mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2024-08-06T20:00:17.827830+00:00
This commit is contained in:
parent
733c5f5b33
commit
79a6e024bc
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2012-0039",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2012-01-14T17:55:01.257",
|
||||
"lastModified": "2024-05-17T00:51:18.527",
|
||||
"lastModified": "2024-08-06T18:15:17.080",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2012-0394",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2012-01-08T15:55:01.467",
|
||||
"lastModified": "2024-05-17T00:51:27.483",
|
||||
"lastModified": "2024-08-06T19:15:29.580",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2012-0693",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2012-01-14T03:57:27.213",
|
||||
"lastModified": "2024-05-17T00:51:36.327",
|
||||
"lastModified": "2024-08-06T19:15:34.723",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2012-0782",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2012-01-30T17:55:00.843",
|
||||
"lastModified": "2024-05-17T00:51:38.620",
|
||||
"lastModified": "2024-08-06T19:15:35.827",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2012-0937",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2012-01-30T17:55:01.330",
|
||||
"lastModified": "2024-05-17T00:51:43.043",
|
||||
"lastModified": "2024-08-06T19:15:38.577",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2013-6276",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-08-09T18:15:07.120",
|
||||
"lastModified": "2024-05-17T00:57:06.843",
|
||||
"lastModified": "2024-08-06T18:15:33.283",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2013-6357",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2013-11-13T15:55:04.190",
|
||||
"lastModified": "2024-05-17T00:57:08.847",
|
||||
"lastModified": "2024-08-06T18:15:34.490",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2013-6999",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2013-12-07T01:55:02.920",
|
||||
"lastModified": "2024-05-17T00:57:26.193",
|
||||
"lastModified": "2024-08-06T18:15:43.730",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2013-7030",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2013-12-12T17:55:03.783",
|
||||
"lastModified": "2024-06-18T19:15:53.980",
|
||||
"lastModified": "2024-08-06T18:15:44.737",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-2209",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2024-03-27T00:15:07.817",
|
||||
"lastModified": "2024-03-27T12:29:30.307",
|
||||
"lastModified": "2024-08-06T19:35:03.380",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un usuario con privilegios administrativos puede crear un archivo dll comprometido con el mismo nombre que el dll original dentro del paquete Firmware Update Utility (FUU) de la impresora HP y colocarlo en el directorio de descargas predeterminado de Microsoft Windows, lo que puede conducir a una posible ejecuci\u00f3n de c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hp.com/us-en/document/ish_10354903-10354932-16",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24336",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T21:15:07.667",
|
||||
"lastModified": "2024-03-20T13:00:16.367",
|
||||
"lastModified": "2024-08-06T18:35:01.670",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A multiple Cross-site scripting (XSS) vulnerability in the '/members/moremember.pl', and \u2018/members/members-home.pl\u2019 endpoints within Koha Library Management System version 23.05.05 and earlier allows malicious staff users to carry out CSRF attacks, including unauthorized changes to usernames and passwords of users visiting the affected page, via the 'Circulation note' and \u2018Patrons Restriction\u2019 components."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nitipoom-jar.github.io/CVE-2024-24336/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26331",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T19:15:23.200",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"lastModified": "2024-08-06T19:35:02.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "ReCrystallize Server 5.10.0.0 utiliza un mecanismo de autorizaci\u00f3n que se basa en el valor de una cookie, pero no vincula el valor de la cookie a una ID de sesi\u00f3n. Los atacantes pueden modificar f\u00e1cilmente el valor de la cookie, dentro de un navegador o implementando c\u00f3digo del lado del cliente fuera de un navegador. Los atacantes pueden eludir el mecanismo de autenticaci\u00f3n modificando la cookie para que contenga un valor esperado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sensepost.com/blog/2024/from-discovery-to-disclosure-recrystallize-server-vulnerabilities/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-2628",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-03-20T17:15:07.570",
|
||||
"lastModified": "2024-08-01T13:49:49.370",
|
||||
"lastModified": "2024-08-06T19:35:04.207",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -42,20 +42,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
21
CVE-2024/CVE-2024-287xx/CVE-2024-28739.json
Normal file
21
CVE-2024/CVE-2024-287xx/CVE-2024-28739.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-28739",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-06T19:15:56.287",
|
||||
"lastModified": "2024-08-06T19:15:56.287",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Koha ILS 23.05 and before allows a remote attacker to execute arbitrary code via a crafted script to the format parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://febin0x4e4a.wordpress.com/2024/03/07/xss-to-one-click-rce-in-koha-ils/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-287xx/CVE-2024-28740.json
Normal file
25
CVE-2024/CVE-2024-287xx/CVE-2024-28740.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-28740",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-06T19:15:56.380",
|
||||
"lastModified": "2024-08-06T19:15:56.380",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in Koha ILS 23.05 and before allows a remote attacker to execute arbitrary code via the additonal-contents.pl component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://febin0x4e4a.wordpress.com/2023/01/11/xss-vulnerability-in-koha-integrated-library-system/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://febin0x4e4a.wordpress.com/2024/03/07/xss-to-one-click-rce-in-koha-ils/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-3838",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-04-17T08:15:10.383",
|
||||
"lastModified": "2024-07-03T02:06:38.383",
|
||||
"lastModified": "2024-08-06T19:35:06.410",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -42,15 +42,15 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-358"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-3844",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-04-17T08:15:10.620",
|
||||
"lastModified": "2024-07-03T02:06:42.643",
|
||||
"lastModified": "2024-08-06T19:35:07.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,23 +22,35 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-358"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40464",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-31T21:15:17.640",
|
||||
"lastModified": "2024-08-01T12:42:36.933",
|
||||
"lastModified": "2024-08-06T18:35:03.237",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": " Un problema en beego v.2.2.0 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s de la funci\u00f3n sendMail ubicada en el archivo beego/core/logs/smtp.go"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-599"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/nyxfqq/b53b0148b9aa040de63f58a68fd11445",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41260",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-01T16:15:06.453",
|
||||
"lastModified": "2024-08-01T16:45:25.400",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-06T19:35:08.443",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un vector de inicializaci\u00f3n est\u00e1tico (IV) en la funci\u00f3n de cifrado de netbird v0.28.4 permite a los atacantes obtener informaci\u00f3n confidencial."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-321"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/nyxfqq/92232108ac153e95d538bb17fc5ad636",
|
||||
|
64
CVE-2024/CVE-2024-416xx/CVE-2024-41677.json
Normal file
64
CVE-2024/CVE-2024-416xx/CVE-2024-41677.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-41677",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-06T18:15:56.883",
|
||||
"lastModified": "2024-08-06T18:15:56.883",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Qwik is a performance focused javascript framework. A potential mutation XSS vulnerability exists in Qwik for versions up to but not including 1.6.0. Qwik improperly escapes HTML on server-side rendering. It converts strings according to the rules found in the `render-ssr.ts` file. It sometimes causes the situation that the final DOM tree rendered on browsers is different from what Qwik expects on server-side rendering. This may be leveraged to perform XSS attacks, and a type of the XSS is known as mXSS (mutation XSS). This has been resolved in qwik version 1.6.0 and @builder.io/qwik version 1.7.3. All users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/QwikDev/qwik/blob/v1.5.5/packages/qwik/src/core/render/ssr/render-ssr.ts#L1182-L1208",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/QwikDev/qwik/commit/7e742eb3a1001542d795776c0317d47df8b9d64e",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/QwikDev/qwik/security/advisories/GHSA-2rwj-7xq8-4gx4",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-423xx/CVE-2024-42347.json
Normal file
60
CVE-2024/CVE-2024-423xx/CVE-2024-42347.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-42347",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-06T18:15:57.103",
|
||||
"lastModified": "2024-08-06T18:15:57.103",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "matrix-react-sdk is a react-based SDK for inserting a Matrix chat/voip client into a web page. A malicious homeserver could manipulate a user's account data to cause the client to enable URL previews in end-to-end encrypted rooms, in which case any URLs in encrypted messages would be sent to the server. This was patched in matrix-react-sdk 3.105.0. Deployments that trust their homeservers, as well as closed federations of trusted servers, are not affected. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-359"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/matrix-org/matrix-react-sdk/releases/tag/v3.105.1",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-f83w-wqhc-cfp4",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-423xx/CVE-2024-42393.json
Normal file
44
CVE-2024/CVE-2024-423xx/CVE-2024-42393.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-42393",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-08-06T19:15:56.640",
|
||||
"lastModified": "2024-08-06T19:15:56.640",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There are vulnerabilities in the Soft AP Daemon Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-423xx/CVE-2024-42394.json
Normal file
44
CVE-2024/CVE-2024-423xx/CVE-2024-42394.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-42394",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-08-06T19:15:56.830",
|
||||
"lastModified": "2024-08-06T19:15:56.830",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There are vulnerabilities in the Soft AP Daemon Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-423xx/CVE-2024-42395.json
Normal file
44
CVE-2024/CVE-2024-423xx/CVE-2024-42395.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-42395",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-08-06T19:15:57.017",
|
||||
"lastModified": "2024-08-06T19:15:57.017",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is a vulnerability in the AP Certificate Management Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-423xx/CVE-2024-42396.json
Normal file
44
CVE-2024/CVE-2024-423xx/CVE-2024-42396.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-42396",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-08-06T19:15:57.200",
|
||||
"lastModified": "2024-08-06T19:15:57.200",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Certificate Management daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-423xx/CVE-2024-42397.json
Normal file
44
CVE-2024/CVE-2024-423xx/CVE-2024-42397.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-42397",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-08-06T19:15:57.373",
|
||||
"lastModified": "2024-08-06T19:15:57.373",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Certificate Management daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-4699",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-14T15:44:26.620",
|
||||
"lastModified": "2024-08-01T21:15:48.283",
|
||||
"lastModified": "2024-08-06T19:15:57.580",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4936",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-14T05:15:49.400",
|
||||
"lastModified": "2024-06-17T12:42:04.623",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T18:29:27.013",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,51 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:canto:canto:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.0.9",
|
||||
"matchCriteriaId": "B03965EF-F526-4A0F-8D56-4D900168F989"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/canto/trunk/includes/lib/sizes.php#L15",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/95a68ae0-36da-499b-a09d-4c91db8aa338?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6772",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-07-16T22:15:06.810",
|
||||
"lastModified": "2024-08-01T14:00:38.260",
|
||||
"lastModified": "2024-08-06T19:35:10.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-358"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6773",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-07-16T22:15:06.893",
|
||||
"lastModified": "2024-08-01T14:00:38.483",
|
||||
"lastModified": "2024-08-06T19:35:11.320",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-358"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6988",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-06T16:15:49.877",
|
||||
"lastModified": "2024-08-06T16:30:24.547",
|
||||
"lastModified": "2024-08-06T18:35:04.950",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "Use after free in Downloads in Google Chrome on iOS prior to 127.0.6533.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
@ -22,6 +45,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6998",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-06T16:15:50.427",
|
||||
"lastModified": "2024-08-06T16:30:24.547",
|
||||
"lastModified": "2024-08-06T18:35:05.953",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "Use after free in User Education in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
@ -22,6 +45,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-7003",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-06T16:15:50.703",
|
||||
"lastModified": "2024-08-06T16:35:20.180",
|
||||
"lastModified": "2024-08-06T19:35:12.383",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -18,23 +18,35 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-358"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html",
|
||||
|
93
README.md
93
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-06T18:00:17.981543+00:00
|
||||
2024-08-06T20:00:17.827830+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-06T17:47:12.660000+00:00
|
||||
2024-08-06T19:35:12.383000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
259163
|
||||
259172
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `35`
|
||||
Recently added CVEs: `9`
|
||||
|
||||
- [CVE-2024-39229](CVE-2024/CVE-2024-392xx/CVE-2024-39229.json) (`2024-08-06T17:15:54.027`)
|
||||
- [CVE-2024-39751](CVE-2024/CVE-2024-397xx/CVE-2024-39751.json) (`2024-08-06T16:15:48.930`)
|
||||
- [CVE-2024-41333](CVE-2024/CVE-2024-413xx/CVE-2024-41333.json) (`2024-08-06T16:15:49.180`)
|
||||
- [CVE-2024-41616](CVE-2024/CVE-2024-416xx/CVE-2024-41616.json) (`2024-08-06T16:15:49.260`)
|
||||
- [CVE-2024-42358](CVE-2024/CVE-2024-423xx/CVE-2024-42358.json) (`2024-08-06T17:15:54.103`)
|
||||
- [CVE-2024-43111](CVE-2024/CVE-2024-431xx/CVE-2024-43111.json) (`2024-08-06T16:15:49.370`)
|
||||
- [CVE-2024-43112](CVE-2024/CVE-2024-431xx/CVE-2024-43112.json) (`2024-08-06T16:15:49.437`)
|
||||
- [CVE-2024-43113](CVE-2024/CVE-2024-431xx/CVE-2024-43113.json) (`2024-08-06T16:15:49.493`)
|
||||
- [CVE-2024-6720](CVE-2024/CVE-2024-67xx/CVE-2024-6720.json) (`2024-08-06T16:15:49.817`)
|
||||
- [CVE-2024-6988](CVE-2024/CVE-2024-69xx/CVE-2024-6988.json) (`2024-08-06T16:15:49.877`)
|
||||
- [CVE-2024-6989](CVE-2024/CVE-2024-69xx/CVE-2024-6989.json) (`2024-08-06T16:15:49.957`)
|
||||
- [CVE-2024-6991](CVE-2024/CVE-2024-69xx/CVE-2024-6991.json) (`2024-08-06T16:15:50.037`)
|
||||
- [CVE-2024-6994](CVE-2024/CVE-2024-69xx/CVE-2024-6994.json) (`2024-08-06T16:15:50.113`)
|
||||
- [CVE-2024-6995](CVE-2024/CVE-2024-69xx/CVE-2024-6995.json) (`2024-08-06T16:15:50.197`)
|
||||
- [CVE-2024-6996](CVE-2024/CVE-2024-69xx/CVE-2024-6996.json) (`2024-08-06T16:15:50.250`)
|
||||
- [CVE-2024-6997](CVE-2024/CVE-2024-69xx/CVE-2024-6997.json) (`2024-08-06T16:15:50.330`)
|
||||
- [CVE-2024-6998](CVE-2024/CVE-2024-69xx/CVE-2024-6998.json) (`2024-08-06T16:15:50.427`)
|
||||
- [CVE-2024-6999](CVE-2024/CVE-2024-69xx/CVE-2024-6999.json) (`2024-08-06T16:15:50.510`)
|
||||
- [CVE-2024-7000](CVE-2024/CVE-2024-70xx/CVE-2024-7000.json) (`2024-08-06T16:15:50.567`)
|
||||
- [CVE-2024-7001](CVE-2024/CVE-2024-70xx/CVE-2024-7001.json) (`2024-08-06T16:15:50.643`)
|
||||
- [CVE-2024-7003](CVE-2024/CVE-2024-70xx/CVE-2024-7003.json) (`2024-08-06T16:15:50.703`)
|
||||
- [CVE-2024-7004](CVE-2024/CVE-2024-70xx/CVE-2024-7004.json) (`2024-08-06T16:15:50.760`)
|
||||
- [CVE-2024-7005](CVE-2024/CVE-2024-70xx/CVE-2024-7005.json) (`2024-08-06T16:15:50.837`)
|
||||
- [CVE-2024-7502](CVE-2024/CVE-2024-75xx/CVE-2024-7502.json) (`2024-08-06T17:15:54.353`)
|
||||
- [CVE-2024-7564](CVE-2024/CVE-2024-75xx/CVE-2024-7564.json) (`2024-08-06T16:15:51.000`)
|
||||
- [CVE-2024-28739](CVE-2024/CVE-2024-287xx/CVE-2024-28739.json) (`2024-08-06T19:15:56.287`)
|
||||
- [CVE-2024-28740](CVE-2024/CVE-2024-287xx/CVE-2024-28740.json) (`2024-08-06T19:15:56.380`)
|
||||
- [CVE-2024-41677](CVE-2024/CVE-2024-416xx/CVE-2024-41677.json) (`2024-08-06T18:15:56.883`)
|
||||
- [CVE-2024-42347](CVE-2024/CVE-2024-423xx/CVE-2024-42347.json) (`2024-08-06T18:15:57.103`)
|
||||
- [CVE-2024-42393](CVE-2024/CVE-2024-423xx/CVE-2024-42393.json) (`2024-08-06T19:15:56.640`)
|
||||
- [CVE-2024-42394](CVE-2024/CVE-2024-423xx/CVE-2024-42394.json) (`2024-08-06T19:15:56.830`)
|
||||
- [CVE-2024-42395](CVE-2024/CVE-2024-423xx/CVE-2024-42395.json) (`2024-08-06T19:15:57.017`)
|
||||
- [CVE-2024-42396](CVE-2024/CVE-2024-423xx/CVE-2024-42396.json) (`2024-08-06T19:15:57.200`)
|
||||
- [CVE-2024-42397](CVE-2024/CVE-2024-423xx/CVE-2024-42397.json) (`2024-08-06T19:15:57.373`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `224`
|
||||
Recently modified CVEs: `24`
|
||||
|
||||
- [CVE-2024-7520](CVE-2024/CVE-2024-75xx/CVE-2024-7520.json) (`2024-08-06T16:35:20.863`)
|
||||
- [CVE-2024-7521](CVE-2024/CVE-2024-75xx/CVE-2024-7521.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7522](CVE-2024/CVE-2024-75xx/CVE-2024-7522.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7523](CVE-2024/CVE-2024-75xx/CVE-2024-7523.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7524](CVE-2024/CVE-2024-75xx/CVE-2024-7524.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7525](CVE-2024/CVE-2024-75xx/CVE-2024-7525.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7526](CVE-2024/CVE-2024-75xx/CVE-2024-7526.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7527](CVE-2024/CVE-2024-75xx/CVE-2024-7527.json) (`2024-08-06T16:35:21.090`)
|
||||
- [CVE-2024-7528](CVE-2024/CVE-2024-75xx/CVE-2024-7528.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7529](CVE-2024/CVE-2024-75xx/CVE-2024-7529.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7530](CVE-2024/CVE-2024-75xx/CVE-2024-7530.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7531](CVE-2024/CVE-2024-75xx/CVE-2024-7531.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7537](CVE-2024/CVE-2024-75xx/CVE-2024-7537.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7538](CVE-2024/CVE-2024-75xx/CVE-2024-7538.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7539](CVE-2024/CVE-2024-75xx/CVE-2024-7539.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7540](CVE-2024/CVE-2024-75xx/CVE-2024-7540.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7541](CVE-2024/CVE-2024-75xx/CVE-2024-7541.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7542](CVE-2024/CVE-2024-75xx/CVE-2024-7542.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7543](CVE-2024/CVE-2024-75xx/CVE-2024-7543.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7544](CVE-2024/CVE-2024-75xx/CVE-2024-7544.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7545](CVE-2024/CVE-2024-75xx/CVE-2024-7545.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7546](CVE-2024/CVE-2024-75xx/CVE-2024-7546.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7547](CVE-2024/CVE-2024-75xx/CVE-2024-7547.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7551](CVE-2024/CVE-2024-75xx/CVE-2024-7551.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2024-7552](CVE-2024/CVE-2024-75xx/CVE-2024-7552.json) (`2024-08-06T16:30:24.547`)
|
||||
- [CVE-2012-0039](CVE-2012/CVE-2012-00xx/CVE-2012-0039.json) (`2024-08-06T18:15:17.080`)
|
||||
- [CVE-2012-0394](CVE-2012/CVE-2012-03xx/CVE-2012-0394.json) (`2024-08-06T19:15:29.580`)
|
||||
- [CVE-2012-0693](CVE-2012/CVE-2012-06xx/CVE-2012-0693.json) (`2024-08-06T19:15:34.723`)
|
||||
- [CVE-2012-0782](CVE-2012/CVE-2012-07xx/CVE-2012-0782.json) (`2024-08-06T19:15:35.827`)
|
||||
- [CVE-2012-0937](CVE-2012/CVE-2012-09xx/CVE-2012-0937.json) (`2024-08-06T19:15:38.577`)
|
||||
- [CVE-2013-6276](CVE-2013/CVE-2013-62xx/CVE-2013-6276.json) (`2024-08-06T18:15:33.283`)
|
||||
- [CVE-2013-6357](CVE-2013/CVE-2013-63xx/CVE-2013-6357.json) (`2024-08-06T18:15:34.490`)
|
||||
- [CVE-2013-6999](CVE-2013/CVE-2013-69xx/CVE-2013-6999.json) (`2024-08-06T18:15:43.730`)
|
||||
- [CVE-2013-7030](CVE-2013/CVE-2013-70xx/CVE-2013-7030.json) (`2024-08-06T18:15:44.737`)
|
||||
- [CVE-2024-2209](CVE-2024/CVE-2024-22xx/CVE-2024-2209.json) (`2024-08-06T19:35:03.380`)
|
||||
- [CVE-2024-24336](CVE-2024/CVE-2024-243xx/CVE-2024-24336.json) (`2024-08-06T18:35:01.670`)
|
||||
- [CVE-2024-2628](CVE-2024/CVE-2024-26xx/CVE-2024-2628.json) (`2024-08-06T19:35:04.207`)
|
||||
- [CVE-2024-26331](CVE-2024/CVE-2024-263xx/CVE-2024-26331.json) (`2024-08-06T19:35:02.510`)
|
||||
- [CVE-2024-3838](CVE-2024/CVE-2024-38xx/CVE-2024-3838.json) (`2024-08-06T19:35:06.410`)
|
||||
- [CVE-2024-3844](CVE-2024/CVE-2024-38xx/CVE-2024-3844.json) (`2024-08-06T19:35:07.433`)
|
||||
- [CVE-2024-40464](CVE-2024/CVE-2024-404xx/CVE-2024-40464.json) (`2024-08-06T18:35:03.237`)
|
||||
- [CVE-2024-41260](CVE-2024/CVE-2024-412xx/CVE-2024-41260.json) (`2024-08-06T19:35:08.443`)
|
||||
- [CVE-2024-4699](CVE-2024/CVE-2024-46xx/CVE-2024-4699.json) (`2024-08-06T19:15:57.580`)
|
||||
- [CVE-2024-4936](CVE-2024/CVE-2024-49xx/CVE-2024-4936.json) (`2024-08-06T18:29:27.013`)
|
||||
- [CVE-2024-6772](CVE-2024/CVE-2024-67xx/CVE-2024-6772.json) (`2024-08-06T19:35:10.307`)
|
||||
- [CVE-2024-6773](CVE-2024/CVE-2024-67xx/CVE-2024-6773.json) (`2024-08-06T19:35:11.320`)
|
||||
- [CVE-2024-6988](CVE-2024/CVE-2024-69xx/CVE-2024-6988.json) (`2024-08-06T18:35:04.950`)
|
||||
- [CVE-2024-6998](CVE-2024/CVE-2024-69xx/CVE-2024-6998.json) (`2024-08-06T18:35:05.953`)
|
||||
- [CVE-2024-7003](CVE-2024/CVE-2024-70xx/CVE-2024-7003.json) (`2024-08-06T19:35:12.383`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
569
_state.csv
569
_state.csv
File diff suppressed because it is too large
Load Diff
Loading…
x
Reference in New Issue
Block a user