Auto-Update: 2024-11-19T21:00:21.679786+00:00

This commit is contained in:
cad-safe-bot 2024-11-19 21:03:24 +00:00
parent dde6abae4c
commit 6bd513ee61
88 changed files with 4236 additions and 785 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-1999-0965", "id": "CVE-1999-0965",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "1997-09-19T04:00:00.000", "published": "1997-09-19T04:00:00.000",
"lastModified": "2022-08-17T10:15:16.023", "lastModified": "2024-11-19T20:37:51.537",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -59,8 +59,139 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:x.org:xterm:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:x.org:x11:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6316FBBE-64CA-44AA-B47C-0F36A96806B1" "versionEndExcluding": "5.0",
"matchCriteriaId": "521AF03D-6C7D-4BF0-8C28-A887F3054E56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:-:*:*:*:*:*:*",
"matchCriteriaId": "12EC442A-3481-481A-8927-86771F01A58C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-01:*:*:*:*:*:*",
"matchCriteriaId": "13B209F8-CB94-4224-A7FD-118915BA8136"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-02:*:*:*:*:*:*",
"matchCriteriaId": "CC6E576D-C6FC-409C-BD48-5FC721FE3C39"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-03:*:*:*:*:*:*",
"matchCriteriaId": "E318087C-875A-49FC-9198-B98E0622F756"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-04:*:*:*:*:*:*",
"matchCriteriaId": "C0747942-FA57-4FAB-91B6-BA59612C5C38"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-05:*:*:*:*:*:*",
"matchCriteriaId": "D18A3EDB-8AF8-4AFC-BCDF-983199B16F5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-06:*:*:*:*:*:*",
"matchCriteriaId": "1A41167C-4BD6-41D8-B1A4-28F6A1664196"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-07:*:*:*:*:*:*",
"matchCriteriaId": "E99C601A-2B21-4284-8FE9-AF5BE6AF2786"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-08:*:*:*:*:*:*",
"matchCriteriaId": "673743D8-31CD-459F-A9DA-0D3188FBCEB3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-09:*:*:*:*:*:*",
"matchCriteriaId": "3BCE835E-101C-4929-82D4-EA0D66B03607"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-10:*:*:*:*:*:*",
"matchCriteriaId": "D46F4C68-4462-41F4-B839-336A9AEAFB76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-11:*:*:*:*:*:*",
"matchCriteriaId": "041E5856-C20F-4B9A-848C-AF64462385F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-12:*:*:*:*:*:*",
"matchCriteriaId": "13147C3B-1954-4703-A5FA-32487ED63DBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-13:*:*:*:*:*:*",
"matchCriteriaId": "35CFF2E5-7F6C-4CFD-85A9-216063878251"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-14:*:*:*:*:*:*",
"matchCriteriaId": "CD25DE0F-A81C-4797-B66D-0645EC3486F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-15:*:*:*:*:*:*",
"matchCriteriaId": "754B62CF-5B7D-4E24-A471-ADBFCF096540"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-16:*:*:*:*:*:*",
"matchCriteriaId": "33571663-B72B-4E53-A715-12409D67D015"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-17:*:*:*:*:*:*",
"matchCriteriaId": "DD503B54-9000-4BF7-B0AE-7CE9A58D1AA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-18:*:*:*:*:*:*",
"matchCriteriaId": "801B1D9F-9890-446F-940F-F02A910DF4AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-19:*:*:*:*:*:*",
"matchCriteriaId": "5587CAA0-BE8A-4F5B-94B1-02097090D8E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-20:*:*:*:*:*:*",
"matchCriteriaId": "8DEA7068-88C1-4A3B-9A35-2E3DA940C2AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-21:*:*:*:*:*:*",
"matchCriteriaId": "B81E853E-2F4E-4B07-A191-9A636B868315"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-22:*:*:*:*:*:*",
"matchCriteriaId": "8552A4FD-5A27-41DD-9C71-6F77E2FAFDEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-23:*:*:*:*:*:*",
"matchCriteriaId": "BBBDFAC9-FF27-43C1-9295-62ED2AAB3776"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-24:*:*:*:*:*:*",
"matchCriteriaId": "95F63320-E86F-4DDA-82B5-6958F2E5E85D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:x11:5.0:fix-25:*:*:*:*:*:*",
"matchCriteriaId": "8C01027A-7DBE-4E9D-A13E-59687BE919E0"
} }
] ]
} }
@ -70,7 +201,10 @@
"references": [ "references": [
{ {
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0965", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0965",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"VDB Entry"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-3533", "id": "CVE-2008-3533",
"sourceIdentifier": "security@ubuntu.com", "sourceIdentifier": "security@ubuntu.com",
"published": "2008-08-18T17:41:00.000", "published": "2008-08-18T17:41:00.000",
"lastModified": "2017-08-08T01:31:57.607", "lastModified": "2024-11-19T20:25:06.450",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -71,7 +71,8 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:gnome:yelp:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:gnome:yelp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0711AF7-6FCD-4311-8D62-E02900BED8B5" "versionEndExcluding": "2.24",
"matchCriteriaId": "7BB1D4D2-4900-45B5-BAB7-84A6EBFC0C49"
} }
] ]
} }
@ -103,7 +104,8 @@
"url": "http://bugzilla.gnome.org/attachment.cgi?id=115890", "url": "http://bugzilla.gnome.org/attachment.cgi?id=115890",
"source": "security@ubuntu.com", "source": "security@ubuntu.com",
"tags": [ "tags": [
"Exploit" "Exploit",
"Issue Tracking"
] ]
}, },
{ {
@ -111,12 +113,17 @@
"source": "security@ubuntu.com", "source": "security@ubuntu.com",
"tags": [ "tags": [
"Exploit", "Exploit",
"Issue Tracking",
"Patch" "Patch"
] ]
}, },
{ {
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html",
"source": "security@ubuntu.com" "source": "security@ubuntu.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "http://secunia.com/advisories/31465", "url": "http://secunia.com/advisories/31465",
@ -127,31 +134,53 @@
}, },
{ {
"url": "http://secunia.com/advisories/31620", "url": "http://secunia.com/advisories/31620",
"source": "security@ubuntu.com" "source": "security@ubuntu.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "http://secunia.com/advisories/31834", "url": "http://secunia.com/advisories/31834",
"source": "security@ubuntu.com" "source": "security@ubuntu.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "http://secunia.com/advisories/32629", "url": "http://secunia.com/advisories/32629",
"source": "security@ubuntu.com" "source": "security@ubuntu.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:175", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:175",
"source": "security@ubuntu.com" "source": "security@ubuntu.com",
"tags": [
"Product"
]
}, },
{ {
"url": "http://www.securityfocus.com/bid/30690", "url": "http://www.securityfocus.com/bid/30690",
"source": "security@ubuntu.com" "source": "security@ubuntu.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "http://www.ubuntu.com/usn/usn-638-1", "url": "http://www.ubuntu.com/usn/usn-638-1",
"source": "security@ubuntu.com" "source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "http://www.vupen.com/english/advisories/2008/2393", "url": "http://www.vupen.com/english/advisories/2008/2393",
"source": "security@ubuntu.com" "source": "security@ubuntu.com",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860", "url": "https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860",
@ -163,11 +192,18 @@
}, },
{ {
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44449", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44449",
"source": "security@ubuntu.com" "source": "security@ubuntu.com",
"tags": [
"VDB Entry"
]
}, },
{ {
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00222.html", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00222.html",
"source": "security@ubuntu.com" "source": "security@ubuntu.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2009-0581", "id": "CVE-2009-0581",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2009-03-23T14:19:12.467", "published": "2009-03-23T14:19:12.467",
"lastModified": "2023-02-13T02:19:39.807", "lastModified": "2024-11-19T20:19:32.403",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,7 +80,8 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B2BA7E7-1D51-4163-8F60-80B0E473F75F" "versionEndExcluding": "2.9.2",
"matchCriteriaId": "28CB30F0-E3AF-490A-B05B-0947A2BF717B"
}, },
{ {
"vulnerable": true, "vulnerable": true,

View File

@ -2,8 +2,8 @@
"id": "CVE-2009-0723", "id": "CVE-2009-0723",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2009-03-23T14:19:12.500", "published": "2009-03-23T14:19:12.500",
"lastModified": "2022-02-07T18:18:53.310", "lastModified": "2024-11-19T20:24:56.033",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -64,7 +64,8 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B2BA7E7-1D51-4163-8F60-80B0E473F75F" "versionEndExcluding": "2.9.2",
"matchCriteriaId": "28CB30F0-E3AF-490A-B05B-0947A2BF717B"
}, },
{ {
"vulnerable": true, "vulnerable": true,

View File

@ -2,8 +2,8 @@
"id": "CVE-2009-0733", "id": "CVE-2009-0733",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2009-03-23T14:19:12.517", "published": "2009-03-23T14:19:12.517",
"lastModified": "2022-02-07T18:28:27.487", "lastModified": "2024-11-19T20:25:01.847",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -64,7 +64,8 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B2BA7E7-1D51-4163-8F60-80B0E473F75F" "versionEndExcluding": "2.9.2",
"matchCriteriaId": "28CB30F0-E3AF-490A-B05B-0947A2BF717B"
}, },
{ {
"vulnerable": true, "vulnerable": true,

View File

@ -2,8 +2,8 @@
"id": "CVE-2016-5118", "id": "CVE-2016-5118",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2016-06-10T15:59:06.737", "published": "2016-06-10T15:59:06.737",
"lastModified": "2023-08-01T18:21:22.910", "lastModified": "2024-11-19T20:24:12.647",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -281,8 +281,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" "versionEndExcluding": "7.0.1-7",
"matchCriteriaId": "3AA78B99-EFCC-47A8-B4F7-4AF1BD01390E"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2016-7531", "id": "CVE-2016-7531",
"sourceIdentifier": "security@debian.org", "sourceIdentifier": "security@debian.org",
"published": "2017-04-19T14:59:00.473", "published": "2017-04-19T14:59:00.473",
"lastModified": "2017-05-09T12:39:15.447", "lastModified": "2024-11-19T20:23:57.503",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -16,13 +16,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" "versionEndExcluding": "7.0.1-0",
"matchCriteriaId": "3CF7D553-5B42-467A-A21D-B3AE0E97DDE8"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-13227", "id": "CVE-2017-13227",
"sourceIdentifier": "security@android.com", "sourceIdentifier": "security@android.com",
"published": "2024-11-14T23:15:05.013", "published": "2024-11-14T23:15:05.013",
"lastModified": "2024-11-15T13:58:08.913", "lastModified": "2024-11-19T20:25:24.913",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,11 +15,72 @@
"value": "En el servicio de autocompletar, el nombre del paquete que proporciona el proceso de la aplicaci\u00f3n se considera de confianza de forma inapropiada. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." "value": "En el servicio de autocompletar, el nombre del paquete que proporciona el proceso de la aplicaci\u00f3n se considera de confianza de forma inapropiada. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B578E383-0D77-4AC7-9C81-3F0B8C18E033"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://source.android.com/security/bulletin/2018-06-01", "url": "https://source.android.com/security/bulletin/2018-06-01",
"source": "security@android.com" "source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9339",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T19:15:05.677",
"lastModified": "2024-11-19T19:15:05.677",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In writeTypedArrayList and readTypedArrayList of Parcel.java, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9340",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T19:15:05.743",
"lastModified": "2024-11-19T19:15:05.743",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In ResStringPool::setTo of ResourceTypes.cpp, it's possible for an attacker to control the value of mStringPoolSize to be out of bounds, causing information disclosure."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9341",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T19:15:05.817",
"lastModified": "2024-11-19T19:15:05.817",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In impeg2d_mc_fullx_fully of impeg2d_mc.c there is a possible out of bound write due to missing bounds check. This could lead to remote arbitrary code execution with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9344",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T19:15:05.877",
"lastModified": "2024-11-19T19:15:05.877",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In several functions of DescramblerImpl.cpp, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9345",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T19:15:05.937",
"lastModified": "2024-11-19T19:15:05.937",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In BnAudioPolicyService::onTransact of AudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9346",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T19:15:06.000",
"lastModified": "2024-11-19T19:15:06.000",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In BnAudioPolicyService::onTransact of AudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9348",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T20:15:27.427",
"lastModified": "2024-11-19T20:15:27.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In SMF_ParseMetaEvent of eas_smf.c, there is a possible integer overflow. This could lead to remote denial of service due to resource exhaustion with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9364",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T20:15:27.493",
"lastModified": "2024-11-19T20:15:27.493",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the LG LAF component, there is a special command that allowed modification of certain partitions. This could lead to bypass of secure boot. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9366",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T20:15:27.550",
"lastModified": "2024-11-19T20:15:27.550",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In IMSA_Recv_Thread and VT_IMCB_Thread of ImsaClient.cpp and VideoTelephony.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9367",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T20:15:27.607",
"lastModified": "2024-11-19T20:15:27.607",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In FT_ACDK_CCT_V2_OP_ISP_SET_TUNING_PARAS of Meta_CCAP_Para.cpp, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9368",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T20:15:27.667",
"lastModified": "2024-11-19T20:15:27.667",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In mtkscoaudio debugfs there is a possible arbitrary kernel memory write due to missing bounds check and weakened SELinux policies. This could lead to local escalation of privilege with system \u00a0execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9369",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T20:15:27.723",
"lastModified": "2024-11-19T20:15:27.723",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In bootloader there is fastboot command allowing user specified kernel command line arguments. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9370",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T20:15:27.787",
"lastModified": "2024-11-19T20:15:27.787",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In download.c there is a special mode allowing user to download data into memory and causing possible memory corruptions due to missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9371",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T20:15:27.843",
"lastModified": "2024-11-19T20:15:27.843",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Mediatek Preloader, there are out of bounds reads and writes due to an exposed interface that allows arbitrary peripheral memory mapping with insufficient blacklisting/whitelisting. This could lead to local elevation of privilege, given physical access to the device with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9372",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T20:15:27.917",
"lastModified": "2024-11-19T20:15:27.917",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In cmd_flash_mmc_sparse_img of dl_commands.c, there is a possible out of bounds write due to a missing bounds check. This could lead to a local escalation of privilege in the bootloader with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9409",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T20:15:27.970",
"lastModified": "2024-11-19T20:15:27.970",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In HWCSession::SetColorModeById of hwc_session.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-3821", "id": "CVE-2019-3821",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2019-03-27T13:29:01.507", "published": "2019-03-27T13:29:01.507",
"lastModified": "2020-11-13T16:15:17.057", "lastModified": "2024-11-19T20:23:50.390",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -117,8 +117,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:ceph:civetweb:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:ceph:civetweb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "684224FC-980E-41B1-9B67-4D3E91D9C20D" "versionEndExcluding": "1.11",
"matchCriteriaId": "2809AE11-B574-4EC0-BBB4-E619D73E892C"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-35473", "id": "CVE-2021-35473",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-11-10T23:15:04.383", "published": "2024-11-10T23:15:04.383",
"lastModified": "2024-11-12T13:55:21.227", "lastModified": "2024-11-19T20:35:13.347",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en LemonLDAP::NG antes de la versi\u00f3n 2.0.12. Falta una comprobaci\u00f3n de caducidad en el controlador OAuth2.0, es decir, no verifica la validez del token de acceso. Un atacante puede usar un token de acceso caducado de un cliente OIDC para acceder al controlador OAuth2. La primera versi\u00f3n afectada es la 2.0.4." "value": "Se descubri\u00f3 un problema en LemonLDAP::NG antes de la versi\u00f3n 2.0.12. Falta una comprobaci\u00f3n de caducidad en el controlador OAuth2.0, es decir, no verifica la validez del token de acceso. Un atacante puede usar un token de acceso caducado de un cliente OIDC para acceder al controlador OAuth2. La primera versi\u00f3n afectada es la 2.0.4."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2549", "url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2549",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-41737", "id": "CVE-2021-41737",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-11-10T23:15:04.450", "published": "2024-11-10T23:15:04.450",
"lastModified": "2024-11-12T13:55:21.227", "lastModified": "2024-11-19T20:35:14.257",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "En Faust 2.23.1, un archivo de entrada con las l\u00edneas \"// r visualisation tCst\" y \"//process = +: L: abM-^Q;\" y \"process = route(3333333333333333333,2,1,2,3,1) : *;\" conduce al consumo de la pila." "value": "En Faust 2.23.1, un archivo de entrada con las l\u00edneas \"// r visualisation tCst\" y \"//process = +: L: abM-^Q;\" y \"process = route(3333333333333333333,2,1,2,3,1) : *;\" conduce al consumo de la pila."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-674"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/grame-cncm/faust/issues/653", "url": "https://github.com/grame-cncm/faust/issues/653",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4900", "id": "CVE-2022-4900",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2023-11-02T16:15:08.700", "published": "2023-11-02T16:15:08.700",
"lastModified": "2023-11-30T22:15:07.600", "lastModified": "2024-11-19T20:27:36.463",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -83,7 +83,6 @@
], ],
"configurations": [ "configurations": [
{ {
"operator": "AND",
"nodes": [ "nodes": [
{ {
"operator": "OR", "operator": "OR",
@ -91,181 +90,44 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:php:php:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"matchCriteriaId": "029B5A37-BA8D-4FEC-BE90-856BB9D0D0E1" "versionEndExcluding": "8.0.22",
"matchCriteriaId": "D7897613-672B-40B3-8703-855F44666019"
} }
] ]
}, }
]
},
{
"nodes": [
{ {
"operator": "OR", "operator": "OR",
"negate": false, "negate": false,
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": false, "vulnerable": true,
"criteria": "cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749804DA-4B27-492A-9ABA-6BB562A6B3AC" "matchCriteriaId": "749804DA-4B27-492A-9ABA-6BB562A6B3AC"
} },
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:php:php:8.1.0:-:*:*:*:*:*:*", "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "58C21C07-1325-481A-A042-9806E0309013" "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC"
} },
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E66F7BF0-EF7C-4695-9D67-7C1A01C6F9B9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:php:php:8.0.0:-:*:*:*:*:*:*", "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6CC80B03-CD93-4B0F-91DC-21BCF9BA42C5" "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
} },
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "038FEDE7-986F-4CA5-9003-BA68352B87D4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:php:php:7.4.0:-:*:*:*:*:*:*", "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7F66C34-5BF9-4EFC-AAB0-A2E3716F4FB8" "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
} },
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "038FEDE7-986F-4CA5-9003-BA68352B87D4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:php:php:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "029B5A37-BA8D-4FEC-BE90-856BB9D0D0E1" "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFA94D5-0139-490C-8257-0751FE9FBAE4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:-:*:*:*:*:*:*:*",
"matchCriteriaId": "029B5A37-BA8D-4FEC-BE90-856BB9D0D0E1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "29B186E5-7C2F-466E-AA4A-8F2B618F8A14"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:-:*:*:*:*:*:*:*",
"matchCriteriaId": "029B5A37-BA8D-4FEC-BE90-856BB9D0D0E1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E66F7BF0-EF7C-4695-9D67-7C1A01C6F9B9"
} }
] ]
} }
@ -289,7 +151,10 @@
}, },
{ {
"url": "https://security.netapp.com/advisory/ntap-20231130-0008/", "url": "https://security.netapp.com/advisory/ntap-20231130-0008/",
"source": "secalert@redhat.com" "source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29382", "id": "CVE-2023-29382",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-07-06T16:15:09.853", "published": "2023-07-06T16:15:09.853",
"lastModified": "2023-07-12T23:00:33.740", "lastModified": "2024-11-19T20:35:16.787",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-45715", "id": "CVE-2023-45715",
"sourceIdentifier": "psirt@hcl.com", "sourceIdentifier": "psirt@hcl.com",
"published": "2024-03-28T15:15:45.983", "published": "2024-03-28T15:15:45.983",
"lastModified": "2024-03-28T16:07:30.893", "lastModified": "2024-11-19T19:35:10.830",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -39,6 +39,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-436"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111972", "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111972",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-45922", "id": "CVE-2023-45922",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-03-27T05:15:47.203", "published": "2024-03-27T05:15:47.203",
"lastModified": "2024-08-02T21:15:46.913", "lastModified": "2024-11-19T19:35:11.600",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [ "cveTags": [
{ {
@ -22,7 +22,42 @@
"value": "Se descubri\u00f3 que glx_pbuffer.c en Mesa 23.0.4 conten\u00eda una infracci\u00f3n de segmentaci\u00f3n al llamar a __glXGetDrawableAttribute(). NOTA: esto est\u00e1 en disputa porque no hay situaciones comunes en las que los usuarios requieran una operaci\u00f3n ininterrumpida con un servidor controlador de atacante." "value": "Se descubri\u00f3 que glx_pbuffer.c en Mesa 23.0.4 conten\u00eda una infracci\u00f3n de segmentaci\u00f3n al llamar a __glXGetDrawableAttribute(). NOTA: esto est\u00e1 en disputa porque no hay situaciones comunes en las que los usuarios requieran una operaci\u00f3n ininterrumpida con un servidor controlador de atacante."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-754"
}
]
}
],
"references": [ "references": [
{ {
"url": "http://seclists.org/fulldisclosure/2024/Jan/50", "url": "http://seclists.org/fulldisclosure/2024/Jan/50",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-10224", "id": "CVE-2024-10224",
"sourceIdentifier": "security@ubuntu.com", "sourceIdentifier": "security@ubuntu.com",
"published": "2024-11-19T18:15:19.773", "published": "2024-11-19T18:15:19.773",
"lastModified": "2024-11-19T18:15:19.773", "lastModified": "2024-11-19T20:35:18.300",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -35,6 +35,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/rschupp/Module-ScanDeps/security/advisories/GHSA-g597-359q-v529", "url": "https://github.com/rschupp/Module-ScanDeps/security/advisories/GHSA-g597-359q-v529",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10443", "id": "CVE-2024-10443",
"sourceIdentifier": "security@synology.com", "sourceIdentifier": "security@synology.com",
"published": "2024-11-15T11:15:09.750", "published": "2024-11-15T11:15:09.750",
"lastModified": "2024-11-15T13:58:08.913", "lastModified": "2024-11-19T19:15:07.510",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{ {
"source": "security@synology.com", "source": "security@synology.com",
"type": "Secondary", "type": "Secondary",
@ -51,14 +71,122 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synology:photos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.6.2-0720",
"matchCriteriaId": "9E1131A0-FD1F-4BC3-AD7A-5F18CC1DADB5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:synology:diskstation_manager:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C483310D-3166-470E-9197-1B3DA12D47E9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synology:beephotos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.0-10053",
"matchCriteriaId": "EE6B62EE-AF47-43F0-82A5-B5FE208CAF68"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:synology:beestation_os:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E456DD53-9402-48F7-98F8-8CEE480D8337"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synology:beephotos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.2-10026",
"matchCriteriaId": "8E7F3368-950F-4D4B-B5BE-D39581A3FC4C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:synology:beestation_os:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DCDD1FA9-719E-4C69-9D72-29B154E27849"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synology:photos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.7.0-0795",
"matchCriteriaId": "5FF5FA84-BBF9-437D-8310-E7115EA9CEDD"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_18", "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_18",
"source": "security@synology.com" "source": "security@synology.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_19", "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_19",
"source": "security@synology.com" "source": "security@synology.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10534", "id": "CVE-2024-10534",
"sourceIdentifier": "iletisim@usom.gov.tr", "sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-11-15T11:15:10.100", "published": "2024-11-15T11:15:10.100",
"lastModified": "2024-11-15T13:58:08.913", "lastModified": "2024-11-19T19:08:44.727",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -59,6 +59,28 @@
"baseSeverity": "HIGH" "baseSeverity": "HIGH"
} }
} }
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
] ]
}, },
"weaknesses": [ "weaknesses": [
@ -73,10 +95,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dataprom:personnel_attendance_control_systems_\\/_access_control_security_systems:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024",
"matchCriteriaId": "D81D9AD6-274F-4564-AA7B-C377AC3DC41F"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.usom.gov.tr/bildirim/tr-24-1856", "url": "https://www.usom.gov.tr/bildirim/tr-24-1856",
"source": "iletisim@usom.gov.tr" "source": "iletisim@usom.gov.tr",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1097", "id": "CVE-2024-1097",
"sourceIdentifier": "security@huntr.dev", "sourceIdentifier": "security@huntr.dev",
"published": "2024-11-15T11:15:10.550", "published": "2024-11-15T11:15:10.550",
"lastModified": "2024-11-15T13:58:08.913", "lastModified": "2024-11-19T19:05:30.620",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -16,6 +16,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "security@huntr.dev", "source": "security@huntr.dev",
@ -40,6 +62,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{ {
"source": "security@huntr.dev", "source": "security@huntr.dev",
"type": "Secondary", "type": "Secondary",
@ -51,10 +83,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:k5n:webcalendar:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E08E15CF-98A9-4257-B60B-C9DC1ED2E828"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://huntr.com/bounties/6dd501f6-6047-4ddb-8b14-f0fc53cdc28e", "url": "https://huntr.com/bounties/6dd501f6-6047-4ddb-8b14-f0fc53cdc28e",
"source": "security@huntr.dev" "source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11003", "id": "CVE-2024-11003",
"sourceIdentifier": "security@ubuntu.com", "sourceIdentifier": "security@ubuntu.com",
"published": "2024-11-19T18:15:19.973", "published": "2024-11-19T18:15:19.973",
"lastModified": "2024-11-19T18:15:19.973", "lastModified": "2024-11-19T20:35:19.000",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -35,6 +35,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/liske/needrestart/commit/0f80a348883f72279a859ee655f58da34babefb0", "url": "https://github.com/liske/needrestart/commit/0f80a348883f72279a859ee655f58da34babefb0",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11182", "id": "CVE-2024-11182",
"sourceIdentifier": "security@eset.com", "sourceIdentifier": "security@eset.com",
"published": "2024-11-15T11:15:10.410", "published": "2024-11-15T11:15:10.410",
"lastModified": "2024-11-18T15:35:03.553", "lastModified": "2024-11-19T19:08:15.657",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -61,6 +61,26 @@
} }
], ],
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -84,6 +104,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{ {
"source": "security@eset.com", "source": "security@eset.com",
"type": "Secondary", "type": "Secondary",
@ -95,10 +125,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mdaemon:mdaemon:*:*:*:*:*:*:*:*",
"versionEndExcluding": "24.5.1",
"matchCriteriaId": "F4A0C049-0053-4A66-A690-905C4D1E6B79"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://files.mdaemon.com/mdaemon/beta/RelNotes_en.html", "url": "https://files.mdaemon.com/mdaemon/beta/RelNotes_en.html",
"source": "security@eset.com" "source": "security@eset.com",
"tags": [
"Release Notes"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11208", "id": "CVE-2024-11208",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-14T14:15:17.787", "published": "2024-11-14T14:15:17.787",
"lastModified": "2024-11-15T13:58:08.913", "lastModified": "2024-11-19T19:38:51.637",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -61,6 +61,26 @@
} }
], ],
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Secondary", "type": "Secondary",
@ -120,26 +140,59 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apereo:central_authentication_service:6.6.0:-:*:*:*:*:*:*",
"matchCriteriaId": "254B6B43-4503-439C-9151-133058335141"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://gist.github.com/0xArthurSouza/ce3b89887b03cc899d5e8cb6e472b04e", "url": "https://gist.github.com/0xArthurSouza/ce3b89887b03cc899d5e8cb6e472b04e",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://ibb.co/1LxSK2k", "url": "https://ibb.co/1LxSK2k",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.284522", "url": "https://vuldb.com/?ctiid.284522",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
}, },
{ {
"url": "https://vuldb.com/?id.284522", "url": "https://vuldb.com/?id.284522",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://vuldb.com/?submit.437211", "url": "https://vuldb.com/?submit.437211",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11209", "id": "CVE-2024-11209",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-14T14:15:18.090", "published": "2024-11-14T14:15:18.090",
"lastModified": "2024-11-15T13:58:08.913", "lastModified": "2024-11-19T19:14:26.543",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -61,6 +61,26 @@
} }
], ],
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Secondary", "type": "Secondary",
@ -110,7 +130,7 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "cna@vuldb.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [ "description": [
{ {
@ -118,24 +138,64 @@
"value": "CWE-287" "value": "CWE-287"
} }
] ]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apereo:central_authentication_service:6.6.0:-:*:*:*:*:*:*",
"matchCriteriaId": "254B6B43-4503-439C-9151-133058335141"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://gist.github.com/0xArthurSouza/281e8ea8a797abc8371a8ced31dc5562", "url": "https://gist.github.com/0xArthurSouza/281e8ea8a797abc8371a8ced31dc5562",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.284523", "url": "https://vuldb.com/?ctiid.284523",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
}, },
{ {
"url": "https://vuldb.com/?id.284523", "url": "https://vuldb.com/?id.284523",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
}, },
{ {
"url": "https://vuldb.com/?submit.437238", "url": "https://vuldb.com/?submit.437238",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11211", "id": "CVE-2024-11211",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-14T15:15:08.077", "published": "2024-11-14T15:15:08.077",
"lastModified": "2024-11-15T13:58:08.913", "lastModified": "2024-11-19T19:01:51.667",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -61,6 +61,26 @@
} }
], ],
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Secondary", "type": "Secondary",
@ -110,8 +130,18 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "cna@vuldb.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -124,22 +154,55 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.6.7",
"matchCriteriaId": "4DB083C4-076E-442D-B984-3FAE3BC8A300"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/falling-snow1/cve/blob/main/EyouCMS_RCE.md", "url": "https://github.com/falling-snow1/cve/blob/main/EyouCMS_RCE.md",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.284526", "url": "https://vuldb.com/?ctiid.284526",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.284526", "url": "https://vuldb.com/?id.284526",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.437600", "url": "https://vuldb.com/?submit.437600",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11237", "id": "CVE-2024-11237",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-15T12:15:14.670", "published": "2024-11-15T12:15:14.670",
"lastModified": "2024-11-15T13:58:08.913", "lastModified": "2024-11-19T19:04:14.987",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -61,6 +61,26 @@
} }
], ],
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Secondary", "type": "Secondary",
@ -110,8 +130,18 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "cna@vuldb.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -124,30 +154,81 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:vn020-f3v\\(t\\)_firmware:tt_v6.2.1021:*:*:*:*:*:*:*",
"matchCriteriaId": "8432B82C-D0E3-49F7-A36C-F2959E1533FE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:vn020-f3v\\(t\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D9A56AC-A260-41FD-97B9-6B4EF5CAF4F0"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/Zephkek/TP-Thumper", "url": "https://github.com/Zephkek/TP-Thumper",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/Zephkek/TP-Thumper/blob/main/poc.c", "url": "https://github.com/Zephkek/TP-Thumper/blob/main/poc.c",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.284672", "url": "https://vuldb.com/?ctiid.284672",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.284672", "url": "https://vuldb.com/?id.284672",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.438408", "url": "https://vuldb.com/?submit.438408",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://www.tp-link.com/", "url": "https://www.tp-link.com/",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Product"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11238", "id": "CVE-2024-11238",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-15T13:15:03.753", "published": "2024-11-15T13:15:03.753",
"lastModified": "2024-11-15T13:58:08.913", "lastModified": "2024-11-19T19:01:13.060",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Landray EKP up to 16.0. This affects the function delPreviewFile of the file /sys/ui/sys_ui_component/sysUiComponent.do?method=delPreviewFile. The manipulation of the argument directoryPath leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." "value": "A vulnerability, which was classified as critical, was found in Landray EKP up to 16.0. This affects the function delPreviewFile of the file /sys/ui/sys_ui_component/sysUiComponent.do?method=delPreviewFile. The manipulation of the argument directoryPath leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Landray EKP hasta la versi\u00f3n 16.0. Afecta a la funci\u00f3n delPreviewFile del archivo /sys/ui/sys_ui_component/sysUiComponent.do?method=delPreviewFile. La manipulaci\u00f3n del argumento directoryPath provoca un path traversal. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
} }
], ],
"metrics": { "metrics": {
@ -57,6 +61,26 @@
} }
], ],
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Secondary", "type": "Secondary",
@ -116,22 +140,55 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:landray:landray_ekp:*:*:*:*:*:*:*:*",
"versionEndIncluding": "16.0",
"matchCriteriaId": "FBA90B1A-4F23-4F35-A470-6AA73B36019D"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/CoinIsMoney/TempGuide/blob/main/LL-exp-02.pdf", "url": "https://github.com/CoinIsMoney/TempGuide/blob/main/LL-exp-02.pdf",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.284673", "url": "https://vuldb.com/?ctiid.284673",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.284673", "url": "https://vuldb.com/?id.284673",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.438291", "url": "https://vuldb.com/?submit.438291",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11239", "id": "CVE-2024-11239",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-15T14:15:19.693", "published": "2024-11-15T14:15:19.693",
"lastModified": "2024-11-15T14:23:55.747", "lastModified": "2024-11-19T19:00:43.230",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability has been found in Landray EKP up to 16.0 and classified as critical. This vulnerability affects the function deleteFile of the file /sys/common/import.do?method=deleteFile of the component API Interface. The manipulation of the argument folder leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." "value": "A vulnerability has been found in Landray EKP up to 16.0 and classified as critical. This vulnerability affects the function deleteFile of the file /sys/common/import.do?method=deleteFile of the component API Interface. The manipulation of the argument folder leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en Landray EKP hasta la versi\u00f3n 16.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n deleteFile del archivo /sys/common/import.do?method=deleteFile de la interfaz API del componente. La manipulaci\u00f3n de la carpeta de argumentos provoca un path traversal. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
} }
], ],
"metrics": { "metrics": {
@ -57,6 +61,26 @@
} }
], ],
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Secondary", "type": "Secondary",
@ -116,22 +140,55 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:landray:landray_ekp:*:*:*:*:*:*:*:*",
"versionEndIncluding": "16.0",
"matchCriteriaId": "FBA90B1A-4F23-4F35-A470-6AA73B36019D"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/CoinIsMoney/TempGuide/blob/main/LL-exp-03.pdf", "url": "https://github.com/CoinIsMoney/TempGuide/blob/main/LL-exp-03.pdf",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.284674", "url": "https://vuldb.com/?ctiid.284674",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.284674", "url": "https://vuldb.com/?id.284674",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.438784", "url": "https://vuldb.com/?submit.438784",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-11395",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-11-19T20:15:29.917",
"lastModified": "2024-11-19T20:15:29.917",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Type Confusion in V8 in Google Chrome prior to 131.0.6778.85 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/11/stable-channel-update-for-desktop_19.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/377384894",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1240", "id": "CVE-2024-1240",
"sourceIdentifier": "security@huntr.dev", "sourceIdentifier": "security@huntr.dev",
"published": "2024-11-15T11:15:10.773", "published": "2024-11-15T11:15:10.773",
"lastModified": "2024-11-15T19:35:06.063", "lastModified": "2024-11-19T19:04:53.913",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -73,14 +93,38 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pyload:pyload:0.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5A06D79-6D64-41FB-9040-17E9630DF4E9"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/pyload/pyload/commit/fe94451dcc2be90b3889e2fd9d07b483c8a6dccd", "url": "https://github.com/pyload/pyload/commit/fe94451dcc2be90b3889e2fd9d07b483c8a6dccd",
"source": "security@huntr.dev" "source": "security@huntr.dev",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://huntr.com/bounties/eef9513d-ccc3-4030-b574-374c5e7b887e", "url": "https://huntr.com/bounties/eef9513d-ccc3-4030-b574-374c5e7b887e",
"source": "security@huntr.dev" "source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-1271",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-11-19T20:15:30.007",
"lastModified": "2024-11-19T20:15:30.007",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: This CVE was previously published at https://bugzilla.redhat.com/show_bug.cgi?id=2262978 but later rejected for the following reason: The flaw requires an attacker to have superuser credentials which is a condition that already permits all impacts, hence not constituing a security vulnerability."
}
],
"metrics": {},
"references": []
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20038", "id": "CVE-2024-20038",
"sourceIdentifier": "security@mediatek.com", "sourceIdentifier": "security@mediatek.com",
"published": "2024-03-04T03:15:07.800", "published": "2024-03-04T03:15:07.800",
"lastModified": "2024-03-04T13:58:23.447", "lastModified": "2024-11-19T19:35:12.580",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "En pq, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08495932; ID del problema: ALPS08495932." "value": "En pq, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08495932; ID del problema: ALPS08495932."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024", "url": "https://corp.mediatek.com/product-security-bulletin/March-2024",

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-21697",
"sourceIdentifier": "security@atlassian.com",
"published": "2024-11-19T19:15:07.937",
"lastModified": "2024-11-19T19:15:07.937",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This High severity RCE (Remote Code Execution) vulnerability was introduced in versions 4.2.8 of Sourcetree for Mac and 3.4.19 for Sourcetree for Windows.\r\n\r\nThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.8, allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.\r\n\r\nAtlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\r\n Sourcetree for Mac 4.2: Upgrade to a release greater than or equal to 4.2.9\r\n Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.20\r\n\r\nSee the release notes ([https://www.sourcetreeapp.com/download-archives]). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center ([https://www.sourcetreeapp.com/download-archives]).\r\n\r\nThis vulnerability was reported via our Penetration Testing program."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@atlassian.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1456179091",
"source": "security@atlassian.com"
},
{
"url": "https://jira.atlassian.com/browse/SRCTREE-8168",
"source": "security@atlassian.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25254", "id": "CVE-2024-25254",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-11-11T23:15:05.460", "published": "2024-11-11T23:15:05.460",
"lastModified": "2024-11-12T13:55:21.227", "lastModified": "2024-11-19T19:35:13.453",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que SuperScan v4.1 conten\u00eda un desbordamiento de b\u00fafer a trav\u00e9s del par\u00e1metro Nombre de host/IP." "value": "Se descubri\u00f3 que SuperScan v4.1 conten\u00eda un desbordamiento de b\u00fafer a trav\u00e9s del par\u00e1metro Nombre de host/IP."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://exploitart.ist/exploit/2023/09/18/superscan-os-command-injection.html", "url": "https://exploitart.ist/exploit/2023/09/18/superscan-os-command-injection.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28013", "id": "CVE-2024-28013",
"sourceIdentifier": "psirt-info@cyber.jp.nec.com", "sourceIdentifier": "psirt-info@cyber.jp.nec.com",
"published": "2024-03-28T01:15:47.693", "published": "2024-03-28T01:15:47.693",
"lastModified": "2024-04-02T06:15:15.350", "lastModified": "2024-11-19T20:35:20.507",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "Uso de vulnerabilidad de valores insuficientemente aleatorios en NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W30 0P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N , WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN y MR02LN, todas las versiones permiten a un atacante cambiar la configuraci\u00f3n a trav\u00e9s de Internet." "value": "Uso de vulnerabilidad de valores insuficientemente aleatorios en NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W30 0P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N , WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN y MR02LN, todas las versiones permiten a un atacante cambiar la configuraci\u00f3n a trav\u00e9s de Internet."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [ "weaknesses": [
{ {
"source": "psirt-info@cyber.jp.nec.com", "source": "psirt-info@cyber.jp.nec.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28745", "id": "CVE-2024-28745",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-03-18T04:15:09.987", "published": "2024-03-18T04:15:09.987",
"lastModified": "2024-03-18T12:38:25.490", "lastModified": "2024-11-19T20:35:20.717",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Existe un problema de exportaci\u00f3n incorrecta de los componentes de la aplicaci\u00f3n de Android en la aplicaci\u00f3n 'ABEMA' para Android anterior a 10.65.0, lo que permite que otra aplicaci\u00f3n instalada en el dispositivo del usuario acceda a una URL arbitraria en la aplicaci\u00f3n 'ABEMA' para Android a trav\u00e9s de Intent. Si se explota esta vulnerabilidad, es posible que se muestre un sitio web arbitrario en la aplicaci\u00f3n y, como resultado, el usuario puede convertirse en v\u00edctima de un ataque de phishing." "value": "Existe un problema de exportaci\u00f3n incorrecta de los componentes de la aplicaci\u00f3n de Android en la aplicaci\u00f3n 'ABEMA' para Android anterior a 10.65.0, lo que permite que otra aplicaci\u00f3n instalada en el dispositivo del usuario acceda a una URL arbitraria en la aplicaci\u00f3n 'ABEMA' para Android a trav\u00e9s de Intent. Si se explota esta vulnerabilidad, es posible que se muestre un sitio web arbitrario en la aplicaci\u00f3n y, como resultado, el usuario puede convertirse en v\u00edctima de un ataque de phishing."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://jvn.jp/en/jp/JVN70640802/", "url": "https://jvn.jp/en/jp/JVN70640802/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-31617", "id": "CVE-2024-31617",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-05-22T18:15:10.040", "published": "2024-05-22T18:15:10.040",
"lastModified": "2024-05-22T18:59:20.240", "lastModified": "2024-11-19T20:35:21.597",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "OpenLiteSpeed anterior a 1.8.1 maneja mal la codificaci\u00f3n fragmentada." "value": "OpenLiteSpeed anterior a 1.8.1 maneja mal la codificaci\u00f3n fragmentada."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/litespeedtech/openlitespeed/releases/tag/v1.8.1", "url": "https://github.com/litespeedtech/openlitespeed/releases/tag/v1.8.1",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-31813", "id": "CVE-2024-31813",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T13:15:08.840", "published": "2024-04-08T13:15:08.840",
"lastModified": "2024-04-08T18:48:40.217", "lastModified": "2024-11-19T20:35:22.397",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "TOTOLINK EX200 V4.0.3c.7646_B20201211 no contiene un mecanismo de autenticaci\u00f3n de forma predeterminada." "value": "TOTOLINK EX200 V4.0.3c.7646_B20201211 no contiene un mecanismo de autenticaci\u00f3n de forma predeterminada."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/Missing_Authentication/missauth.md", "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/Missing_Authentication/missauth.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36905", "id": "CVE-2024-36905",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-30T16:15:14.030", "published": "2024-05-30T16:15:14.030",
"lastModified": "2024-11-19T18:35:04.747", "lastModified": "2024-11-19T20:15:30.583",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -83,6 +83,10 @@
{ {
"url": "https://git.kernel.org/stable/c/f47d0d32fa94e815fdd78b8b88684873e67939f4", "url": "https://git.kernel.org/stable/c/f47d0d32fa94e815fdd78b8b88684873e67939f4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/10/29/1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} }
] ]
} }

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37070",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-11-19T20:15:30.693",
"lastModified": "2024-11-19T20:15:30.693",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Concert Software 1.0.0, 1.0.1, 1.0.2, and 1.0.2.1 could allow an authenticated user to obtain sensitive information that could aid in further attacks against the system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-359"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7176346",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38264", "id": "CVE-2024-38264",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-11-12T18:15:21.390", "published": "2024-11-12T18:15:21.390",
"lastModified": "2024-11-13T17:01:58.603", "lastModified": "2024-11-19T20:52:32.727",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -41,8 +41,18 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "secure@microsoft.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -51,10 +61,74 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22621.4460",
"matchCriteriaId": "04BC0915-6F14-4D7A-951F-83CBAB47C3C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22621.4460",
"matchCriteriaId": "8A16CFCB-D002-4F63-B568-9D14ACE88E94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22631.4460",
"matchCriteriaId": "B8FE14E5-7226-43CA-A57E-A81636185AD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22631.4460",
"matchCriteriaId": "97507261-3969-4EBF-BCED-93FBADCBB6DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.26100.2314",
"matchCriteriaId": "D32C04CA-E5BE-47CA-AF79-B39859288531"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.26100.2314",
"matchCriteriaId": "40A6B92E-21C6-4BDD-BA57-DC227FF0F998"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1251",
"matchCriteriaId": "A549BD98-3DE2-4EF3-A579-12AFCB764975"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.2314",
"matchCriteriaId": "4F17FD7F-254D-4EE6-9D22-468E76D9B054"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38264", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38264",
"source": "secure@microsoft.com" "source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39609", "id": "CVE-2024-39609",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-11-13T21:15:27.197", "published": "2024-11-13T21:15:27.197",
"lastModified": "2024-11-15T14:00:09.720", "lastModified": "2024-11-19T19:58:29.653",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -61,6 +61,26 @@
} }
], ],
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{ {
"source": "secure@intel.com", "source": "secure@intel.com",
"type": "Secondary", "type": "Secondary",
@ -95,10 +115,44 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:server_board_m70klp2sb_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "01.04.0030",
"matchCriteriaId": "6259299E-37EC-48AD-959D-3DE49A61B923"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:server_board_m70klp2sb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C473084-B18C-4307-9733-7B9CE9E2D9C4"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01175.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01175.html",
"source": "secure@intel.com" "source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41167", "id": "CVE-2024-41167",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2024-11-13T21:15:28.590", "published": "2024-11-13T21:15:28.590",
"lastModified": "2024-11-15T14:00:09.720", "lastModified": "2024-11-19T19:45:02.660",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -61,6 +61,26 @@
} }
], ],
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{ {
"source": "secure@intel.com", "source": "secure@intel.com",
"type": "Secondary", "type": "Secondary",
@ -84,6 +104,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{ {
"source": "secure@intel.com", "source": "secure@intel.com",
"type": "Secondary", "type": "Secondary",
@ -95,10 +125,43 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:m10jnp2sb_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7.220",
"matchCriteriaId": "E7676079-7126-4C28-A826-64ED2E740D34"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:m10jnp2sb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9EF1949-8447-4D04-9808-7E6D147B4B70"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01175.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01175.html",
"source": "secure@intel.com" "source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42450", "id": "CVE-2024-42450",
"sourceIdentifier": "support@hackerone.com", "sourceIdentifier": "support@hackerone.com",
"published": "2024-11-19T18:15:20.560", "published": "2024-11-19T18:15:20.560",
"lastModified": "2024-11-19T18:15:20.560", "lastModified": "2024-11-19T20:35:23.447",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -12,6 +12,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "support@hackerone.com", "source": "support@hackerone.com",
@ -35,6 +57,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://security-portal.versa-networks.com/emailbulletins/6735a300415abb89e9a8a9d3", "url": "https://security-portal.versa-networks.com/emailbulletins/6735a300415abb89e9a8a9d3",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43447", "id": "CVE-2024-43447",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-11-12T18:15:21.707", "published": "2024-11-12T18:15:21.707",
"lastModified": "2024-11-13T17:01:58.603", "lastModified": "2024-11-19T20:52:55.763",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -41,8 +41,18 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "secure@microsoft.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -51,10 +61,32 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2849",
"matchCriteriaId": "38D9CE84-B85F-42B0-959D-A390427A1641"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43447", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43447",
"source": "secure@microsoft.com" "source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43449", "id": "CVE-2024-43449",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-11-12T18:15:21.977", "published": "2024-11-12T18:15:21.977",
"lastModified": "2024-11-13T17:01:58.603", "lastModified": "2024-11-19T20:49:54.423",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -41,8 +41,18 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "secure@microsoft.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -51,10 +61,179 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.10240.20826",
"matchCriteriaId": "94D57126-EC8D-4898-A5FE-D7EB6463B634"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.10240.20826",
"matchCriteriaId": "54AA8A1F-0EAD-406A-A4AF-B86C316D1089"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.7515",
"matchCriteriaId": "86F8F1B2-C206-4CD6-83C6-C450329CEE10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.14393.7515",
"matchCriteriaId": "FCBE6103-075E-4841-836D-4E0D630E99FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.6532",
"matchCriteriaId": "81C732A1-CC0F-4633-B00D-473869E77DB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.17763.6532",
"matchCriteriaId": "AF9C20B8-CB5E-46C9-B041-D6A42C26703B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.19044.5131",
"matchCriteriaId": "71AD0B79-C3EF-4E13-AB04-D5FAEABA6954"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.19044.5131",
"matchCriteriaId": "B35413A3-DE3B-4E35-AB48-C6D5D138AC07"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.19044.5131",
"matchCriteriaId": "D0558F5F-A561-41E9-9242-7F4A5D924479"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.19045.5131",
"matchCriteriaId": "EA243DE7-EDB1-43DA-AD7E-541843DECB58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.19045.5131",
"matchCriteriaId": "5D428E06-FC7C-4151-9582-D66D05D7AFE6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.19045.5131",
"matchCriteriaId": "FB49C811-F4D7-46EB-9ED6-50CB3EAAAD90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22621.4460",
"matchCriteriaId": "04BC0915-6F14-4D7A-951F-83CBAB47C3C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22621.4460",
"matchCriteriaId": "8A16CFCB-D002-4F63-B568-9D14ACE88E94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22631.4460",
"matchCriteriaId": "B8FE14E5-7226-43CA-A57E-A81636185AD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22631.4460",
"matchCriteriaId": "97507261-3969-4EBF-BCED-93FBADCBB6DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.26100.2314",
"matchCriteriaId": "D32C04CA-E5BE-47CA-AF79-B39859288531"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.26100.2314",
"matchCriteriaId": "40A6B92E-21C6-4BDD-BA57-DC227FF0F998"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7515",
"matchCriteriaId": "82E3AC46-9D0D-4381-93EE-FE87C212040A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6532",
"matchCriteriaId": "A43E1F6C-B2A7-4DEC-B4EC-04153746C42B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2849",
"matchCriteriaId": "38D9CE84-B85F-42B0-959D-A390427A1641"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1251",
"matchCriteriaId": "A549BD98-3DE2-4EF3-A579-12AFCB764975"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.2314",
"matchCriteriaId": "4F17FD7F-254D-4EE6-9D22-468E76D9B054"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43449", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43449",
"source": "secure@microsoft.com" "source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43450", "id": "CVE-2024-43450",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-11-12T18:15:22.237", "published": "2024-11-12T18:15:22.237",
"lastModified": "2024-11-13T17:01:58.603", "lastModified": "2024-11-19T20:49:26.017",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -41,8 +41,18 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "secure@microsoft.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -51,10 +61,71 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7515",
"matchCriteriaId": "82E3AC46-9D0D-4381-93EE-FE87C212040A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6532",
"matchCriteriaId": "A43E1F6C-B2A7-4DEC-B4EC-04153746C42B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2849",
"matchCriteriaId": "38D9CE84-B85F-42B0-959D-A390427A1641"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1251",
"matchCriteriaId": "A549BD98-3DE2-4EF3-A579-12AFCB764975"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.2314",
"matchCriteriaId": "4F17FD7F-254D-4EE6-9D22-468E76D9B054"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43450", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43450",
"source": "secure@microsoft.com" "source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43452", "id": "CVE-2024-43452",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-11-12T18:15:22.737", "published": "2024-11-12T18:15:22.737",
"lastModified": "2024-11-13T17:01:58.603", "lastModified": "2024-11-19T20:48:28.447",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -41,8 +41,18 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "secure@microsoft.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -51,10 +61,139 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.6532",
"matchCriteriaId": "81C732A1-CC0F-4633-B00D-473869E77DB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.17763.6532",
"matchCriteriaId": "AF9C20B8-CB5E-46C9-B041-D6A42C26703B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.19044.5131",
"matchCriteriaId": "71AD0B79-C3EF-4E13-AB04-D5FAEABA6954"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.19044.5131",
"matchCriteriaId": "B35413A3-DE3B-4E35-AB48-C6D5D138AC07"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.19044.5131",
"matchCriteriaId": "D0558F5F-A561-41E9-9242-7F4A5D924479"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.19045.5131",
"matchCriteriaId": "EA243DE7-EDB1-43DA-AD7E-541843DECB58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.19045.5131",
"matchCriteriaId": "5D428E06-FC7C-4151-9582-D66D05D7AFE6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.19045.5131",
"matchCriteriaId": "FB49C811-F4D7-46EB-9ED6-50CB3EAAAD90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22621.4460",
"matchCriteriaId": "04BC0915-6F14-4D7A-951F-83CBAB47C3C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22621.4460",
"matchCriteriaId": "8A16CFCB-D002-4F63-B568-9D14ACE88E94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22631.4460",
"matchCriteriaId": "B8FE14E5-7226-43CA-A57E-A81636185AD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22631.4460",
"matchCriteriaId": "97507261-3969-4EBF-BCED-93FBADCBB6DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.26100.2314",
"matchCriteriaId": "D32C04CA-E5BE-47CA-AF79-B39859288531"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.26100.2314",
"matchCriteriaId": "40A6B92E-21C6-4BDD-BA57-DC227FF0F998"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6532",
"matchCriteriaId": "A43E1F6C-B2A7-4DEC-B4EC-04153746C42B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2849",
"matchCriteriaId": "38D9CE84-B85F-42B0-959D-A390427A1641"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1251",
"matchCriteriaId": "A549BD98-3DE2-4EF3-A579-12AFCB764975"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.2314",
"matchCriteriaId": "4F17FD7F-254D-4EE6-9D22-468E76D9B054"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43452", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43452",
"source": "secure@microsoft.com" "source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43459", "id": "CVE-2024-43459",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-11-12T18:15:23.090", "published": "2024-11-12T18:15:23.090",
"lastModified": "2024-11-13T17:01:58.603", "lastModified": "2024-11-19T20:43:02.103",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -41,8 +41,18 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "secure@microsoft.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -51,10 +61,68 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
"versionStartIncluding": "13.0.6300.2",
"versionEndExcluding": "13.0.6455.2",
"matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
"versionStartIncluding": "13.0.7000.253",
"versionEndExcluding": "13.0.7050.2",
"matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
"versionStartIncluding": "14.0.1000.169",
"versionEndExcluding": "14.0.2070.1",
"matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
"versionStartIncluding": "14.0.3006.16",
"versionEndExcluding": "14.0.3485.1",
"matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
"versionStartIncluding": "15.0.2000.5",
"versionEndExcluding": "15.0.2130.3",
"matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
"versionStartIncluding": "15.0.4003.23",
"versionEndExcluding": "15.0.4410.1",
"matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43459", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43459",
"source": "secure@microsoft.com" "source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43462", "id": "CVE-2024-43462",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-11-12T18:15:23.370", "published": "2024-11-12T18:15:23.370",
"lastModified": "2024-11-13T17:01:58.603", "lastModified": "2024-11-19T20:18:42.467",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -41,8 +41,18 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "secure@microsoft.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -51,10 +61,68 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
"versionStartIncluding": "13.0.6300.2",
"versionEndExcluding": "13.0.6455.2",
"matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
"versionStartIncluding": "13.0.7000.253",
"versionEndExcluding": "13.0.7050.2",
"matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
"versionStartIncluding": "14.0.1000.169",
"versionEndExcluding": "14.0.2070.1",
"matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
"versionStartIncluding": "14.0.3006.16",
"versionEndExcluding": "14.0.3485.1",
"matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
"versionStartIncluding": "15.0.2000.5",
"versionEndExcluding": "15.0.2130.3",
"matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
"versionStartIncluding": "15.0.4003.23",
"versionEndExcluding": "15.0.4410.1",
"matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43462", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43462",
"source": "secure@microsoft.com" "source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43498", "id": "CVE-2024-43498",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-11-12T18:15:24.110", "published": "2024-11-12T18:15:24.110",
"lastModified": "2024-11-13T17:01:58.603", "lastModified": "2024-11-19T20:01:04.877",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -41,8 +41,18 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "secure@microsoft.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -51,10 +61,91 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:.net:9.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5DFE5320-88E8-42C2-BC1C-E402FE71ECBB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.6",
"versionEndExcluding": "17.6.21",
"matchCriteriaId": "480EF56E-9720-4ABD-BE13-CD68F6300482"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.8",
"versionEndExcluding": "17.8.16",
"matchCriteriaId": "E3974951-EE1A-47CD-B1AB-389C4BDADEB0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.10.0",
"versionEndExcluding": "17.10.9",
"matchCriteriaId": "B85CEE4B-546D-4DBF-8673-96859149F05F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.11.0",
"versionEndExcluding": "17.11.6",
"matchCriteriaId": "0FCE50CB-B8BC-4C62-86AC-4B5DC0F0A8BA"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43498", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43498",
"source": "secure@microsoft.com" "source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43499", "id": "CVE-2024-43499",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-11-12T18:15:24.363", "published": "2024-11-12T18:15:24.363",
"lastModified": "2024-11-14T19:15:06.850", "lastModified": "2024-11-19T19:59:24.387",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -41,8 +41,18 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "secure@microsoft.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -55,10 +65,91 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:.net:9.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5DFE5320-88E8-42C2-BC1C-E402FE71ECBB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.6",
"versionEndExcluding": "17.6.21",
"matchCriteriaId": "480EF56E-9720-4ABD-BE13-CD68F6300482"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.8",
"versionEndExcluding": "17.8.16",
"matchCriteriaId": "E3974951-EE1A-47CD-B1AB-389C4BDADEB0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.10.0",
"versionEndIncluding": "17.10.9",
"matchCriteriaId": "F66E9930-468D-4637-9FAF-35C7288C6E4A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.11.0",
"versionEndExcluding": "17.11.6",
"matchCriteriaId": "0FCE50CB-B8BC-4C62-86AC-4B5DC0F0A8BA"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43499", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43499",
"source": "secure@microsoft.com" "source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44546", "id": "CVE-2024-44546",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-11-11T21:15:06.360", "published": "2024-11-11T21:15:06.360",
"lastModified": "2024-11-12T13:55:21.227", "lastModified": "2024-11-19T20:35:24.240",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Powerjob >= 3.20 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro de versi\u00f3n." "value": "Powerjob >= 3.20 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro de versi\u00f3n."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://gist.github.com/jwx0539/5151f53ec497474cab6af4fa8ee6b6f7", "url": "https://gist.github.com/jwx0539/5151f53ec497474cab6af4fa8ee6b6f7",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45419",
"sourceIdentifier": "security@zoom.us",
"published": "2024-11-19T20:15:30.973",
"lastModified": "2024-11-19T20:15:30.973",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in some Zoom Apps may allow an unauthenticated user to conduct a disclosure of information via network access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@zoom.us",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@zoom.us",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-252"
}
]
}
],
"references": [
{
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24041",
"source": "security@zoom.us"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45420",
"sourceIdentifier": "security@zoom.us",
"published": "2024-11-19T20:15:31.200",
"lastModified": "2024-11-19T20:15:31.200",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Uncontrolled resource consumption in some Zoom Apps before version 6.2.0 may allow an authenticated user to conduct a denial of service via network access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@zoom.us",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@zoom.us",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24042",
"source": "security@zoom.us"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45422",
"sourceIdentifier": "security@zoom.us",
"published": "2024-11-19T20:15:31.430",
"lastModified": "2024-11-19T20:15:31.430",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in some Zoom Apps before version 6.2.0 may allow an unauthenticated user to conduct a denial of service via network access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@zoom.us",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security@zoom.us",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24044",
"source": "security@zoom.us"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45611", "id": "CVE-2024-45611",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T21:15:09.627", "published": "2024-11-15T21:15:09.627",
"lastModified": "2024-11-18T17:11:56.587", "lastModified": "2024-11-19T20:57:21.473",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{ {
"source": "security-advisories@github.com", "source": "security-advisories@github.com",
"type": "Secondary", "type": "Secondary",
@ -51,10 +71,32 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.84",
"versionEndExcluding": "10.0.17",
"matchCriteriaId": "1D7BDA2A-8E0F-41AC-B87E-9DD909B743C9"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j73h-x6j3-m479", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j73h-x6j3-m479",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-48694",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-19T19:15:08.140",
"lastModified": "2024-11-19T19:15:08.140",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "File Upload vulnerability in Xi'an Daxi Information technology OfficeWeb365 v.8.6.1.0 and v7.18.23.0 allows a remote attacker to execute arbitrary code via the pw/savedraw component."
}
],
"metrics": {},
"references": [
{
"url": "https://avd.aliyun.com/detail?id=AVD-2023-1678930",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/32024c5dbb7ff60fa7347cccf6ebb3763a513e7a/docs/wiki/webapp/OfficeWeb365/OfficeWeb365%20SaveDraw%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md?plain=1#L24",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Threekiii/Vulnerability-Wiki/blob/master/docs-base/docs/webapp/OfficeWeb365-SaveDraw-%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/luck-ying/Library-POC/blob/master/2023HW/2023.8.15/OfficeWeb365_SaveDraw%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.py",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/xuetang1125/OfficeWeb365/blob/main/OfficeWeb365%20SaveDraw%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E%20%282%29.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48939", "id": "CVE-2024-48939",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-11-11T01:15:04.890", "published": "2024-11-11T01:15:04.890",
"lastModified": "2024-11-13T21:15:29.177", "lastModified": "2024-11-19T20:35:25.830",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "La validaci\u00f3n insuficiente realizada en el archivo de licencia de la API REST en Paxton Net2 antes de la versi\u00f3n 6.07.14023.5015 (SR4) permite el uso de la API REST con un archivo de licencia no v\u00e1lido. Los atacantes podr\u00edan recuperar datos del registro de acceso." "value": "La validaci\u00f3n insuficiente realizada en el archivo de licencia de la API REST en Paxton Net2 antes de la versi\u00f3n 6.07.14023.5015 (SR4) permite el uso de la API REST con un archivo de licencia no v\u00e1lido. Los atacantes podr\u00edan recuperar datos del registro de acceso."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/gitaware/CVE/blob/main/CVE-2024-48939/20241020_vuln_discl_paxton_API_license.pdf", "url": "https://github.com/gitaware/CVE/blob/main/CVE-2024-48939/20241020_vuln_discl_paxton_API_license.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48990", "id": "CVE-2024-48990",
"sourceIdentifier": "security@ubuntu.com", "sourceIdentifier": "security@ubuntu.com",
"published": "2024-11-19T18:15:21.530", "published": "2024-11-19T18:15:21.530",
"lastModified": "2024-11-19T18:15:21.530", "lastModified": "2024-11-19T20:35:26.633",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -35,6 +35,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/liske/needrestart/commit/fcc9a4401392231bef4ef5ed026a0d7a275149ab", "url": "https://github.com/liske/needrestart/commit/fcc9a4401392231bef4ef5ed026a0d7a275149ab",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48992", "id": "CVE-2024-48992",
"sourceIdentifier": "security@ubuntu.com", "sourceIdentifier": "security@ubuntu.com",
"published": "2024-11-19T18:15:21.897", "published": "2024-11-19T18:15:21.897",
"lastModified": "2024-11-19T18:15:21.897", "lastModified": "2024-11-19T20:35:27.427",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -35,6 +35,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/liske/needrestart/commit/b5f25f6ec6e7dd0c5be249e4e45de4ee9ffe594f", "url": "https://github.com/liske/needrestart/commit/b5f25f6ec6e7dd0c5be249e4e45de4ee9ffe594f",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48993", "id": "CVE-2024-48993",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-11-12T18:15:35.840", "published": "2024-11-12T18:15:35.840",
"lastModified": "2024-11-13T17:01:58.603", "lastModified": "2024-11-19T19:06:50.177",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -41,8 +41,18 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "secure@microsoft.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -51,10 +61,68 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
"versionStartIncluding": "13.0.6300.2",
"versionEndExcluding": "13.0.6455.2",
"matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
"versionStartIncluding": "13.0.7000.253",
"versionEndExcluding": "13.0.7050.2",
"matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
"versionStartIncluding": "14.0.1000.169",
"versionEndExcluding": "14.0.2070.1",
"matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
"versionStartIncluding": "14.0.3006.16",
"versionEndExcluding": "14.0.3485.1",
"matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
"versionStartIncluding": "15.0.2000.5",
"versionEndExcluding": "15.0.2130.3",
"matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
"versionStartIncluding": "15.0.4003.23",
"versionEndExcluding": "15.0.4410.1",
"matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48993", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48993",
"source": "secure@microsoft.com" "source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-50430",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-19T19:15:08.240",
"lastModified": "2024-11-19T19:15:08.240",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Beaver Builder Team Beaver Builder allows Stored XSS.This issue affects Beaver Builder: from n/a through 2.8.3.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/beaver-builder-lite-version/wordpress-beaver-builder-plugin-2-8-3-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-50636", "id": "CVE-2024-50636",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-11-11T23:15:05.833", "published": "2024-11-11T23:15:05.833",
"lastModified": "2024-11-12T13:55:21.227", "lastModified": "2024-11-19T19:35:14.833",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "PyMOL 2.5.0 contiene una vulnerabilidad en su funci\u00f3n \"Run Script\", que permite la ejecuci\u00f3n de c\u00f3digo Python arbitrario incrustado en archivos .PYM. Los atacantes pueden manipular un archivo .PYM malicioso que contenga un payload de shell inversa de Python y explotar la funci\u00f3n para lograr la ejecuci\u00f3n remota de comandos (RCE). Esta vulnerabilidad surge porque PyMOL trata los archivos .PYM como scripts de Python sin validar o restringir adecuadamente los comandos dentro del script, lo que permite a los atacantes ejecutar comandos no autorizados en el contexto del usuario que ejecuta la aplicaci\u00f3n." "value": "PyMOL 2.5.0 contiene una vulnerabilidad en su funci\u00f3n \"Run Script\", que permite la ejecuci\u00f3n de c\u00f3digo Python arbitrario incrustado en archivos .PYM. Los atacantes pueden manipular un archivo .PYM malicioso que contenga un payload de shell inversa de Python y explotar la funci\u00f3n para lograr la ejecuci\u00f3n remota de comandos (RCE). Esta vulnerabilidad surge porque PyMOL trata los archivos .PYM como scripts de Python sin validar o restringir adecuadamente los comandos dentro del script, lo que permite a los atacantes ejecutar comandos no autorizados en el contexto del usuario que ejecuta la aplicaci\u00f3n."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/schrodinger/pymol-open-source/issues/405", "url": "https://github.com/schrodinger/pymol-open-source/issues/405",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-51503",
"sourceIdentifier": "security@trendmicro.com",
"published": "2024-11-19T19:15:08.470",
"lastModified": "2024-11-19T19:15:08.470",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A security agent manual scan command injection vulnerability in the Trend Micro Deep Security 20 Agent could allow an attacker to escalate privileges and execute arbitrary code on an affected machine. In certain circumstances, attackers that have legitimate access to the domain may be able to remotely inject commands to other machines in the same domain.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability locally and must have domain user privileges to affect other machines."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://success.trendmicro.com/en-US/solution/KA-0018154",
"source": "security@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1516/",
"source": "security@trendmicro.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51679", "id": "CVE-2024-51679",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-14T22:15:20.610", "published": "2024-11-14T22:15:20.610",
"lastModified": "2024-11-15T13:58:08.913", "lastModified": "2024-11-19T20:07:35.257",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -51,10 +71,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:appointmind:appointmind:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.1.0",
"matchCriteriaId": "E43A4EE1-FB20-42AE-A9AB-EE9D60933ABD"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://patchstack.com/database/vulnerability/appointmind/wordpress-appointmind-plugin-4-0-0-csrf-to-stored-xss-vulnerability?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/appointmind/wordpress-appointmind-plugin-4-0-0-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com" "source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-52359",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-11-19T20:15:31.840",
"lastModified": "2024-11-19T20:15:31.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Concert Software 1.0.0, 1.0.1, 1.0.2, and 1.0.2.1 could allow an authenticated user to perform unauthorized actions that should be reserved to administrator used due to improper access controls."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-286"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7176346",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-52360",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-11-19T20:15:32.147",
"lastModified": "2024-11-19T20:15:32.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Concert Software 1.0.0, 1.0.1, 1.0.2, and 1.0.2.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7176346",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52613", "id": "CVE-2024-52613",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-11-14T23:15:05.967", "published": "2024-11-14T23:15:05.967",
"lastModified": "2024-11-15T13:58:08.913", "lastModified": "2024-11-19T20:39:42.197",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,11 +15,67 @@
"value": "Un b\u00fafer basado en mont\u00f3n suble\u00eddo en tsMuxer versi\u00f3n nightly-2024-05-12-02-01-18 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo de video MOV manipulado espec\u00edficamente." "value": "Un b\u00fafer basado en mont\u00f3n suble\u00eddo en tsMuxer versi\u00f3n nightly-2024-05-12-02-01-18 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo de video MOV manipulado espec\u00edficamente."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:justdan96:tsmuxer:nightly-2024-05-12-02-01-18:*:*:*:*:*:*:*",
"matchCriteriaId": "518BE04B-2D5E-4617-95D9-AF476CEAB9B3"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/justdan96/tsMuxer/issues/881", "url": "https://github.com/justdan96/tsMuxer/issues/881",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
} }
] ]
} }

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-52714",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-19T19:15:08.680",
"lastModified": "2024-11-19T19:15:08.680",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC6 v2.0 v15.03.06.50 was discovered to contain a buffer overflow in the function 'fromSetSysTime."
}
],
"metrics": {},
"references": [
{
"url": "http://tenda.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/CLan-nad/CVE/blob/main/tenda/fromSetSysTime/1.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-52759",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-19T19:15:08.767",
"lastModified": "2024-11-19T19:15:08.767",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "D-LINK DI-8003 v16.07.26A1 was discovered to contain a buffer overflow via the ip parameter in the ip_position_asp function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/DI_8003_ip_position_asp_stackoverflow/detail.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

110
README.md
View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-11-19T19:00:26.573949+00:00 2024-11-19T21:00:21.679786+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-11-19T18:42:44.733000+00:00 2024-11-19T20:57:21.473000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
270591 270621
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `269` Recently added CVEs: `30`
- [CVE-2024-53064](CVE-2024/CVE-2024-530xx/CVE-2024-53064.json) (`2024-11-19T18:15:26.260`) - [CVE-2018-9346](CVE-2018/CVE-2018-93xx/CVE-2018-9346.json) (`2024-11-19T19:15:06.000`)
- [CVE-2024-53065](CVE-2024/CVE-2024-530xx/CVE-2024-53065.json) (`2024-11-19T18:15:26.333`) - [CVE-2018-9348](CVE-2018/CVE-2018-93xx/CVE-2018-9348.json) (`2024-11-19T20:15:27.427`)
- [CVE-2024-53066](CVE-2024/CVE-2024-530xx/CVE-2024-53066.json) (`2024-11-19T18:15:26.413`) - [CVE-2018-9364](CVE-2018/CVE-2018-93xx/CVE-2018-9364.json) (`2024-11-19T20:15:27.493`)
- [CVE-2024-53067](CVE-2024/CVE-2024-530xx/CVE-2024-53067.json) (`2024-11-19T18:15:26.490`) - [CVE-2018-9366](CVE-2018/CVE-2018-93xx/CVE-2018-9366.json) (`2024-11-19T20:15:27.550`)
- [CVE-2024-53068](CVE-2024/CVE-2024-530xx/CVE-2024-53068.json) (`2024-11-19T18:15:26.557`) - [CVE-2018-9367](CVE-2018/CVE-2018-93xx/CVE-2018-9367.json) (`2024-11-19T20:15:27.607`)
- [CVE-2024-53069](CVE-2024/CVE-2024-530xx/CVE-2024-53069.json) (`2024-11-19T18:15:26.630`) - [CVE-2018-9368](CVE-2018/CVE-2018-93xx/CVE-2018-9368.json) (`2024-11-19T20:15:27.667`)
- [CVE-2024-53070](CVE-2024/CVE-2024-530xx/CVE-2024-53070.json) (`2024-11-19T18:15:26.700`) - [CVE-2018-9369](CVE-2018/CVE-2018-93xx/CVE-2018-9369.json) (`2024-11-19T20:15:27.723`)
- [CVE-2024-53071](CVE-2024/CVE-2024-530xx/CVE-2024-53071.json) (`2024-11-19T18:15:26.793`) - [CVE-2018-9370](CVE-2018/CVE-2018-93xx/CVE-2018-9370.json) (`2024-11-19T20:15:27.787`)
- [CVE-2024-53072](CVE-2024/CVE-2024-530xx/CVE-2024-53072.json) (`2024-11-19T18:15:26.877`) - [CVE-2018-9371](CVE-2018/CVE-2018-93xx/CVE-2018-9371.json) (`2024-11-19T20:15:27.843`)
- [CVE-2024-53073](CVE-2024/CVE-2024-530xx/CVE-2024-53073.json) (`2024-11-19T18:15:26.950`) - [CVE-2018-9372](CVE-2018/CVE-2018-93xx/CVE-2018-9372.json) (`2024-11-19T20:15:27.917`)
- [CVE-2024-53074](CVE-2024/CVE-2024-530xx/CVE-2024-53074.json) (`2024-11-19T18:15:27.013`) - [CVE-2018-9409](CVE-2018/CVE-2018-94xx/CVE-2018-9409.json) (`2024-11-19T20:15:27.970`)
- [CVE-2024-53075](CVE-2024/CVE-2024-530xx/CVE-2024-53075.json) (`2024-11-19T18:15:27.077`) - [CVE-2024-11395](CVE-2024/CVE-2024-113xx/CVE-2024-11395.json) (`2024-11-19T20:15:29.917`)
- [CVE-2024-53076](CVE-2024/CVE-2024-530xx/CVE-2024-53076.json) (`2024-11-19T18:15:27.147`) - [CVE-2024-1271](CVE-2024/CVE-2024-12xx/CVE-2024-1271.json) (`2024-11-19T20:15:30.007`)
- [CVE-2024-53077](CVE-2024/CVE-2024-530xx/CVE-2024-53077.json) (`2024-11-19T18:15:27.213`) - [CVE-2024-21697](CVE-2024/CVE-2024-216xx/CVE-2024-21697.json) (`2024-11-19T19:15:07.937`)
- [CVE-2024-53078](CVE-2024/CVE-2024-530xx/CVE-2024-53078.json) (`2024-11-19T18:15:27.280`) - [CVE-2024-37070](CVE-2024/CVE-2024-370xx/CVE-2024-37070.json) (`2024-11-19T20:15:30.693`)
- [CVE-2024-53079](CVE-2024/CVE-2024-530xx/CVE-2024-53079.json) (`2024-11-19T18:15:27.340`) - [CVE-2024-45419](CVE-2024/CVE-2024-454xx/CVE-2024-45419.json) (`2024-11-19T20:15:30.973`)
- [CVE-2024-53080](CVE-2024/CVE-2024-530xx/CVE-2024-53080.json) (`2024-11-19T18:15:27.413`) - [CVE-2024-45420](CVE-2024/CVE-2024-454xx/CVE-2024-45420.json) (`2024-11-19T20:15:31.200`)
- [CVE-2024-53081](CVE-2024/CVE-2024-530xx/CVE-2024-53081.json) (`2024-11-19T18:15:27.480`) - [CVE-2024-45422](CVE-2024/CVE-2024-454xx/CVE-2024-45422.json) (`2024-11-19T20:15:31.430`)
- [CVE-2024-53082](CVE-2024/CVE-2024-530xx/CVE-2024-53082.json) (`2024-11-19T18:15:27.540`) - [CVE-2024-48694](CVE-2024/CVE-2024-486xx/CVE-2024-48694.json) (`2024-11-19T19:15:08.140`)
- [CVE-2024-53083](CVE-2024/CVE-2024-530xx/CVE-2024-53083.json) (`2024-11-19T18:15:27.620`) - [CVE-2024-50430](CVE-2024/CVE-2024-504xx/CVE-2024-50430.json) (`2024-11-19T19:15:08.240`)
- [CVE-2024-53084](CVE-2024/CVE-2024-530xx/CVE-2024-53084.json) (`2024-11-19T18:15:27.680`) - [CVE-2024-51503](CVE-2024/CVE-2024-515xx/CVE-2024-51503.json) (`2024-11-19T19:15:08.470`)
- [CVE-2024-53085](CVE-2024/CVE-2024-530xx/CVE-2024-53085.json) (`2024-11-19T18:15:27.757`) - [CVE-2024-52359](CVE-2024/CVE-2024-523xx/CVE-2024-52359.json) (`2024-11-19T20:15:31.840`)
- [CVE-2024-53086](CVE-2024/CVE-2024-530xx/CVE-2024-53086.json) (`2024-11-19T18:15:27.823`) - [CVE-2024-52360](CVE-2024/CVE-2024-523xx/CVE-2024-52360.json) (`2024-11-19T20:15:32.147`)
- [CVE-2024-53087](CVE-2024/CVE-2024-530xx/CVE-2024-53087.json) (`2024-11-19T18:15:27.883`) - [CVE-2024-52714](CVE-2024/CVE-2024-527xx/CVE-2024-52714.json) (`2024-11-19T19:15:08.680`)
- [CVE-2024-53088](CVE-2024/CVE-2024-530xx/CVE-2024-53088.json) (`2024-11-19T18:15:27.950`) - [CVE-2024-52759](CVE-2024/CVE-2024-527xx/CVE-2024-52759.json) (`2024-11-19T19:15:08.767`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `54` Recently modified CVEs: `56`
- [CVE-2024-42383](CVE-2024/CVE-2024-423xx/CVE-2024-42383.json) (`2024-11-19T17:55:22.020`) - [CVE-2024-28745](CVE-2024/CVE-2024-287xx/CVE-2024-28745.json) (`2024-11-19T20:35:20.717`)
- [CVE-2024-42384](CVE-2024/CVE-2024-423xx/CVE-2024-42384.json) (`2024-11-19T17:54:50.167`) - [CVE-2024-31617](CVE-2024/CVE-2024-316xx/CVE-2024-31617.json) (`2024-11-19T20:35:21.597`)
- [CVE-2024-42385](CVE-2024/CVE-2024-423xx/CVE-2024-42385.json) (`2024-11-19T17:54:31.197`) - [CVE-2024-31813](CVE-2024/CVE-2024-318xx/CVE-2024-31813.json) (`2024-11-19T20:35:22.397`)
- [CVE-2024-42386](CVE-2024/CVE-2024-423xx/CVE-2024-42386.json) (`2024-11-19T17:52:44.657`) - [CVE-2024-36905](CVE-2024/CVE-2024-369xx/CVE-2024-36905.json) (`2024-11-19T20:15:30.583`)
- [CVE-2024-42387](CVE-2024/CVE-2024-423xx/CVE-2024-42387.json) (`2024-11-19T17:51:41.980`) - [CVE-2024-38264](CVE-2024/CVE-2024-382xx/CVE-2024-38264.json) (`2024-11-19T20:52:32.727`)
- [CVE-2024-42388](CVE-2024/CVE-2024-423xx/CVE-2024-42388.json) (`2024-11-19T17:51:24.567`) - [CVE-2024-39609](CVE-2024/CVE-2024-396xx/CVE-2024-39609.json) (`2024-11-19T19:58:29.653`)
- [CVE-2024-42389](CVE-2024/CVE-2024-423xx/CVE-2024-42389.json) (`2024-11-19T17:51:10.533`) - [CVE-2024-41167](CVE-2024/CVE-2024-411xx/CVE-2024-41167.json) (`2024-11-19T19:45:02.660`)
- [CVE-2024-42390](CVE-2024/CVE-2024-423xx/CVE-2024-42390.json) (`2024-11-19T17:50:51.907`) - [CVE-2024-42450](CVE-2024/CVE-2024-424xx/CVE-2024-42450.json) (`2024-11-19T20:35:23.447`)
- [CVE-2024-42391](CVE-2024/CVE-2024-423xx/CVE-2024-42391.json) (`2024-11-19T17:50:36.100`) - [CVE-2024-43447](CVE-2024/CVE-2024-434xx/CVE-2024-43447.json) (`2024-11-19T20:52:55.763`)
- [CVE-2024-42392](CVE-2024/CVE-2024-423xx/CVE-2024-42392.json) (`2024-11-19T17:55:51.430`) - [CVE-2024-43449](CVE-2024/CVE-2024-434xx/CVE-2024-43449.json) (`2024-11-19T20:49:54.423`)
- [CVE-2024-43211](CVE-2024/CVE-2024-432xx/CVE-2024-43211.json) (`2024-11-19T18:15:20.787`) - [CVE-2024-43450](CVE-2024/CVE-2024-434xx/CVE-2024-43450.json) (`2024-11-19T20:49:26.017`)
- [CVE-2024-43323](CVE-2024/CVE-2024-433xx/CVE-2024-43323.json) (`2024-11-19T18:15:20.917`) - [CVE-2024-43452](CVE-2024/CVE-2024-434xx/CVE-2024-43452.json) (`2024-11-19T20:48:28.447`)
- [CVE-2024-49256](CVE-2024/CVE-2024-492xx/CVE-2024-49256.json) (`2024-11-19T18:15:22.090`) - [CVE-2024-43459](CVE-2024/CVE-2024-434xx/CVE-2024-43459.json) (`2024-11-19T20:43:02.103`)
- [CVE-2024-51094](CVE-2024/CVE-2024-510xx/CVE-2024-51094.json) (`2024-11-19T17:35:14.493`) - [CVE-2024-43462](CVE-2024/CVE-2024-434xx/CVE-2024-43462.json) (`2024-11-19T20:18:42.467`)
- [CVE-2024-51764](CVE-2024/CVE-2024-517xx/CVE-2024-51764.json) (`2024-11-19T17:35:15.297`) - [CVE-2024-43498](CVE-2024/CVE-2024-434xx/CVE-2024-43498.json) (`2024-11-19T20:01:04.877`)
- [CVE-2024-51765](CVE-2024/CVE-2024-517xx/CVE-2024-51765.json) (`2024-11-19T17:35:16.103`) - [CVE-2024-43499](CVE-2024/CVE-2024-434xx/CVE-2024-43499.json) (`2024-11-19T19:59:24.387`)
- [CVE-2024-52291](CVE-2024/CVE-2024-522xx/CVE-2024-52291.json) (`2024-11-19T18:06:42.973`) - [CVE-2024-44546](CVE-2024/CVE-2024-445xx/CVE-2024-44546.json) (`2024-11-19T20:35:24.240`)
- [CVE-2024-52292](CVE-2024/CVE-2024-522xx/CVE-2024-52292.json) (`2024-11-19T18:27:21.567`) - [CVE-2024-45611](CVE-2024/CVE-2024-456xx/CVE-2024-45611.json) (`2024-11-19T20:57:21.473`)
- [CVE-2024-52293](CVE-2024/CVE-2024-522xx/CVE-2024-52293.json) (`2024-11-19T17:51:39.460`) - [CVE-2024-48939](CVE-2024/CVE-2024-489xx/CVE-2024-48939.json) (`2024-11-19T20:35:25.830`)
- [CVE-2024-52305](CVE-2024/CVE-2024-523xx/CVE-2024-52305.json) (`2024-11-19T18:04:12.680`) - [CVE-2024-48990](CVE-2024/CVE-2024-489xx/CVE-2024-48990.json) (`2024-11-19T20:35:26.633`)
- [CVE-2024-8961](CVE-2024/CVE-2024-89xx/CVE-2024-8961.json) (`2024-11-19T17:01:15.787`) - [CVE-2024-48992](CVE-2024/CVE-2024-489xx/CVE-2024-48992.json) (`2024-11-19T20:35:27.427`)
- [CVE-2024-8978](CVE-2024/CVE-2024-89xx/CVE-2024-8978.json) (`2024-11-19T17:04:38.903`) - [CVE-2024-48993](CVE-2024/CVE-2024-489xx/CVE-2024-48993.json) (`2024-11-19T19:06:50.177`)
- [CVE-2024-8979](CVE-2024/CVE-2024-89xx/CVE-2024-8979.json) (`2024-11-19T17:05:08.270`) - [CVE-2024-50636](CVE-2024/CVE-2024-506xx/CVE-2024-50636.json) (`2024-11-19T19:35:14.833`)
- [CVE-2024-9474](CVE-2024/CVE-2024-94xx/CVE-2024-9474.json) (`2024-11-19T17:16:40.513`) - [CVE-2024-51679](CVE-2024/CVE-2024-516xx/CVE-2024-51679.json) (`2024-11-19T20:07:35.257`)
- [CVE-2024-9680](CVE-2024/CVE-2024-96xx/CVE-2024-9680.json) (`2024-11-19T17:29:12.207`) - [CVE-2024-52613](CVE-2024/CVE-2024-526xx/CVE-2024-52613.json) (`2024-11-19T20:39:42.197`)
## Download and Usage ## Download and Usage

File diff suppressed because it is too large Load Diff