mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 11:07:05 +00:00
Auto-Update: 2024-05-16T14:00:29.963246+00:00
This commit is contained in:
parent
b3e9d65019
commit
78eb57e9bb
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-40297",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-15T20:15:08.767",
|
||||
"lastModified": "2024-05-15T20:15:08.767",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Stakater Forecastle 1.0.139 and before allows %5C../ directory traversal in the website component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Stakater Forecastle 1.0.139 y anteriores permite el directory traversal %5C../ en el componente del sitio web."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20791",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T09:15:08.967",
|
||||
"lastModified": "2024-05-16T09:15:08.967",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20792",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T09:15:09.313",
|
||||
"lastModified": "2024-05-16T09:15:09.313",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20793",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T09:15:09.560",
|
||||
"lastModified": "2024-05-16T09:15:09.560",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2358",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-05-16T09:15:09.800",
|
||||
"lastModified": "2024-05-16T09:15:09.800",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2361",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-05-16T09:15:10.060",
|
||||
"lastModified": "2024-05-16T09:15:10.060",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2366",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-05-16T09:15:10.287",
|
||||
"lastModified": "2024-05-16T09:15:10.287",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,35 +2,14 @@
|
||||
"id": "CVE-2024-26821",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-17T10:15:08.917",
|
||||
"lastModified": "2024-04-17T12:48:07.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-16T13:15:47.693",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: relax mount_setattr() permission checks\n\nWhen we added mount_setattr() I added additional checks compared to the\nlegacy do_reconfigure_mnt() and do_change_type() helpers used by regular\nmount(2). If that mount had a parent then verify that the caller and the\nmount namespace the mount is attached to match and if not make sure that\nit's an anonymous mount.\n\nThe real rootfs falls into neither category. It is neither an anoymous\nmount because it is obviously attached to the initial mount namespace\nbut it also obviously doesn't have a parent mount. So that means legacy\nmount(2) allows changing mount properties on the real rootfs but\nmount_setattr(2) blocks this. I never thought much about this but of\ncourse someone on this planet of earth changes properties on the real\nrootfs as can be seen in [1].\n\nSince util-linux finally switched to the new mount api in 2.39 not so\nlong ago it also relies on mount_setattr() and that surfaced this issue\nwhen Fedora 39 finally switched to it. Fix this."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fs: relajar las comprobaciones de permisos de mount_setattr() Cuando agregamos mount_setattr(), agregu\u00e9 comprobaciones adicionales en comparaci\u00f3n con los ayudantes heredados do_reconfigure_mnt() y do_change_type() utilizados por el mount(2) normal. Si ese montaje ten\u00eda un padre, verifique que la persona que llama y el espacio de nombres del montaje coincidan y, de lo contrario, aseg\u00farese de que sea un montaje an\u00f3nimo. Los rootfs reales no entran en ninguna de las dos categor\u00edas. No es un montaje an\u00f3nimo porque obviamente est\u00e1 adjunto al espacio de nombres de montaje inicial pero obviamente tampoco tiene un montaje principal. Eso significa que el montaje heredado (2) permite cambiar las propiedades de montaje en los rootfs reales, pero mount_setattr (2) bloquea esto. Nunca pens\u00e9 mucho en esto pero, por supuesto, alguien en este planeta tierra cambia las propiedades de las ra\u00edces reales como se puede ver en [1]. Dado que util-linux finalmente cambi\u00f3 a la nueva API de montaje en 2.39 no hace mucho, tambi\u00e9n depende de mount_setattr() y surgi\u00f3 este problema cuando Fedora 39 finalmente cambi\u00f3 a ella. Arregla esto."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2a7a31e1fb9717845d9d5e2a8c6e48848147801e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/31f71f2d7a081fc6c6bdf06865beedf6db5b0ca4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/46f5ab762d048dad224436978315cbc2fa79c630",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/95de4ad173ca0e61034f3145d66917970961c210",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-27243",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2024-05-15T21:15:07.987",
|
||||
"lastModified": "2024-05-15T21:15:07.987",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer overflow in some Zoom Workplace Apps and SDK\u2019s may allow an authenticated user to conduct a denial of service via network access."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El desbordamiento del b\u00fafer en algunas aplicaciones y SDK de Zoom Workplace puede permitir que un usuario autenticado lleve a cabo una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-27244",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2024-05-15T21:15:08.220",
|
||||
"lastModified": "2024-05-15T21:15:08.220",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient verification of data authenticity in the installer for Zoom Workplace VDI App for Windows may allow an authenticated user to conduct an escalation of privilege via local access."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una verificaci\u00f3n insuficiente de la autenticidad de los datos en el instalador de la aplicaci\u00f3n Zoom Workplace VDI para Windows puede permitir que un usuario autenticado realice una escalada de privilegios a trav\u00e9s del acceso local."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30274",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T09:15:10.527",
|
||||
"lastModified": "2024-05-16T09:15:10.527",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30275",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T09:15:10.750",
|
||||
"lastModified": "2024-05-16T09:15:10.750",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30281",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T09:15:11.007",
|
||||
"lastModified": "2024-05-16T09:15:11.007",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30282",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T09:15:11.253",
|
||||
"lastModified": "2024-05-16T09:15:11.253",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2024/CVE-2024-302xx/CVE-2024-30283.json
Normal file
55
CVE-2024/CVE-2024-302xx/CVE-2024-30283.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30283",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T12:15:08.407",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-302xx/CVE-2024-30286.json
Normal file
55
CVE-2024/CVE-2024-302xx/CVE-2024-30286.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30286",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T12:15:09.097",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-302xx/CVE-2024-30287.json
Normal file
55
CVE-2024/CVE-2024-302xx/CVE-2024-30287.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30287",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T12:15:09.700",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-302xx/CVE-2024-30288.json
Normal file
55
CVE-2024/CVE-2024-302xx/CVE-2024-30288.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30288",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T12:15:10.330",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-302xx/CVE-2024-30289.json
Normal file
55
CVE-2024/CVE-2024-302xx/CVE-2024-30289.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30289",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T12:15:10.897",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-302xx/CVE-2024-30290.json
Normal file
55
CVE-2024/CVE-2024-302xx/CVE-2024-30290.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30290",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T12:15:11.527",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-302xx/CVE-2024-30291.json
Normal file
55
CVE-2024/CVE-2024-302xx/CVE-2024-30291.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30291",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T12:15:12.107",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-302xx/CVE-2024-30292.json
Normal file
55
CVE-2024/CVE-2024-302xx/CVE-2024-30292.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30292",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T12:15:12.713",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30293",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T09:15:11.497",
|
||||
"lastModified": "2024-05-16T09:15:11.497",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Animate versions 24.0.2, 23.0.5 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones 24.0.2, 23.0.5 y anteriores de Animate se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30294",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T09:15:11.763",
|
||||
"lastModified": "2024-05-16T09:15:11.763",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Animate versions 24.0.2, 23.0.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones 24.0.2, 23.0.5 y anteriores de Animate se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30295",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T09:15:11.990",
|
||||
"lastModified": "2024-05-16T09:15:11.990",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Animate versions 24.0.2, 23.0.5 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones 24.0.2, 23.0.5 y anteriores de Animate se ven afectadas por una vulnerabilidad de desreferencia de puntero NULL que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30296",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T09:15:12.213",
|
||||
"lastModified": "2024-05-16T09:15:12.213",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Animate versions 24.0.2, 23.0.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones 24.0.2, 23.0.5 y anteriores de Animate se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30297",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T09:15:12.447",
|
||||
"lastModified": "2024-05-16T09:15:12.447",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Animate versions 24.0.2, 23.0.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones 24.0.2, 23.0.5 y anteriores de Animate se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30298",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T09:15:12.680",
|
||||
"lastModified": "2024-05-16T09:15:12.680",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Animate versions 24.0.2, 23.0.5 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones de Animate 24.0.2, 23.0.5 y anteriores Respuesta: se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30307",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T09:15:12.910",
|
||||
"lastModified": "2024-05-16T09:15:12.910",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Substance3D - Painter versions 9.1.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Substance3D: las versiones 9.1.2 y anteriores de Painter se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30308",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T09:15:13.137",
|
||||
"lastModified": "2024-05-16T09:15:13.137",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Substance3D - Painter versions 9.1.2 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Substance3D: versiones de Painter 9.1.2 y anteriores. Respuesta: se ven afectados por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30309",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T09:15:13.377",
|
||||
"lastModified": "2024-05-16T09:15:13.377",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Substance3D - Painter versions 9.1.2 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Substance3D - Painter versiones 9.1.2 y anteriores. Respuesta: se ven afectados por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
55
CVE-2024/CVE-2024-303xx/CVE-2024-30314.json
Normal file
55
CVE-2024/CVE-2024-303xx/CVE-2024-30314.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30314",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T12:15:13.280",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dreamweaver Desktop versions 21.3 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an attacker. Exploitation of this issue does require user interaction."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/dreamweaver/apsb24-39.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-31409",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-05-15T20:15:11.203",
|
||||
"lastModified": "2024-05-15T20:15:11.203",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Certain MQTT wildcards are not blocked on the \nCyberPower PowerPanel\n\nsystem, which might result in an attacker obtaining data from throughout the system after gaining access to any device."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Ciertos comodines MQTT no est\u00e1n bloqueados en el sistema CyberPower PowerPanel, lo que podr\u00eda provocar que un atacante obtenga datos de todo el sistema despu\u00e9s de obtener acceso a cualquier dispositivo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-31410",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-05-15T20:15:11.473",
|
||||
"lastModified": "2024-05-15T20:15:11.473",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The devices which CyberPower PowerPanel manages use identical certificates based on a \nhard-coded cryptographic key. This can allow an attacker to impersonate \nany client in the system and send malicious data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los dispositivos que gestiona CyberPower PowerPanel utilizan certificados id\u00e9nticos basados en una clave criptogr\u00e1fica codificada. Esto puede permitir que un atacante se haga pasar por cualquier cliente del sistema y env\u00ede datos maliciosos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-31856",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-05-15T20:15:11.710",
|
||||
"lastModified": "2024-05-15T20:15:11.710",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An attacker with certain MQTT permissions can create malicious messages \nto all CyberPower PowerPanel devices. This could result in an attacker injecting \nSQL syntax, writing arbitrary files to the system, and executing remote \ncode."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un atacante con ciertos permisos MQTT puede crear mensajes maliciosos para todos los dispositivos CyberPower PowerPanel. Esto podr\u00eda provocar que un atacante inyecte sintaxis SQL, escriba archivos arbitrarios en el sistema y ejecute c\u00f3digo remoto."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3126",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-05-16T09:15:13.840",
|
||||
"lastModified": "2024-05-16T09:15:13.840",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A command injection vulnerability exists in the 'run_xtts_api_server' function of the parisneo/lollms-webui application, specifically within the 'lollms_xtts.py' script. The vulnerability arises due to the improper neutralization of special elements used in an OS command. The affected function utilizes 'subprocess.Popen' to execute a command constructed with a Python f-string, without adequately sanitizing the 'xtts_base_url' input. This flaw allows attackers to execute arbitrary commands remotely by manipulating the 'xtts_base_url' parameter. The vulnerability affects versions up to and including the latest version before 9.5. Successful exploitation could lead to arbitrary remote code execution (RCE) on the system where the application is deployed."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en la funci\u00f3n 'run_xtts_api_server' de la aplicaci\u00f3n parisneo/lollms-webui, espec\u00edficamente dentro del script 'lollms_xtts.py'. La vulnerabilidad surge debido a la neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando del sistema operativo. La funci\u00f3n afectada utiliza 'subprocess.Popen' para ejecutar un comando construido con una cadena f de Python, sin desinfectar adecuadamente la entrada 'xtts_base_url'. Esta falla permite a los atacantes ejecutar comandos arbitrarios de forma remota manipulando el par\u00e1metro 'xtts_base_url'. La vulnerabilidad afecta a versiones hasta la \u00faltima versi\u00f3n anterior a la 9.5 incluida. Una explotaci\u00f3n exitosa podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo (RCE) arbitraria en el sistema donde se implementa la aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32042",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-05-15T20:15:11.950",
|
||||
"lastModified": "2024-05-15T20:15:11.950",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The key used to encrypt passwords stored in the database can be found in\n the \nCyberPower PowerPanel\n\napplication code, allowing the passwords to be recovered."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La clave utilizada para cifrar las contrase\u00f1as almacenadas en la base de datos se puede encontrar en el c\u00f3digo de la aplicaci\u00f3n CyberPower PowerPanel, lo que permite recuperar las contrase\u00f1as."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32047",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-05-15T20:15:12.197",
|
||||
"lastModified": "2024-05-15T20:15:12.197",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hard-coded credentials for the \nCyberPower PowerPanel test server can be found in the \nproduction code. This might result in an attacker gaining access to the \ntesting or production server."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las credenciales codificadas para el servidor de prueba CyberPower PowerPanel se pueden encontrar en el c\u00f3digo de producci\u00f3n. Esto podr\u00eda provocar que un atacante obtenga acceso al servidor de prueba o de producci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32053",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-05-15T20:15:12.443",
|
||||
"lastModified": "2024-05-15T20:15:12.443",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hard-coded credentials are used by the\u00a0\nCyberPower PowerPanel \n\n platform to authenticate to the \ndatabase, other services, and the cloud. This could result in an \nattacker gaining access to services with the privileges of a Powerpanel \nbusiness application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La plataforma CyberPower PowerPanel utiliza credenciales codificadas para autenticarse en la base de datos, otros servicios y la nube. Esto podr\u00eda resultar en que un atacante obtenga acceso a servicios con los privilegios de una aplicaci\u00f3n empresarial Powerpanel."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-33615",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-05-15T20:15:12.687",
|
||||
"lastModified": "2024-05-15T20:15:12.687",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A specially crafted Zip file containing path traversal characters can be\n imported to the \nCyberPower PowerPanel \n\nserver, which allows file writing to the server outside\n the intended scope, and could allow an attacker to achieve remote code \nexecution."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se puede importar al servidor CyberPower PowerPanel un archivo Zip especialmente manipulado que contiene caracteres de recorrido de ruta, lo que permite escribir archivos en el servidor fuera del alcance previsto y podr\u00eda permitir a un atacante lograr la ejecuci\u00f3n remota de c\u00f3digo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-33625",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-05-15T20:15:12.927",
|
||||
"lastModified": "2024-05-15T20:15:12.927",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CyberPower PowerPanel business \napplication code contains a hard-coded JWT signing key. This could \nresult in an attacker forging JWT tokens to bypass authentication."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El c\u00f3digo de la aplicaci\u00f3n empresarial CyberPower PowerPanel contiene una clave de firma JWT codificada. Esto podr\u00eda resultar en que un atacante falsifique tokens JWT para eludir la autenticaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-34025",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-05-15T20:15:13.190",
|
||||
"lastModified": "2024-05-15T20:15:13.190",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CyberPower PowerPanel business application code contains a hard-coded set of authentication \ncredentials. This could result in an attacker bypassing authentication \nand gaining administrator privileges."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El c\u00f3digo de la aplicaci\u00f3n empresarial CyberPower PowerPanel contiene un conjunto codificado de credenciales de autenticaci\u00f3n. Esto podr\u00eda provocar que un atacante eluda la autenticaci\u00f3n y obtenga privilegios de administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-34906",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-15T20:15:13.460",
|
||||
"lastModified": "2024-05-15T20:15:13.460",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in dootask v0.30.13 allows attackers to execute arbitrary code via uploading a crafted PDF file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de carga de archivos arbitrarios en dootask v0.30.13 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PDF manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-34909",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-15T20:15:13.570",
|
||||
"lastModified": "2024-05-15T20:15:13.570",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in KYKMS v1.0.1 and below allows attackers to execute arbitrary code via uploading a crafted PDF file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de carga de archivos arbitraria en KYKMS v1.0.1 y versiones anteriores permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PDF manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-34913",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-15T20:15:13.657",
|
||||
"lastModified": "2024-05-15T20:15:13.657",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in r-pan-scaffolding v5.0 and below allows attackers to execute arbitrary code via uploading a crafted PDF file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de carga de archivos arbitraria en r-pan-scaffolding v5.0 y versiones anteriores permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PDF manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3403",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-05-16T09:15:14.053",
|
||||
"lastModified": "2024-05-16T09:15:14.053",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "imartinez/privategpt version 0.2.0 is vulnerable to a local file inclusion vulnerability that allows attackers to read arbitrary files from the filesystem. By manipulating file upload functionality to ingest arbitrary local files, attackers can exploit the 'Search in Docs' feature or query the AI to retrieve or disclose the contents of any file on the system. This vulnerability could lead to various impacts, including but not limited to remote code execution by obtaining private SSH keys, unauthorized access to private files, source code disclosure facilitating further attacks, and exposure of configuration files."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "imartinez/privategpt versi\u00f3n 0.2.0 es vulnerable a una vulnerabilidad de inclusi\u00f3n de archivos local que permite a los atacantes leer archivos arbitrarios del sistema de archivos. Al manipular la funcionalidad de carga de archivos para ingerir archivos locales arbitrarios, los atacantes pueden explotar la funci\u00f3n \"Buscar en Documentos\" o consultar la IA para recuperar o revelar el contenido de cualquier archivo en el sistema. Esta vulnerabilidad podr\u00eda provocar varios impactos, que incluyen, entre otros, la ejecuci\u00f3n remota de c\u00f3digo mediante la obtenci\u00f3n de claves SSH privadas, el acceso no autorizado a archivos privados, la divulgaci\u00f3n del c\u00f3digo fuente que facilita m\u00e1s ataques y la exposici\u00f3n de archivos de configuraci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3435",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-05-16T09:15:14.290",
|
||||
"lastModified": "2024-05-16T09:15:14.290",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path traversal vulnerability exists in the 'save_settings' endpoint of the parisneo/lollms-webui application, affecting versions up to the latest release before 9.5. The vulnerability arises due to insufficient sanitization of the 'config' parameter in the 'apply_settings' function, allowing an attacker to manipulate the application's configuration by sending specially crafted JSON payloads. This could lead to remote code execution (RCE) by bypassing existing patches designed to mitigate such vulnerabilities."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de path traversal en el endpoint 'save_settings' de la aplicaci\u00f3n parisneo/lollms-webui, que afecta a las versiones hasta la \u00faltima versi\u00f3n anterior a la 9.5. La vulnerabilidad surge debido a una sanitizaci\u00f3n insuficiente del par\u00e1metro 'config' en la funci\u00f3n 'apply_settings', lo que permite a un atacante manipular la configuraci\u00f3n de la aplicaci\u00f3n enviando payloads JSON especialmente manipuladas. Esto podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo (RCE) al pasar por alto los parches existentes manipulados para mitigar dichas vulnerabilidades."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35102",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-15T19:15:08.063",
|
||||
"lastModified": "2024-05-15T19:15:08.063",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure Permissions vulnerability in VITEC AvediaServer (Model avsrv-m8105) 8.6.2-1 allows a remote attacker to escalate privileges via a crafted script."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de permisos inseguros en VITEC AvediaServer (modelo avsrv-m8105) 8.6.2-1 permite a un atacante remoto escalar privilegios mediante un script manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35183",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-05-15T22:15:08.580",
|
||||
"lastModified": "2024-05-15T22:15:08.580",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "wolfictl is a command line tool for working with Wolfi. A git authentication issue in versions prior to 0.16.10 allows a local user\u2019s GitHub token to be sent to remote servers other than `github.com`. Most git-dependent functionality in wolfictl relies on its own `git` package, which contains centralized logic for implementing interactions with git repositories. Some of this functionality requires authentication in order to access private repositories. A central function `GetGitAuth` looks for a GitHub token in the environment variable `GITHUB_TOKEN` and returns it as an HTTP basic auth object to be used with the `github.com/go-git/go-git/v5` library. Most callers (direct or indirect) of `GetGitAuth` use the token to authenticate to github.com only; however, in some cases callers were passing this authentication without checking that the remote git repository was hosted on github.com. This behavior has existed in one form or another since commit 0d06e1578300327c212dda26a5ab31d09352b9d0 - committed January 25, 2023. This impacts anyone who ran the `wolfictl check update` commands with a Melange configuration that included a `git-checkout` directive step that referenced a git repository not hosted on github.com. This also impacts anyone who ran `wolfictl update <url>` with a remote URL outside of github.com. Additionally, these subcommands must have run with the `GITHUB_TOKEN` environment variable set to a valid GitHub token. Users should upgrade to version 0.16.10 to receive a patch."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "wolfictl es una herramienta de l\u00ednea de comandos para trabajar con Wolfi. Un problema de autenticaci\u00f3n de Git en versiones anteriores a la 0.16.10 permite que el token de GitHub de un usuario local se env\u00ede a servidores remotos distintos de `github.com`. La mayor parte de la funcionalidad dependiente de git en wolfictl se basa en su propio paquete `git`, que contiene l\u00f3gica centralizada para implementar interacciones con repositorios de git. Algunas de estas funciones requieren autenticaci\u00f3n para poder acceder a repositorios privados. Una funci\u00f3n central `GetGitAuth` busca un token de GitHub en la variable de entorno `GITHUB_TOKEN` y lo devuelve como un objeto de autenticaci\u00f3n b\u00e1sica HTTP para usar con la librer\u00eda `github.com/go-git/go-git/v5`. La mayor\u00eda de las personas que llaman (directas o indirectas) a `GetGitAuth` usan el token para autenticarse en github.com \u00fanicamente; sin embargo, en algunos casos las personas que llamaban pasaban esta autenticaci\u00f3n sin verificar que el repositorio git remoto estuviera alojado en github.com. Este comportamiento ha existido de una forma u otra desde el commit 0d06e1578300327c212dda26a5ab31d09352b9d0, confirmada el 25 de enero de 2023. Esto afecta a cualquiera que haya ejecutado los comandos `wolfictl check update` con una configuraci\u00f3n de Melange que inclu\u00eda un paso de directiva `git-checkout` que hac\u00eda referencia a un repositorio de git. no alojado en github.com. Esto tambi\u00e9n afecta a cualquiera que haya ejecutado `wolfictl update ` con una URL remota fuera de github.com. Adem\u00e1s, estos subcomandos deben haberse ejecutado con la variable de entorno `GITHUB_TOKEN` configurada en un token de GitHub v\u00e1lido. Los usuarios deben actualizar a la versi\u00f3n 0.16.10 para recibir un parche."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35184",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-05-15T22:15:08.867",
|
||||
"lastModified": "2024-05-15T22:15:08.867",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Paperless-ngx is a document management system that transforms physical documents into a searchable online archive. Starting in version 2.5.0 and prior to version 2.8.6, remote user authentication allows API access even if API access is explicitly disabled. Version 2.8.6 contains a patchc for the issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Paperless-ngx es un sistema de gesti\u00f3n de documentos que transforma documentos f\u00edsicos en un archivo en l\u00ednea con capacidad de b\u00fasqueda. A partir de la versi\u00f3n 2.5.0 y antes de la versi\u00f3n 2.8.6, la autenticaci\u00f3n de usuario remoto permite el acceso a la API incluso si el acceso a la API est\u00e1 expl\u00edcitamente deshabilitado. La versi\u00f3n 2.8.6 contiene un parche para el problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35299",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-05-16T11:15:47.460",
|
||||
"lastModified": "2024-05-16T11:15:47.460",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35300",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-05-16T11:15:47.720",
|
||||
"lastModified": "2024-05-16T11:15:47.720",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35301",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-05-16T11:15:47.947",
|
||||
"lastModified": "2024-05-16T11:15:47.947",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35302",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-05-16T11:15:48.160",
|
||||
"lastModified": "2024-05-16T11:15:48.160",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3641",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-05-16T06:15:08.703",
|
||||
"lastModified": "2024-05-16T06:15:08.703",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3642",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-05-16T06:15:09.770",
|
||||
"lastModified": "2024-05-16T06:15:09.770",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3643",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-05-16T06:15:10.053",
|
||||
"lastModified": "2024-05-16T06:15:10.053",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3644",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-05-16T06:15:10.370",
|
||||
"lastModified": "2024-05-16T06:15:10.370",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3750",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T03:15:07.913",
|
||||
"lastModified": "2024-05-16T03:15:07.913",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3848",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-05-16T09:15:14.543",
|
||||
"lastModified": "2024-05-16T09:15:14.543",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a bypass for the previously addressed CVE-2023-6909. The vulnerability arises from the application's handling of artifact URLs, where a '#' character can be used to insert a path into the fragment, effectively skipping validation. This allows an attacker to construct a URL that, when processed, ignores the protocol scheme and uses the provided path for filesystem access. As a result, an attacker can read arbitrary files, including sensitive information such as SSH and cloud keys, by exploiting the way the application converts the URL into a filesystem path. The issue stems from insufficient validation of the fragment portion of the URL, leading to arbitrary file read through path traversal."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de path traversal en mlflow/mlflow versi\u00f3n 2.11.0, identificada como una derivaci\u00f3n para el CVE-2023-6909 abordado anteriormente. La vulnerabilidad surge del manejo de las URL de artefactos por parte de la aplicaci\u00f3n, donde se puede usar un car\u00e1cter '#' para insertar una ruta en el fragmento, omitiendo efectivamente la validaci\u00f3n. Esto permite a un atacante construir una URL que, cuando se procesa, ignora el esquema del protocolo y utiliza la ruta proporcionada para acceder al sistema de archivos. Como resultado, un atacante puede leer archivos arbitrarios, incluida informaci\u00f3n confidencial como SSH y claves de la nube, aprovechando la forma en que la aplicaci\u00f3n convierte la URL en una ruta del sistema de archivos. El problema surge de una validaci\u00f3n insuficiente de la parte del fragmento de la URL, lo que lleva a una lectura arbitraria del archivo a trav\u00e9s del path traversal."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3851",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-05-16T09:15:14.823",
|
||||
"lastModified": "2024-05-16T09:15:14.823",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stored Cross-Site Scripting (XSS) vulnerability exists in the 'imartinez/privategpt' repository due to improper validation of file uploads. Attackers can exploit this vulnerability by uploading malicious HTML files, such as those containing JavaScript payloads, which are then executed in the context of the victim's session when accessed. This could lead to the execution of arbitrary JavaScript code in the context of the user's browser session, potentially resulting in phishing attacks or other malicious actions. The vulnerability affects the latest version of the repository."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de cross-site scripting (XSS) almacenado en el repositorio 'imartinez/privategpt' debido a una validaci\u00f3n incorrecta de la carga de archivos. Los atacantes pueden aprovechar esta vulnerabilidad cargando archivos HTML maliciosos, como los que contienen payloads de JavaScript, que luego se ejecutan en el contexto de la sesi\u00f3n de la v\u00edctima cuando se accede a ellos. Esto podr\u00eda dar lugar a la ejecuci\u00f3n de c\u00f3digo JavaScript arbitrario en el contexto de la sesi\u00f3n del navegador del usuario, lo que podr\u00eda dar lugar a ataques de phishing u otras acciones maliciosas. La vulnerabilidad afecta a la \u00faltima versi\u00f3n del repositorio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3887",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T09:15:15.070",
|
||||
"lastModified": "2024-05-16T09:15:15.070",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Form Builder widget in all versions up to, and including, 1.3.974 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Royal Elementor Addons and Templates para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget Form Builder en todas las versiones hasta la 1.3.974 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4078",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-05-16T09:15:15.313",
|
||||
"lastModified": "2024-05-16T09:15:15.313",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the parisneo/lollms, specifically in the `/unInstall_binding` endpoint, allows for arbitrary code execution due to insufficient sanitization of user input. The issue arises from the lack of path sanitization when handling the `name` parameter in the `unInstall_binding` function, allowing an attacker to traverse directories and execute arbitrary code by loading a malicious `__init__.py` file. This vulnerability affects the latest version of the software. The exploitation of this vulnerability could lead to remote code execution on the system where parisneo/lollms is deployed."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en parisneo/lollms, espec\u00edficamente en el endpoint `/unInstall_binding`, permite la ejecuci\u00f3n de c\u00f3digo arbitrario debido a una sanitizaci\u00f3n insuficiente de la entrada del usuario. El problema surge de la falta de sanitizaci\u00f3n de rutas al manejar el par\u00e1metro `name` en la funci\u00f3n `unInstall_binding`, lo que permite a un atacante atravesar directorios y ejecutar c\u00f3digo arbitrario cargando un archivo `__init__.py` malicioso. Esta vulnerabilidad afecta a la \u00faltima versi\u00f3n del software. La explotaci\u00f3n de esta vulnerabilidad podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo en el sistema donde est\u00e1 implementado parisneo/lollms."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4181",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-05-16T09:15:15.553",
|
||||
"lastModified": "2024-05-16T09:15:15.553",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A command injection vulnerability exists in the RunGptLLM class of the llama_index library, version 0.9.47, used by the RunGpt framework from JinaAI to connect to Language Learning Models (LLMs). The vulnerability arises from the improper use of the eval function, allowing a malicious or compromised LLM hosting provider to execute arbitrary commands on the client's machine. This issue was fixed in version 0.10.13. The exploitation of this vulnerability could lead to a hosting provider gaining full control over client machines."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en la clase RunGptLLM de la librer\u00eda llama_index, versi\u00f3n 0.9.47, utilizada por el marco RunGpt de JinaAI para conectarse a los modelos de aprendizaje de idiomas (LLM). La vulnerabilidad surge del uso inadecuado de la funci\u00f3n de evaluaci\u00f3n, lo que permite que un proveedor de alojamiento LLM malicioso o comprometido ejecute comandos arbitrarios en la m\u00e1quina del cliente. Este problema se solucion\u00f3 en la versi\u00f3n 0.10.13. La explotaci\u00f3n de esta vulnerabilidad podr\u00eda llevar a que un proveedor de alojamiento obtenga control total sobre las m\u00e1quinas cliente."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4222",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T10:15:08.687",
|
||||
"lastModified": "2024-05-16T10:15:08.687",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4223",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T09:15:15.810",
|
||||
"lastModified": "2024-05-16T09:15:15.810",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Tutor LMS plugin for WordPress is vulnerable to unauthorized access of data, modification of data, loss of data due to a missing capability check on multiple functions in all versions up to, and including, 2.7.0. This makes it possible for unauthenticated attackers to add, modify, or delete data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Tutor LMS para WordPress es vulnerable al acceso no autorizado a datos, modificaci\u00f3n de datos, p\u00e9rdida de datos debido a una falta de verificaci\u00f3n de capacidad en m\u00faltiples funciones en todas las versiones hasta la 2.7.0 inclusive. Esto hace posible que atacantes no autenticados agreguen, modifiquen o eliminen datos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4263",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-05-16T09:15:16.037",
|
||||
"lastModified": "2024-05-16T09:15:16.037",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A broken access control vulnerability exists in mlflow/mlflow versions before 2.10.1, where low privilege users with only EDIT permissions on an experiment can delete any artifacts. This issue arises due to the lack of proper validation for DELETE requests by users with EDIT permissions, allowing them to perform unauthorized deletions of artifacts. The vulnerability specifically affects the handling of artifact deletions within the application, as demonstrated by the ability of a low privilege user to delete a directory inside an artifact using a DELETE request, despite the official documentation stating that users with EDIT permission can only read and update artifacts, not delete them."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de control de acceso roto en las versiones mlflow/mlflow anteriores a la 2.10.1, donde los usuarios con privilegios bajos y con solo permisos EDITAR en un experimento pueden eliminar cualquier artefacto. Este problema surge debido a la falta de una validaci\u00f3n adecuada para las solicitudes DELETE realizadas por usuarios con permisos EDIT, lo que les permite realizar eliminaciones no autorizadas de artefactos. La vulnerabilidad afecta espec\u00edficamente el manejo de eliminaciones de artefactos dentro de la aplicaci\u00f3n, como lo demuestra la capacidad de un usuario con privilegios bajos de eliminar un directorio dentro de un artefacto mediante una solicitud DELETE, a pesar de que la documentaci\u00f3n oficial indica que los usuarios con permiso EDITAR solo pueden leer y actualizar. artefactos, no eliminarlos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4279",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T06:15:10.667",
|
||||
"lastModified": "2024-05-16T06:15:10.667",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4288",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T11:15:48.373",
|
||||
"lastModified": "2024-05-16T11:15:48.373",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4318",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T06:15:11.480",
|
||||
"lastModified": "2024-05-16T06:15:11.480",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4321",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-05-16T09:15:16.327",
|
||||
"lastModified": "2024-05-16T09:15:16.327",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Local File Inclusion (LFI) vulnerability exists in the gaizhenbiao/chuanhuchatgpt application, specifically within the functionality for uploading chat history. The vulnerability arises due to improper input validation when handling file paths during the chat history upload process. An attacker can exploit this vulnerability by intercepting requests and manipulating the 'name' parameter to specify arbitrary file paths. This allows the attacker to read sensitive files on the server, leading to information leakage, including API keys and private information. The issue affects version 20240310 of the application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de inclusi\u00f3n de archivos locales (LFI) en la aplicaci\u00f3n gaizhenbiao/chuanhuchatgpt, espec\u00edficamente dentro de la funcionalidad para cargar el historial de chat. La vulnerabilidad surge debido a una validaci\u00f3n de entrada incorrecta al manejar rutas de archivos durante el proceso de carga del historial de chat. Un atacante puede aprovechar esta vulnerabilidad interceptando solicitudes y manipulando el par\u00e1metro 'nombre' para especificar rutas de archivo arbitrarias. Esto permite al atacante leer archivos confidenciales en el servidor, lo que provoca una fuga de informaci\u00f3n, incluidas claves API e informaci\u00f3n privada. El problema afecta a la versi\u00f3n 20240310 de la aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4322",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-05-16T09:15:16.613",
|
||||
"lastModified": "2024-05-16T09:15:16.613",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path traversal vulnerability exists in the parisneo/lollms-webui application, specifically within the `/list_personalities` endpoint. By manipulating the `category` parameter, an attacker can traverse the directory structure and list any directory on the system. This issue affects the latest version of the application. The vulnerability is due to improper handling of user-supplied input in the `list_personalities` function, where the `category` parameter can be controlled to specify arbitrary directories for listing. Successful exploitation of this vulnerability could allow an attacker to list all folders in the drive on the system, potentially leading to information disclosure."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de path traversal en la aplicaci\u00f3n parisneo/lollms-webui, espec\u00edficamente dentro del endpoint `/list_personalities`. Al manipular el par\u00e1metro \"categor\u00eda\", un atacante puede atravesar la estructura del directorio y enumerar cualquier directorio del sistema. Este problema afecta a la \u00faltima versi\u00f3n de la aplicaci\u00f3n. La vulnerabilidad se debe al manejo inadecuado de la entrada proporcionada por el usuario en la funci\u00f3n `list_personalities`, donde el par\u00e1metro `category` se puede controlar para especificar directorios arbitrarios para listar. La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda permitir a un atacante enumerar todas las carpetas en la unidad del sistema, lo que podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4326",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-05-16T09:15:16.887",
|
||||
"lastModified": "2024-05-16T09:15:16.887",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in parisneo/lollms-webui versions up to 9.3 allows remote attackers to execute arbitrary code. The vulnerability stems from insufficient protection of the `/apply_settings` and `/execute_code` endpoints. Attackers can bypass protections by setting the host to localhost, enabling code execution, and disabling code validation through the `/apply_settings` endpoint. Subsequently, arbitrary commands can be executed remotely via the `/execute_code` endpoint, exploiting the delay in settings enforcement. This issue was addressed in version 9.5."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en las versiones parisneo/lollms-webui hasta 9.3 permite a atacantes remotos ejecutar c\u00f3digo arbitrario. La vulnerabilidad se debe a una protecci\u00f3n insuficiente de los endpoints `/apply_settings` y `/execute_code`. Los atacantes pueden eludir las protecciones configurando el host en localhost, habilitando la ejecuci\u00f3n de c\u00f3digo y deshabilitando la validaci\u00f3n de c\u00f3digo a trav\u00e9s del endpoint `/apply_settings`. Posteriormente, se pueden ejecutar comandos arbitrarios de forma remota a trav\u00e9s del endpoint `/execute_code`, aprovechando el retraso en la aplicaci\u00f3n de la configuraci\u00f3n. Este problema se solucion\u00f3 en la versi\u00f3n 9.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4351",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T10:15:09.890",
|
||||
"lastModified": "2024-05-16T10:15:09.890",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4352",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T10:15:10.470",
|
||||
"lastModified": "2024-05-16T10:15:10.470",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4385",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T11:15:48.577",
|
||||
"lastModified": "2024-05-16T11:15:48.577",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4391",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T09:15:17.143",
|
||||
"lastModified": "2024-05-16T09:15:17.143",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Event Calendar widget in all versions up to, and including, 3.10.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Happy Addons para Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget Calendario de eventos del complemento en todas las versiones hasta la 3.10.7 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4400",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T11:15:48.773",
|
||||
"lastModified": "2024-05-16T11:15:48.773",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4478",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T08:15:38.200",
|
||||
"lastModified": "2024-05-16T08:15:38.200",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4546",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T08:15:38.487",
|
||||
"lastModified": "2024-05-16T08:15:38.487",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2024/CVE-2024-45xx/CVE-2024-4580.json
Normal file
55
CVE-2024/CVE-2024-45xx/CVE-2024-4580.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-4580",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T12:15:13.857",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Master Addons \u2013 Free Widgets, Hover Effects, Toggle, Conditions, Animations for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters in versions up to, and including, 2.0.6.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/master-addons/trunk/addons/ma-image-hover-effects/ma-image-hover-effects.php#L1546",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/master-addons/trunk/addons/ma-tabs/ma-tabs.php#L1068",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3087193/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e3e3ac84-dd82-42b0-80b9-c876731170d5?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4617",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T11:15:48.967",
|
||||
"lastModified": "2024-05-16T11:15:48.967",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4634",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T11:15:49.153",
|
||||
"lastModified": "2024-05-16T11:15:49.153",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4635",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T06:15:12.090",
|
||||
"lastModified": "2024-05-16T06:15:12.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4642",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-05-16T09:15:17.360",
|
||||
"lastModified": "2024-05-16T09:15:17.360",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Server-Side Request Forgery (SSRF) vulnerability exists in the wandb/wandb repository due to improper handling of HTTP 302 redirects. This issue allows team members with access to the 'User settings -> Webhooks' function to exploit this vulnerability to access internal HTTP(s) servers. In severe cases, such as on AWS instances, this could potentially be abused to achieve remote code execution on the victim's machine. The vulnerability is present in the latest version of the repository."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de Server Side Request Forgery (SSRF) en el repositorio wandb/wandb debido a un manejo inadecuado de las redirecciones HTTP 302. Este problema permite a los miembros del equipo con acceso a la funci\u00f3n 'Configuraci\u00f3n de usuario -> Webhooks' aprovechar esta vulnerabilidad para acceder a servidores HTTP internos. En casos graves, como en instancias de AWS, se podr\u00eda abusar de esto para lograr la ejecuci\u00f3n remota de c\u00f3digo en la m\u00e1quina de la v\u00edctima. La vulnerabilidad est\u00e1 presente en la \u00faltima versi\u00f3n del repositorio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
55
CVE-2024/CVE-2024-47xx/CVE-2024-4760.json
Normal file
55
CVE-2024/CVE-2024-47xx/CVE-2024-4760.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-4760",
|
||||
"sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
|
||||
"published": "2024-05-16T13:15:47.893",
|
||||
"lastModified": "2024-05-16T13:15:47.893",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A voltage glitch during the startup of EEFC NVM controllers on Microchip SAM E70/S70/V70/V71 microcontrollers allows access to the memory bus via the debug interface even if the security bit is set."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.4,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1247"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.0x01team.com/hw_security/bypassing-microchip-atmel-sam-e70-s70-v70-v71-security/",
|
||||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-48xx/CVE-2024-4826.json
Normal file
55
CVE-2024/CVE-2024-48xx/CVE-2024-4826.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-4826",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-05-16T12:15:14.330",
|
||||
"lastModified": "2024-05-16T13:15:48.163",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in Simple PHP Shopping Cart affecting version 0.9. This vulnerability could allow an attacker to retrieve all the information stored in the database by sending a specially crafted SQL query, due to the lack of proper sanitisation of the category_id parameter in the category.php file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-simple-php-shopping-cart",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4838",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T11:15:49.343",
|
||||
"lastModified": "2024-05-16T11:15:49.343",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4843",
|
||||
"sourceIdentifier": "trellixpsirt@trellix.com",
|
||||
"published": "2024-05-16T06:15:12.690",
|
||||
"lastModified": "2024-05-16T06:15:12.690",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4844",
|
||||
"sourceIdentifier": "trellixpsirt@trellix.com",
|
||||
"published": "2024-05-16T07:15:50.743",
|
||||
"lastModified": "2024-05-16T07:15:50.743",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4904",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T20:15:13.750",
|
||||
"lastModified": "2024-05-15T20:15:13.750",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Byzoro Smart S200 Management Platform up to 20240507. It has been rated as critical. This issue affects some unknown processing of the file /useratte/userattestation.php. The manipulation of the argument web_img leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264437 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en Byzoro Smart S200 Management Platform hasta 20240507 y fue calificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo /useratte/userattestation.php. La manipulaci\u00f3n del argumento web_img conduce a una carga sin restricciones. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-264437. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4906",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T19:15:08.203",
|
||||
"lastModified": "2024-05-15T19:15:08.203",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in Campcodes Complete Web-Based School Management System 1.0. This affects an unknown part of the file /view/show_student1.php. The manipulation of the argument grade leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264441 was assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en Campcodes Complete Web-Based School Management System 1.0 y clasificada como cr\u00edtica. Esto afecta a una parte desconocida del archivo /view/show_student1.php. La manipulaci\u00f3n del grado del argumento conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-264441."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4907",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T19:15:08.607",
|
||||
"lastModified": "2024-05-15T19:15:08.607",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Campcodes Complete Web-Based School Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /view/show_student2.php. The manipulation of the argument grade leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-264442 is the identifier assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad ha sido encontrada en Campcodes Complete Web-Based School Management System 1.0 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /view/show_student2.php. La manipulaci\u00f3n del grado del argumento conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-264442 es el identificador asignado a esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4908",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T19:15:08.980",
|
||||
"lastModified": "2024-05-15T19:15:08.980",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /view/student_attendance_history1.php. The manipulation of the argument index leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264443."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en Campcodes Complete Web-Based School Management System 1.0 y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo /view/student_attendance_history1.php. La manipulaci\u00f3n del \u00edndice del argumento conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-264443."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4909",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T19:15:09.320",
|
||||
"lastModified": "2024-05-15T19:15:09.320",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /view/student_due_payment.php. The manipulation of the argument due_year leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264444."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Complete Web-Based School Management System 1.0. Ha sido clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /view/student_due_paid.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento debido_a\u00f1o conduce a la inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-264444."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4910",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T20:15:14.167",
|
||||
"lastModified": "2024-05-15T20:15:14.167",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /view/student_exam_mark_insert_form1.php. The manipulation of the argument grade leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264445 was assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Complete Web-Based School Management System 1.0. Ha sido declarada cr\u00edtica. Una funci\u00f3n desconocida del archivo /view/student_exam_mark_insert_form1.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del grado del argumento conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-264445."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4911",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T21:15:08.447",
|
||||
"lastModified": "2024-05-15T21:15:08.447",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /view/student_exam_mark_update_form.php. The manipulation of the argument exam leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-264446 is the identifier assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Complete Web-Based School Management System 1.0. Ha sido calificado como cr\u00edtico. Una funci\u00f3n desconocida del archivo /view/student_exam_mark_update_form.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del examen de argumentos conduce a la inyecci\u00f3n de SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-264446 es el identificador asignado a esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4912",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T21:15:08.720",
|
||||
"lastModified": "2024-05-15T21:15:08.720",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in Campcodes Online Examination System 1.0. This affects an unknown part of the file addExamExe.php. The manipulation of the argument examTitle leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264447."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad ha sido encontrada en Campcodes Online Examination System 1.0 y clasificada como cr\u00edtica. Una parte desconocida del archivo addExamExe.php afecta a una parte desconocida. La manipulaci\u00f3n del argumento examTitle conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-264447."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4913",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T21:15:09.000",
|
||||
"lastModified": "2024-05-15T21:15:09.000",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in Campcodes Online Examination System 1.0. This vulnerability affects unknown code of the file exam.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264448."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en Campcodes Online Examination System 1.0 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo exam.php. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-264448."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4914",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T22:15:09.153",
|
||||
"lastModified": "2024-05-15T22:15:09.153",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in Campcodes Online Examination System 1.0. This issue affects some unknown processing of the file ranking-exam.php. The manipulation of the argument exam_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264449 was assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en Campcodes Online Examination System 1.0 y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo ranking-exam.php. La manipulaci\u00f3n del argumento exam_id conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-264449."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user