Auto-Update: 2025-06-17T22:00:19.934607+00:00

This commit is contained in:
cad-safe-bot 2025-06-17 22:03:56 +00:00
parent 43b2e187cc
commit 71c0d661b2
402 changed files with 10017 additions and 1718 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-14520",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-08-24T20:15:08.510",
"lastModified": "2024-11-21T03:49:15.140",
"lastModified": "2025-06-17T20:15:23.837",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-8006",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-12T12:15:41.467",
"lastModified": "2024-11-21T05:38:12.083",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T21:01:15.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,52 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://circontrol.com/intelligent-charging-solutions/dc-chargers-series/raption-150/",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://seclists.org/fulldisclosure/2024/Mar/33",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://circontrol.com/intelligent-charging-solutions/dc-chargers-series/raption-150/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://seclists.org/fulldisclosure/2024/Mar/33",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:circontrol:raption_server:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.11.2",
"matchCriteriaId": "90380BD4-1577-43CA-919D-55974517E129"
}
]
}
]
}
],
"references": [
{
"url": "https://circontrol.com/intelligent-charging-solutions/dc-chargers-series/raption-150/",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://seclists.org/fulldisclosure/2024/Mar/33",
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://circontrol.com/intelligent-charging-solutions/dc-chargers-series/raption-150/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://seclists.org/fulldisclosure/2024/Mar/33",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1807",
"sourceIdentifier": "security-alert@sophos.com",
"published": "2022-09-07T18:15:08.647",
"lastModified": "2024-11-21T06:41:30.647",
"lastModified": "2025-06-17T20:15:24.970",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-23689",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2022-09-06T18:15:11.313",
"lastModified": "2024-11-21T06:49:06.443",
"lastModified": "2025-06-17T20:15:25.123",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-30312",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-07T18:15:08.807",
"lastModified": "2024-11-21T07:02:33.337",
"lastModified": "2025-06-17T20:15:25.327",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-319"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-31414",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-07T17:15:08.397",
"lastModified": "2024-11-21T07:04:27.940",
"lastModified": "2025-06-17T20:15:25.530",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-32264",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-06T18:15:15.530",
"lastModified": "2024-11-21T07:06:03.270",
"lastModified": "2025-06-17T20:15:25.727",
"vulnStatus": "Modified",
"cveTags": [
{
@ -43,6 +43,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -56,6 +76,16 @@
"value": "CWE-755"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-36504",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-08-25T14:15:11.237",
"lastModified": "2024-11-21T07:13:10.750",
"lastModified": "2025-06-17T20:15:25.923",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-36508",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-08-25T14:15:11.413",
"lastModified": "2024-11-21T07:13:11.347",
"lastModified": "2025-06-17T20:15:26.120",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-36509",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-08-25T14:15:11.457",
"lastModified": "2024-11-21T07:13:11.520",
"lastModified": "2025-06-17T20:15:26.290",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-36510",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-08-25T14:15:11.500",
"lastModified": "2024-11-21T07:13:11.693",
"lastModified": "2025-06-17T20:15:26.453",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-36511",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-08-25T14:15:11.547",
"lastModified": "2024-11-21T07:13:11.850",
"lastModified": "2025-06-17T20:15:26.617",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-36513",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-08-25T14:15:11.590",
"lastModified": "2024-11-21T07:13:12.010",
"lastModified": "2025-06-17T20:15:26.780",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-36587",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-07T17:15:08.520",
"lastModified": "2024-11-21T07:13:21.960",
"lastModified": "2025-06-17T20:15:26.947",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-36659",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-07T17:15:08.567",
"lastModified": "2024-11-21T07:13:27.807",
"lastModified": "2025-06-17T20:15:27.130",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-476"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-36660",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-07T17:15:08.613",
"lastModified": "2024-11-21T07:13:27.947",
"lastModified": "2025-06-17T20:15:27.297",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-36661",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-07T17:15:08.667",
"lastModified": "2024-11-21T07:13:28.100",
"lastModified": "2025-06-17T20:15:27.457",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-476"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-37780",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-07T17:15:08.717",
"lastModified": "2024-11-21T07:15:09.260",
"lastModified": "2025-06-17T20:15:27.613",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48577",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-10T22:15:47.610",
"lastModified": "2024-11-21T07:33:31.703",
"lastModified": "2025-06-17T20:15:27.790",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29483",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T14:15:12.010",
"lastModified": "2024-11-21T07:57:08.920",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T20:50:56.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,86 +51,236 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/eventlet/eventlet/issues/913",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/eventlet/eventlet/releases/tag/v0.35.2",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://github.com/rthalley/dnspython/issues/1045",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/rthalley/dnspython/releases/tag/v2.6.0",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRKR57IFVKQC2GCXZBFLCLBAWBWL3F6/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOHJOO3OM65UIUUUVDEXMCTXNM6LXZEH/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3BNSIK5NFYSAP53Y45GOCMOQHHDLGIF/",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240510-0001/",
"source": "cve@mitre.org"
},
{
"url": "https://security.snyk.io/vuln/SNYK-PYTHON-DNSPYTHON-6241713",
"source": "cve@mitre.org"
},
{
"url": "https://www.dnspython.org/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/eventlet/eventlet/issues/913",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/eventlet/eventlet/releases/tag/v0.35.2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/rthalley/dnspython/issues/1045",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/rthalley/dnspython/releases/tag/v2.6.0",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRKR57IFVKQC2GCXZBFLCLBAWBWL3F6/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOHJOO3OM65UIUUUVDEXMCTXNM6LXZEH/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3BNSIK5NFYSAP53Y45GOCMOQHHDLGIF/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240510-0001/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://security.snyk.io/vuln/SNYK-PYTHON-DNSPYTHON-6241713",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.dnspython.org/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:eventlet:eventlet:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.35.2",
"matchCriteriaId": "6A4D34E2-32E0-4D02-9CCE-C51CABE65099"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dnspython:dnspython:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.6.0",
"matchCriteriaId": "97627580-395B-4E07-8634-01CB4DC5CD62"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/eventlet/eventlet/issues/913",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://github.com/eventlet/eventlet/releases/tag/v0.35.2",
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/rthalley/dnspython/issues/1045",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://github.com/rthalley/dnspython/releases/tag/v2.6.0",
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRKR57IFVKQC2GCXZBFLCLBAWBWL3F6/",
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOHJOO3OM65UIUUUVDEXMCTXNM6LXZEH/",
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3BNSIK5NFYSAP53Y45GOCMOQHHDLGIF/",
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240510-0001/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-PYTHON-DNSPYTHON-6241713",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.dnspython.org/",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/eventlet/eventlet/issues/913",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://github.com/eventlet/eventlet/releases/tag/v0.35.2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/rthalley/dnspython/issues/1045",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://github.com/rthalley/dnspython/releases/tag/v2.6.0",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRKR57IFVKQC2GCXZBFLCLBAWBWL3F6/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOHJOO3OM65UIUUUVDEXMCTXNM6LXZEH/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3BNSIK5NFYSAP53Y45GOCMOQHHDLGIF/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240510-0001/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-PYTHON-DNSPYTHON-6241713",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.dnspython.org/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32295",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-11T12:15:07.707",
"lastModified": "2025-02-11T22:15:26.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T20:51:06.523",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -81,14 +81,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/easyappointments/wordpress-easy-appointments-plugin-1-3-1-arbitrary-file-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
},
"nodes": [
{
"url": "https://patchstack.com/database/vulnerability/easyappointments/wordpress-easy-appointments-plugin-1-3-1-arbitrary-file-deletion-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easyappointments:easy\\!appointments:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.4.0",
"matchCriteriaId": "B79B3551-1D48-46C6-9ACB-BE5A6C4A6ABD"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/easyappointments/wordpress-easy-appointments-plugin-1-3-1-arbitrary-file-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/easyappointments/wordpress-easy-appointments-plugin-1-3-1-arbitrary-file-deletion-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39457",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:10.647",
"lastModified": "2024-11-21T08:15:27.707",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T21:03:54.923",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com"
},
"nodes": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1025/",
"source": "zdi-disclosures@trendmicro.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1025/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:5.1.3.20324:*:*:*:*:*:*:*",
"matchCriteriaId": "B3AC0B76-A64D-4650-AFF9-4B9AE5A8C4C3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1025/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1025/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39458",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:10.823",
"lastModified": "2024-11-21T08:15:27.830",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T21:03:48.560",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com"
},
"nodes": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1026/",
"source": "zdi-disclosures@trendmicro.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1026/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:5.1.3.20324:*:*:*:*:*:*:*",
"matchCriteriaId": "B3AC0B76-A64D-4650-AFF9-4B9AE5A8C4C3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1026/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1026/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39459",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:10.987",
"lastModified": "2024-11-21T08:15:27.947",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T21:03:44.860",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com"
},
"nodes": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1027/",
"source": "zdi-disclosures@trendmicro.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1027/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E52553E2-31EB-48D8-AB17-167CE092FB8C"
}
]
}
]
}
],
"references": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1027/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1027/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39460",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:11.157",
"lastModified": "2024-11-21T08:15:28.063",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T21:03:41.000",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com"
},
"nodes": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1028/",
"source": "zdi-disclosures@trendmicro.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1028/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:5.1.3.20324:*:*:*:*:*:*:*",
"matchCriteriaId": "B3AC0B76-A64D-4650-AFF9-4B9AE5A8C4C3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1028/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1028/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39461",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:11.363",
"lastModified": "2024-11-21T08:15:28.183",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T21:03:37.467",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com"
},
"nodes": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1029/",
"source": "zdi-disclosures@trendmicro.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1029/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:5.1.3.20324:*:*:*:*:*:*:*",
"matchCriteriaId": "B3AC0B76-A64D-4650-AFF9-4B9AE5A8C4C3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1029/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1029/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39462",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:11.533",
"lastModified": "2024-11-21T08:15:28.313",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T21:03:33.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com"
},
"nodes": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1030/",
"source": "zdi-disclosures@trendmicro.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1030/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:5.1.3.20324:*:*:*:*:*:*:*",
"matchCriteriaId": "B3AC0B76-A64D-4650-AFF9-4B9AE5A8C4C3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1030/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1030/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39463",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:11.703",
"lastModified": "2024-11-21T08:15:28.437",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T21:03:30.330",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com"
},
"nodes": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1031/",
"source": "zdi-disclosures@trendmicro.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1031/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:5.1.3.20324:*:*:*:*:*:*:*",
"matchCriteriaId": "B3AC0B76-A64D-4650-AFF9-4B9AE5A8C4C3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1031/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1031/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39464",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:11.870",
"lastModified": "2024-11-21T08:15:28.560",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T21:03:26.297",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com"
},
"nodes": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1032/",
"source": "zdi-disclosures@trendmicro.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1032/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:5.1.3.20324:*:*:*:*:*:*:*",
"matchCriteriaId": "B3AC0B76-A64D-4650-AFF9-4B9AE5A8C4C3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1032/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1032/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39465",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:12.030",
"lastModified": "2024-11-21T08:15:28.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T21:03:22.110",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com"
},
"nodes": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1033/",
"source": "zdi-disclosures@trendmicro.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1033/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:5.1.3.20324:*:*:*:*:*:*:*",
"matchCriteriaId": "B3AC0B76-A64D-4650-AFF9-4B9AE5A8C4C3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1033/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1033/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39466",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:12.193",
"lastModified": "2024-11-21T08:15:28.803",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T21:03:18.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com"
},
"nodes": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1034/",
"source": "zdi-disclosures@trendmicro.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1034/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:5.1.3.20324:*:*:*:*:*:*:*",
"matchCriteriaId": "B3AC0B76-A64D-4650-AFF9-4B9AE5A8C4C3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1034/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1034/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39467",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:12.360",
"lastModified": "2024-11-21T08:15:28.927",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T21:03:14.050",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com"
},
"nodes": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1035/",
"source": "zdi-disclosures@trendmicro.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1035/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:5.1.3.20324:*:*:*:*:*:*:*",
"matchCriteriaId": "B3AC0B76-A64D-4650-AFF9-4B9AE5A8C4C3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1035/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1035/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39468",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:12.563",
"lastModified": "2024-11-21T08:15:29.043",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T21:02:53.483",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com"
},
"nodes": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1036/",
"source": "zdi-disclosures@trendmicro.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1036/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:5.1.3.20324:*:*:*:*:*:*:*",
"matchCriteriaId": "B3AC0B76-A64D-4650-AFF9-4B9AE5A8C4C3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1036/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1036/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-44117",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-01-16T08:15:08.573",
"lastModified": "2024-11-21T08:25:16.753",
"lastModified": "2025-06-17T21:15:27.167",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-47459",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-16T01:15:34.283",
"lastModified": "2024-11-21T08:30:18.770",
"lastModified": "2025-06-17T20:15:28.223",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48865",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T22:15:13.687",
"lastModified": "2024-11-21T08:32:34.300",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T20:49:50.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gist.github.com/aashiqahamedn/39383cfbc639cbdc3e1a7d74b977aeae",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/reportico-web/reportico/issues/51",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://gist.github.com/aashiqahamedn/39383cfbc639cbdc3e1a7d74b977aeae",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/reportico-web/reportico/issues/51",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:reportico:reportico:8.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "77D31E9B-3561-4C7C-9F55-92E49C9D209D"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/aashiqahamedn/39383cfbc639cbdc3e1a7d74b977aeae",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/reportico-web/reportico/issues/51",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://gist.github.com/aashiqahamedn/39383cfbc639cbdc3e1a7d74b977aeae",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/reportico-web/reportico/issues/51",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-50349",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-02-09T21:15:07.840",
"lastModified": "2024-11-21T08:36:53.027",
"lastModified": "2025-06-17T20:15:28.383",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-352"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51890",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-24T18:15:08.380",
"lastModified": "2024-11-21T08:38:55.530",
"lastModified": "2025-06-17T20:15:28.593",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-835"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51949",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-12T15:15:09.663",
"lastModified": "2024-11-21T08:38:57.543",
"lastModified": "2025-06-17T21:15:31.547",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-352"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5879",
"sourceIdentifier": "cve@rapid7.com",
"published": "2024-01-03T20:15:21.737",
"lastModified": "2024-11-21T08:42:41.747",
"lastModified": "2025-06-17T20:15:28.793",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6494",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-13T09:15:06.917",
"lastModified": "2024-11-21T08:43:57.800",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T20:58:23.243",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,52 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3069323%40woo-smart-quick-view&new=3069323%40woo-smart-quick-view&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
"nodes": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/45ac52e1-9f0e-499e-9125-2581940f5bdd?source=cve",
"source": "security@wordfence.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3069323%40woo-smart-quick-view&new=3069323%40woo-smart-quick-view&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/45ac52e1-9f0e-499e-9125-2581940f5bdd?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:wpclever:wpc_smart_quick_view_for_woocommerce:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.0.3",
"matchCriteriaId": "ECCB017E-A7C6-4390-81A2-8AC5D14DE089"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3069323%40woo-smart-quick-view&new=3069323%40woo-smart-quick-view&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/45ac52e1-9f0e-499e-9125-2581940f5bdd?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3069323%40woo-smart-quick-view&new=3069323%40woo-smart-quick-view&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/45ac52e1-9f0e-499e-9125-2581940f5bdd?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-7125",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:14.080",
"lastModified": "2024-11-21T08:45:19.223",
"lastModified": "2025-06-17T21:15:33.470",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10811",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2025-01-14T17:15:14.007",
"lastModified": "2025-02-21T15:15:11.143",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T21:07:03.427",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,16 +69,86 @@
"value": "CWE-36"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:*:-:*:*:*:*:*:*",
"versionEndExcluding": "2022",
"matchCriteriaId": "11BA6FEC-4862-4799-B8A1-9CEF9FE1B147"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*",
"matchCriteriaId": "46580865-5177-4E55-BDAC-73DA4B472B35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*",
"matchCriteriaId": "E57E12B5-B789-450C-9476-6C4C151E6993"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*",
"matchCriteriaId": "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*",
"matchCriteriaId": "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*",
"matchCriteriaId": "1877FB55-76BA-4714-ABB8-47258132F537"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*",
"matchCriteriaId": "4F9E8D45-5F12-4D45-A74E-C314FA3618A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*",
"matchCriteriaId": "6C7283FE-C10A-4E37-B004-15FB0CAC49A5"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.horizon3.ai/attack-research/attack-blogs/ivanti-endpoint-manager-multiple-credential-coercion-vulnerabilities/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21154",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:17.767",
"lastModified": "2024-11-21T08:53:53.457",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T20:01:39.753",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "secalert_us@oracle.com"
},
"nodes": [
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_human_resources:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FDB17640-C307-4997-9D2F-A461812107E9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21169",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:20.430",
"lastModified": "2024-11-21T08:53:55.117",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T20:01:59.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "secalert_us@oracle.com"
},
"nodes": [
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:marketing:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.2.3",
"versionEndIncluding": "12.2.13",
"matchCriteriaId": "CFF09012-F408-4F7D-A282-34ECA514CAB2"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21821",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-01-11T00:15:44.633",
"lastModified": "2024-11-21T08:55:03.880",
"lastModified": "2025-06-17T20:15:29.210",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22526",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-12T07:15:08.480",
"lastModified": "2024-11-21T08:56:24.543",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T21:01:24.940",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gist.github.com/GAP-dev/c33276a151c824300d68aecc317082a3",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://gist.github.com/GAP-dev/c33276a151c824300d68aecc317082a3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bandisoft:bandiview:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BDE724DB-166F-438B-B787-871DF6EF7504"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/GAP-dev/c33276a151c824300d68aecc317082a3",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/GAP-dev/c33276a151c824300d68aecc317082a3",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22734",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-12T06:15:06.697",
"lastModified": "2024-11-21T08:56:36.573",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T21:01:42.860",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,40 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.redlinecybersecurity.com/blog/cve-2024-22734",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.redlinecybersecurity.com/blog/cve-2024-22734",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:amcsgroup:trux_waste_management:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.19.0018.26912",
"matchCriteriaId": "98209DC3-6210-4E8B-9B4E-0AE2A38D4705"
}
]
}
]
}
],
"references": [
{
"url": "https://www.redlinecybersecurity.com/blog/cve-2024-22734",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.redlinecybersecurity.com/blog/cve-2024-22734",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23049",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-05T23:15:08.463",
"lastModified": "2024-11-21T08:56:51.953",
"lastModified": "2025-06-17T20:15:29.467",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-77"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23060",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-11T16:15:56.110",
"lastModified": "2024-11-21T08:56:53.390",
"lastModified": "2025-06-17T20:15:29.657",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23576",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-05-14T14:59:48.920",
"lastModified": "2024-11-21T08:57:56.943",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T21:01:23.060",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0112907",
"source": "psirt@hcl.com"
},
"nodes": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0112907",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltechsw:hcl_commerce:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.1.12",
"versionEndExcluding": "9.1.14",
"matchCriteriaId": "52EFA725-093A-4B6E-BD5D-A729BDA81B01"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0112907",
"source": "psirt@hcl.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0112907",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23692",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2024-05-31T10:15:09.330",
"lastModified": "2025-01-27T21:43:16.410",
"vulnStatus": "Analyzed",
"lastModified": "2025-06-17T20:15:29.823",
"vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "disclosure@vulncheck.com",
@ -157,6 +157,14 @@
"Third Party Advisory"
]
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2024-23692-detect-rejetto-hfs-vulnerability",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2024-23692-rejetto-hfs-mitigate-vulnerability",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.vicarius.io/vsociety/posts/unauthenticated-rce-flaw-in-rejetto-http-file-server-cve-2024-23692",
"source": "af854a3a-2127-422b-91ae-364da2661108",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24510",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-09T19:15:13.197",
"lastModified": "2024-11-05T21:35:06.877",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:17:07.527",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://book.hacktricks.xyz/pentesting-web/xs-search/css-injection",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/Alinto/sogo/commit/21468700718ed71774eaf2979ee59330fc569424",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:alinto:sogo:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.0",
"matchCriteriaId": "2B880C8F-1A92-4A2E-976B-3A8CACC5D00E"
}
]
}
]
}
],
"references": [
{
"url": "https://book.hacktricks.xyz/pentesting-web/xs-search/css-injection",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/Alinto/sogo/commit/21468700718ed71774eaf2979ee59330fc569424",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24746",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-06T12:15:08.310",
"lastModified": "2024-11-21T08:59:36.647",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:45:18.740",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,30 +61,66 @@
]
}
],
"references": [
"configurations": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/05/2",
"source": "security@apache.org"
},
"nodes": [
{
"url": "https://github.com/apache/mynewt-nimble/commit/d42a0ebe6632bd0c318560e4293a522634f60594",
"source": "security@apache.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://lists.apache.org/thread/bptkzc0o2ymjk8qqzqdmy39kcmh27078",
"source": "security@apache.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/05/2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/apache/mynewt-nimble/commit/d42a0ebe6632bd0c318560e4293a522634f60594",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.apache.org/thread/bptkzc0o2ymjk8qqzqdmy39kcmh27078",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:nimble:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.7.0",
"matchCriteriaId": "886F6C28-EF8D-4F3F-97FB-6221D6322B55"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/05/2",
"source": "security@apache.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://github.com/apache/mynewt-nimble/commit/d42a0ebe6632bd0c318560e4293a522634f60594",
"source": "security@apache.org",
"tags": [
"Patch"
]
},
{
"url": "https://lists.apache.org/thread/bptkzc0o2ymjk8qqzqdmy39kcmh27078",
"source": "security@apache.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/05/2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://github.com/apache/mynewt-nimble/commit/d42a0ebe6632bd0c318560e4293a522634f60594",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://lists.apache.org/thread/bptkzc0o2ymjk8qqzqdmy39kcmh27078",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25201",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-07T14:15:53.060",
"lastModified": "2024-11-21T09:00:26.897",
"lastModified": "2025-06-17T20:15:30.030",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25309",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-09T13:15:42.130",
"lastModified": "2024-11-21T09:00:37.043",
"lastModified": "2025-06-17T20:15:30.187",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25376",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T21:15:07.937",
"lastModified": "2025-03-13T21:15:38.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T20:50:44.857",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.thesycon.de/eng/usb_audiodriver.shtml#SecurityAdvisory",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.thesycon.de/eng/usb_audiodriver.shtml#SecurityAdvisory",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thesycon:tusbaudio:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.68.0",
"matchCriteriaId": "04EEC0F4-0FEF-4947-83D7-F766BB70C8F8"
}
]
}
]
}
],
"references": [
{
"url": "https://www.thesycon.de/eng/usb_audiodriver.shtml#SecurityAdvisory",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.thesycon.de/eng/usb_audiodriver.shtml#SecurityAdvisory",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25545",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-12T13:15:15.220",
"lastModified": "2024-11-21T09:00:58.537",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T21:01:04.893",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,53 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gist.github.com/khronokernel/b68709335aa097752423f5d6844c3aa3",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.weavehelp.com/hc/en-us/articles/360060696152-Download-the-Weave-Desktop-App",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://gist.github.com/khronokernel/b68709335aa097752423f5d6844c3aa3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.weavehelp.com/hc/en-us/articles/360060696152-Download-the-Weave-Desktop-App",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:weave:weave_desktop:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.78.10",
"versionEndIncluding": "7.84.1",
"matchCriteriaId": "3AB852FC-3297-4A5E-8557-11598882A5A3"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/khronokernel/b68709335aa097752423f5d6844c3aa3",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.weavehelp.com/hc/en-us/articles/360060696152-Download-the-Weave-Desktop-App",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://gist.github.com/khronokernel/b68709335aa097752423f5d6844c3aa3",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.weavehelp.com/hc/en-us/articles/360060696152-Download-the-Weave-Desktop-App",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25852",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T21:15:07.980",
"lastModified": "2024-11-21T09:01:27.317",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T20:50:31.347",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,73 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/ZackSecurity/VulnerReport/blob/cve/Linksys/1.md",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linksys:re7000_firmware:2.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "D458466C-3906-4191-83DD-CE81790B7226"
},
{
"url": "https://immense-mirror-b42.notion.site/Linksys-RE7000-command-injection-vulnerability-c1a47abf5e8d4dd0934d20d77da930bd",
"source": "cve@mitre.org"
"vulnerable": true,
"criteria": "cpe:2.3:o:linksys:re7000_firmware:2.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9E1C493F-E2E1-4A8C-9C7F-625102FF452A"
},
{
"url": "https://github.com/ZackSecurity/VulnerReport/blob/cve/Linksys/1.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:o:linksys:re7000_firmware:2.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "9F28D5E8-5CFA-4FB2-99C8-63A9BEB8E031"
}
]
},
{
"url": "https://immense-mirror-b42.notion.site/Linksys-RE7000-command-injection-vulnerability-c1a47abf5e8d4dd0934d20d77da930bd",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:linksys:re7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D04E83B6-EE99-42EB-AA37-895B1467CEDA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ZackSecurity/VulnerReport/blob/cve/Linksys/1.md",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://immense-mirror-b42.notion.site/Linksys-RE7000-command-injection-vulnerability-c1a47abf5e8d4dd0934d20d77da930bd",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/ZackSecurity/VulnerReport/blob/cve/Linksys/1.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://immense-mirror-b42.notion.site/Linksys-RE7000-command-injection-vulnerability-c1a47abf5e8d4dd0934d20d77da930bd",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26362",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T21:15:06.533",
"lastModified": "2024-11-21T09:02:25.010",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T20:56:16.430",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,54 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://packetstormsecurity.com/files/177075/Enpass-Desktop-Application-6.9.2-HTML-Injection.html",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:enpass:password_manager:6.9.2:*:*:*:desktop:*:*:*",
"matchCriteriaId": "FCD19FF9-0F7C-4C5F-BAEA-DDACA509E480"
}
]
},
{
"url": "https://packetstormsecurity.com/files/177075/Enpass-Desktop-Application-6.9.2-HTML-Injection.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://packetstormsecurity.com/files/177075/Enpass-Desktop-Application-6.9.2-HTML-Injection.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://packetstormsecurity.com/files/177075/Enpass-Desktop-Application-6.9.2-HTML-Injection.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27231",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:07.787",
"lastModified": "2024-11-25T16:15:12.423",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:45:31.497",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27232",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:07.847",
"lastModified": "2024-11-21T16:15:23.417",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:45:37.470",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -55,14 +55,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27314",
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
"published": "2024-05-27T07:15:09.297",
"lastModified": "2024-11-21T09:04:18.717",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T20:18:05.387",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,14 +61,85 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.manageengine.com/products/service-desk/cve-2024-27314.html",
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:*:*:*:*:*:*:*:*",
"versionEndIncluding": "14.6",
"matchCriteriaId": "290E0FBA-79EA-4510-A53A-34220253A9C1"
},
{
"url": "https://www.manageengine.com/products/service-desk/cve-2024-27314.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:14.7:14700:*:*:*:*:*:*",
"matchCriteriaId": "1EDFAB9B-9DC8-432C-B191-EA0F31800E03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:14.7:14710:*:*:*:*:*:*",
"matchCriteriaId": "DE0513D6-ED58-4498-ADD1-3F4C86B64FA3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:14.7:14720:*:*:*:*:*:*",
"matchCriteriaId": "AC72689A-18BD-42B0-90AD-39112EBA80F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:*:*:*:*:*:*:*:*",
"versionEndIncluding": "14.6",
"matchCriteriaId": "AEBBD6E9-B17F-413F-9AC3-2D7F86274743"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:14.7:14700:*:*:*:*:*:*",
"matchCriteriaId": "91D417CC-9745-402E-A7E6-AE2D5C23E132"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:14.7:14710:*:*:*:*:*:*",
"matchCriteriaId": "9A56DBA9-0983-4329-B77A-CF84112B0C06"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:*:*:*:*:*:*:*:*",
"versionEndIncluding": "14.6",
"matchCriteriaId": "AE784E2C-B217-4FE8-A6E4-D378356AE1AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:14.7:14700:*:*:*:*:*:*",
"matchCriteriaId": "B7CDCEC2-9D93-41FB-9FC0-556EE84C033E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:14.7:14710:*:*:*:*:*:*",
"matchCriteriaId": "2C420DA1-CC5C-4A9B-B428-F3816B10F822"
}
]
}
]
}
],
"references": [
{
"url": "https://www.manageengine.com/products/service-desk/cve-2024-27314.html",
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.manageengine.com/products/service-desk/cve-2024-27314.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27592",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T21:15:08.027",
"lastModified": "2024-11-21T09:04:46.897",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T20:50:17.903",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,53 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/corezoid/helm/issues/110",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://medium.com/%40nicatabbasov00002/open-redirect-vulnerability-62986ccaf0f7",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://github.com/corezoid/helm/issues/110",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://medium.com/%40nicatabbasov00002/open-redirect-vulnerability-62986ccaf0f7",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:corezoid:corezoid:6.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "31A243CF-DFFF-4351-AEC7-7E1D0861622D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/corezoid/helm/issues/110",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://medium.com/%40nicatabbasov00002/open-redirect-vulnerability-62986ccaf0f7",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/corezoid/helm/issues/110",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://medium.com/%40nicatabbasov00002/open-redirect-vulnerability-62986ccaf0f7",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27683",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T01:25:05.340",
"lastModified": "2024-11-21T09:04:53.367",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T20:55:49.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,30 +51,77 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://drive.google.com/file/d/18RhbBnaD_kH16Y6C-7TpSSPUmYKKyU_k/view",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:go-rt-ac750_firmware:101b03:*:*:*:*:*:*:*",
"matchCriteriaId": "11857770-E809-483A-993F-1C827428B334"
}
]
},
{
"url": "https://gist.github.com/sunwithmoon/428c3871482a600382fec0a1994a518b",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
},
{
"url": "https://drive.google.com/file/d/18RhbBnaD_kH16Y6C-7TpSSPUmYKKyU_k/view",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://gist.github.com/sunwithmoon/428c3871482a600382fec0a1994a518b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:go-rt-ac750:a1:*:*:*:*:*:*:*",
"matchCriteriaId": "FD359363-0BD0-49DF-99B3-1F6A2CED8378"
}
]
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/18RhbBnaD_kH16Y6C-7TpSSPUmYKKyU_k/view",
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
]
},
{
"url": "https://gist.github.com/sunwithmoon/428c3871482a600382fec0a1994a518b",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://drive.google.com/file/d/18RhbBnaD_kH16Y6C-7TpSSPUmYKKyU_k/view",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://gist.github.com/sunwithmoon/428c3871482a600382fec0a1994a518b",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28718",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-12T13:15:15.473",
"lastModified": "2024-11-21T09:06:49.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T21:00:54.593",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,30 +51,69 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://bugs.launchpad.net/magnum/+bug/2047690",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://gist.github.com/Fewword/f098d8d6375ac25e27b18c0e57be532f",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://review.opendev.org/c/openstack/magnum/+/907305",
"source": "cve@mitre.org"
},
{
"url": "https://bugs.launchpad.net/magnum/+bug/2047690",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://gist.github.com/Fewword/f098d8d6375ac25e27b18c0e57be532f",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://review.opendev.org/c/openstack/magnum/+/907305",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:openstack:magnum:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83DFAAEE-A65A-4004-912C-B83E43769DF4"
}
]
}
]
}
],
"references": [
{
"url": "https://bugs.launchpad.net/magnum/+bug/2047690",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
]
},
{
"url": "https://gist.github.com/Fewword/f098d8d6375ac25e27b18c0e57be532f",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://review.opendev.org/c/openstack/magnum/+/907305",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://bugs.launchpad.net/magnum/+bug/2047690",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
]
},
{
"url": "https://gist.github.com/Fewword/f098d8d6375ac25e27b18c0e57be532f",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://review.opendev.org/c/openstack/magnum/+/907305",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29399",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T06:15:06.903",
"lastModified": "2024-11-21T09:08:00.033",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T20:53:19.370",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/ally-petitt/CVE-2024-29399",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/ally-petitt/CVE-2024-29399",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnu:savane:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.13",
"matchCriteriaId": "872D49FE-7656-42F1-815D-1BBAF4731F17"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ally-petitt/CVE-2024-29399",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/ally-petitt/CVE-2024-29399",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29500",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T20:15:07.510",
"lastModified": "2025-04-15T23:15:42.400",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T20:56:39.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,44 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://raeph123.github.io/BlogPosts/inteset/Inteset_Secure_Lockdown_Multi_Application_Edition_-_Vulnerabilities_and_Hardening_Measures_en.html",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.drive-byte.de/en/blog/inteset-bugs-and-hardening",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.drive-byte.de/en/blog/inteset-bugs-and-hardening",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:inteset:secure_lockdown:2.00.219:*:*:*:multi_application:*:*:*",
"matchCriteriaId": "85AAE36A-CED7-4BFE-8F4E-C71C314BAE98"
}
]
}
]
}
],
"references": [
{
"url": "https://raeph123.github.io/BlogPosts/inteset/Inteset_Secure_Lockdown_Multi_Application_Edition_-_Vulnerabilities_and_Hardening_Measures_en.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://www.drive-byte.de/en/blog/inteset-bugs-and-hardening",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.drive-byte.de/en/blog/inteset-bugs-and-hardening",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29502",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T20:15:07.567",
"lastModified": "2025-04-15T22:15:15.290",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T20:56:33.427",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,44 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://raeph123.github.io/BlogPosts/inteset/Inteset_Secure_Lockdown_Multi_Application_Edition_-_Vulnerabilities_and_Hardening_Measures_en.html",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.drive-byte.de/en/blog/inteset-bugs-and-hardening",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.drive-byte.de/en/blog/inteset-bugs-and-hardening",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:inteset:secure_lockdown:2.00.219:*:*:*:multi_application:*:*:*",
"matchCriteriaId": "85AAE36A-CED7-4BFE-8F4E-C71C314BAE98"
}
]
}
]
}
],
"references": [
{
"url": "https://raeph123.github.io/BlogPosts/inteset/Inteset_Secure_Lockdown_Multi_Application_Edition_-_Vulnerabilities_and_Hardening_Measures_en.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://www.drive-byte.de/en/blog/inteset-bugs-and-hardening",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.drive-byte.de/en/blog/inteset-bugs-and-hardening",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29504",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T22:15:07.287",
"lastModified": "2024-11-21T09:08:05.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T20:56:03.060",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,54 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gist.github.com/phoenix118go/a9192281efcfa518daa709ab7638712b",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/summernote/summernote/pull/3782",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://gist.github.com/phoenix118go/a9192281efcfa518daa709ab7638712b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/summernote/summernote/pull/3782",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:summernote:summernote:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.8.18",
"matchCriteriaId": "1553436A-6819-4EB1-8170-33EFB876DC00"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/phoenix118go/a9192281efcfa518daa709ab7638712b",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/summernote/summernote/pull/3782",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://gist.github.com/phoenix118go/a9192281efcfa518daa709ab7638712b",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/summernote/summernote/pull/3782",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29738",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:07.907",
"lastModified": "2025-03-29T00:15:20.783",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:45:42.580",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29739",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:07.960",
"lastModified": "2024-11-21T09:08:12.613",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:45:47.673",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29740",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.010",
"lastModified": "2024-11-21T09:08:12.813",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:45:53.207",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29741",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.060",
"lastModified": "2025-02-27T20:15:38.403",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:45:58.880",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29742",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.107",
"lastModified": "2024-11-21T09:08:13.120",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:46:04.303",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29743",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.153",
"lastModified": "2025-03-24T20:15:18.087",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:46:09.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29744",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.207",
"lastModified": "2025-03-25T18:15:32.603",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:46:16.403",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29746",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.303",
"lastModified": "2024-11-21T09:08:13.740",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:47:51.877",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29747",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.357",
"lastModified": "2024-11-21T09:08:13.937",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:47:57.923",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29749",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.457",
"lastModified": "2024-11-21T09:08:14.373",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:48:02.363",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29750",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.507",
"lastModified": "2024-11-21T09:08:14.570",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:48:05.980",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29751",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.560",
"lastModified": "2024-11-21T09:08:14.760",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:48:10.710",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29752",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.617",
"lastModified": "2024-11-21T09:08:14.953",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:48:14.407",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29753",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.667",
"lastModified": "2025-03-25T16:15:20.563",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:48:18.490",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29754",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.717",
"lastModified": "2025-03-27T21:15:48.057",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:48:23.027",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29755",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.763",
"lastModified": "2024-11-21T09:08:15.367",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:48:27.723",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29756",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.813",
"lastModified": "2024-11-21T09:08:15.560",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:48:32.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29757",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.867",
"lastModified": "2025-03-18T21:15:24.640",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:48:37.457",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29782",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.917",
"lastModified": "2024-11-21T15:15:29.660",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:48:42.020",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29783",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.967",
"lastModified": "2025-03-25T16:15:20.717",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T20:48:47.317",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
},
"nodes": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29937",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T01:25:15.210",
"lastModified": "2025-03-13T16:15:18.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T20:54:57.107",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,38 +51,85 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://news.ycombinator.com/item?id=39778203",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:-:*:*:*:*:*:*",
"matchCriteriaId": "FA25530A-133C-4D7C-8993-D5C42D79A0B5"
},
{
"url": "https://t2.fi/schedule/2024/",
"source": "cve@mitre.org"
},
{
"url": "https://www.signedness.org/t2.fi.2024/",
"source": "cve@mitre.org"
},
{
"url": "https://www.youtube.com/watch?v=i_JOkHaCdzk",
"source": "cve@mitre.org"
},
{
"url": "https://news.ycombinator.com/item?id=39778203",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://t2.fi/schedule/2024/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.signedness.org/t2.fi.2024/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.youtube.com/watch?v=i_JOkHaCdzk",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7.4",
"matchCriteriaId": "CCDBC9BF-FEE5-4EBD-9D65-87086684439A"
}
]
}
]
}
],
"references": [
{
"url": "https://news.ycombinator.com/item?id=39778203",
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://t2.fi/schedule/2024/",
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://www.signedness.org/t2.fi.2024/",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.youtube.com/watch?v=i_JOkHaCdzk",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://news.ycombinator.com/item?id=39778203",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
]
},
{
"url": "https://t2.fi/schedule/2024/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
]
},
{
"url": "https://www.signedness.org/t2.fi.2024/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.youtube.com/watch?v=i_JOkHaCdzk",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30125",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-07-18T18:15:05.460",
"lastModified": "2024-11-21T09:11:18.223",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T21:02:15.470",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0113886",
"source": "psirt@hcl.com"
},
"nodes": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0113886",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:bigfix_compliance:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0.11",
"matchCriteriaId": "F3301F5D-57E1-4FE2-8397-26C7FA083278"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0113886",
"source": "psirt@hcl.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0113886",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30126",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-07-18T20:15:03.967",
"lastModified": "2024-11-21T09:11:18.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T21:02:33.930",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0113886",
"source": "psirt@hcl.com"
},
"nodes": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0113886",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:bigfix_compliance:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0.11",
"matchCriteriaId": "F3301F5D-57E1-4FE2-8397-26C7FA083278"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0113886",
"source": "psirt@hcl.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0113886",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30140",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-11-07T09:15:03.480",
"lastModified": "2024-11-08T19:01:03.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T21:03:05.410",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,30 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0117197",
"source": "psirt@hcl.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:bigfix_compliance:2.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "093AEE43-3BAB-4CA4-A8FF-58E9DB3A40FA"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0117197",
"source": "psirt@hcl.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30141",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-11-07T09:15:03.707",
"lastModified": "2024-11-08T19:01:03.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T21:03:22.573",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,30 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0117197",
"source": "psirt@hcl.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:bigfix_compliance:2.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "093AEE43-3BAB-4CA4-A8FF-58E9DB3A40FA"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0117197",
"source": "psirt@hcl.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30142",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-11-07T09:15:03.907",
"lastModified": "2024-11-08T19:01:03.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T21:03:34.543",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,30 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0117197",
"source": "psirt@hcl.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:bigfix_compliance:2.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "093AEE43-3BAB-4CA4-A8FF-58E9DB3A40FA"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0117197",
"source": "psirt@hcl.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30845",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-12T14:15:07.870",
"lastModified": "2024-11-21T09:12:27.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T21:00:15.753",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gist.github.com/Zshan7que/c813f2b52daab08c9fb4f6c6b8178b66",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/netcccyun/pan/issues/6",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://gist.github.com/Zshan7que/c813f2b52daab08c9fb4f6c6b8178b66",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/netcccyun/pan/issues/6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:rainbow_external_link_network_disk_project:rainbow_external_link_network_disk:5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4C8ADB0D-A161-4D2D-9A32-E2F96C0F4CE1"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Zshan7que/c813f2b52daab08c9fb4f6c6b8178b66",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/netcccyun/pan/issues/6",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://gist.github.com/Zshan7que/c813f2b52daab08c9fb4f6c6b8178b66",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/netcccyun/pan/issues/6",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30850",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-12T06:15:06.943",
"lastModified": "2024-11-21T09:12:27.960",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T21:01:34.237",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tiagorlampert:chaos:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4394E4C7-B45D-4C37-BBFE-1B133370CFED"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30884",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T05:15:47.683",
"lastModified": "2024-11-21T09:12:32.397",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T20:54:31.537",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/Hebing123/cve/issues/28",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/Hebing123/cve/issues/28",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:discuz:discuzx:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DB10C69D-DF3E-4281-8CFC-74A4B0618CD6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Hebing123/cve/issues/28",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://github.com/Hebing123/cve/issues/28",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30915",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T06:15:06.977",
"lastModified": "2025-03-25T16:15:20.867",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T20:51:29.210",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,41 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/OpenDDS/OpenDDS/issues/4527",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/OpenDDS/OpenDDS/issues/4527",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:objectcomputing:opendds:2024-02-16:*:*:*:*:*:*:*",
"matchCriteriaId": "0813A797-94AB-4B0D-8E4B-4F1771D9647E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/OpenDDS/OpenDDS/issues/4527",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Issue Tracking"
]
},
{
"url": "https://github.com/OpenDDS/OpenDDS/issues/4527",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Issue Tracking"
]
}
]
}

Some files were not shown because too many files have changed in this diff Show More