mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-06-04T16:00:19.902810+00:00
This commit is contained in:
parent
a96eed4d7f
commit
890d8e85cb
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2018-25112",
|
"id": "CVE-2018-25112",
|
||||||
"sourceIdentifier": "info@cert.vde.com",
|
"sourceIdentifier": "info@cert.vde.com",
|
||||||
"published": "2025-06-04T10:15:20.380",
|
"published": "2025-06-04T10:15:20.380",
|
||||||
"lastModified": "2025-06-04T10:15:20.380",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An unauthenticated remote attacker may use an uncontrolled resource consumption in the IEC 61131 program of the affected products by creating large amounts of network traffic that needs to be handled by the ILC. This results in a Denial-of-Service of the device."
|
"value": "An unauthenticated remote attacker may use an uncontrolled resource consumption in the IEC 61131 program of the affected products by creating large amounts of network traffic that needs to be handled by the ILC. This results in a Denial-of-Service of the device."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Un atacante remoto no autenticado podr\u00eda consumir recursos descontroladamente en el programa IEC 61131 de los productos afectados, generando grandes cantidades de tr\u00e1fico de red que el ILC debe gestionar. Esto provoca una denegaci\u00f3n de servicio del dispositivo."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2020-36603",
|
"id": "CVE-2020-36603",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2022-09-14T22:15:11.177",
|
"published": "2022-09-14T22:15:11.177",
|
||||||
"lastModified": "2024-11-21T05:29:52.383",
|
"lastModified": "2025-06-04T15:15:21.917",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 0.6,
|
"exploitabilityScore": 0.6,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.6,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,6 +69,16 @@
|
|||||||
"value": "NVD-CWE-noinfo"
|
"value": "NVD-CWE-noinfo"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-269"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2021-4422",
|
"id": "CVE-2021-4422",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2023-07-12T07:15:09.997",
|
"published": "2023-07-12T07:15:09.997",
|
||||||
"lastModified": "2024-11-21T06:37:41.330",
|
"lastModified": "2025-06-04T15:05:06.540",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -76,9 +76,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:wpexperts:post_smtp_mailer:*:*:*:*:*:wordpress:*:*",
|
"criteria": "cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*",
|
||||||
"versionEndIncluding": "2.0.20",
|
"versionEndIncluding": "2.0.20",
|
||||||
"matchCriteriaId": "D3612D88-8DF0-4960-BB19-937CA7D3B46D"
|
"matchCriteriaId": "C365E2DD-CEF9-419F-917D-2EE9F6F5BEF4"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-25708",
|
"id": "CVE-2022-25708",
|
||||||
"sourceIdentifier": "product-security@qualcomm.com",
|
"sourceIdentifier": "product-security@qualcomm.com",
|
||||||
"published": "2022-09-16T06:15:11.473",
|
"published": "2022-09-16T06:15:11.473",
|
||||||
"lastModified": "2024-11-21T06:52:46.613",
|
"lastModified": "2025-06-04T15:15:23.067",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -69,6 +69,16 @@
|
|||||||
"value": "CWE-120"
|
"value": "CWE-120"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-120"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-3082",
|
"id": "CVE-2023-3082",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2023-07-12T05:15:09.677",
|
"published": "2023-07-12T05:15:09.677",
|
||||||
"lastModified": "2024-11-21T08:16:24.297",
|
"lastModified": "2025-06-04T15:05:06.540",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -64,9 +64,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:wpexperts:post_smtp_mailer:*:*:*:*:*:wordpress:*:*",
|
"criteria": "cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*",
|
||||||
"versionEndExcluding": "2.5.8",
|
"versionEndExcluding": "2.5.8",
|
||||||
"matchCriteriaId": "BECABCB4-7E6C-41BC-8291-5B7B2823CE01"
|
"matchCriteriaId": "7AC67537-665D-4146-94C5-FF797BF94015"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-3179",
|
"id": "CVE-2023-3179",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2023-07-17T14:15:10.843",
|
"published": "2023-07-17T14:15:10.843",
|
||||||
"lastModified": "2024-11-21T08:16:38.150",
|
"lastModified": "2025-06-04T15:05:06.540",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -56,9 +56,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:wpexperts:post_smtp_mailer:*:*:*:*:*:wordpress:*:*",
|
"criteria": "cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*",
|
||||||
"versionEndExcluding": "2.5.7",
|
"versionEndExcluding": "2.5.7",
|
||||||
"matchCriteriaId": "BEDAD609-58E9-4841-A9C9-2CF8935580CA"
|
"matchCriteriaId": "AACA58B5-42D5-4C1F-8B91-80569638003E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,13 +2,13 @@
|
|||||||
"id": "CVE-2023-48677",
|
"id": "CVE-2023-48677",
|
||||||
"sourceIdentifier": "security@acronis.com",
|
"sourceIdentifier": "security@acronis.com",
|
||||||
"published": "2023-12-12T09:15:08.383",
|
"published": "2023-12-12T09:15:08.383",
|
||||||
"lastModified": "2025-01-31T13:15:26.723",
|
"lastModified": "2025-06-04T14:15:25.697",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40901, Acronis Cyber Protect Cloud Agent (Windows) before build 39378."
|
"value": "Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40901, Acronis Cyber Protect Cloud Agent (Windows) before build 39378, Acronis Cyber Protect 16 (Windows) before build 39938."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -64,7 +64,7 @@
|
|||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "security@acronis.com",
|
"source": "security@acronis.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-52233",
|
"id": "CVE-2023-52233",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-06-11T16:15:16.757",
|
"published": "2024-06-11T16:15:16.757",
|
||||||
"lastModified": "2024-11-21T08:39:27.173",
|
"lastModified": "2025-06-04T15:05:06.540",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -80,9 +80,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:wpexperts:post_smtp_mailer:*:*:*:*:*:wordpress:*:*",
|
"criteria": "cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*",
|
||||||
"versionEndExcluding": "2.8.7",
|
"versionEndExcluding": "2.8.7",
|
||||||
"matchCriteriaId": "DAE21F17-BC0F-4051-9754-6CAAEF59A010"
|
"matchCriteriaId": "00068F78-E905-4A92-8286-F98BDBD96103"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-5958",
|
"id": "CVE-2023-5958",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2023-11-27T17:15:09.623",
|
"published": "2023-11-27T17:15:09.623",
|
||||||
"lastModified": "2024-11-21T08:42:51.820",
|
"lastModified": "2025-06-04T15:05:06.540",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -60,9 +60,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:wpexperts:post_smtp_mailer:*:*:*:*:*:wordpress:*:*",
|
"criteria": "cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*",
|
||||||
"versionEndExcluding": "2.7.1",
|
"versionEndExcluding": "2.7.1",
|
||||||
"matchCriteriaId": "E40A03E0-E94A-431E-8C67-039F96A535BE"
|
"matchCriteriaId": "0388D55E-C715-40AB-81C3-35A193C417A2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-6620",
|
"id": "CVE-2023-6620",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2024-01-15T16:15:12.513",
|
"published": "2024-01-15T16:15:12.513",
|
||||||
"lastModified": "2024-11-21T08:44:13.107",
|
"lastModified": "2025-06-04T15:05:06.540",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -60,9 +60,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:wpexperts:post_smtp_mailer:*:*:*:*:*:wordpress:*:*",
|
"criteria": "cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*",
|
||||||
"versionEndExcluding": "2.8.7",
|
"versionEndExcluding": "2.8.7",
|
||||||
"matchCriteriaId": "DAE21F17-BC0F-4051-9754-6CAAEF59A010"
|
"matchCriteriaId": "00068F78-E905-4A92-8286-F98BDBD96103"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-6875",
|
"id": "CVE-2023-6875",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2024-01-11T09:15:52.773",
|
"published": "2024-01-11T09:15:52.773",
|
||||||
"lastModified": "2025-06-03T14:15:41.283",
|
"lastModified": "2025-06-04T15:05:06.540",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -90,9 +90,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:wpexperts:post_smtp_mailer:*:*:*:*:*:wordpress:*:*",
|
"criteria": "cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*",
|
||||||
"versionEndIncluding": "2.8.7",
|
"versionEndIncluding": "2.8.7",
|
||||||
"matchCriteriaId": "69EA3FC7-5A83-43E1-A957-885559CA5C91"
|
"matchCriteriaId": "B9580B8D-CECD-4DBB-9566-95A339FFD67A"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-12718",
|
"id": "CVE-2024-12718",
|
||||||
"sourceIdentifier": "cna@python.org",
|
"sourceIdentifier": "cna@python.org",
|
||||||
"published": "2025-06-03T13:15:20.183",
|
"published": "2025-06-03T13:15:20.183",
|
||||||
"lastModified": "2025-06-03T21:15:20.857",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Allows modifying some file metadata (e.g. last modified) with filter=\"data\"\u00a0or file permissions (chmod) with filter=\"tar\"\u00a0of files outside the extraction directory.\nYou are affected by this vulnerability if using the tarfile\u00a0module to extract untrusted tar archives using TarFile.extractall()\u00a0or TarFile.extract()\u00a0using the filter=\u00a0parameter with a value of \"data\"\u00a0or \"tar\". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter \u00a0for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature.\n\nNote that for Python 3.14 or later the default value of filter=\u00a0changed from \"no filtering\" to `\"data\", so if you are relying on this new default behavior then your usage is also affected.\n\nNote that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links."
|
"value": "Allows modifying some file metadata (e.g. last modified) with filter=\"data\"\u00a0or file permissions (chmod) with filter=\"tar\"\u00a0of files outside the extraction directory.\nYou are affected by this vulnerability if using the tarfile\u00a0module to extract untrusted tar archives using TarFile.extractall()\u00a0or TarFile.extract()\u00a0using the filter=\u00a0parameter with a value of \"data\"\u00a0or \"tar\". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter \u00a0for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature.\n\nNote that for Python 3.14 or later the default value of filter=\u00a0changed from \"no filtering\" to `\"data\", so if you are relying on this new default behavior then your usage is also affected.\n\nNote that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Permite modificar algunos metadatos de archivo (p. ej., la \u00faltima modificaci\u00f3n) con filter=\"data\" o permisos de archivo (chmod) con filter=\"tar\" de archivos fuera del directorio de extracci\u00f3n. Esta vulnerabilidad afecta al usar el m\u00f3dulo tarfile para extraer archivos tar no confiables mediante TarFile.extractall() o TarFile.extract() y el par\u00e1metro filter= con el valor \"data\" o \"tar\". Consulte la documentaci\u00f3n sobre filtros de extracci\u00f3n de archivos tar (https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter) para obtener m\u00e1s informaci\u00f3n. Estas vulnerabilidades solo afectan a las versiones de Python 3.12 o posteriores; las versiones anteriores no incluyen la funci\u00f3n de filtro de extracci\u00f3n. Tenga en cuenta que para Python 3.14 o posteriores, el valor predeterminado de filter= cambi\u00f3 de \"sin filtrado\" a \"data\", por lo que si utiliza este nuevo comportamiento predeterminado, su uso tambi\u00e9n se ver\u00e1 afectado. Tenga en cuenta que ninguna de estas vulnerabilidades afecta significativamente la instalaci\u00f3n de distribuciones fuente que son archivos tar, ya que estas permiten la ejecuci\u00f3n de c\u00f3digo arbitrario durante el proceso de compilaci\u00f3n. Sin embargo, al evaluar distribuciones fuente, es importante evitar instalar distribuciones fuente con enlaces sospechosos."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-13246",
|
"id": "CVE-2024-13246",
|
||||||
"sourceIdentifier": "mlhess@drupal.org",
|
"sourceIdentifier": "mlhess@drupal.org",
|
||||||
"published": "2025-01-09T19:15:18.497",
|
"published": "2025-01-09T19:15:18.497",
|
||||||
"lastModified": "2025-01-10T20:15:30.297",
|
"lastModified": "2025-06-04T15:18:56.680",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -49,12 +49,43 @@
|
|||||||
"value": "CWE-282"
|
"value": "CWE-282"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-Other"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:node_access_rebuild_progressive_project:node_access_rebuild_progressive:*:*:*:*:*:drupal:*:*",
|
||||||
|
"versionEndExcluding": "2.0.2",
|
||||||
|
"matchCriteriaId": "645C1D5A-9814-41BC-974C-D3047A53CBF2"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.drupal.org/sa-contrib-2024-010",
|
"url": "https://www.drupal.org/sa-contrib-2024-010",
|
||||||
"source": "mlhess@drupal.org"
|
"source": "mlhess@drupal.org",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-13247",
|
"id": "CVE-2024-13247",
|
||||||
"sourceIdentifier": "mlhess@drupal.org",
|
"sourceIdentifier": "mlhess@drupal.org",
|
||||||
"published": "2025-01-09T19:15:18.610",
|
"published": "2025-01-09T19:15:18.610",
|
||||||
"lastModified": "2025-01-09T21:15:25.443",
|
"lastModified": "2025-06-04T15:23:03.783",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -49,12 +49,44 @@
|
|||||||
"value": "CWE-79"
|
"value": "CWE-79"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:coffee_project:coffee:*:*:*:*:*:drupal:*:*",
|
||||||
|
"versionStartIncluding": "7.x-1.0",
|
||||||
|
"versionEndExcluding": "8.x-1.4",
|
||||||
|
"matchCriteriaId": "7A3CF56C-985A-4ACA-B504-597F0554A2EC"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.drupal.org/sa-contrib-2024-011",
|
"url": "https://www.drupal.org/sa-contrib-2024-011",
|
||||||
"source": "mlhess@drupal.org"
|
"source": "mlhess@drupal.org",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-13248",
|
"id": "CVE-2024-13248",
|
||||||
"sourceIdentifier": "mlhess@drupal.org",
|
"sourceIdentifier": "mlhess@drupal.org",
|
||||||
"published": "2025-01-09T19:15:18.730",
|
"published": "2025-01-09T19:15:18.730",
|
||||||
"lastModified": "2025-01-10T22:15:25.360",
|
"lastModified": "2025-06-04T15:58:13.153",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -49,12 +49,43 @@
|
|||||||
"value": "CWE-266"
|
"value": "CWE-266"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-Other"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:private_content_project:private_content:*:*:*:*:*:drupal:*:*",
|
||||||
|
"versionEndExcluding": "8.x-2.1",
|
||||||
|
"matchCriteriaId": "64751EE0-3530-4947-8907-0C1F3C0E5142"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.drupal.org/sa-contrib-2024-012",
|
"url": "https://www.drupal.org/sa-contrib-2024-012",
|
||||||
"source": "mlhess@drupal.org"
|
"source": "mlhess@drupal.org",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-13249",
|
"id": "CVE-2024-13249",
|
||||||
"sourceIdentifier": "mlhess@drupal.org",
|
"sourceIdentifier": "mlhess@drupal.org",
|
||||||
"published": "2025-01-09T19:15:18.857",
|
"published": "2025-01-09T19:15:18.857",
|
||||||
"lastModified": "2025-01-10T22:15:25.497",
|
"lastModified": "2025-06-04T15:59:26.683",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -49,12 +49,44 @@
|
|||||||
"value": "CWE-282"
|
"value": "CWE-282"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-Other"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:node_access_rebuild_progressive_project:node_access_rebuild_progressive:*:*:*:*:*:drupal:*:*",
|
||||||
|
"versionStartIncluding": "7.x-1.0",
|
||||||
|
"versionEndExcluding": "7.x-1.2",
|
||||||
|
"matchCriteriaId": "92E6F480-064E-472A-8B32-AB1A87018095"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.drupal.org/sa-contrib-2024-013",
|
"url": "https://www.drupal.org/sa-contrib-2024-013",
|
||||||
"source": "mlhess@drupal.org"
|
"source": "mlhess@drupal.org",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-13256",
|
"id": "CVE-2024-13256",
|
||||||
"sourceIdentifier": "mlhess@drupal.org",
|
"sourceIdentifier": "mlhess@drupal.org",
|
||||||
"published": "2025-01-09T19:15:19.660",
|
"published": "2025-01-09T19:15:19.660",
|
||||||
"lastModified": "2025-01-10T17:15:13.473",
|
"lastModified": "2025-06-04T15:09:20.230",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -49,12 +49,43 @@
|
|||||||
"value": "CWE-1220"
|
"value": "CWE-1220"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-Other"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:email_contact_project:email_contact:*:*:*:*:*:drupal:*:*",
|
||||||
|
"versionEndExcluding": "2.0.4",
|
||||||
|
"matchCriteriaId": "AAB8BD90-BCAB-4F9B-93DF-6996667CB111"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.drupal.org/sa-contrib-2024-020",
|
"url": "https://www.drupal.org/sa-contrib-2024-020",
|
||||||
"source": "mlhess@drupal.org"
|
"source": "mlhess@drupal.org",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-13257",
|
"id": "CVE-2024-13257",
|
||||||
"sourceIdentifier": "mlhess@drupal.org",
|
"sourceIdentifier": "mlhess@drupal.org",
|
||||||
"published": "2025-01-09T19:15:19.773",
|
"published": "2025-01-09T19:15:19.773",
|
||||||
"lastModified": "2025-01-10T17:15:13.633",
|
"lastModified": "2025-06-04T15:09:44.690",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -49,12 +49,43 @@
|
|||||||
"value": "CWE-863"
|
"value": "CWE-863"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-863"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:commerce_view_receipt_project:commerce_view_receipt:*:*:*:*:*:drupal:*:*",
|
||||||
|
"versionEndExcluding": "1.0.3",
|
||||||
|
"matchCriteriaId": "479E4DD2-1943-4985-8AAF-92F7AB9B3B1D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.drupal.org/sa-contrib-2024-021",
|
"url": "https://www.drupal.org/sa-contrib-2024-021",
|
||||||
"source": "mlhess@drupal.org"
|
"source": "mlhess@drupal.org",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-13258",
|
"id": "CVE-2024-13258",
|
||||||
"sourceIdentifier": "mlhess@drupal.org",
|
"sourceIdentifier": "mlhess@drupal.org",
|
||||||
"published": "2025-01-09T19:15:19.887",
|
"published": "2025-01-09T19:15:19.887",
|
||||||
"lastModified": "2025-01-10T17:15:13.790",
|
"lastModified": "2025-06-04T15:11:56.670",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -49,12 +49,43 @@
|
|||||||
"value": "CWE-863"
|
"value": "CWE-863"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-863"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:rest_\\&_json_api_authentication_project:rest_\\&_json_api_authentication:*:*:*:*:*:drupal:*:*",
|
||||||
|
"versionEndExcluding": "2.0.13",
|
||||||
|
"matchCriteriaId": "B171654A-766C-4291-9BC2-8BB31C647E92"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.drupal.org/sa-contrib-2024-022",
|
"url": "https://www.drupal.org/sa-contrib-2024-022",
|
||||||
"source": "mlhess@drupal.org"
|
"source": "mlhess@drupal.org",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-13259",
|
"id": "CVE-2024-13259",
|
||||||
"sourceIdentifier": "mlhess@drupal.org",
|
"sourceIdentifier": "mlhess@drupal.org",
|
||||||
"published": "2025-01-09T19:15:19.997",
|
"published": "2025-01-09T19:15:19.997",
|
||||||
"lastModified": "2025-01-10T17:15:13.960",
|
"lastModified": "2025-06-04T15:12:41.220",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -49,12 +49,43 @@
|
|||||||
"value": "CWE-201"
|
"value": "CWE-201"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-Other"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:image_sizes_project:image_sizes:*:*:*:*:*:drupal:*:*",
|
||||||
|
"versionEndExcluding": "3.0.2",
|
||||||
|
"matchCriteriaId": "46EA3A66-4866-451B-862E-611ACB1CD6AC"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.drupal.org/sa-contrib-2024-023",
|
"url": "https://www.drupal.org/sa-contrib-2024-023",
|
||||||
"source": "mlhess@drupal.org"
|
"source": "mlhess@drupal.org",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-13260",
|
"id": "CVE-2024-13260",
|
||||||
"sourceIdentifier": "mlhess@drupal.org",
|
"sourceIdentifier": "mlhess@drupal.org",
|
||||||
"published": "2025-01-09T20:15:34.650",
|
"published": "2025-01-09T20:15:34.650",
|
||||||
"lastModified": "2025-01-10T17:15:14.107",
|
"lastModified": "2025-06-04T15:13:24.007",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -49,12 +49,43 @@
|
|||||||
"value": "CWE-352"
|
"value": "CWE-352"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:migrate_queue_importer_project:migrate_queue_importer:*:*:*:*:*:drupal:*:*",
|
||||||
|
"versionEndExcluding": "2.1.1",
|
||||||
|
"matchCriteriaId": "2A186C1F-492E-4940-A32E-0EF277BD626D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.drupal.org/sa-contrib-2024-024",
|
"url": "https://www.drupal.org/sa-contrib-2024-024",
|
||||||
"source": "mlhess@drupal.org"
|
"source": "mlhess@drupal.org",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-13967",
|
"id": "CVE-2024-13967",
|
||||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||||
"published": "2025-06-04T08:15:21.367",
|
"published": "2025-06-04T08:15:21.367",
|
||||||
"lastModified": "2025-06-04T08:15:21.367",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "This vulnerability allows the successful attacker to gain unauthorized access to a \nconfiguration web page delivered by the integrated web Server of EIBPORT.\n\nThis issue affects EIBPORT V3 KNX: through 3.9.8; EIBPORT V3 KNX GSM: through 3.9.8."
|
"value": "This vulnerability allows the successful attacker to gain unauthorized access to a \nconfiguration web page delivered by the integrated web Server of EIBPORT.\n\nThis issue affects EIBPORT V3 KNX: through 3.9.8; EIBPORT V3 KNX GSM: through 3.9.8."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Esta vulnerabilidad permite al atacante obtener acceso no autorizado a una p\u00e1gina web de configuraci\u00f3n proporcionada por el servidor web integrado de EIBPORT. Este problema afecta a EIBPORT V3 KNX (hasta la versi\u00f3n 3.9.8) y EIBPORT V3 KNX GSM (hasta la versi\u00f3n 3.9.8)."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-23899",
|
"id": "CVE-2024-23899",
|
||||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
"published": "2024-01-24T18:15:09.467",
|
"published": "2024-01-24T18:15:09.467",
|
||||||
"lastModified": "2024-11-21T08:58:40.040",
|
"lastModified": "2025-06-04T15:15:23.400",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,6 +69,16 @@
|
|||||||
"value": "NVD-CWE-noinfo"
|
"value": "NVD-CWE-noinfo"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-22"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-31127",
|
"id": "CVE-2024-31127",
|
||||||
"sourceIdentifier": "cve@zscaler.com",
|
"sourceIdentifier": "cve@zscaler.com",
|
||||||
"published": "2025-06-04T05:15:21.870",
|
"published": "2025-06-04T05:15:21.870",
|
||||||
"lastModified": "2025-06-04T05:15:21.870",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An improper verification of a loaded library in Zscaler Client Connector on Mac < 4.2.0.241 may allow a local attacker to elevate their privileges."
|
"value": "An improper verification of a loaded library in Zscaler Client Connector on Mac < 4.2.0.241 may allow a local attacker to elevate their privileges."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una verificaci\u00f3n incorrecta de una librer\u00eda cargada en Zscaler Client Connector en Mac < 4.2.0.241 puede permitir que un atacante local eleve sus privilegios."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-36486",
|
"id": "CVE-2024-36486",
|
||||||
"sourceIdentifier": "talos-cna@cisco.com",
|
"sourceIdentifier": "talos-cna@cisco.com",
|
||||||
"published": "2025-06-03T10:15:20.657",
|
"published": "2025-06-03T10:15:20.657",
|
||||||
"lastModified": "2025-06-03T14:15:47.160",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-45655",
|
"id": "CVE-2024-45655",
|
||||||
"sourceIdentifier": "psirt@us.ibm.com",
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
"published": "2025-06-03T15:15:58.093",
|
"published": "2025-06-03T15:15:58.093",
|
||||||
"lastModified": "2025-06-03T15:15:58.093",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "IBM Application Gateway 19.12 through 24.09 could allow a local privileged user to perform unauthorized actions due to incorrect permissions assignment."
|
"value": "IBM Application Gateway 19.12 through 24.09 could allow a local privileged user to perform unauthorized actions due to incorrect permissions assignment."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "IBM Application Gateway 19.12 a 24.09 podr\u00eda permitir que un usuario privilegiado local realice acciones no autorizadas debido a una asignaci\u00f3n de permisos incorrecta."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-52561",
|
"id": "CVE-2024-52561",
|
||||||
"sourceIdentifier": "talos-cna@cisco.com",
|
"sourceIdentifier": "talos-cna@cisco.com",
|
||||||
"published": "2025-06-03T10:15:21.857",
|
"published": "2025-06-03T10:15:21.857",
|
||||||
"lastModified": "2025-06-03T14:15:47.283",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-53010",
|
"id": "CVE-2024-53010",
|
||||||
"sourceIdentifier": "product-security@qualcomm.com",
|
"sourceIdentifier": "product-security@qualcomm.com",
|
||||||
"published": "2025-06-03T06:15:23.887",
|
"published": "2025-06-03T06:15:23.887",
|
||||||
"lastModified": "2025-06-03T06:15:23.887",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Memory corruption may occur while attaching VM when the HLOS retains access to VM."
|
"value": "Memory corruption may occur while attaching VM when the HLOS retains access to VM."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Puede ocurrir corrupci\u00f3n de memoria al conectar una m\u00e1quina virtual cuando el HLOS retiene el acceso a la m\u00e1quina virtual."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-53013",
|
"id": "CVE-2024-53013",
|
||||||
"sourceIdentifier": "product-security@qualcomm.com",
|
"sourceIdentifier": "product-security@qualcomm.com",
|
||||||
"published": "2025-06-03T06:15:24.160",
|
"published": "2025-06-03T06:15:24.160",
|
||||||
"lastModified": "2025-06-03T06:15:24.160",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Memory corruption may occur while processing voice call registration with user."
|
"value": "Memory corruption may occur while processing voice call registration with user."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Puede ocurrir corrupci\u00f3n en la memoria mientras se procesa el registro de llamadas de voz con el usuario."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-53015",
|
"id": "CVE-2024-53015",
|
||||||
"sourceIdentifier": "product-security@qualcomm.com",
|
"sourceIdentifier": "product-security@qualcomm.com",
|
||||||
"published": "2025-06-03T06:15:24.350",
|
"published": "2025-06-03T06:15:24.350",
|
||||||
"lastModified": "2025-06-03T06:15:24.350",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Memory corruption while processing IOCTL command to handle buffers associated with a session."
|
"value": "Memory corruption while processing IOCTL command to handle buffers associated with a session."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Corrupci\u00f3n de memoria al procesar el comando IOCTL para manejar los b\u00faferes asociados con una sesi\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-53016",
|
"id": "CVE-2024-53016",
|
||||||
"sourceIdentifier": "product-security@qualcomm.com",
|
"sourceIdentifier": "product-security@qualcomm.com",
|
||||||
"published": "2025-06-03T06:15:24.580",
|
"published": "2025-06-03T06:15:24.580",
|
||||||
"lastModified": "2025-06-03T06:15:24.580",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Memory corruption while processing I2C settings in Camera driver."
|
"value": "Memory corruption while processing I2C settings in Camera driver."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Corrupci\u00f3n de memoria al procesar configuraciones I2C en el controlador de la c\u00e1mara."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-53017",
|
"id": "CVE-2024-53017",
|
||||||
"sourceIdentifier": "product-security@qualcomm.com",
|
"sourceIdentifier": "product-security@qualcomm.com",
|
||||||
"published": "2025-06-03T06:15:24.793",
|
"published": "2025-06-03T06:15:24.793",
|
||||||
"lastModified": "2025-06-03T06:15:24.793",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Memory corruption while handling test pattern generator IOCTL command."
|
"value": "Memory corruption while handling test pattern generator IOCTL command."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Corrupci\u00f3n de memoria durante el manejo del comando IOCTL del generador de patrones de prueba."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-53018",
|
"id": "CVE-2024-53018",
|
||||||
"sourceIdentifier": "product-security@qualcomm.com",
|
"sourceIdentifier": "product-security@qualcomm.com",
|
||||||
"published": "2025-06-03T06:15:24.963",
|
"published": "2025-06-03T06:15:24.963",
|
||||||
"lastModified": "2025-06-03T06:15:24.963",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Memory corruption may occur while processing the OIS packet parser."
|
"value": "Memory corruption may occur while processing the OIS packet parser."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Puede ocurrir corrupci\u00f3n de memoria mientras se procesa el analizador de paquetes OIS."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-53019",
|
"id": "CVE-2024-53019",
|
||||||
"sourceIdentifier": "product-security@qualcomm.com",
|
"sourceIdentifier": "product-security@qualcomm.com",
|
||||||
"published": "2025-06-03T06:15:25.147",
|
"published": "2025-06-03T06:15:25.147",
|
||||||
"lastModified": "2025-06-03T06:15:25.147",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Information disclosure may occur while decoding the RTP packet with improper header length for number of contributing sources."
|
"value": "Information disclosure may occur while decoding the RTP packet with improper header length for number of contributing sources."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Puede ocurrir una divulgaci\u00f3n de informaci\u00f3n mientras se decodifica el paquete RTP con una longitud de encabezado inadecuada para la cantidad de fuentes contribuyentes."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-53020",
|
"id": "CVE-2024-53020",
|
||||||
"sourceIdentifier": "product-security@qualcomm.com",
|
"sourceIdentifier": "product-security@qualcomm.com",
|
||||||
"published": "2025-06-03T06:15:25.347",
|
"published": "2025-06-03T06:15:25.347",
|
||||||
"lastModified": "2025-06-03T06:15:25.347",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Information disclosure may occur while decoding the RTP packet with invalid header extension from network."
|
"value": "Information disclosure may occur while decoding the RTP packet with invalid header extension from network."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Puede ocurrir una divulgaci\u00f3n de informaci\u00f3n mientras se decodifica el paquete RTP con una extensi\u00f3n de encabezado no v\u00e1lida de la red."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-53021",
|
"id": "CVE-2024-53021",
|
||||||
"sourceIdentifier": "product-security@qualcomm.com",
|
"sourceIdentifier": "product-security@qualcomm.com",
|
||||||
"published": "2025-06-03T06:15:25.560",
|
"published": "2025-06-03T06:15:25.560",
|
||||||
"lastModified": "2025-06-03T06:15:25.560",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Information disclosure may occur while processing goodbye RTCP packet from network."
|
"value": "Information disclosure may occur while processing goodbye RTCP packet from network."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Puede ocurrir una divulgaci\u00f3n de informaci\u00f3n mientras se procesa el paquete RTCP de despedida de la red."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-53026",
|
"id": "CVE-2024-53026",
|
||||||
"sourceIdentifier": "product-security@qualcomm.com",
|
"sourceIdentifier": "product-security@qualcomm.com",
|
||||||
"published": "2025-06-03T06:15:25.780",
|
"published": "2025-06-03T06:15:25.780",
|
||||||
"lastModified": "2025-06-03T06:15:25.780",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Information disclosure when an invalid RTCP packet is received during a VoLTE/VoWiFi IMS call."
|
"value": "Information disclosure when an invalid RTCP packet is received during a VoLTE/VoWiFi IMS call."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Divulgaci\u00f3n de informaci\u00f3n cuando se recibe un paquete RTCP no v\u00e1lido durante una llamada IMS VoLTE/VoWiFi."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-54020",
|
"id": "CVE-2024-54020",
|
||||||
"sourceIdentifier": "psirt@fortinet.com",
|
"sourceIdentifier": "psirt@fortinet.com",
|
||||||
"published": "2025-05-28T08:15:20.043",
|
"published": "2025-05-28T08:15:20.043",
|
||||||
"lastModified": "2025-05-28T15:01:30.720",
|
"lastModified": "2025-06-04T14:34:54.323",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 0.8,
|
"exploitabilityScore": 0.8,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "7.0.0",
|
||||||
|
"versionEndExcluding": "7.0.8",
|
||||||
|
"matchCriteriaId": "F5248A7F-5122-4C07-8A4C-FE7A0BA07CF2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "7.2.0",
|
||||||
|
"versionEndExcluding": "7.2.2",
|
||||||
|
"matchCriteriaId": "C654DFBA-E3B0-4865-9088-13385A428E78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-023",
|
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-023",
|
||||||
"source": "psirt@fortinet.com"
|
"source": "psirt@fortinet.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-54189",
|
"id": "CVE-2024-54189",
|
||||||
"sourceIdentifier": "talos-cna@cisco.com",
|
"sourceIdentifier": "talos-cna@cisco.com",
|
||||||
"published": "2025-06-03T10:15:22.040",
|
"published": "2025-06-03T10:15:22.040",
|
||||||
"lastModified": "2025-06-03T14:15:47.803",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
|
@ -2,13 +2,13 @@
|
|||||||
"id": "CVE-2024-55539",
|
"id": "CVE-2024-55539",
|
||||||
"sourceIdentifier": "security@acronis.com",
|
"sourceIdentifier": "security@acronis.com",
|
||||||
"published": "2024-12-23T14:15:06.270",
|
"published": "2024-12-23T14:15:06.270",
|
||||||
"lastModified": "2025-01-09T17:15:16.057",
|
"lastModified": "2025-06-04T14:15:26.893",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Weak algorithm used to sign RPM package. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux) before build 39185."
|
"value": "Weak algorithm used to sign RPM package. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux) before build 39185, Acronis Cyber Protect 16 (Linux) before build 39938."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -16,28 +16,6 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
|
||||||
{
|
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
||||||
"type": "Secondary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
|
||||||
"baseScore": 2.5,
|
|
||||||
"baseSeverity": "LOW",
|
|
||||||
"attackVector": "LOCAL",
|
|
||||||
"attackComplexity": "HIGH",
|
|
||||||
"privilegesRequired": "LOW",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"confidentialityImpact": "NONE",
|
|
||||||
"integrityImpact": "LOW",
|
|
||||||
"availabilityImpact": "NONE"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 1.0,
|
|
||||||
"impactScore": 1.4
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"cvssMetricV30": [
|
"cvssMetricV30": [
|
||||||
{
|
{
|
||||||
"source": "security@acronis.com",
|
"source": "security@acronis.com",
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-1051",
|
"id": "CVE-2025-1051",
|
||||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||||
"published": "2025-06-02T19:15:25.740",
|
"published": "2025-06-02T19:15:25.740",
|
||||||
"lastModified": "2025-06-02T19:15:25.740",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Sonos Era 300 Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the processing of ALAC data. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the anacapa user. Was ZDI-CAN-25865."
|
"value": "Sonos Era 300 Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the processing of ALAC data. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the anacapa user. Was ZDI-CAN-25865."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por desbordamiento de b\u00fafer basado en mont\u00f3n en Sonos Era 300. Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en los altavoces Sonos Era 300 afectados. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en el procesamiento de datos ALAC. El problema se debe a la falta de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos a un b\u00fafer basado en mont\u00f3n. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del usuario anacapa. Era ZDI-CAN-25865."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-1334",
|
"id": "CVE-2025-1334",
|
||||||
"sourceIdentifier": "psirt@us.ibm.com",
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
"published": "2025-06-03T16:15:22.983",
|
"published": "2025-06-03T16:15:22.983",
|
||||||
"lastModified": "2025-06-03T16:15:22.983",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 allows web pages to be stored locally which can be read by another user on the system."
|
"value": "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 allows web pages to be stored locally which can be read by another user on the system."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "IBM QRadar Suite Software 1.10.12.0 a 1.11.2.0 e IBM Cloud Pak for Security 1.10.0.0 a 1.10.11.0 permiten almacenar p\u00e1ginas web localmente para que otro usuario del sistema pueda leerlas."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
82
CVE-2025/CVE-2025-17xx/CVE-2025-1701.json
Normal file
82
CVE-2025/CVE-2025-17xx/CVE-2025-1701.json
Normal file
@ -0,0 +1,82 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-1701",
|
||||||
|
"sourceIdentifier": "security@mimsoftware.com",
|
||||||
|
"published": "2025-06-04T14:15:27.050",
|
||||||
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CVE-2025-1701 is a high-severity vulnerability in the MIM Admin service. An attacker could exploit this vulnerability by sending a specially crafted request over the RMI interface to execute arbitrary code with the privileges of the MIM Admin service. The RMI interface is only accessible locally (listening on 127.0.0.1), limiting the attack vector to the local machine. This means that in a properly configured hospital environment, an attacker must have already compromised the network and additionally compromised the system where the MIM Admin service is running. From there, attackers with sufficient knowledge of MIM's implementation, library usage, and functionality with access to extend the MIM RMI library could force the MIM Admin service to run commands on the local machine with its privileges.\n\nUsers of MIM Software products exposed via RDP or multi-user application virtualization system should take note that the system being exposed is the environment hosting the virtualized MIM client.\n\n\n\nThis issue affects MIM Admin Service: before 7.2.13, 7.3.8, 7.4.3"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "security@mimsoftware.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 8.9,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "ADJACENT",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "PRESENT",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "HIGH",
|
||||||
|
"vulnIntegrityImpact": "HIGH",
|
||||||
|
"vulnAvailabilityImpact": "HIGH",
|
||||||
|
"subConfidentialityImpact": "HIGH",
|
||||||
|
"subIntegrityImpact": "HIGH",
|
||||||
|
"subAvailabilityImpact": "HIGH",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@mimsoftware.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-20"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-306"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.mimsoftware.com/cve-2025-1701",
|
||||||
|
"source": "security@mimsoftware.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-1725",
|
"id": "CVE-2025-1725",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2025-06-03T09:15:22.487",
|
"published": "2025-06-03T09:15:22.487",
|
||||||
"lastModified": "2025-06-03T09:15:22.487",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "The Bit File Manager \u2013 100% Free & Open Source File Manager and Code Editor for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
|
"value": "The Bit File Manager \u2013 100% Free & Open Source File Manager and Code Editor for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "El complemento Bit File Manager \u2013 100% Free & Open Source File Manager and Code Editor para WordPress es vulnerable a Cross-Site Scripting Almacenado al subir archivos SVG en todas las versiones hasta la 6.7 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de suscriptor o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario al archivo SVG."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2025-20188",
|
"id": "CVE-2025-20188",
|
||||||
"sourceIdentifier": "psirt@cisco.com",
|
"sourceIdentifier": "psirt@cisco.com",
|
||||||
"published": "2025-05-07T18:15:38.617",
|
"published": "2025-05-07T18:15:38.617",
|
||||||
"lastModified": "2025-05-08T14:39:09.683",
|
"lastModified": "2025-06-04T14:15:27.247",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -19,7 +19,7 @@
|
|||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "psirt@cisco.com",
|
"source": "psirt@cisco.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||||
@ -42,7 +42,7 @@
|
|||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "psirt@cisco.com",
|
"source": "psirt@cisco.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -55,6 +55,10 @@
|
|||||||
{
|
{
|
||||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-file-uplpd-rHZG9UfC",
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-file-uplpd-rHZG9UfC",
|
||||||
"source": "psirt@cisco.com"
|
"source": "psirt@cisco.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://horizon3.ai/attack-research/attack-blogs/cisco-ios-xe-wlc-arbitrary-file-upload-vulnerability-cve-2025-20188-analysis/",
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-20297",
|
"id": "CVE-2025-20297",
|
||||||
"sourceIdentifier": "psirt@cisco.com",
|
"sourceIdentifier": "psirt@cisco.com",
|
||||||
"published": "2025-06-02T18:15:23.360",
|
"published": "2025-06-02T18:15:23.360",
|
||||||
"lastModified": "2025-06-02T18:15:23.360",
|
"lastModified": "2025-06-04T14:54:53.980",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In Splunk Enterprise versions below 9.4.2, 9.3.4 and 9.2.6, and Splunk Cloud Platform versions below 9.3.2411.102, 9.3.2408.111 and 9.2.2406.118, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could craft a malicious payload through the pdfgen/render REST endpoint that could result in execution of unauthorized JavaScript code in the browser of a user."
|
"value": "In Splunk Enterprise versions below 9.4.2, 9.3.4 and 9.2.6, and Splunk Cloud Platform versions below 9.3.2411.102, 9.3.2408.111 and 9.2.2406.118, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could craft a malicious payload through the pdfgen/render REST endpoint that could result in execution of unauthorized JavaScript code in the browser of a user."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En las versiones de Splunk Enterprise anteriores a 9.4.2, 9.3.4 y 9.2.6, y en las versiones de Splunk Cloud Platform anteriores a 9.3.2411.102, 9.3.2408.111 y 9.2.2406.118, un usuario con privilegios bajos que no tenga los roles de \"admin\" o \"power\" de Splunk podr\u00eda manipular un payload malicioso a trav\u00e9s del endpoint REST pdfgen/render que podr\u00eda resultar en la ejecuci\u00f3n de c\u00f3digo JavaScript no autorizado en el navegador de un usuario."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-20298",
|
"id": "CVE-2025-20298",
|
||||||
"sourceIdentifier": "psirt@cisco.com",
|
"sourceIdentifier": "psirt@cisco.com",
|
||||||
"published": "2025-06-02T18:15:23.560",
|
"published": "2025-06-02T18:15:23.560",
|
||||||
"lastModified": "2025-06-02T18:15:23.560",
|
"lastModified": "2025-06-04T14:54:53.980",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In Universal Forwarder for Windows versions below 9.4.2, 9.3.4, 9.2.6, and 9.1.9, a new installation of or an upgrade to an affected version can result in incorrect permissions assignment in the Universal Forwarder for Windows Installation directory (by default, C:\\Program Files\\SplunkUniversalForwarder). This lets non-administrator users on the machine access the directory and all its contents."
|
"value": "In Universal Forwarder for Windows versions below 9.4.2, 9.3.4, 9.2.6, and 9.1.9, a new installation of or an upgrade to an affected version can result in incorrect permissions assignment in the Universal Forwarder for Windows Installation directory (by default, C:\\Program Files\\SplunkUniversalForwarder). This lets non-administrator users on the machine access the directory and all its contents."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En versiones de Universal Forwarder para Windows anteriores a 9.4.2, 9.3.4, 9.2.6 y 9.1.9, una nueva instalaci\u00f3n o actualizaci\u00f3n a una versi\u00f3n afectada puede provocar una asignaci\u00f3n incorrecta de permisos en el directorio de instalaci\u00f3n de Universal Forwarder para Windows (por defecto, C:\\Program Files\\SplunkUniversalForwarder). Esto permite que usuarios sin privilegios de administrador accedan al directorio y a todo su contenido."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-20981",
|
"id": "CVE-2025-20981",
|
||||||
"sourceIdentifier": "mobile.security@samsung.com",
|
"sourceIdentifier": "mobile.security@samsung.com",
|
||||||
"published": "2025-06-04T05:15:23.073",
|
"published": "2025-06-04T05:15:23.073",
|
||||||
"lastModified": "2025-06-04T05:15:23.073",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper access control in AudioService prior to SMR Jun-2025 Release 1 allows local attackers to access sensitive information."
|
"value": "Improper access control in AudioService prior to SMR Jun-2025 Release 1 allows local attackers to access sensitive information."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "El control de acceso inadecuado en AudioService anterior a SMR Jun-2025 Release 1 permite que atacantes locales accedan a informaci\u00f3n confidencial."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-20984",
|
"id": "CVE-2025-20984",
|
||||||
"sourceIdentifier": "mobile.security@samsung.com",
|
"sourceIdentifier": "mobile.security@samsung.com",
|
||||||
"published": "2025-06-04T05:15:23.213",
|
"published": "2025-06-04T05:15:23.213",
|
||||||
"lastModified": "2025-06-04T05:15:23.213",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Incorrect default permission in Samsung Cloud for Galaxy Watch prior to SMR Jun-2025 Release 1 allows local attackers to access data in Samsung Cloud for Galaxy Watch."
|
"value": "Incorrect default permission in Samsung Cloud for Galaxy Watch prior to SMR Jun-2025 Release 1 allows local attackers to access data in Samsung Cloud for Galaxy Watch."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "El permiso predeterminado incorrecto en Samsung Cloud para Galaxy Watch anterior a SMR Jun-2025 Release 1 permite que atacantes locales accedan a datos en Samsung Cloud para Galaxy Watch."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-20985",
|
"id": "CVE-2025-20985",
|
||||||
"sourceIdentifier": "mobile.security@samsung.com",
|
"sourceIdentifier": "mobile.security@samsung.com",
|
||||||
"published": "2025-06-04T05:15:23.347",
|
"published": "2025-06-04T05:15:23.347",
|
||||||
"lastModified": "2025-06-04T05:15:23.347",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper privilege management in ThemeManager prior to SMR Jun-2025 Release 1 allows local privileged attackers to reuse trial items."
|
"value": "Improper privilege management in ThemeManager prior to SMR Jun-2025 Release 1 allows local privileged attackers to reuse trial items."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "La gesti\u00f3n inadecuada de privilegios en ThemeManager antes de la versi\u00f3n 1 de SMR de junio de 2025 permite que atacantes privilegiados locales reutilicen elementos de prueba."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-20986",
|
"id": "CVE-2025-20986",
|
||||||
"sourceIdentifier": "mobile.security@samsung.com",
|
"sourceIdentifier": "mobile.security@samsung.com",
|
||||||
"published": "2025-06-04T05:15:23.483",
|
"published": "2025-06-04T05:15:23.483",
|
||||||
"lastModified": "2025-06-04T05:15:23.483",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper access control in ScreenCapture for Galaxy Watch prior to SMR Jun-2025 Release 1 allows local attackers to take screenshots."
|
"value": "Improper access control in ScreenCapture for Galaxy Watch prior to SMR Jun-2025 Release 1 allows local attackers to take screenshots."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "El control de acceso inadecuado en ScreenCapture para Galaxy Watch anterior a SMR Jun-2025 Release 1 permite que atacantes locales tomen capturas de pantalla."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-20987",
|
"id": "CVE-2025-20987",
|
||||||
"sourceIdentifier": "mobile.security@samsung.com",
|
"sourceIdentifier": "mobile.security@samsung.com",
|
||||||
"published": "2025-06-04T05:15:23.603",
|
"published": "2025-06-04T05:15:23.603",
|
||||||
"lastModified": "2025-06-04T05:15:23.603",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper access control in fingerprint trustlet prior to SMR May-2025 Release 1 allows local privileged attackers to get a auth_token."
|
"value": "Improper access control in fingerprint trustlet prior to SMR May-2025 Release 1 allows local privileged attackers to get a auth_token."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Un control de acceso inadecuado en el trustlet de huellas dactilares anterior a la versi\u00f3n 1 de SMR de mayo de 2025 permite que atacantes privilegiados locales obtengan un auth_token."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-20988",
|
"id": "CVE-2025-20988",
|
||||||
"sourceIdentifier": "mobile.security@samsung.com",
|
"sourceIdentifier": "mobile.security@samsung.com",
|
||||||
"published": "2025-06-04T05:15:23.727",
|
"published": "2025-06-04T05:15:23.727",
|
||||||
"lastModified": "2025-06-04T05:15:23.727",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Out-of-bounds read in fingerprint trustlet prior to SMR May-2025 Release 1 allows local privileged attackers to read out-of-bounds memory."
|
"value": "Out-of-bounds read in fingerprint trustlet prior to SMR May-2025 Release 1 allows local privileged attackers to read out-of-bounds memory."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "La lectura fuera de los l\u00edmites en el trustlet de huellas dactilares anterior a la versi\u00f3n 1 de SMR de mayo de 2025 permite que atacantes privilegiados locales lean memoria fuera de los l\u00edmites."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-20989",
|
"id": "CVE-2025-20989",
|
||||||
"sourceIdentifier": "mobile.security@samsung.com",
|
"sourceIdentifier": "mobile.security@samsung.com",
|
||||||
"published": "2025-06-04T05:15:23.847",
|
"published": "2025-06-04T05:15:23.847",
|
||||||
"lastModified": "2025-06-04T05:15:23.847",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper logging in fingerprint trustlet prior to SMR May-2025 Release 1 allows local privileged attackers to get a hmac_key."
|
"value": "Improper logging in fingerprint trustlet prior to SMR May-2025 Release 1 allows local privileged attackers to get a hmac_key."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "El inicio de sesi\u00f3n incorrecto en el trustlet de huellas dactilares anterior a la versi\u00f3n 1 de SMR de mayo de 2025 permite que atacantes privilegiados locales obtengan una hmac_key."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-20991",
|
"id": "CVE-2025-20991",
|
||||||
"sourceIdentifier": "mobile.security@samsung.com",
|
"sourceIdentifier": "mobile.security@samsung.com",
|
||||||
"published": "2025-06-04T05:15:23.970",
|
"published": "2025-06-04T05:15:23.970",
|
||||||
"lastModified": "2025-06-04T05:15:23.970",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper export of Android application components in Bluetooth prior to SMR Jun-2025 Release 1 allows local attackers to make devices discoverable."
|
"value": "Improper export of Android application components in Bluetooth prior to SMR Jun-2025 Release 1 allows local attackers to make devices discoverable."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "La exportaci\u00f3n incorrecta de componentes de aplicaciones de Android en Bluetooth antes de la versi\u00f3n 1 de SMR de junio de 2025 permite que atacantes locales hagan que los dispositivos sean detectables."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-20992",
|
"id": "CVE-2025-20992",
|
||||||
"sourceIdentifier": "mobile.security@samsung.com",
|
"sourceIdentifier": "mobile.security@samsung.com",
|
||||||
"published": "2025-06-04T05:15:24.090",
|
"published": "2025-06-04T05:15:24.090",
|
||||||
"lastModified": "2025-06-04T05:15:24.090",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Out-of-bound read in libsecimaging.camera.samsung.so prior to SMR Feb-2025 Release 1 allows local attackers to read out-of-bounds memory."
|
"value": "Out-of-bound read in libsecimaging.camera.samsung.so prior to SMR Feb-2025 Release 1 allows local attackers to read out-of-bounds memory."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "La lectura fuera de los l\u00edmites en libsecimaging.camera.samsung.so anterior a SMR Feb-2025 Release 1 permite que atacantes locales lean memoria fuera de los l\u00edmites."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-20993",
|
"id": "CVE-2025-20993",
|
||||||
"sourceIdentifier": "mobile.security@samsung.com",
|
"sourceIdentifier": "mobile.security@samsung.com",
|
||||||
"published": "2025-06-04T05:15:24.223",
|
"published": "2025-06-04T05:15:24.223",
|
||||||
"lastModified": "2025-06-04T05:15:24.223",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Out-of-bounds write in libsecimaging.camera.samsung.so prior to SMR Jun-2025 Release 1 allows local attackers to write out-of-bounds memory."
|
"value": "Out-of-bounds write in libsecimaging.camera.samsung.so prior to SMR Jun-2025 Release 1 allows local attackers to write out-of-bounds memory."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "La escritura fuera de los l\u00edmites en libsecimaging.camera.samsung.so anterior a SMR Jun-2025 Release 1 permite que atacantes locales escriban en la memoria fuera de los l\u00edmites."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-20994",
|
"id": "CVE-2025-20994",
|
||||||
"sourceIdentifier": "mobile.security@samsung.com",
|
"sourceIdentifier": "mobile.security@samsung.com",
|
||||||
"published": "2025-06-04T05:15:24.353",
|
"published": "2025-06-04T05:15:24.353",
|
||||||
"lastModified": "2025-06-04T05:15:24.353",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper handling of insufficient permission in SyncClientProvider in Samsung Internet installed on non-Samsung Device prior to version 28.0.0.59 allows local attackers to access read and write arbitrary files."
|
"value": "Improper handling of insufficient permission in SyncClientProvider in Samsung Internet installed on non-Samsung Device prior to version 28.0.0.59 allows local attackers to access read and write arbitrary files."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "El manejo inadecuado de permisos insuficientes en SyncClientProvider en Samsung Internet instalado en dispositivos que no son Samsung antes de la versi\u00f3n 28.0.0.59 permite a atacantes locales acceder a archivos arbitrarios de lectura y escritura."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-20995",
|
"id": "CVE-2025-20995",
|
||||||
"sourceIdentifier": "mobile.security@samsung.com",
|
"sourceIdentifier": "mobile.security@samsung.com",
|
||||||
"published": "2025-06-04T05:15:24.480",
|
"published": "2025-06-04T05:15:24.480",
|
||||||
"lastModified": "2025-06-04T05:15:24.480",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper handling of insufficient permission in ClientProvider in Samsung Internet installed on non-Samsung Device prior to version 28.0.0.59 allows local attackers to read and write arbitrary files."
|
"value": "Improper handling of insufficient permission in ClientProvider in Samsung Internet installed on non-Samsung Device prior to version 28.0.0.59 allows local attackers to read and write arbitrary files."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "El manejo inadecuado de permisos insuficientes en ClientProvider en Samsung Internet instalado en dispositivos que no son Samsung antes de la versi\u00f3n 28.0.0.59 permite a atacantes locales leer y escribir archivos arbitrarios."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-20996",
|
"id": "CVE-2025-20996",
|
||||||
"sourceIdentifier": "mobile.security@samsung.com",
|
"sourceIdentifier": "mobile.security@samsung.com",
|
||||||
"published": "2025-06-04T05:15:24.607",
|
"published": "2025-06-04T05:15:24.607",
|
||||||
"lastModified": "2025-06-04T05:15:24.607",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper authorization in Smart Switch installed on non-Samsung Device prior to version 3.7.64.10 allows local attackers to read data with the privilege of Smart Switch. User interaction is required for triggering this vulnerability."
|
"value": "Improper authorization in Smart Switch installed on non-Samsung Device prior to version 3.7.64.10 allows local attackers to read data with the privilege of Smart Switch. User interaction is required for triggering this vulnerability."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una autorizaci\u00f3n incorrecta en Smart Switch instalado en dispositivos que no son Samsung (versi\u00f3n anterior a la 3.7.64.10) permite a atacantes locales leer datos con el privilegio de Smart Switch. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-21463",
|
"id": "CVE-2025-21463",
|
||||||
"sourceIdentifier": "product-security@qualcomm.com",
|
"sourceIdentifier": "product-security@qualcomm.com",
|
||||||
"published": "2025-06-03T06:15:25.983",
|
"published": "2025-06-03T06:15:25.983",
|
||||||
"lastModified": "2025-06-03T06:15:25.983",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Transient DOS while processing the EHT operation IE in the received beacon frame."
|
"value": "Transient DOS while processing the EHT operation IE in the received beacon frame."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "DOS transitorio durante el procesamiento de la operaci\u00f3n EHT IE en el beacon frame recibido."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-21479",
|
"id": "CVE-2025-21479",
|
||||||
"sourceIdentifier": "product-security@qualcomm.com",
|
"sourceIdentifier": "product-security@qualcomm.com",
|
||||||
"published": "2025-06-03T07:15:20.933",
|
"published": "2025-06-03T07:15:20.933",
|
||||||
"lastModified": "2025-06-04T01:00:02.020",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-21480",
|
"id": "CVE-2025-21480",
|
||||||
"sourceIdentifier": "product-security@qualcomm.com",
|
"sourceIdentifier": "product-security@qualcomm.com",
|
||||||
"published": "2025-06-03T06:15:26.190",
|
"published": "2025-06-03T06:15:26.190",
|
||||||
"lastModified": "2025-06-04T01:00:02.020",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Undergoing Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-21485",
|
"id": "CVE-2025-21485",
|
||||||
"sourceIdentifier": "product-security@qualcomm.com",
|
"sourceIdentifier": "product-security@qualcomm.com",
|
||||||
"published": "2025-06-03T06:15:26.423",
|
"published": "2025-06-03T06:15:26.423",
|
||||||
"lastModified": "2025-06-03T06:15:26.423",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Memory corruption while processing INIT and multimode invoke IOCTL calls on FastRPC."
|
"value": "Memory corruption while processing INIT and multimode invoke IOCTL calls on FastRPC."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Corrupci\u00f3n de memoria durante el procesamiento de llamadas IOCTL de invocaci\u00f3n INIT y multimodo en FastRPC."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-21486",
|
"id": "CVE-2025-21486",
|
||||||
"sourceIdentifier": "product-security@qualcomm.com",
|
"sourceIdentifier": "product-security@qualcomm.com",
|
||||||
"published": "2025-06-03T06:15:26.590",
|
"published": "2025-06-03T06:15:26.590",
|
||||||
"lastModified": "2025-06-03T06:15:26.590",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Memory corruption during dynamic process creation call when client is only passing address and length of shell binary."
|
"value": "Memory corruption during dynamic process creation call when client is only passing address and length of shell binary."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Corrupci\u00f3n de memoria durante la llamada de creaci\u00f3n de proceso din\u00e1mico cuando el cliente solo pasa la direcci\u00f3n y la longitud del binario del shell."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-22252",
|
"id": "CVE-2025-22252",
|
||||||
"sourceIdentifier": "psirt@fortinet.com",
|
"sourceIdentifier": "psirt@fortinet.com",
|
||||||
"published": "2025-05-28T08:15:21.070",
|
"published": "2025-05-28T08:15:21.070",
|
||||||
"lastModified": "2025-05-28T15:01:30.720",
|
"lastModified": "2025-06-04T14:35:38.543",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,47 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiproxy:7.6.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "C1A9E35E-AA55-44C4-BAAC-2E44E6DCE2EF"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:7.2.5:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "8E5AF7C2-3954-4931-8929-7D1A3A9B4FAA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "7.4.4",
|
||||||
|
"versionEndExcluding": "7.4.7",
|
||||||
|
"matchCriteriaId": "6E4A264B-EFE6-466C-8E86-3DA465C4751C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "44CE8EE3-D64A-49C8-87D7-C18B302F864A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-472",
|
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-472",
|
||||||
"source": "psirt@fortinet.com"
|
"source": "psirt@fortinet.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-22777",
|
"id": "CVE-2025-22777",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2025-01-13T14:15:12.900",
|
"published": "2025-01-13T14:15:12.900",
|
||||||
"lastModified": "2025-01-13T18:15:22.000",
|
"lastModified": "2025-06-04T14:07:37.637",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,16 +69,51 @@
|
|||||||
"value": "CWE-502"
|
"value": "CWE-502"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-502"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "3.19.4",
|
||||||
|
"matchCriteriaId": "C250C56D-D7E5-4935-A7F8-CE82B3D141C5"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/wordpress/plugin/give/vulnerability/wordpress-givewp-plugin-3-19-3-php-object-injection-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/wordpress/plugin/give/vulnerability/wordpress-givewp-plugin-3-19-3-php-object-injection-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://securityonline.info/cve-2025-22777-cvss-9-8-critical-security-alert-for-givewp-plugin-with-100000-active-installations/",
|
"url": "https://securityonline.info/cve-2025-22777-cvss-9-8-critical-security-alert-for-givewp-plugin-with-100000-active-installations/",
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-22800",
|
"id": "CVE-2025-22800",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2025-01-13T14:15:13.067",
|
"published": "2025-01-13T14:15:13.067",
|
||||||
"lastModified": "2025-01-13T14:15:13.067",
|
"lastModified": "2025-06-04T14:37:20.747",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "2.9.12",
|
||||||
|
"matchCriteriaId": "4270D375-C4CB-4928-949E-0706E2E6E1F2"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/wordpress/plugin/post-smtp/vulnerability/wordpress-post-smtp-plugin-2-9-11-broken-access-control-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/wordpress/plugin/post-smtp/vulnerability/wordpress-post-smtp-plugin-2-9-11-broken-access-control-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
25
CVE-2025/CVE-2025-230xx/CVE-2025-23095.json
Normal file
25
CVE-2025/CVE-2025-230xx/CVE-2025-23095.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-23095",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-06-04T15:15:23.760",
|
||||||
|
"lastModified": "2025-06-04T15:15:23.760",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 1480, 2400. A Double Free in the mobile processor leads to privilege escalation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23095/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2025/CVE-2025-230xx/CVE-2025-23096.json
Normal file
25
CVE-2025/CVE-2025-230xx/CVE-2025-23096.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-23096",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-06-04T15:15:23.860",
|
||||||
|
"lastModified": "2025-06-04T15:15:23.860",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 1480, 2400. A Double Free in the mobile processor leads to privilege escalation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23096/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-23097",
|
"id": "CVE-2025-23097",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-06-03T20:15:20.883",
|
"published": "2025-06-03T20:15:20.883",
|
||||||
"lastModified": "2025-06-03T20:15:20.883",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An issue was discovered in Samsung Mobile Processor Exynos 1380. The lack of a length check leads to out-of-bounds writes."
|
"value": "An issue was discovered in Samsung Mobile Processor Exynos 1380. The lack of a length check leads to out-of-bounds writes."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 1380. La falta de una verificaci\u00f3n de longitud provoca escrituras fuera de los l\u00edmites."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-23098",
|
"id": "CVE-2025-23098",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-06-03T20:15:21.760",
|
"published": "2025-06-03T20:15:21.760",
|
||||||
"lastModified": "2025-06-03T20:15:21.760",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An issue was discovered in Samsung Mobile Processor Exynos 980, 990, 1080, 2100, 1280, 2200, 1380. A Use-After-Free in the mobile processor leads to privilege escalation."
|
"value": "An issue was discovered in Samsung Mobile Processor Exynos 980, 990, 1080, 2100, 1280, 2200, 1380. A Use-After-Free in the mobile processor leads to privilege escalation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 980, 990, 1080, 2100, 1280, 2200, 1380. Un Use-After-Free en el procesador m\u00f3vil conduce a una escalada de privilegios."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-23099",
|
"id": "CVE-2025-23099",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-06-02T19:15:26.213",
|
"published": "2025-06-02T19:15:26.213",
|
||||||
"lastModified": "2025-06-03T03:15:26.790",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An issue was discovered in Samsung Mobile Processor Exynos 1480 and 2400. The lack of a length check leads to out-of-bounds writes."
|
"value": "An issue was discovered in Samsung Mobile Processor Exynos 1480 and 2400. The lack of a length check leads to out-of-bounds writes."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 1480 y 2400. La falta de una verificaci\u00f3n de longitud provoca escrituras fuera de los l\u00edmites."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-23100",
|
"id": "CVE-2025-23100",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-06-03T20:15:21.880",
|
"published": "2025-06-03T20:15:21.880",
|
||||||
"lastModified": "2025-06-03T20:15:21.880",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 1480, 2400. The absence of a NULL check leads to a Denial of Service."
|
"value": "An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 1480, 2400. The absence of a NULL check leads to a Denial of Service."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 1280, 2200, 1380, 1480, 2400. La ausencia de una comprobaci\u00f3n NULL conduce a una denegaci\u00f3n de servicio."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
|
25
CVE-2025/CVE-2025-231xx/CVE-2025-23101.json
Normal file
25
CVE-2025/CVE-2025-231xx/CVE-2025-23101.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-23101",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-06-04T15:15:23.960",
|
||||||
|
"lastModified": "2025-06-04T15:15:23.960",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue was discovered in Samsung Mobile Processor Exynos 1380. A Use-After-Free in the mobile processor leads to privilege escalation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23101/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-23102",
|
"id": "CVE-2025-23102",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-06-03T19:15:38.807",
|
"published": "2025-06-03T19:15:38.807",
|
||||||
"lastModified": "2025-06-03T19:15:38.807",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An issue was discovered in Samsung Mobile Processor Exynos 9820, 9825, 980, 990, 1080, 2100, 1280, 2200, and 1380. A Double Free in the mobile processor leads to privilege escalation."
|
"value": "An issue was discovered in Samsung Mobile Processor Exynos 9820, 9825, 980, 990, 1080, 2100, 1280, 2200, and 1380. A Double Free in the mobile processor leads to privilege escalation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 9820, 9825, 980, 990, 1080, 2100, 1280, 2200 y 1380. Una doble liberaci\u00f3n en el procesador m\u00f3vil conduce a una escalada de privilegios."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-23103",
|
"id": "CVE-2025-23103",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-06-03T16:15:23.650",
|
"published": "2025-06-03T16:15:23.650",
|
||||||
"lastModified": "2025-06-03T16:15:23.650",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An issue was discovered in Samsung Mobile Processor Exynos 1480 and 2400. The lack of a length check leads to out-of-bounds writes."
|
"value": "An issue was discovered in Samsung Mobile Processor Exynos 1480 and 2400. The lack of a length check leads to out-of-bounds writes."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 1480 y 2400. La falta de una verificaci\u00f3n de longitud provoca escrituras fuera de los l\u00edmites."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-23104",
|
"id": "CVE-2025-23104",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-06-02T18:15:23.770",
|
"published": "2025-06-02T18:15:23.770",
|
||||||
"lastModified": "2025-06-02T21:15:21.473",
|
"lastModified": "2025-06-04T14:54:53.980",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-23105",
|
"id": "CVE-2025-23105",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-06-02T19:15:26.913",
|
"published": "2025-06-02T19:15:26.913",
|
||||||
"lastModified": "2025-06-03T03:15:26.957",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, and 2400. A Use-After-Free in the mobile processor leads to privilege escalation."
|
"value": "An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, and 2400. A Use-After-Free in the mobile processor leads to privilege escalation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 2200, 1480 y 2400. Un Use-After-Free en el procesador m\u00f3vil conduce a una escalada de privilegios."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-23107",
|
"id": "CVE-2025-23107",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-06-03T17:15:21.327",
|
"published": "2025-06-03T17:15:21.327",
|
||||||
"lastModified": "2025-06-03T18:15:24.947",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An issue was discovered in Samsung Mobile Processor Exynos 1480 and 2400. The lack of a length check leads to out-of-bounds writes."
|
"value": "An issue was discovered in Samsung Mobile Processor Exynos 1480 and 2400. The lack of a length check leads to out-of-bounds writes."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 1480 y 2400. La falta de una verificaci\u00f3n de longitud provoca escrituras fuera de los l\u00edmites."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-24015",
|
"id": "CVE-2025-24015",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2025-06-03T23:15:20.633",
|
"published": "2025-06-03T23:15:20.633",
|
||||||
"lastModified": "2025-06-03T23:15:20.633",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Versions 1.46.0 through 2.1.6 have an issue that affects AES-256-GCM and AES-128-GCM in Deno in which the authentication tag is not being validated. This means tampered ciphertexts or incorrect keys might not be detected, which breaks the guarantees expected from AES-GCM. Older versions of Deno correctly threw errors in such cases, as does Node.js. Without authentication tag verification, AES-GCM degrades to essentially CTR mode, removing integrity protection. Authenticated data set with set_aad is also affected, as it is incorporated into the GCM hash (ghash) but this too is not validated, rendering AAD checks ineffective. Version 2.1.7 includes a patch that addresses this issue."
|
"value": "Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Versions 1.46.0 through 2.1.6 have an issue that affects AES-256-GCM and AES-128-GCM in Deno in which the authentication tag is not being validated. This means tampered ciphertexts or incorrect keys might not be detected, which breaks the guarantees expected from AES-GCM. Older versions of Deno correctly threw errors in such cases, as does Node.js. Without authentication tag verification, AES-GCM degrades to essentially CTR mode, removing integrity protection. Authenticated data set with set_aad is also affected, as it is incorporated into the GCM hash (ghash) but this too is not validated, rendering AAD checks ineffective. Version 2.1.7 includes a patch that addresses this issue."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Deno es un entorno de ejecuci\u00f3n de JavaScript, TypeScript y WebAssembly con valores predeterminados seguros. Las versiones 1.46.0 a 2.1.6 presentan un problema que afecta a AES-256-GCM y AES-128-GCM en Deno, donde la etiqueta de autenticaci\u00f3n no se valida. Esto implica que podr\u00edan no detectarse textos cifrados alterados o claves incorrectas, lo que incumple las garant\u00edas esperadas de AES-GCM. Las versiones anteriores de Deno, al igual que Node.js, generaban errores correctamente en estos casos. Sin la verificaci\u00f3n de la etiqueta de autenticaci\u00f3n, AES-GCM se degrada al modo CTR, eliminando la protecci\u00f3n de integridad. El conjunto de datos autenticado con set_aad tambi\u00e9n se ve afectado, ya que se incorpora al hash de GCM (ghash), pero este tampoco se valida, lo que inutiliza las comprobaciones de AAD. La versi\u00f3n 2.1.7 incluye un parche que soluciona este problema."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -60,7 +64,7 @@
|
|||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -85,6 +89,10 @@
|
|||||||
{
|
{
|
||||||
"url": "https://github.com/denoland/deno/security/advisories/GHSA-2x3r-hwv5-p32x",
|
"url": "https://github.com/denoland/deno/security/advisories/GHSA-2x3r-hwv5-p32x",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/denoland/deno/security/advisories/GHSA-2x3r-hwv5-p32x",
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-24473",
|
"id": "CVE-2025-24473",
|
||||||
"sourceIdentifier": "psirt@fortinet.com",
|
"sourceIdentifier": "psirt@fortinet.com",
|
||||||
"published": "2025-05-28T08:15:21.230",
|
"published": "2025-05-28T08:15:21.230",
|
||||||
"lastModified": "2025-05-28T15:01:30.720",
|
"lastModified": "2025-06-04T15:38:01.880",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.2,
|
"exploitabilityScore": 2.2,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"baseScore": 3.7,
|
||||||
|
"baseSeverity": "LOW",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 1.4
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,12 +69,44 @@
|
|||||||
"value": "CWE-497"
|
"value": "CWE-497"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
|
||||||
|
"versionStartIncluding": "7.2.0",
|
||||||
|
"versionEndExcluding": "7.2.2",
|
||||||
|
"matchCriteriaId": "9E9DD222-9198-4E02-A086-2B24F06BBA53"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-548",
|
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-548",
|
||||||
"source": "psirt@fortinet.com"
|
"source": "psirt@fortinet.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-25019",
|
"id": "CVE-2025-25019",
|
||||||
"sourceIdentifier": "psirt@us.ibm.com",
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
"published": "2025-06-03T16:15:23.960",
|
"published": "2025-06-03T16:15:23.960",
|
||||||
"lastModified": "2025-06-03T16:15:23.960",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 does not invalidate session after a logout which could allow a user to impersonate another user on the system."
|
"value": "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 does not invalidate session after a logout which could allow a user to impersonate another user on the system."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "IBM QRadar Suite Software 1.10.12.0 a 1.11.2.0 e IBM Cloud Pak for Security 1.10.0.0 a 1.10.11.0 no invalidan la sesi\u00f3n despu\u00e9s de un cierre de sesi\u00f3n, lo que podr\u00eda permitir que un usuario se haga pasar por otro usuario en el sistema."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-25020",
|
"id": "CVE-2025-25020",
|
||||||
"sourceIdentifier": "psirt@us.ibm.com",
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
"published": "2025-06-03T16:15:24.123",
|
"published": "2025-06-03T16:15:24.123",
|
||||||
"lastModified": "2025-06-03T16:15:24.123",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could allow an authenticated user to cause a denial of service due to improperly validating API data input."
|
"value": "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could allow an authenticated user to cause a denial of service due to improperly validating API data input."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "IBM QRadar Suite Software 1.10.12.0 a 1.11.2.0 e IBM Cloud Pak for Security 1.10.0.0 a 1.10.11.0 podr\u00edan permitir que un usuario autenticado provoque una denegaci\u00f3n de servicio debido a una validaci\u00f3n incorrecta de la entrada de datos de la API."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-25021",
|
"id": "CVE-2025-25021",
|
||||||
"sourceIdentifier": "psirt@us.ibm.com",
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
"published": "2025-06-03T16:15:24.277",
|
"published": "2025-06-03T16:15:24.277",
|
||||||
"lastModified": "2025-06-03T16:15:24.277",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could allow a privileged execute code in case management script creation due to the improper generation of code."
|
"value": "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could allow a privileged execute code in case management script creation due to the improper generation of code."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "IBM QRadar Suite Software 1.10.12.0 a 1.11.2.0 e IBM Cloud Pak for Security 1.10.0.0 a 1.10.11.0 podr\u00edan permitir la ejecuci\u00f3n de c\u00f3digo privilegiado en la creaci\u00f3n de scripts de gesti\u00f3n de casos debido a la generaci\u00f3n incorrecta de c\u00f3digo."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-25022",
|
"id": "CVE-2025-25022",
|
||||||
"sourceIdentifier": "psirt@us.ibm.com",
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
"published": "2025-06-03T16:15:24.437",
|
"published": "2025-06-03T16:15:24.437",
|
||||||
"lastModified": "2025-06-03T16:15:24.437",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could allow an unauthenticated user in the environment to obtain highly sensitive information in configuration files."
|
"value": "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could allow an unauthenticated user in the environment to obtain highly sensitive information in configuration files."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "IBM QRadar Suite Software 1.10.12.0 a 1.11.2.0 e IBM Cloud Pak for Security 1.10.0.0 a 1.10.11.0 podr\u00edan permitir que un usuario no autenticado en el entorno obtenga informaci\u00f3n altamente confidencial en los archivos de configuraci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-25025",
|
"id": "CVE-2025-25025",
|
||||||
"sourceIdentifier": "psirt@us.ibm.com",
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
"published": "2025-05-28T02:15:20.417",
|
"published": "2025-05-28T02:15:20.417",
|
||||||
"lastModified": "2025-05-28T15:01:30.720",
|
"lastModified": "2025-06-04T14:34:21.177",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -19,7 +19,7 @@
|
|||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "psirt@us.ibm.com",
|
"source": "psirt@us.ibm.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,30 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:ibm:security_guardium:12.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "58C5F3EF-C0F7-4CC9-9A31-5D0DDFA068F3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.ibm.com/support/pages/node/7234827",
|
"url": "https://www.ibm.com/support/pages/node/7234827",
|
||||||
"source": "psirt@us.ibm.com"
|
"source": "psirt@us.ibm.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-25026",
|
"id": "CVE-2025-25026",
|
||||||
"sourceIdentifier": "psirt@us.ibm.com",
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
"published": "2025-05-28T02:15:20.583",
|
"published": "2025-05-28T02:15:20.583",
|
||||||
"lastModified": "2025-05-28T15:01:30.720",
|
"lastModified": "2025-06-04T14:34:34.380",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,10 +51,30 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:ibm:security_guardium:12.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "58C5F3EF-C0F7-4CC9-9A31-5D0DDFA068F3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.ibm.com/support/pages/node/7234827",
|
"url": "https://www.ibm.com/support/pages/node/7234827",
|
||||||
"source": "psirt@us.ibm.com"
|
"source": "psirt@us.ibm.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-25029",
|
"id": "CVE-2025-25029",
|
||||||
"sourceIdentifier": "psirt@us.ibm.com",
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
"published": "2025-05-28T02:15:20.753",
|
"published": "2025-05-28T02:15:20.753",
|
||||||
"lastModified": "2025-05-28T15:01:30.720",
|
"lastModified": "2025-06-04T14:34:42.130",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -19,7 +19,7 @@
|
|||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "psirt@us.ibm.com",
|
"source": "psirt@us.ibm.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 1.2,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,30 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:ibm:security_guardium:12.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "58C5F3EF-C0F7-4CC9-9A31-5D0DDFA068F3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.ibm.com/support/pages/node/7234827",
|
"url": "https://www.ibm.com/support/pages/node/7234827",
|
||||||
"source": "psirt@us.ibm.com"
|
"source": "psirt@us.ibm.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-25251",
|
"id": "CVE-2025-25251",
|
||||||
"sourceIdentifier": "psirt@fortinet.com",
|
"sourceIdentifier": "psirt@fortinet.com",
|
||||||
"published": "2025-05-28T08:15:21.387",
|
"published": "2025-05-28T08:15:21.387",
|
||||||
"lastModified": "2025-05-28T15:01:30.720",
|
"lastModified": "2025-06-04T15:37:46.183",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:macos:*:*",
|
||||||
|
"versionStartIncluding": "7.0.0",
|
||||||
|
"versionEndExcluding": "7.2.9",
|
||||||
|
"matchCriteriaId": "6C849529-C78C-4DE7-B2EA-FFF29FF9972F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:macos:*:*",
|
||||||
|
"versionStartIncluding": "7.4.0",
|
||||||
|
"versionEndExcluding": "7.4.3",
|
||||||
|
"matchCriteriaId": "96EF5BCC-56D3-4218-80A2-085F8B63D83A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-016",
|
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-016",
|
||||||
"source": "psirt@fortinet.com"
|
"source": "psirt@fortinet.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-2678",
|
"id": "CVE-2025-2678",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2025-03-24T03:15:14.573",
|
"published": "2025-03-24T03:15:14.573",
|
||||||
"lastModified": "2025-03-26T13:42:31.437",
|
"lastModified": "2025-06-04T15:46:43.063",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -131,7 +131,7 @@
|
|||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -163,8 +163,8 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:phpgurukul:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10"
|
"matchCriteriaId": "E8782F27-C73C-497B-92B3-2F9DC551C233"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -177,8 +177,8 @@
|
|||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Exploit",
|
"Exploit",
|
||||||
"Third Party Advisory",
|
"Issue Tracking",
|
||||||
"Issue Tracking"
|
"Third Party Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -200,16 +200,16 @@
|
|||||||
"url": "https://vuldb.com/?id.300695",
|
"url": "https://vuldb.com/?id.300695",
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"VDB Entry",
|
"Third Party Advisory",
|
||||||
"Third Party Advisory"
|
"VDB Entry"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.521445",
|
"url": "https://vuldb.com/?submit.521445",
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"VDB Entry",
|
"Third Party Advisory",
|
||||||
"Third Party Advisory"
|
"VDB Entry"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-2679",
|
"id": "CVE-2025-2679",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2025-03-24T03:15:15.553",
|
"published": "2025-03-24T03:15:15.553",
|
||||||
"lastModified": "2025-03-26T13:35:46.297",
|
"lastModified": "2025-06-04T15:19:35.357",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -131,7 +131,7 @@
|
|||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -163,8 +163,8 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:phpgurukul:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10"
|
"matchCriteriaId": "E8782F27-C73C-497B-92B3-2F9DC551C233"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -177,7 +177,8 @@
|
|||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Exploit",
|
"Exploit",
|
||||||
"Third Party Advisory"
|
"Third Party Advisory",
|
||||||
|
"Issue Tracking"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -207,8 +208,8 @@
|
|||||||
"url": "https://vuldb.com/?submit.521447",
|
"url": "https://vuldb.com/?submit.521447",
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"VDB Entry",
|
"Third Party Advisory",
|
||||||
"Third Party Advisory"
|
"VDB Entry"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-2680",
|
"id": "CVE-2025-2680",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2025-03-24T03:15:15.727",
|
"published": "2025-03-24T03:15:15.727",
|
||||||
"lastModified": "2025-03-26T13:23:41.867",
|
"lastModified": "2025-06-04T15:16:46.930",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -131,7 +131,7 @@
|
|||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -163,8 +163,8 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:phpgurukul:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10"
|
"matchCriteriaId": "E8782F27-C73C-497B-92B3-2F9DC551C233"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -177,8 +177,8 @@
|
|||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Exploit",
|
"Exploit",
|
||||||
"Third Party Advisory",
|
"Issue Tracking",
|
||||||
"Issue Tracking"
|
"Third Party Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -208,8 +208,8 @@
|
|||||||
"url": "https://vuldb.com/?submit.521448",
|
"url": "https://vuldb.com/?submit.521448",
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"VDB Entry",
|
"Third Party Advisory",
|
||||||
"Third Party Advisory"
|
"VDB Entry"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-27029",
|
"id": "CVE-2025-27029",
|
||||||
"sourceIdentifier": "product-security@qualcomm.com",
|
"sourceIdentifier": "product-security@qualcomm.com",
|
||||||
"published": "2025-06-03T06:15:26.777",
|
"published": "2025-06-03T06:15:26.777",
|
||||||
"lastModified": "2025-06-03T06:15:26.777",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Transient DOS while processing the tone measurement response buffer when the response buffer is out of range."
|
"value": "Transient DOS while processing the tone measurement response buffer when the response buffer is out of range."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "DOS transitorio durante el procesamiento del b\u00fafer de respuesta de medici\u00f3n de tono cuando el b\u00fafer de respuesta est\u00e1 fuera de rango."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-27031",
|
"id": "CVE-2025-27031",
|
||||||
"sourceIdentifier": "product-security@qualcomm.com",
|
"sourceIdentifier": "product-security@qualcomm.com",
|
||||||
"published": "2025-06-03T06:15:26.960",
|
"published": "2025-06-03T06:15:26.960",
|
||||||
"lastModified": "2025-06-03T06:15:26.960",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "memory corruption while processing IOCTL commands, when the buffer in write loopback mode is accessed after being freed."
|
"value": "memory corruption while processing IOCTL commands, when the buffer in write loopback mode is accessed after being freed."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Corrupci\u00f3n de memoria durante el procesamiento de comandos IOCTL, cuando se accede al b\u00fafer en modo de bucle invertido de escritura despu\u00e9s de ser liberado."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-27038",
|
"id": "CVE-2025-27038",
|
||||||
"sourceIdentifier": "product-security@qualcomm.com",
|
"sourceIdentifier": "product-security@qualcomm.com",
|
||||||
"published": "2025-06-03T06:15:27.133",
|
"published": "2025-06-03T06:15:27.133",
|
||||||
"lastModified": "2025-06-04T01:00:02.020",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Undergoing Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
|
@ -2,16 +2,43 @@
|
|||||||
"id": "CVE-2025-27444",
|
"id": "CVE-2025-27444",
|
||||||
"sourceIdentifier": "security@joomla.org",
|
"sourceIdentifier": "security@joomla.org",
|
||||||
"published": "2025-06-04T08:15:21.613",
|
"published": "2025-06-04T08:15:21.613",
|
||||||
"lastModified": "2025-06-04T08:15:21.613",
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A reflected XSS vulnerability in RSform!Pro component 3.0.0 - 3.3.13 for Joomla was discovered. The issue arises from the improper handling of the filter[dateFrom] GET parameter, which is reflected unescaped in the administrative backend interface. This allows an authenticated attacker with admin or editor privileges to inject arbitrary JavaScript code by crafting a malicious URL."
|
"value": "A reflected XSS vulnerability in RSform!Pro component 3.0.0 - 3.3.13 for Joomla was discovered. The issue arises from the improper handling of the filter[dateFrom] GET parameter, which is reflected unescaped in the administrative backend interface. This allows an authenticated attacker with admin or editor privileges to inject arbitrary JavaScript code by crafting a malicious URL."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se descubri\u00f3 una vulnerabilidad XSS reflejado en el componente RSform!Pro 3.0.0 - 3.3.13 para Joomla. El problema surge del manejo incorrecto del par\u00e1metro GET filter[dateFrom], que se refleja sin escape en la interfaz administrativa del backend. Esto permite que un atacante autenticado con privilegios de administrador o editor inyecte c\u00f3digo JavaScript arbitrario manipulando una URL maliciosa."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "security@joomla.org",
|
"source": "security@joomla.org",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-27702",
|
"id": "CVE-2025-27702",
|
||||||
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
|
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
|
||||||
"published": "2025-05-28T21:15:21.307",
|
"published": "2025-05-28T21:15:21.307",
|
||||||
"lastModified": "2025-05-29T14:29:50.247",
|
"lastModified": "2025-06-04T15:37:13.483",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -59,6 +59,28 @@
|
|||||||
"providerUrgency": "NOT_DEFINED"
|
"providerUrgency": "NOT_DEFINED"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||||
|
"baseScore": 4.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
@ -73,10 +95,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:absolute:secure_access:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "13.54",
|
||||||
|
"matchCriteriaId": "30A5DDF4-1B4A-4867-8F0B-9ECD4F5A538F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.absolute.com/platform/vulnerability-archive/cve-2025-27702",
|
"url": "https://www.absolute.com/platform/vulnerability-archive/cve-2025-27702",
|
||||||
"source": "SecurityResponse@netmotionsoftware.com"
|
"source": "SecurityResponse@netmotionsoftware.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
25
CVE-2025/CVE-2025-278xx/CVE-2025-27811.json
Normal file
25
CVE-2025/CVE-2025-278xx/CVE-2025-27811.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-27811",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-06-04T14:15:28.260",
|
||||||
|
"lastModified": "2025-06-04T14:54:33.783",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A local privilege escalation in the razer_elevation_service.exe in Razer Synapse 4 through 4.0.86.2502180127 allows a local attacker to escalate their privileges via a vulnerable COM interface in the target service."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://app.inspectiv.com/#/submissions/EAEDG9ssRaTWKSJJ5Bbrt9",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://gist.github.com/leonjza/829a98f6c0954d7cb3f6614d05f87f37",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-27953",
|
"id": "CVE-2025-27953",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-06-02T18:15:23.903",
|
"published": "2025-06-02T18:15:23.903",
|
||||||
"lastModified": "2025-06-03T14:15:48.417",
|
"lastModified": "2025-06-04T14:54:53.980",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user