "2024-11-12T13:55:21.227",
|
"lastModified": "2024-11-19T19:35:14.833",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "PyMOL 2.5.0 contiene una vulnerabilidad en su funci\u00f3n \"Run Script\", que permite la ejecuci\u00f3n de c\u00f3digo Python arbitrario incrustado en archivos .PYM. Los atacantes pueden manipular un archivo .PYM malicioso que contenga un payload de shell inversa de Python y explotar la funci\u00f3n para lograr la ejecuci\u00f3n remota de comandos (RCE). Esta vulnerabilidad surge porque PyMOL trata los archivos .PYM como scripts de Python sin validar o restringir adecuadamente los comandos dentro del script, lo que permite a los atacantes ejecutar comandos no autorizados en el contexto del usuario que ejecuta la aplicaci\u00f3n."
|
"value": "PyMOL 2.5.0 contiene una vulnerabilidad en su funci\u00f3n \"Run Script\", que permite la ejecuci\u00f3n de c\u00f3digo Python arbitrario incrustado en archivos .PYM. Los atacantes pueden manipular un archivo .PYM malicioso que contenga un payload de shell inversa de Python y explotar la funci\u00f3n para lograr la ejecuci\u00f3n remota de comandos (RCE). Esta vulnerabilidad surge porque PyMOL trata los archivos .PYM como scripts de Python sin validar o restringir adecuadamente los comandos dentro del script, lo que permite a los atacantes ejecutar comandos no autorizados en el contexto del usuario que ejecuta la aplicaci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/schrodinger/pymol-open-source/issues/405",
|
"url": "https://github.com/schrodinger/pymol-open-source/issues/405",
|
||||||
|
60
CVE-2024/CVE-2024-515xx/CVE-2024-51503.json
Normal file
60
CVE-2024/CVE-2024-515xx/CVE-2024-51503.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-51503",
|
||||||
|
"sourceIdentifier": "security@trendmicro.com",
|
||||||
|
"published": "2024-11-19T19:15:08.470",
|
||||||
|
"lastModified": "2024-11-19T19:15:08.470",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A security agent manual scan command injection vulnerability in the Trend Micro Deep Security 20 Agent could allow an attacker to escalate privileges and execute arbitrary code on an affected machine. In certain circumstances, attackers that have legitimate access to the domain may be able to remotely inject commands to other machines in the same domain.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability locally and must have domain user privileges to affect other machines."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@trendmicro.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.0,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.3,
|
||||||
|
"impactScore": 6.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@trendmicro.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://success.trendmicro.com/en-US/solution/KA-0018154",
|
||||||
|
"source": "security@trendmicro.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1516/",
|
||||||
|
"source": "security@trendmicro.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-51679",
|
"id": "CVE-2024-51679",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-11-14T22:15:20.610",
|
"published": "2024-11-14T22:15:20.610",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T20:07:35.257",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:appointmind:appointmind:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "4.1.0",
|
||||||
|
"matchCriteriaId": "E43A4EE1-FB20-42AE-A9AB-EE9D60933ABD"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/appointmind/wordpress-appointmind-plugin-4-0-0-csrf-to-stored-xss-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/vulnerability/appointmind/wordpress-appointmind-plugin-4-0-0-csrf-to-stored-xss-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
56
CVE-2024/CVE-2024-523xx/CVE-2024-52359.json
Normal file
56
CVE-2024/CVE-2024-523xx/CVE-2024-52359.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-52359",
|
||||||
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
|
"published": "2024-11-19T20:15:31.840",
|
||||||
|
"lastModified": "2024-11-19T20:15:31.840",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "IBM Concert Software 1.0.0, 1.0.1, 1.0.2, and 1.0.2.1 could allow an authenticated user to perform unauthorized actions that should be reserved to administrator used due to improper access controls."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-286"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.ibm.com/support/pages/node/7176346",
|
||||||
|
"source": "psirt@us.ibm.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2024/CVE-2024-523xx/CVE-2024-52360.json
Normal file
56
CVE-2024/CVE-2024-523xx/CVE-2024-52360.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-52360",
|
||||||
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
|
"published": "2024-11-19T20:15:32.147",
|
||||||
|
"lastModified": "2024-11-19T20:15:32.147",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "IBM Concert Software 1.0.0, 1.0.1, 1.0.2, and 1.0.2.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.6,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 4.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.ibm.com/support/pages/node/7176346",
|
||||||
|
"source": "psirt@us.ibm.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-52613",
|
"id": "CVE-2024-52613",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-14T23:15:05.967",
|
"published": "2024-11-14T23:15:05.967",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T20:39:42.197",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,11 +15,67 @@
|
|||||||
"value": "Un b\u00fafer basado en mont\u00f3n suble\u00eddo en tsMuxer versi\u00f3n nightly-2024-05-12-02-01-18 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo de video MOV manipulado espec\u00edficamente."
|
"value": "Un b\u00fafer basado en mont\u00f3n suble\u00eddo en tsMuxer versi\u00f3n nightly-2024-05-12-02-01-18 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo de video MOV manipulado espec\u00edficamente."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-125"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:justdan96:tsmuxer:nightly-2024-05-12-02-01-18:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "518BE04B-2D5E-4617-95D9-AF476CEAB9B3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/justdan96/tsMuxer/issues/881",
|
"url": "https://github.com/justdan96/tsMuxer/issues/881",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
25
CVE-2024/CVE-2024-527xx/CVE-2024-52714.json
Normal file
25
CVE-2024/CVE-2024-527xx/CVE-2024-52714.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-52714",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-11-19T19:15:08.680",
|
||||||
|
"lastModified": "2024-11-19T19:15:08.680",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Tenda AC6 v2.0 v15.03.06.50 was discovered to contain a buffer overflow in the function 'fromSetSysTime."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "http://tenda.com",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/CLan-nad/CVE/blob/main/tenda/fromSetSysTime/1.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-527xx/CVE-2024-52759.json
Normal file
25
CVE-2024/CVE-2024-527xx/CVE-2024-52759.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-52759",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-11-19T19:15:08.767",
|
||||||
|
"lastModified": "2024-11-19T19:15:08.767",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "D-LINK DI-8003 v16.07.26A1 was discovered to contain a buffer overflow via the ip parameter in the ip_position_asp function."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/DI_8003_ip_position_asp_stackoverflow/detail.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
110
README.md
110
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-11-19T19:00:26.573949+00:00
|
2024-11-19T21:00:21.679786+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-11-19T18:42:44.733000+00:00
|
2024-11-19T20:57:21.473000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
270591
|
270621
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `269`
|
Recently added CVEs: `30`
|
||||||
|
|
||||||
- [CVE-2024-53064](CVE-2024/CVE-2024-530xx/CVE-2024-53064.json) (`2024-11-19T18:15:26.260`)
|
- [CVE-2018-9346](CVE-2018/CVE-2018-93xx/CVE-2018-9346.json) (`2024-11-19T19:15:06.000`)
|
||||||
- [CVE-2024-53065](CVE-2024/CVE-2024-530xx/CVE-2024-53065.json) (`2024-11-19T18:15:26.333`)
|
- [CVE-2018-9348](CVE-2018/CVE-2018-93xx/CVE-2018-9348.json) (`2024-11-19T20:15:27.427`)
|
||||||
- [CVE-2024-53066](CVE-2024/CVE-2024-530xx/CVE-2024-53066.json) (`2024-11-19T18:15:26.413`)
|
- [CVE-2018-9364](CVE-2018/CVE-2018-93xx/CVE-2018-9364.json) (`2024-11-19T20:15:27.493`)
|
||||||
- [CVE-2024-53067](CVE-2024/CVE-2024-530xx/CVE-2024-53067.json) (`2024-11-19T18:15:26.490`)
|
- [CVE-2018-9366](CVE-2018/CVE-2018-93xx/CVE-2018-9366.json) (`2024-11-19T20:15:27.550`)
|
||||||
- [CVE-2024-53068](CVE-2024/CVE-2024-530xx/CVE-2024-53068.json) (`2024-11-19T18:15:26.557`)
|
- [CVE-2018-9367](CVE-2018/CVE-2018-93xx/CVE-2018-9367.json) (`2024-11-19T20:15:27.607`)
|
||||||
- [CVE-2024-53069](CVE-2024/CVE-2024-530xx/CVE-2024-53069.json) (`2024-11-19T18:15:26.630`)
|
- [CVE-2018-9368](CVE-2018/CVE-2018-93xx/CVE-2018-9368.json) (`2024-11-19T20:15:27.667`)
|
||||||
- [CVE-2024-53070](CVE-2024/CVE-2024-530xx/CVE-2024-53070.json) (`2024-11-19T18:15:26.700`)
|
- [CVE-2018-9369](CVE-2018/CVE-2018-93xx/CVE-2018-9369.json) (`2024-11-19T20:15:27.723`)
|
||||||
- [CVE-2024-53071](CVE-2024/CVE-2024-530xx/CVE-2024-53071.json) (`2024-11-19T18:15:26.793`)
|
- [CVE-2018-9370](CVE-2018/CVE-2018-93xx/CVE-2018-9370.json) (`2024-11-19T20:15:27.787`)
|
||||||
- [CVE-2024-53072](CVE-2024/CVE-2024-530xx/CVE-2024-53072.json) (`2024-11-19T18:15:26.877`)
|
- [CVE-2018-9371](CVE-2018/CVE-2018-93xx/CVE-2018-9371.json) (`2024-11-19T20:15:27.843`)
|
||||||
- [CVE-2024-53073](CVE-2024/CVE-2024-530xx/CVE-2024-53073.json) (`2024-11-19T18:15:26.950`)
|
- [CVE-2018-9372](CVE-2018/CVE-2018-93xx/CVE-2018-9372.json) (`2024-11-19T20:15:27.917`)
|
||||||
- [CVE-2024-53074](CVE-2024/CVE-2024-530xx/CVE-2024-53074.json) (`2024-11-19T18:15:27.013`)
|
- [CVE-2018-9409](CVE-2018/CVE-2018-94xx/CVE-2018-9409.json) (`2024-11-19T20:15:27.970`)
|
||||||
- [CVE-2024-53075](CVE-2024/CVE-2024-530xx/CVE-2024-53075.json) (`2024-11-19T18:15:27.077`)
|
- [CVE-2024-11395](CVE-2024/CVE-2024-113xx/CVE-2024-11395.json) (`2024-11-19T20:15:29.917`)
|
||||||
- [CVE-2024-53076](CVE-2024/CVE-2024-530xx/CVE-2024-53076.json) (`2024-11-19T18:15:27.147`)
|
- [CVE-2024-1271](CVE-2024/CVE-2024-12xx/CVE-2024-1271.json) (`2024-11-19T20:15:30.007`)
|
||||||
- [CVE-2024-53077](CVE-2024/CVE-2024-530xx/CVE-2024-53077.json) (`2024-11-19T18:15:27.213`)
|
- [CVE-2024-21697](CVE-2024/CVE-2024-216xx/CVE-2024-21697.json) (`2024-11-19T19:15:07.937`)
|
||||||
- [CVE-2024-53078](CVE-2024/CVE-2024-530xx/CVE-2024-53078.json) (`2024-11-19T18:15:27.280`)
|
- [CVE-2024-37070](CVE-2024/CVE-2024-370xx/CVE-2024-37070.json) (`2024-11-19T20:15:30.693`)
|
||||||
- [CVE-2024-53079](CVE-2024/CVE-2024-530xx/CVE-2024-53079.json) (`2024-11-19T18:15:27.340`)
|
- [CVE-2024-45419](CVE-2024/CVE-2024-454xx/CVE-2024-45419.json) (`2024-11-19T20:15:30.973`)
|
||||||
- [CVE-2024-53080](CVE-2024/CVE-2024-530xx/CVE-2024-53080.json) (`2024-11-19T18:15:27.413`)
|
- [CVE-2024-45420](CVE-2024/CVE-2024-454xx/CVE-2024-45420.json) (`2024-11-19T20:15:31.200`)
|
||||||
- [CVE-2024-53081](CVE-2024/CVE-2024-530xx/CVE-2024-53081.json) (`2024-11-19T18:15:27.480`)
|
- [CVE-2024-45422](CVE-2024/CVE-2024-454xx/CVE-2024-45422.json) (`2024-11-19T20:15:31.430`)
|
||||||
- [CVE-2024-53082](CVE-2024/CVE-2024-530xx/CVE-2024-53082.json) (`2024-11-19T18:15:27.540`)
|
- [CVE-2024-48694](CVE-2024/CVE-2024-486xx/CVE-2024-48694.json) (`2024-11-19T19:15:08.140`)
|
||||||
- [CVE-2024-53083](CVE-2024/CVE-2024-530xx/CVE-2024-53083.json) (`2024-11-19T18:15:27.620`)
|
- [CVE-2024-50430](CVE-2024/CVE-2024-504xx/CVE-2024-50430.json) (`2024-11-19T19:15:08.240`)
|
||||||
- [CVE-2024-53084](CVE-2024/CVE-2024-530xx/CVE-2024-53084.json) (`2024-11-19T18:15:27.680`)
|
- [CVE-2024-51503](CVE-2024/CVE-2024-515xx/CVE-2024-51503.json) (`2024-11-19T19:15:08.470`)
|
||||||
- [CVE-2024-53085](CVE-2024/CVE-2024-530xx/CVE-2024-53085.json) (`2024-11-19T18:15:27.757`)
|
- [CVE-2024-52359](CVE-2024/CVE-2024-523xx/CVE-2024-52359.json) (`2024-11-19T20:15:31.840`)
|
||||||
- [CVE-2024-53086](CVE-2024/CVE-2024-530xx/CVE-2024-53086.json) (`2024-11-19T18:15:27.823`)
|
- [CVE-2024-52360](CVE-2024/CVE-2024-523xx/CVE-2024-52360.json) (`2024-11-19T20:15:32.147`)
|
||||||
- [CVE-2024-53087](CVE-2024/CVE-2024-530xx/CVE-2024-53087.json) (`2024-11-19T18:15:27.883`)
|
- [CVE-2024-52714](CVE-2024/CVE-2024-527xx/CVE-2024-52714.json) (`2024-11-19T19:15:08.680`)
|
||||||
- [CVE-2024-53088](CVE-2024/CVE-2024-530xx/CVE-2024-53088.json) (`2024-11-19T18:15:27.950`)
|
- [CVE-2024-52759](CVE-2024/CVE-2024-527xx/CVE-2024-52759.json) (`2024-11-19T19:15:08.767`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `54`
|
Recently modified CVEs: `56`
|
||||||
|
|
||||||
- [CVE-2024-42383](CVE-2024/CVE-2024-423xx/CVE-2024-42383.json) (`2024-11-19T17:55:22.020`)
|
- [CVE-2024-28745](CVE-2024/CVE-2024-287xx/CVE-2024-28745.json) (`2024-11-19T20:35:20.717`)
|
||||||
- [CVE-2024-42384](CVE-2024/CVE-2024-423xx/CVE-2024-42384.json) (`2024-11-19T17:54:50.167`)
|
- [CVE-2024-31617](CVE-2024/CVE-2024-316xx/CVE-2024-31617.json) (`2024-11-19T20:35:21.597`)
|
||||||
- [CVE-2024-42385](CVE-2024/CVE-2024-423xx/CVE-2024-42385.json) (`2024-11-19T17:54:31.197`)
|
- [CVE-2024-31813](CVE-2024/CVE-2024-318xx/CVE-2024-31813.json) (`2024-11-19T20:35:22.397`)
|
||||||
- [CVE-2024-42386](CVE-2024/CVE-2024-423xx/CVE-2024-42386.json) (`2024-11-19T17:52:44.657`)
|
- [CVE-2024-36905](CVE-2024/CVE-2024-369xx/CVE-2024-36905.json) (`2024-11-19T20:15:30.583`)
|
||||||
- [CVE-2024-42387](CVE-2024/CVE-2024-423xx/CVE-2024-42387.json) (`2024-11-19T17:51:41.980`)
|
- [CVE-2024-38264](CVE-2024/CVE-2024-382xx/CVE-2024-38264.json) (`2024-11-19T20:52:32.727`)
|
||||||
- [CVE-2024-42388](CVE-2024/CVE-2024-423xx/CVE-2024-42388.json) (`2024-11-19T17:51:24.567`)
|
- [CVE-2024-39609](CVE-2024/CVE-2024-396xx/CVE-2024-39609.json) (`2024-11-19T19:58:29.653`)
|
||||||
- [CVE-2024-42389](CVE-2024/CVE-2024-423xx/CVE-2024-42389.json) (`2024-11-19T17:51:10.533`)
|
- [CVE-2024-41167](CVE-2024/CVE-2024-411xx/CVE-2024-41167.json) (`2024-11-19T19:45:02.660`)
|
||||||
- [CVE-2024-42390](CVE-2024/CVE-2024-423xx/CVE-2024-42390.json) (`2024-11-19T17:50:51.907`)
|
- [CVE-2024-42450](CVE-2024/CVE-2024-424xx/CVE-2024-42450.json) (`2024-11-19T20:35:23.447`)
|
||||||
- [CVE-2024-42391](CVE-2024/CVE-2024-423xx/CVE-2024-42391.json) (`2024-11-19T17:50:36.100`)
|
- [CVE-2024-43447](CVE-2024/CVE-2024-434xx/CVE-2024-43447.json) (`2024-11-19T20:52:55.763`)
|
||||||
- [CVE-2024-42392](CVE-2024/CVE-2024-423xx/CVE-2024-42392.json) (`2024-11-19T17:55:51.430`)
|
- [CVE-2024-43449](CVE-2024/CVE-2024-434xx/CVE-2024-43449.json) (`2024-11-19T20:49:54.423`)
|
||||||
- [CVE-2024-43211](CVE-2024/CVE-2024-432xx/CVE-2024-43211.json) (`2024-11-19T18:15:20.787`)
|
- [CVE-2024-43450](CVE-2024/CVE-2024-434xx/CVE-2024-43450.json) (`2024-11-19T20:49:26.017`)
|
||||||
- [CVE-2024-43323](CVE-2024/CVE-2024-433xx/CVE-2024-43323.json) (`2024-11-19T18:15:20.917`)
|
- [CVE-2024-43452](CVE-2024/CVE-2024-434xx/CVE-2024-43452.json) (`2024-11-19T20:48:28.447`)
|
||||||
- [CVE-2024-49256](CVE-2024/CVE-2024-492xx/CVE-2024-49256.json) (`2024-11-19T18:15:22.090`)
|
- [CVE-2024-43459](CVE-2024/CVE-2024-434xx/CVE-2024-43459.json) (`2024-11-19T20:43:02.103`)
|
||||||
- [CVE-2024-51094](CVE-2024/CVE-2024-510xx/CVE-2024-51094.json) (`2024-11-19T17:35:14.493`)
|
- [CVE-2024-43462](CVE-2024/CVE-2024-434xx/CVE-2024-43462.json) (`2024-11-19T20:18:42.467`)
|
||||||
- [CVE-2024-51764](CVE-2024/CVE-2024-517xx/CVE-2024-51764.json) (`2024-11-19T17:35:15.297`)
|
- [CVE-2024-43498](CVE-2024/CVE-2024-434xx/CVE-2024-43498.json) (`2024-11-19T20:01:04.877`)
|
||||||
- [CVE-2024-51765](CVE-2024/CVE-2024-517xx/CVE-2024-51765.json) (`2024-11-19T17:35:16.103`)
|
- [CVE-2024-43499](CVE-2024/CVE-2024-434xx/CVE-2024-43499.json) (`2024-11-19T19:59:24.387`)
|
||||||
- [CVE-2024-52291](CVE-2024/CVE-2024-522xx/CVE-2024-52291.json) (`2024-11-19T18:06:42.973`)
|
- [CVE-2024-44546](CVE-2024/CVE-2024-445xx/CVE-2024-44546.json) (`2024-11-19T20:35:24.240`)
|
||||||
- [CVE-2024-52292](CVE-2024/CVE-2024-522xx/CVE-2024-52292.json) (`2024-11-19T18:27:21.567`)
|
- [CVE-2024-45611](CVE-2024/CVE-2024-456xx/CVE-2024-45611.json) (`2024-11-19T20:57:21.473`)
|
||||||
- [CVE-2024-52293](CVE-2024/CVE-2024-522xx/CVE-2024-52293.json) (`2024-11-19T17:51:39.460`)
|
- [CVE-2024-48939](CVE-2024/CVE-2024-489xx/CVE-2024-48939.json) (`2024-11-19T20:35:25.830`)
|
||||||
- [CVE-2024-52305](CVE-2024/CVE-2024-523xx/CVE-2024-52305.json) (`2024-11-19T18:04:12.680`)
|
- [CVE-2024-48990](CVE-2024/CVE-2024-489xx/CVE-2024-48990.json) (`2024-11-19T20:35:26.633`)
|
||||||
- [CVE-2024-8961](CVE-2024/CVE-2024-89xx/CVE-2024-8961.json) (`2024-11-19T17:01:15.787`)
|
- [CVE-2024-48992](CVE-2024/CVE-2024-489xx/CVE-2024-48992.json) (`2024-11-19T20:35:27.427`)
|
||||||
- [CVE-2024-8978](CVE-2024/CVE-2024-89xx/CVE-2024-8978.json) (`2024-11-19T17:04:38.903`)
|
- [CVE-2024-48993](CVE-2024/CVE-2024-489xx/CVE-2024-48993.json) (`2024-11-19T19:06:50.177`)
|
||||||
- [CVE-2024-8979](CVE-2024/CVE-2024-89xx/CVE-2024-8979.json) (`2024-11-19T17:05:08.270`)
|
- [CVE-2024-50636](CVE-2024/CVE-2024-506xx/CVE-2024-50636.json) (`2024-11-19T19:35:14.833`)
|
||||||
- [CVE-2024-9474](CVE-2024/CVE-2024-94xx/CVE-2024-9474.json) (`2024-11-19T17:16:40.513`)
|
- [CVE-2024-51679](CVE-2024/CVE-2024-516xx/CVE-2024-51679.json) (`2024-11-19T20:07:35.257`)
|
||||||
- [CVE-2024-9680](CVE-2024/CVE-2024-96xx/CVE-2024-9680.json) (`2024-11-19T17:29:12.207`)
|
- [CVE-2024-52613](CVE-2024/CVE-2024-526xx/CVE-2024-52613.json) (`2024-11-19T20:39:42.197`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
776
_state.csv
776
_state.csv
File diff suppressed because it is too large
Load Diff
Loading…
x
Reference in New Issue
Block a user