Auto-Update: 2024-08-06T18:00:17.981543+00:00

This commit is contained in:
cad-safe-bot 2024-08-06 18:03:14 +00:00
parent fb136c93cf
commit 733c5f5b33
261 changed files with 4875 additions and 819 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-1937",
"sourceIdentifier": "secalert@redhat.com",
"published": "2013-04-16T14:04:31.253",
"lastModified": "2024-05-17T00:55:12.197",
"lastModified": "2024-08-06T16:15:23.280",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-2185",
"sourceIdentifier": "secalert@redhat.com",
"published": "2014-01-19T18:02:57.037",
"lastModified": "2024-05-17T00:55:18.613",
"lastModified": "2024-08-06T16:15:26.177",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-2763",
"sourceIdentifier": "cve@mitre.org",
"published": "2013-04-04T11:58:49.867",
"lastModified": "2024-05-17T00:55:33.453",
"lastModified": "2024-08-06T16:15:36.477",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-3245",
"sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
"published": "2013-07-10T19:55:04.797",
"lastModified": "2024-07-03T01:35:13.413",
"lastModified": "2024-08-06T16:15:43.750",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-3525",
"sourceIdentifier": "cve@mitre.org",
"published": "2013-05-10T21:55:02.430",
"lastModified": "2024-05-17T00:55:53.087",
"lastModified": "2024-08-06T17:15:26.403",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-3734",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-10-24T15:29:00.200",
"lastModified": "2024-05-17T00:55:59.247",
"lastModified": "2024-08-06T17:15:30.283",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-3735",
"sourceIdentifier": "cve@mitre.org",
"published": "2013-05-31T21:55:01.230",
"lastModified": "2024-05-17T00:55:59.360",
"lastModified": "2024-08-06T17:15:30.397",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-3926",
"sourceIdentifier": "cve@mitre.org",
"published": "2013-07-01T21:55:03.090",
"lastModified": "2024-05-17T00:56:04.293",
"lastModified": "2024-08-06T17:15:32.507",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-4732",
"sourceIdentifier": "cve@mitre.org",
"published": "2013-06-30T19:28:10.173",
"lastModified": "2024-05-17T00:56:25.240",
"lastModified": "2024-08-06T17:15:42.833",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2023-28806",
"sourceIdentifier": "cve@zscaler.com",
"published": "2024-08-06T16:15:46.453",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Validation of signature in Zscaler Client Connector on Windows allows an authenticated user to disable anti-tampering. This issue affects Client Connector on Windows <4.2.0.190."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"references": [
{
"url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=windows&applicable_version=4.2.0.190",
"source": "cve@zscaler.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-31355",
"sourceIdentifier": "psirt@amd.com",
"published": "2024-08-05T16:15:34.510",
"lastModified": "2024-08-05T16:15:34.510",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest's UMC seed potentially allowing reading of memory from a decommissioned guest."
},
{
"lang": "es",
"value": "Una restricci\u00f3n inadecuada de las operaciones de escritura en el firmware SNP podr\u00eda permitir que un hipervisor malicioso sobrescriba la semilla UMC de un invitado, lo que podr\u00eda permitir la lectura de la memoria de un invitado fuera de servicio."
}
],
"metrics": {

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-40290",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-27T04:15:10.387",
"lastModified": "2024-03-27T12:29:30.307",
"lastModified": "2024-08-06T16:35:01.287",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en los dispositivos Supermicro X11SSM-F, X11SAE-F y X11SSE-F 1.66. Un atacante podr\u00eda aprovechar un problema XSS que afecta a Internet Explorer 11 en Windows."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40819",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-06T14:16:03.380",
"lastModified": "2024-08-06T14:16:03.380",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42011",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-06-27T18:15:13.143",
"lastModified": "2024-06-27T19:25:12.067",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T16:13:00.150",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -51,14 +71,43 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:6.1:*:*:*:standard:*:*:*",
"matchCriteriaId": "EAB30CAA-8F41-470E-9B2D-8713B5397026"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:6.2:*:*:*:standard:*:*:*",
"matchCriteriaId": "60AB8589-9748-42E3-945E-19FAB3B30A4F"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/265508",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7158657",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-46967",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-20T21:15:07.937",
"lastModified": "2024-02-20T21:52:55.187",
"lastModified": "2024-08-06T17:35:01.070",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de Cross-site scripting en la funci\u00f3n de sanitizaci\u00f3n en Enhancesoft osTicket 1.18.0 permite a un atacante remoto escalar privilegios a trav\u00e9s de un ticket de soporte manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.sonarsource.com/blog/pitfalls-of-desanitization-leaking-customer-data-from-osticket/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-48901",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-21T04:15:08.963",
"lastModified": "2024-03-21T12:58:51.093",
"lastModified": "2024-08-06T17:35:02.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en tramyardg Autoexpress versi\u00f3n 1.3.0 permite a atacantes remotos no autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro \"id\" dentro de la llamada a la funci\u00f3n getPhotosByCarId en detalles.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://packetstormsecurity.com/files/177660/Tramyardg-Autoexpress-1.3.0-SQL-Injection.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-49540",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T22:15:47.600",
"lastModified": "2024-03-01T22:22:25.913",
"lastModified": "2024-08-06T16:35:02.663",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que Book Store Management System v1.0 conten\u00eda una vulnerabilidad de Cross-Site Scripting (XSS) en /bsms_ci/index.php/history. Esta vulnerabilidad permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro de historial."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/geraldoalcantara/CVE-2023-49540",

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-5000",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-06T02:15:35.030",
"lastModified": "2024-08-06T02:15:35.030",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Horizontal scrolling announcements plugin for WordPress is vulnerable to SQL Injection via the plugin's 'hsas-shortcode' shortcode in versions up to, and including, 2.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with contributor-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
},
{
"lang": "es",
"value": "El complemento Horizontal scrolling announcements para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del c\u00f3digo abreviado 'hsas-shortcode' del complemento en versiones hasta la 2.4 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos."
}
],
"metrics": {

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-0953",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-02-05T17:15:09.320",
"lastModified": "2024-02-09T16:38:45.380",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-06T16:15:46.927",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When a user scans a QR Code with the QR Code Scanner feature, the user is not prompted before being navigated to the page specified in the code. This may surprise the user and potentially direct them to unwanted content."
"value": "When a user scans a QR Code with the QR Code Scanner feature, the user is not prompted before being navigated to the page specified in the code. This may surprise the user and potentially direct them to unwanted content. This vulnerability affects Firefox for iOS < 129."
},
{
"lang": "es",
@ -76,6 +76,10 @@
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-36/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21459",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:44.807",
"lastModified": "2024-08-05T15:15:44.807",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:31:05.780",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Information disclosure while handling beacon or probe response frame in STA."
},
{
"lang": "es",
"value": "Divulgaci\u00f3n de informaci\u00f3n mientras se maneja el framework de respuesta de baliza o sonda en STA."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21467",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:45.140",
"lastModified": "2024-08-05T15:15:45.140",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:31:05.780",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Information disclosure while handling beacon probe frame during scan entry generation in client side."
},
{
"lang": "es",
"value": "Divulgaci\u00f3n de informaci\u00f3n mientras se maneja el framework de la sonda de baliza durante la generaci\u00f3n de entradas de escaneo en el lado del cliente."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21479",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:45.407",
"lastModified": "2024-08-05T15:15:45.407",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:31:05.780",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS during music playback of ALAC content."
},
{
"lang": "es",
"value": "DOS transitorio durante la reproducci\u00f3n de m\u00fasica de contenido ALAC."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21481",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:45.670",
"lastModified": "2024-08-05T15:15:45.670",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption when preparing a shared memory notification for a memparcel in Resource Manager."
},
{
"lang": "es",
"value": "Corrupci\u00f3n de la memoria al preparar una notificaci\u00f3n de memoria compartida para un memparcel en Resource Manager."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21978",
"sourceIdentifier": "psirt@amd.com",
"published": "2024-08-05T16:15:35.193",
"lastModified": "2024-08-05T16:15:35.193",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption."
},
{
"lang": "es",
"value": "Una validaci\u00f3n de entrada incorrecta en SEV-SNP podr\u00eda permitir que un hipervisor malicioso lea o sobrescriba la memoria del hu\u00e9sped, lo que podr\u00eda provocar una fuga o corrupci\u00f3n de datos."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21980",
"sourceIdentifier": "psirt@amd.com",
"published": "2024-08-05T16:15:35.377",
"lastModified": "2024-08-05T16:15:35.377",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity."
},
{
"lang": "es",
"value": "Una restricci\u00f3n inadecuada de las operaciones de escritura en el firmware SNP podr\u00eda permitir que un hipervisor malicioso sobrescriba potencialmente la memoria de un invitado o la semilla UMC, lo que provocar\u00eda una p\u00e9rdida de confidencialidad e integridad."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23350",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:45.960",
"lastModified": "2024-08-05T15:15:45.960",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Permanent DOS when DL NAS transport receives multiple payloads such that one payload contains SOR container whose integrity check has failed, and the other is LPP where UE needs to send status message to network."
},
{
"lang": "es",
"value": "DOS permanente cuando el transporte DL NAS recibe m\u00faltiples payloads, de modo que un payload contiene un contenedor SOR cuya verificaci\u00f3n de integridad fall\u00f3 y la otra es LPP donde UE necesita enviar un mensaje de estado a la red."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23352",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:46.173",
"lastModified": "2024-08-05T15:15:46.173",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS when NAS receives ODAC criteria of length 1 and type 1 in registration accept OTA."
},
{
"lang": "es",
"value": "DOS transitorio cuando NAS recibe criterios ODAC de longitud 1 y tipo 1 en el registro acepta OTA."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23353",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:46.430",
"lastModified": "2024-08-05T15:15:46.430",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while decoding attach reject message received by UE, when IEI is set to ESM_IEI."
},
{
"lang": "es",
"value": "DOS transitorio mientras se decodifica el mensaje de rechazo de adjuntar recibido por el UE, cuando IEI est\u00e1 configurado en ESM_IEI."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23355",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:46.660",
"lastModified": "2024-08-05T15:15:46.660",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption when keymaster operation imports a shared key."
},
{
"lang": "es",
"value": "Corrupci\u00f3n de la memoria cuando la operaci\u00f3n del maestro de llaves importa una clave compartida."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23356",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:46.887",
"lastModified": "2024-08-05T15:15:46.887",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption during session sign renewal request calls in HLOS."
},
{
"lang": "es",
"value": "Corrupci\u00f3n de la memoria durante las llamadas de solicitud de renovaci\u00f3n de se\u00f1al de sesi\u00f3n en HLOS."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23357",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:47.110",
"lastModified": "2024-08-05T15:15:47.110",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while importing a PKCS#8-encoded RSA key with zero bytes modulus."
},
{
"lang": "es",
"value": "DOS transitorio al importar una clave RSA codificada en PKCS#8 con m\u00f3dulo de cero bytes."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23381",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:47.347",
"lastModified": "2024-08-05T15:15:47.347",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption when memory mapped in a VBO is not unmapped by the GPU SMMU."
},
{
"lang": "es",
"value": "Corrupci\u00f3n de la memoria cuando la memoria asignada en un VBO no es desasignada por la GPU SMMU."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23382",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:47.570",
"lastModified": "2024-08-05T15:15:47.570",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while processing graphics kernel driver request to create DMA fence."
},
{
"lang": "es",
"value": "Corrupci\u00f3n de la memoria al procesar la solicitud del controlador del kernel de gr\u00e1ficos para crear una barrera DMA."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23383",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:47.790",
"lastModified": "2024-08-05T15:15:47.790",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption when kernel driver attempts to trigger hardware fences."
},
{
"lang": "es",
"value": "Corrupci\u00f3n de la memoria cuando el controlador del kernel intenta activar barreras de hardware."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23384",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:48.027",
"lastModified": "2024-08-05T15:15:48.027",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption when the mapped pages in VBO are still mapped after reclaiming by shrinker."
},
{
"lang": "es",
"value": "Corrupci\u00f3n de la memoria cuando las p\u00e1ginas asignadas en VBO todav\u00eda est\u00e1n asignadas despu\u00e9s de ser reclamadas por el shrinker."
}
],
"metrics": {

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-23456",
"sourceIdentifier": "cve@zscaler.com",
"published": "2024-08-06T16:15:47.060",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Anti-tampering can be disabled under certain conditions without signature validation. This affects Zscaler Client Connector <4.2.0.190 with anti-tampering enabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"references": [
{
"url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=windows&applicable_version=4.2.0.190",
"source": "cve@zscaler.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-23458",
"sourceIdentifier": "cve@zscaler.com",
"published": "2024-08-06T16:15:47.260",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "While copying individual autoupdater log files, reparse point check was missing which could result into crafted attacks, potentially leading to a local privilege escalation. This issue affects Zscaler Client Connector on Windows <4.2.0.190."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
}
],
"references": [
{
"url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=windows&applicable_version=4.2.0.190",
"source": "cve@zscaler.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-23460",
"sourceIdentifier": "cve@zscaler.com",
"published": "2024-08-06T16:15:47.460",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Zscaler Updater process does not validate the digital signature of the installer before execution, allowing arbitrary code to be locally executed. This affects Zscaler Client Connector on MacOS <4.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"references": [
{
"url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=macos&applicable_version=4.2",
"source": "cve@zscaler.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-23464",
"sourceIdentifier": "cve@zscaler.com",
"published": "2024-08-06T16:15:47.643",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In certain cases, Zscaler Internet Access (ZIA) can be disabled by PowerShell commands with admin rights. This affects Zscaler Client Connector on Windows <4.2.1"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-281"
}
]
}
],
"references": [
{
"url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Windows&applicable_version=4.2.1",
"source": "cve@zscaler.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-23483",
"sourceIdentifier": "cve@zscaler.com",
"published": "2024-08-06T16:15:47.850",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Input Validation vulnerability in Zscaler Client Connector on MacOS allows OS Command Injection.\u00a0This issue affects Zscaler Client Connector on MacOS <4.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=macos&applicable_version=4.2",
"source": "cve@zscaler.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23657",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-05T21:15:37.880",
"lastModified": "2024-08-05T21:15:37.880",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nuxt is a free and open-source framework to create full-stack web applications and websites with Vue.js. Nuxt Devtools is missing authentication on the `getTextAssetContent` RPC function which is vulnerable to path traversal. Combined with a lack of Origin checks on the WebSocket handler, an attacker is able to interact with a locally running devtools instance and exfiltrate data abusing this vulnerability. In certain configurations an attacker could leak the devtools authentication token and then abuse other RPC functions to achieve RCE. The `getTextAssetContent` function does not check for path traversals, this could allow an attacker to read arbitrary files over the RPC WebSocket. The WebSocket server does not check the origin of the request leading to cross-site-websocket-hijacking. This may be intentional to allow certain configurations to work correctly. Nuxt Devtools authentication tokens are placed within the home directory of the current user. The malicious webpage can connect to the Devtools WebSocket, perform a directory traversal brute force to find the authentication token, then use the *authenticated* `writeStaticAssets` function to create a new Component, Nitro Handler or `app.vue` file which will run automatically as the file is changed. This vulnerability has been addressed in release version 1.3.9. All users are advised to upgrade. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "Nuxt es un framework gratuito y de c\u00f3digo abierto para crear sitios web y aplicaciones web completos con Vue.js. A Nuxt Devtools le falta autenticaci\u00f3n en la funci\u00f3n RPC `getTextAssetContent`, que es vulnerable a path traversal. Combinado con la falta de comprobaciones de origen en el controlador WebSocket, un atacante puede interactuar con una instancia de devtools que se ejecuta localmente y extraer datos abusando de esta vulnerabilidad. En determinadas configuraciones, un atacante podr\u00eda filtrar el token de autenticaci\u00f3n de devtools y luego abusar de otras funciones RPC para lograr RCE. La funci\u00f3n `getTextAssetContent` no comprueba los path traversal, lo que podr\u00eda permitir a un atacante leer archivos arbitrarios a trav\u00e9s del RPC WebSocket. El servidor WebSocket no verifica el origen de la solicitud, lo que conduce al secuestro de websocket entre sitios. Esto puede ser intencionado para permitir que ciertas configuraciones funcionen correctamente. Los tokens de autenticaci\u00f3n de Nuxt Devtools se colocan dentro del directorio de inicio del usuario actual. La p\u00e1gina web maliciosa puede conectarse al WebSocket de Devtools, realizar un directory traversal por fuerza bruta para encontrar el token de autenticaci\u00f3n y luego usar la funci\u00f3n *autenticada* `writeStaticAssets` para crear un nuevo componente, Nitro Handler o archivo `app.vue` que se ejecutar\u00e1 autom\u00e1ticamente a medida que se cambia el archivo. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 1.3.9. Se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24511",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T23:15:08.260",
"lastModified": "2024-03-04T13:58:23.447",
"lastModified": "2024-08-06T16:35:04.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de Cross-Site Scripting en Pkp OJS v.3.4 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente T\u00edtulo de entrada."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/1IhU9tNhc6enKL1Dgq9--R05biJBjodKv/view?usp=sharing",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25293",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T06:15:48.347",
"lastModified": "2024-03-01T14:04:26.010",
"lastModified": "2024-08-06T16:35:05.360",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que las versiones 3.0.4 y 3.1.0-beta de mjml-app contienen una ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del atributo href."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.5,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/EQSTLab/PoC/tree/main/2024/LCE/CVE-2024-25293",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25413",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-16T02:15:51.307",
"lastModified": "2024-02-16T13:37:51.433",
"lastModified": "2024-08-06T16:35:06.130",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Una vulnerabilidad de inyecci\u00f3n del lado del servidor XSLT en la funci\u00f3n Importar trabajos de FireBear Enhanced Import And Export v3.8.6 permite a los atacantes ejecutar comandos arbitrarios a trav\u00e9s de un archivo XSLT manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://github.com/capture0x/Magento-ver.-2.4.6",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25735",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-27T03:15:12.150",
"lastModified": "2024-03-27T12:29:30.307",
"lastModified": "2024-08-06T16:35:06.527",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en dispositivos WyreStorm Apollo VX20 anteriores a la versi\u00f3n 1.3.58. Los atacantes remotos pueden descubrir contrase\u00f1as en texto plano a trav\u00e9s de una solicitud GET de SoftAP /device/config."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/177082",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27444",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-26T16:28:00.430",
"lastModified": "2024-02-26T16:32:25.577",
"lastModified": "2024-08-06T16:35:07.500",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "langchain_experimental (tambi\u00e9n conocido como LangChain Experimental) en LangChain anterior a 0.1.8 permite a un atacante eludir la correcci\u00f3n CVE-2023-44467 y ejecutar c\u00f3digo arbitrario a trav\u00e9s de the __import__, __subclasses__, __builtins__, __globals__, __getattribute__, __bases__, __mro__, or __base__ attribute en c\u00f3digo Python. Estos no est\u00e1n prohibidos por pal_chain/base.py."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-749"
}
]
}
],
"references": [
{
"url": "https://github.com/langchain-ai/langchain/commit/de9a6cdf163ed00adaf2e559203ed0a9ca2f1de7",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28164",
"sourceIdentifier": "cna@sap.com",
"published": "2024-06-11T03:15:09.953",
"lastModified": "2024-06-11T13:54:12.057",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T16:40:49.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "cna@sap.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,14 +81,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:netweaver_application_server_java:gp-core_7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A5F64B5B-8342-4F60-BB57-7CD0C77EA6B0"
}
]
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3425571",
"source": "cna@sap.com"
"source": "cna@sap.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html",
"source": "cna@sap.com"
"source": "cna@sap.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28283",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-19T21:15:07.770",
"lastModified": "2024-03-20T13:00:16.367",
"lastModified": "2024-08-06T16:35:08.440",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "There is stack-based buffer overflow vulnerability in pc_change_act function in Linksys E1000 router firmware version v.2.1.03 and before, leading to remote code execution."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://d05004.notion.site/Linksys-E1000-BOF-37b98eec45ea4fc991b9b5bea3db091d?pvs=4",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28431",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T13:15:47.943",
"lastModified": "2024-03-13T14:28:45.217",
"lastModified": "2024-08-06T16:35:09.430",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que DedeCMS v5.7 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /dede/catalog_del.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/itsqian797/cms/blob/main/3.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28675",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T14:15:07.770",
"lastModified": "2024-03-13T14:28:45.217",
"lastModified": "2024-08-06T16:35:10.273",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que DedeCMS v5.7 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /dede/diy_edit.php"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/12.md",

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-28962",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-08-06T04:16:45.810",
"lastModified": "2024-08-06T04:16:45.810",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Command | Update, Dell Update, and Alienware Update UWP, versions prior to 5.4, contain an Exposed Dangerous Method or Function vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to denial of service."
},
{
"lang": "es",
"value": "Comando Dell | Update, Dell Update y Alienware Update UWP, versiones anteriores a la 5.4, contienen una vulnerabilidad de funci\u00f3n o m\u00e9todo peligroso expuesto. Un atacante no autenticado con acceso remoto podr\u00eda explotar esta vulnerabilidad y provocar una denegaci\u00f3n de servicio."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29954",
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-06-26T00:15:10.263",
"lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T16:07:07.410",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "sirt@brocade.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
},
{
"source": "sirt@brocade.com",
"type": "Secondary",
@ -51,10 +81,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.2.3e",
"matchCriteriaId": "E81DB5A7-856B-4D79-86FE-45D0EB6CA554"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.1",
"versionEndExcluding": "9.1.1d",
"matchCriteriaId": "8271BD31-8795-4D66-A088-B82EDE143FD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.2.0",
"versionEndExcluding": "9.2.0b",
"matchCriteriaId": "64256C4C-AF75-4D8F-80C3-E4EF4AC0CC8E"
}
]
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/23226",
"source": "sirt@brocade.com"
"source": "sirt@brocade.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2915",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-03-26T16:15:14.117",
"lastModified": "2024-03-26T17:09:53.043",
"lastModified": "2024-08-06T16:35:11.173",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "El control de acceso inadecuado en la elevaci\u00f3n de PAM JIT en Devolutions Server 2024.1.6 y versiones anteriores permite que un atacante con acceso a la funci\u00f3n de elevaci\u00f3n de PAM JIT se eleve a grupos no autorizados mediante una solicitud especialmente manipulada."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0005",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30170",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-06T14:16:03.777",
"lastModified": "2024-08-06T14:16:03.777",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:35:12.080",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,42 @@
"value": "PrivX before 34.0 allows data exfiltration and denial of service via the REST API. This is fixed in minor versions 33.1, 32.3, 31.3, and later, and in major version 34.0 and later,"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://info.ssh.com/improper-input-validation-faq",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31916",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-06-27T18:15:17.857",
"lastModified": "2024-06-27T19:25:12.067",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T16:24:50.467",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,14 +81,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:openbmc:*:*:*:*:*:*:*:*",
"versionStartIncluding": "fw1050.00",
"versionEndIncluding": "fw1050.10",
"matchCriteriaId": "E30757DE-5CEA-4705-8EAA-486363521FF3"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/290026",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7158679",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33010",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:48.410",
"lastModified": "2024-08-05T15:15:48.410",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while parsing fragments of MBSSID IE from beacon frame."
},
{
"lang": "es",
"value": "DOS transitorio mientras se analizan fragmentos de MBSSID IE del framework de baliza."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33011",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:48.923",
"lastModified": "2024-08-05T15:15:48.923",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while parsing the MBSSID IE from the beacons, when the MBSSID IE length is zero."
},
{
"lang": "es",
"value": "DOS transitorio mientras se analiza el MBSSID IE de las balizas, cuando la longitud del MBSSID IE es cero."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33012",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:49.260",
"lastModified": "2024-08-05T15:15:49.260",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while parsing the multiple MBSSID IEs from the beacon, when the tag length is non-zero value but with end of beacon."
},
{
"lang": "es",
"value": "DOS transitorio mientras se analizan los m\u00faltiples MBSSID IE de la baliza, cuando la longitud de la etiqueta es un valor distinto de cero pero con el final de la baliza."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33013",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:49.667",
"lastModified": "2024-08-05T15:15:49.667",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS when driver accesses the ML IE memory and offset value is incremented beyond ML IE length."
},
{
"lang": "es",
"value": "DOS transitorio cuando el controlador accede a la memoria ML IE y el valor de compensaci\u00f3n se incrementa m\u00e1s all\u00e1 de la longitud de ML IE."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33014",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:49.890",
"lastModified": "2024-08-05T15:15:49.890",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while parsing ESP IE from beacon/probe response frame."
},
{
"lang": "es",
"value": "DOS transitorio mientras se analiza ESP IE desde el framework de respuesta de baliza/sonda."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33015",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:50.163",
"lastModified": "2024-08-05T15:15:50.163",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while parsing SCAN RNR IE when bytes received from AP is such that the size of the last param of IE is less than neighbor report."
},
{
"lang": "es",
"value": "DOS transitorio mientras se analiza SCAN RNR IE cuando los bytes recibidos del AP son tales que el tama\u00f1o del \u00faltimo par\u00e1metro de IE es menor que el informe del vecino."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33018",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:50.417",
"lastModified": "2024-08-05T15:15:50.417",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while parsing the received TID-to-link mapping element of the TID-to-link mapping action frame."
},
{
"lang": "es",
"value": "DOS transitorio mientras se analiza el elemento de mapeo de TID a enlace recibido del framework de acci\u00f3n de mapeo de TID a enlace."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33019",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:50.850",
"lastModified": "2024-08-05T15:15:50.850",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while parsing the received TID-to-link mapping action frame."
},
{
"lang": "es",
"value": "DOS transitorio mientras se analiza el framework de acci\u00f3n de mapeo de TID a enlace recibido."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33020",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:51.073",
"lastModified": "2024-08-05T15:15:51.073",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while processing TID-to-link mapping IE elements."
},
{
"lang": "es",
"value": "DOS transitorio mientras se procesan elementos IE de mapeo de TID a enlace."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33021",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:51.353",
"lastModified": "2024-08-05T15:15:51.353",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while processing IOCTL call to set metainfo."
},
{
"lang": "es",
"value": "Corrupci\u00f3n de la memoria al procesar la llamada IOCTL para configurar la metainformaci\u00f3n."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33022",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:51.633",
"lastModified": "2024-08-05T15:15:51.633",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while allocating memory in HGSL driver."
},
{
"lang": "es",
"value": "Corrupci\u00f3n de la memoria al asignar memoria en el controlador HGSL."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33023",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:51.913",
"lastModified": "2024-08-05T15:15:51.913",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while creating a fence to wait on timeline events, and simultaneously signal timeline events."
},
{
"lang": "es",
"value": "Corrupci\u00f3n de la memoria al crear una valla para esperar los eventos de la l\u00ednea de tiempo y, simult\u00e1neamente, se\u00f1alar eventos de la l\u00ednea de tiempo."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33024",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:52.183",
"lastModified": "2024-08-05T15:15:52.183",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while parsing the ML IE when a beacon with length field inside the common info of ML IE greater than the ML IE length."
},
{
"lang": "es",
"value": "DOS transitorio mientras se analiza ML IE cuando una baliza con un campo de longitud dentro de la informaci\u00f3n com\u00fan de ML IE es mayor que la longitud de ML IE."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33025",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:52.503",
"lastModified": "2024-08-05T15:15:52.503",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while parsing the BSS parameter change count or MLD capabilities fields of the ML IE."
},
{
"lang": "es",
"value": "DOS transitorio mientras se analiza el recuento de cambios de par\u00e1metros BSS o los campos de capacidades MLD del ML IE."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33026",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:52.793",
"lastModified": "2024-08-05T15:15:52.793",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while parsing probe response and assoc response frame when received frame length is less than max size of timestamp."
},
{
"lang": "es",
"value": "DOS transitorio mientras se analiza la respuesta de la sonda y el framework de respuesta asociada cuando la longitud del framework recibido es menor que el tama\u00f1o m\u00e1ximo de la marca de tiempo."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33027",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:53.090",
"lastModified": "2024-08-05T15:15:53.090",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption can occur when arbitrary user-space app gains kernel level privilege to modify DDR memory by corrupting the GPU page table."
},
{
"lang": "es",
"value": "La corrupci\u00f3n de la memoria puede ocurrir cuando una aplicaci\u00f3n arbitraria del espacio de usuario obtiene privilegios a nivel de kernel para modificar la memoria DDR corrompiendo la tabla de p\u00e1ginas de la GPU."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33028",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:53.440",
"lastModified": "2024-08-05T15:15:53.440",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption as fence object may still be accessed in timeline destruct after isync fence is released."
},
{
"lang": "es",
"value": "A\u00fan se puede acceder a la corrupci\u00f3n de memoria como objeto de valla en la destrucci\u00f3n de la l\u00ednea de tiempo despu\u00e9s de que se libera la valla de isync."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33034",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-08-05T15:15:53.700",
"lastModified": "2024-08-05T15:15:53.700",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption can occur if VBOs hold outdated or invalid GPU SMMU mappings, especially when the binding and reclaiming of memory buffers are performed at the same time."
},
{
"lang": "es",
"value": "La corrupci\u00f3n de la memoria puede ocurrir si los VBO contienen asignaciones de SMMU de GPU obsoletas o no v\u00e1lidas, especialmente cuando la vinculaci\u00f3n y recuperaci\u00f3n de b\u00faferes de memoria se realizan al mismo tiempo."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33897",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-06T14:16:03.870",
"lastModified": "2024-08-06T14:16:03.870",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33957",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T11:16:04.443",
"lastModified": "2024-08-06T11:16:04.443",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33958",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T11:16:04.920",
"lastModified": "2024-08-06T11:16:04.920",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33959",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T11:16:05.133",
"lastModified": "2024-08-06T11:16:05.133",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33960",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:49.130",
"lastModified": "2024-08-06T12:15:49.130",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33961",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:49.360",
"lastModified": "2024-08-06T12:15:49.360",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33962",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:49.570",
"lastModified": "2024-08-06T12:15:49.570",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33963",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:49.790",
"lastModified": "2024-08-06T12:15:49.790",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33964",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:50.000",
"lastModified": "2024-08-06T12:15:50.000",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33965",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:50.223",
"lastModified": "2024-08-06T12:15:50.223",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33966",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:50.440",
"lastModified": "2024-08-06T12:15:50.440",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33967",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:50.667",
"lastModified": "2024-08-06T12:15:50.667",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33968",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:50.887",
"lastModified": "2024-08-06T12:15:50.887",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33969",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:51.100",
"lastModified": "2024-08-06T12:15:51.100",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33970",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:51.330",
"lastModified": "2024-08-06T12:15:51.330",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33971",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:51.550",
"lastModified": "2024-08-06T12:15:51.550",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33972",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:51.773",
"lastModified": "2024-08-06T12:15:51.773",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33973",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:51.993",
"lastModified": "2024-08-06T12:15:51.993",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33974",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:52.213",
"lastModified": "2024-08-06T12:15:52.213",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33975",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T11:16:05.343",
"lastModified": "2024-08-06T11:16:05.343",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33976",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T11:16:05.580",
"lastModified": "2024-08-06T11:16:05.580",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33977",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T11:16:05.793",
"lastModified": "2024-08-06T11:16:05.793",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33978",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T11:16:06.017",
"lastModified": "2024-08-06T11:16:06.017",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33979",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T11:16:06.223",
"lastModified": "2024-08-06T11:16:06.223",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33980",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T11:16:06.477",
"lastModified": "2024-08-06T11:16:06.477",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33981",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T11:16:06.733",
"lastModified": "2024-08-06T11:16:06.733",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33982",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T13:15:53.257",
"lastModified": "2024-08-06T13:15:53.257",
"vulnStatus": "Received",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

Some files were not shown because too many files have changed in this diff Show More