Auto-Update: 2024-11-01T19:00:20.683979+00:00

This commit is contained in:
cad-safe-bot 2024-11-01 19:03:22 +00:00
parent 79dc68fea9
commit 891e89ba79
66 changed files with 7444 additions and 561 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-47189",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-10T19:15:47.570",
"lastModified": "2024-04-10T19:49:51.183",
"lastModified": "2024-11-01T18:35:00.807",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: arreglo del ordenamiento de memoria entre funciones de trabajo normales y ordenadas No se garantiza que las funciones de trabajo ordenadas sean manejadas por el mismo hilo que ejecut\u00f3 las funciones de trabajo normales. La \u00fanica forma de sincronizar la ejecuci\u00f3n entre funciones normales/ordenadas es a trav\u00e9s de WORK_DONE_BIT, desafortunadamente los bitops utilizados no garantizan ning\u00fan orden. Esto se manifest\u00f3 como fallas aparentemente inexplicables en ARM64, donde async_chunk::inode se ve como no nulo en async_cow_submit, lo que hace que se llame a submission_compressed_extents y se produce una falla porque async_chunk::inode de repente se volvi\u00f3 NULL. El seguimiento de llamadas fue similar a: pc : submission_compressed_extents+0x38/0x3d0 lr : async_cow_submit+0x50/0xd0 sp : ffff800015d4bc20 Seguimiento de llamadas: submission_compressed_extents+0x38/0x3d0 async_cow_submit+0x50/0xd0 run_ordered_work+0xc8/0x280 btrfs_work_helper+0x98/0x250 process_one_work+0x1f0/0x4ac worker_thread+0x188/0x504 kthread+0x110/0x114 ret_from_fork+0x10/0x18 Solucione esto agregando las llamadas de barrera respectivas que garantizan que todos los accesos anteriores a la configuraci\u00f3n de Los bits WORK_DONE_BIT se ordenan estrictamente antes de establecer la bandera. Al mismo tiempo, agregue una barrera de lectura despu\u00e9s de la lectura de WORK_DONE_BIT en run_ordered_work que garantiza que todas las cargas posteriores se ordenar\u00e1n estrictamente despu\u00e9s de leer el bit. Esto, a su vez, garantiza que todos los accesos antes de WORK_DONE_BIT se ordenar\u00e1n estrictamente antes de cualquier acceso que pueda ocurrir en ordered_func."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/45da9c1767ac31857df572f0a909fbe88fd5a7e9",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-47267",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:15.297",
"lastModified": "2024-05-21T16:54:26.047",
"lastModified": "2024-11-01T17:35:01.673",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: corrige varios fallos de dispositivos en cableado de 10 gbps usb_assign_descriptors() se llama con 5 par\u00e1metros, los \u00faltimos 4 de los cuales son usb_descriptor_header para: velocidad completa (USB1.1 - 12Mbps [ incluyendo USB1.0 de baja velocidad a 1,5 Mbps), alta velocidad (USB2.0 - 480 Mbps), s\u00faper velocidad (USB3.0 - 5 Gbps), s\u00faper velocidad plus (USB3.1 - 10 Gbps). Las diferencias entre los descriptores de velocidad completa/alta/supervelocidad suelen ser sustanciales (debido a cambios en el tama\u00f1o m\u00e1ximo del bloque USB de 64 a 512 a 1024 bytes y otras diferencias en las especificaciones), mientras que la diferencia entre los descriptores de 5 y 10 Gbps puede ser tan casi nada (en muchos casos, la misma afinaci\u00f3n es simplemente suficiente). Sin embargo, si un controlador de dispositivo llama a usb_assign_descriptors() con un descriptor NULL para super-speed-plus y luego se usa en una configuraci\u00f3n m\u00e1xima de 10 gbps, el kernel fallar\u00e1 con una desreferencia de puntero null, cuando un puerto de dispositivo con capacidad de 10 gbps + cable + puerto de host Aparece la combinaci\u00f3n. (Esto no suceder\u00eda si la velocidad m\u00e1xima del dispositivo estuviera configurada en 5 gbps, pero, por supuesto, est\u00e1 predeterminada al m\u00e1ximo y no hay ninguna raz\u00f3n real para limitarla artificialmente). La soluci\u00f3n es simplemente usar el descriptor de 5 gbps como el descriptor de 10 gbps, si no se proporcion\u00f3 un descriptor de 10 gbps. Obviamente, esto no solucionar\u00e1 el problema si el descriptor de 5 gbps tambi\u00e9n es NULL, pero estos casos no se pueden resolver de manera tan trivial (y es poco probable que dichos dispositivos se utilicen con puertos USB3 de alguna manera)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/032e288097a553db5653af552dd8035cd2a0ba96",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-47400",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:25.457",
"lastModified": "2024-05-21T16:54:26.047",
"lastModified": "2024-11-01T18:35:01.800",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: hns3: no permitir llamadas repetidas a hns3_nic_net_open. No se permite llamar repetidamente a hns3_nic_net_open(), pero no se puede verificar esto. Al restablecer y configurar tc el dispositivo simult\u00e1neamente, existe una peque\u00f1a oportunidad de llamar a hns3_nic_net_open repetidamente y causar un error en el kernel al llamar a napi_enable dos veces. La informaci\u00f3n del seguimiento de llamadas es la siguiente: [3078.222780] ------------[ cortar aqu\u00ed ]------------ [ 3078.230255] BUG del kernel en net/core/dev. c:6991! [3078.236224] Error interno: Ups - BUG: 0 [#1] SMP PREEMPLEADO [3078.243431] M\u00f3dulos vinculados en: hns3 hclgevf hclge hnae3 vfio_iommu_type1 vfio_pci vfio_virqfd vfio pv680_mii(O) [ 3078.258880 CPU : 0 PID: 295 Comunicaciones: kworker/u8 :5 Contaminado: GO 5.14.0-rc4+ #1 [ 3078.269102] Nombre de hardware: , BIOS KpxxxFPGA 1P B600 V181 12/08/2021 [ 3078.276801] Cola de trabajo: hclge hclge_service_task [hclge] [ 3078.288774] pstate: 0009 (nZCv daif +PAN -UAO -TCO BTYPE=--) [ 3078.296168] pc : napi_enable+0x80/0x84 tc qdisc sho[w 3d0e7v8 .e3t0h218 79] lr : hns3_nic_net_open+0x138/0x510 [hns3] [ 3078.314771] sp : 8000108abb20 [3078.319099] x29: ffff8000108abb20 x28: 0000000000000000 x27: ffff0820a8490300 [ 3078.329121] x26: 0000000000000001 x25: ffff08209cfc6200 x24: 00000000000 00000 [ 3078.339044] x23: ffff0820a8490300 x22: ffff08209cd76000 x21: ffff0820abfe3880 [ 3078.349018] x20: 0000000000000000 x19: 00 x18: 0000000000000000 [ 3078.358620] x17: 0000000000000000 x16 : ffffc816e1727a50 x15: 0000ffff8f4ff930 [ 3078.368895] x14: 0000000000000000 x13: 0000000000000000 x12: 0000259e9dbeb6b4 [ 3078.377987] x11: 0096a8f7e764eb40 x10: 634615ad28d3eab5 x9: ffffc816ad8885b8 [3078.387091] x8: ffff08209cfc6fb8 x7: ffff0820ac0da058 x6: ffff0820a8490344 [ 3 078.396356] x5: 0000000000000140 x4: 0000000000000003 x3: ffff08209cd76938 [3078.405365] x2: 0000000000000000 x1: 0000000000000010 x0: ffff0820abfe38a0 [3078.414657] Rastreo de llamadas: [3078.418517] +0x80/0x84 [ 3078.424626] hns3_reset_notify_up_enet+0x78/0xd0 [hns3] [ 3078.433469] hns3_reset_notify+0x64/0x80 [hns3 ] [ 3078.441430] hclge_notify_client+0x68/0xb0 [hclge] [ 3078.450511] hclge_reset_rebuild+0x524/0x884 [hclge] [ 3078.458879] hclge_reset_service_task+0x3c4/0x680 [hclge] 3078.467470] hclge_service_task+0xb0/0xb54 [hclge] [ 3078.475675] proceso_one_work+ 0x1dc/0x48c [ 3078.481888] work_thread+0x15c/0x464 [ 3078.487104] kthread+0x160/0x170 [ 3078.492479] ret_from_fork+0x10/0x18 [ 3078.498785] C\u00f3digo: c81 35ffffa2 d50323bf d65f03c0 (d4210000) [ 3078.506889] ---[ final de seguimiento 8ebe0340a1b0fb44 ] --- Una vez que hns3_nic_net_open() se ejecute correctamente, se borrar\u00e1 el indicador HNS3_NIC_STATE_DOWN. Por lo tanto, agregue la verificaci\u00f3n de este indicador y regrese directamente cuando HNS3_NIC_STATE_DOWN no est\u00e9 configurado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/3dac38bdce7932901b9f0b71c62331852c809e61",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-47440",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-22T07:15:09.250",
"lastModified": "2024-05-22T12:46:53.887",
"lastModified": "2024-11-01T17:35:01.927",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: encx24j600: error de verificaci\u00f3n en devm_regmap_init_encx24j600 devm_regmap_init puede devolver un error causado por falta de memoria, esto resultar\u00e1 en una desreferencia del puntero nulo m\u00e1s adelante al leer o escribir el registro: falla de protecci\u00f3n general en encx24j600_spi_probe KASAN: null-ptr-deref en el rango [0x0000000000000090-0x0000000000000097] CPU: 0 PID: 286 Comm: spi-encx24j600- No contaminado 5.15.0-rc2-00142-g9978db7 50e31-dirty #11 9c53a778c1306b1b02359f3c2bbedc0222cba652 Nombre del hardware: PC est\u00e1ndar QEMU ( i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 01/04/2014 RIP: 0010:regcache_cache_bypass drivers/base/regmap/regcache.c:540 C\u00f3digo: 54 41 89 f4 55 53 48 89 fb 48 83 ec 08 e8 26 94 a8 fe 48 8d bb a0 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 4a 03 00 00 4c 8d ab b0 00 00 00 48 8b ab a0 00 RSP: 0018:ffffc900010476b8 EFLAGS: 00010207 RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: 00000000000000000 RDX: 0000000000000012 RSI: 888002de0000 RDI: 0000000000000094 RBP: ffff888013c9a000 R08: 0000000000000000 R09: ffffbfff3f9cc6a R10: ffffc900010476e8 R11: ffffbfff3f9cc69 : 0000000000000001 R13: 000000000000000a R14: ffff888013c9af54 R15: ffff888013c9ad08 FS: 00007ffa984ab580(0000) GS:ffff88801fe00000(0000) knlGS:0000000000000000 CS: 010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055a6384136c8 CR3: 000000003bbe6003 CR4: 0000000000770ef0 DR0: 0000000000000000 DR1: 00000 00000000000DR2 : 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Seguimiento de llamadas: encx24j600_spi_probe drivers/net/ethernet/microchip/encx24j600.c:459 spi_probe drivers/spi/spi.c:397 Actually_probe drivers/base/dd.c:517 __driver_probe_device drivers/base/dd.c:751 driver_probe_device drivers/ base/dd.c:782 __device_attach_driver drivers/base/dd.c:899 bus_for_each_drv drivers/base/bus.c:427 __device_attach drivers/base/dd.c:971 bus_probe_device drivers/base/bus.c:487 device_add drivers/ base/core.c:3364 __spi_add_device drivers/spi/spi.c:599 spi_add_device drivers/spi/spi.c:641 spi_new_device drivers/spi/spi.c:717 new_device_store+0x18c/0x1f1 [spi_stub 4e02719357f1ff33f5a43d0 0630982840568e85e] controladores/base dev_attr_store /core.c:2074 sysfs_kf_write fs/sysfs/file.c:139 kernfs_fop_write_iter fs/kernfs/file.c:300 new_sync_write fs/read_write.c:508 (discriminador 4) vfs_write fs/read_write.c:594 ksys_write fs/read_write .c:648 do_syscall_64 arch/x86/entry/common.c:50 Entry_SYSCALL_64_after_hwframe arch/x86/entry/entry_64.S:113 Agregue verificaci\u00f3n de errores en devm_regmap_init_encx24j600 para evitar esta situaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 2.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/322c0e53496309e634d9db7349678eaad1d25b55",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-27105",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-07-26T22:15:10.753",
"lastModified": "2022-08-02T19:42:52.900",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-01T17:15:15.500",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -80,12 +80,8 @@
]
},
{
"url": "https://gist.github.com/TheWorkingDeveloper/9b7afbfe56938294480f7613805d3b7f",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
"url": "https://gist.github.com/0xVavaldi/9b7afbfe56938294480f7613805d3b7f",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52045",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T19:15:12.450",
"lastModified": "2024-11-01T12:57:03.417",
"lastModified": "2024-11-01T18:35:02.070",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Studio-42 eLfinder 2.1.62 contains a filename restriction bypass leading to a persistent Cross-site Scripting (XSS) vulnerability."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/Studio-42/elFinder/issues/3617",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52364",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-08T10:15:07.537",
"lastModified": "2024-04-08T18:48:40.217",
"lastModified": "2024-11-01T18:35:02.950",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "La vulnerabilidad de los par\u00e1metros de entrada no se verifica estrictamente en el m\u00f3dulo RSMC. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede causar escritura fuera de l\u00edmites."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",

View File

@ -2,20 +2,44 @@
"id": "CVE-2024-10040",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-18T05:15:04.667",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T18:26:23.450",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Infinite-Scroll plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.2. This is due to missing or incorrect nonce validation on the process_ajax_edit and process_ajax_delete function. This makes it possible for unauthenticated attackers to make changes to plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento Infinite-Scroll para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.6.2 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en las funciones process_ajax_edit y process_ajax_delete. Esto permite que atacantes no autenticados realicen cambios en la configuraci\u00f3n del complemento a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
@ -47,18 +71,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infinite-scroll:infinite-scroll:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.6.2",
"matchCriteriaId": "317C05FC-E752-4691-93D7-D49EB17E795A"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/infinite-scroll/trunk/includes/presets.php#L252",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/infinite-scroll/trunk/includes/presets.php#L275",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4045575a-35f0-46e5-afb7-93eee9be3a97?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10093",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-17T23:15:11.817",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T18:07:07.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in VSO ConvertXtoDvd 7.0.0.83. Affected is an unknown function in the library avcodec.dll of the file ConvertXtoDvd.exe. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en VSO ConvertXtoDvd 7.0.0.83. Se trata de una funci\u00f3n desconocida de la librer\u00eda avcodec.dll del archivo ConvertXtoDvd.exe. La manipulaci\u00f3n genera una ruta de b\u00fasqueda no controlada. Es necesario atacar de forma local. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,18 +140,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vso-software:convertxtodvd:7.0.0.83:*:*:*:*:*:*:*",
"matchCriteriaId": "20C9EACC-8C1A-4F5E-8815-CC0C0ED5443C"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.280758",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.280758",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.420798",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10119",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-10-18T05:15:05.200",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T18:40:58.367",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The wireless router WRTM326 from SECOM does not properly validate a specific parameter. An unauthenticated remote attacker could execute arbitrary system commands by sending crafted requests."
},
{
"lang": "es",
"value": "El enrutador inal\u00e1mbrico WRTM326 de SECOM no valida correctamente un par\u00e1metro espec\u00edfico. Un atacante remoto no autenticado podr\u00eda ejecutar comandos arbitrarios del sistema mediante el env\u00edo de solicitudes manipuladas."
}
],
"metrics": {
@ -47,14 +51,50 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zte:wrtm326_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.3.20",
"matchCriteriaId": "5D87CB20-EB64-4B9B-9E63-C57BFBCCA86E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zte:wrtm326:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B913028-45E6-4BAF-BABA-17B5F53FCBFB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8157-e0461-2.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8156-81c9d-1.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10131",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-10-19T04:15:05.300",
"lastModified": "2024-10-22T17:15:03.203",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T17:12:26.297",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -51,10 +73,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infiniflow:ragflow:0.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CFDFA2-0908-48AA-B613-BC2B0FB248BE"
}
]
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/42ae0b27-e851-4b58-a991-f691a437fbaa",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10448",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-28T14:15:04.143",
"lastModified": "2024-10-29T14:34:50.257",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T18:26:55.980",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,26 +140,63 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:blood_bank_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "074BD804-92B2-445A-9A77-DE019D9E8A13"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/bevennyamande/bloodbank_delete_csrf_attack",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.282008",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.282008",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.432501",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1900",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-03-05T22:15:47.060",
"lastModified": "2024-03-06T15:18:08.093",
"lastModified": "2024-11-01T17:35:03.073",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "La gesti\u00f3n inadecuada de la sesi\u00f3n en el flujo de autenticaci\u00f3n del proveedor de identidad en Devolutions Server 2023.3.14.0 y versiones anteriores permite que un usuario autenticado a trav\u00e9s de un proveedor de identidad permanezca autenticado despu\u00e9s de que su usuario se deshabilite o elimine en el proveedor de identidad, como Okta o Microsoft O365. El usuario permanecer\u00e1 autenticado hasta que caduque el token del servidor Devolutions."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0002",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20026",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-03-04T03:15:07.320",
"lastModified": "2024-03-04T13:58:23.447",
"lastModified": "2024-11-01T17:35:03.287",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En da, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541632; ID del problema: ALPS08541632."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",

File diff suppressed because it is too large Load Diff

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20340",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T17:15:18.300",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T17:40:30.980",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,18 +81,234 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DFA94312-376E-4785-888F-3C07612E1DF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "29E73FBF-2579-4660-AFFA-7F9607004226"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "87FAAFFB-0589-441B-8289-8B8A6E18F705"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "73B92119-793D-4A43-A056-24DB6826E759"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "093A0BC2-037C-463F-AFC5-EF11C2954EAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B881B8DF-A96D-4B64-B98A-71F0D3388641"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F6A97625-D39C-42D5-89E4-415A868A0972"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5E4D83B4-9697-4071-AC9F-7ADC86A6B529"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F81F708-ACED-4E42-8CA9-116B5C4F5141"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3C86116B-8475-40A0-A507-D4A7947F5F2C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A58A2DA5-3EE7-408D-AAFA-82330F0325B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F4C51EE7-866B-410C-B75E-EF260D5062B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD1E4527-AAE2-4DA9-AFDA-6375839F7843"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2ED03874-4071-4382-8A46-8B3A59E601FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BF84E043-DF3C-4A95-8FDA-B0FDCD795377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B9498087-9642-4A86-B3EE-1513C55A86E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "36C229AB-2851-48D4-815A-63AAB4462A24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6DA4BCFC-8237-4F5C-9863-523EE7D8619B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "07693A92-7D84-45A1-ACD6-D83AE41D504B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2C78050A-A5FB-427B-BF0D-0353B240A4FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "85E76AE7-12AC-4419-AE66-43730B173B4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D803EC9-26EE-4799-A435-C782C92739CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6EEF87CD-2335-4886-A65C-4E33775AEC52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "953EB81A-1B53-4A57-9F59-D4A7D37E657E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1CB534BC-3E4D-4484-AFD0-69524B1F07F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D401072-6709-4921-8918-720F28D61E24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C0EA3467-4205-4C41-AF24-689330F7396B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BE94E38-5F29-4AE1-8129-7F7582C2CC75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6BD1665-7824-4D98-A930-432CBDA4EAD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F8056E69-22FA-4935-A576-916805D90C62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A80BBBE-DB5E-460A-8621-6E28D2BD6E44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B33F953-FEF3-4C46-A12A-2A42D8339D6E"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inject-2EnmTC8v",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20377",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:06.327",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T17:30:14.350",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,220 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0FEE4092-0EAD-48DA-92EB-82DD4EB43E49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7B8DF2E2-848A-4616-AEF0-1EFE68A900C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "387E34BD-913B-4CB7-9230-81B283E92A9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FFE8B3DC-9865-4845-B989-FB41D6FE085E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BC98B2C9-2F78-4DB5-97D7-78D584CEBE87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "44CEED06-6E18-4961-BD69-8BF3E7A6D59C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D815D562-D60A-4AD1-9243-8167B244882E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FA91AC4A-77D5-4C41-BD63-4E8F3BA4FF84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A5808D1C-6D6E-403D-8904-147B66B50385"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FD9A750B-7C84-484C-94F3-FB66EF6296E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "62950A6C-8467-4215-BCD1-010B8C491714"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6D97494F-BA89-4E95-A01F-C2CE02505A27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD46B42A-B445-4397-ACD9-FB179B155A34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "21D28D33-2B3C-4695-9137-7C4AC6BA2D7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3DCA8FE8-D0BC-4B6C-8E15-0DC5D0EF515F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "62213974-B025-4A76-87CD-025C84389A2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A876A2A0-0973-481C-A63A-1A5761015308"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6671431-4FE3-4D7D-9F46-445A1A6B7EEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E2757987-7648-4BE1-AE91-99F1FC95C8C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "841C3C05-7289-46CC-A610-5A5BFC81FD42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "91599B30-27D5-450A-A565-A65BF940C30C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "71802FFD-A173-4F21-87C8-495D8F95A176"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8B9CD6DE-EE1E-4FF4-8DF5-7F9DA36AFCFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E0EF1B4E-3E42-4C42-9981-2BC17F22BA2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "30E26E7E-F6D8-4A89-85F7-42FCB0E37AD6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E2A7E707-6CBB-42E3-BE90-72E835156DB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4BB537CA-0E37-471E-8DD3-7710A443224A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F9022BCA-EDBF-4FD1-B427-573CA07E5134"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "23BA0BE4-B06D-45AE-9C9D-280F1BFA7EDA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3B79ABCC-C95B-45AB-BE9D-454BD8174651"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A4FD7D25-704B-47EB-AF36-DC684AD07807"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3D33E431-39F5-4F73-99A1-19A05A594C90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6F69A3-E15F-43C9-8B9C-A30E057C4FD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "602535DE-ED32-4805-85EF-940955459B34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "17727E39-1612-4433-AC23-CBC852B392C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D5894CEC-AB1C-44F2-A977-FE74897A24A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "579DC0CE-1CEA-449F-BF76-AD7087573ACD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB3E28C0-675B-4C30-B248-BE1EB5E961C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7E7A89-A9CA-45DA-8378-A50B1F9D260E"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-infodisc-RL4mJFer",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20379",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:06.553",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T18:02:52.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,60 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6F69A3-E15F-43C9-8B9C-A30E057C4FD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "602535DE-ED32-4805-85EF-940955459B34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "17727E39-1612-4433-AC23-CBC852B392C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D5894CEC-AB1C-44F2-A977-FE74897A24A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "579DC0CE-1CEA-449F-BF76-AD7087573ACD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB3E28C0-675B-4C30-B248-BE1EB5E961C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7E7A89-A9CA-45DA-8378-A50B1F9D260E"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-file-read-5q4mQRn",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20424",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:09.930",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T18:07:44.057",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,485 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6175407A-207E-4844-B150-EA0129C4CBBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "45B6E615-F42A-468F-8E40-AD28994B4B1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C4B08264-DA65-4BFF-A973-FF733C7325B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CE2A5330-8180-48CE-B22A-1CF24B7B1631"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ACC1D72F-9542-4A62-AA90-C0E6B2095068"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E4F3A97A-3359-40C7-95B0-2AB41C067141"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B68BA14B-1752-4F05-9331-D556247462C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE72ABB-B573-43CC-A2AC-D81807970BD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "5DB186DC-6C03-4868-8218-06BEFC0CE400"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "B29670B8-F2D3-46D7-8F34-F44B320DD6FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2F04DDF5-2058-4208-A608-3673872450EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "C9A483AC-A8CF-439C-9009-4DFAB0484BCE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "94E7D836-46E5-4CD5-8BDC-4697D915FE05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "06220CB8-7F16-4D3C-A835-558D5F4D97ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "82917F5C-CF20-4D97-A981-FE3F8476CCFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "47E42025-1D1E-4390-AC21-9A1B0FBE8D82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "52651664-CA65-4812-8226-E104E1BE7864"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "64E0FDB2-D5A4-4749-A182-B0B145DC00D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "23B58490-C403-44D5-BDB9-88FAD19ABC2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DE33A280-84E4-4B5B-AB31-7A78754413F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BA3F9410-02E1-4FE9-9A4B-E504515F4615"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8AAAF924-1ADE-4267-9957-DF060D1D3538"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D02863A-1355-4FFE-A6BD-C912697774A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1755E718-C726-442B-B203-E9536C546DF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AB80FC39-0FCE-49F7-9A28-CE733DBB3572"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F61496C8-9ADE-4A4E-9788-447050691727"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "E0780AD6-4F38-4400-AA63-E41879F74B68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "52C7994F-AA17-467B-919E-A49F0CC9DB47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9F007F6B-1EAA-468C-8159-78B020DF1E58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "C9053FDE-A6BE-4535-AE36-A323F8B7ACA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "6E255975-F952-43AB-A577-B8D331DDB3AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D1D808CD-B030-4334-A286-9B3A1D35C61D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0DFE9115-3E32-4A55-AB5A-83513322FE97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8452BA9A-F56C-48E0-BDBA-9095AF78F521"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B2CE3B06-353C-4623-9EF4-78814DCB0D7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FD968EA0-616D-4A22-A15D-C66918E71761"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "249F9108-758A-4118-94C1-BAC747AF45ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "978284EE-8BE8-43ED-ADA0-B90151D83EA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0BA140F9-4706-4B05-826E-962A277E625A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "270CA092-1AF1-48D4-8695-E7DB694969C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DFA94312-376E-4785-888F-3C07612E1DF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "29E73FBF-2579-4660-AFFA-7F9607004226"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "87FAAFFB-0589-441B-8289-8B8A6E18F705"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "73B92119-793D-4A43-A056-24DB6826E759"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "093A0BC2-037C-463F-AFC5-EF11C2954EAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B881B8DF-A96D-4B64-B98A-71F0D3388641"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F6A97625-D39C-42D5-89E4-415A868A0972"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5E4D83B4-9697-4071-AC9F-7ADC86A6B529"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F81F708-ACED-4E42-8CA9-116B5C4F5141"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3C86116B-8475-40A0-A507-D4A7947F5F2C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A58A2DA5-3EE7-408D-AAFA-82330F0325B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F4C51EE7-866B-410C-B75E-EF260D5062B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD1E4527-AAE2-4DA9-AFDA-6375839F7843"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2ED03874-4071-4382-8A46-8B3A59E601FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BF84E043-DF3C-4A95-8FDA-B0FDCD795377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B9498087-9642-4A86-B3EE-1513C55A86E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "36C229AB-2851-48D4-815A-63AAB4462A24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6DA4BCFC-8237-4F5C-9863-523EE7D8619B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "07693A92-7D84-45A1-ACD6-D83AE41D504B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2C78050A-A5FB-427B-BF0D-0353B240A4FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "85E76AE7-12AC-4419-AE66-43730B173B4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D803EC9-26EE-4799-A435-C782C92739CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6EEF87CD-2335-4886-A65C-4E33775AEC52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "953EB81A-1B53-4A57-9F59-D4A7D37E657E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1CB534BC-3E4D-4484-AFD0-69524B1F07F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D401072-6709-4921-8918-720F28D61E24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C0EA3467-4205-4C41-AF24-689330F7396B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BE94E38-5F29-4AE1-8129-7F7582C2CC75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6BD1665-7824-4D98-A930-432CBDA4EAD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F8056E69-22FA-4935-A576-916805D90C62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A80BBBE-DB5E-460A-8621-6E28D2BD6E44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B33F953-FEF3-4C46-A12A-2A42D8339D6E"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-v3AWDqN7",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20471",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:10.773",
"lastModified": "2024-10-25T12:56:07.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T18:16:35.227",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,480 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6175407A-207E-4844-B150-EA0129C4CBBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "45B6E615-F42A-468F-8E40-AD28994B4B1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C4B08264-DA65-4BFF-A973-FF733C7325B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CE2A5330-8180-48CE-B22A-1CF24B7B1631"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ACC1D72F-9542-4A62-AA90-C0E6B2095068"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E4F3A97A-3359-40C7-95B0-2AB41C067141"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B68BA14B-1752-4F05-9331-D556247462C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE72ABB-B573-43CC-A2AC-D81807970BD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "5DB186DC-6C03-4868-8218-06BEFC0CE400"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "B29670B8-F2D3-46D7-8F34-F44B320DD6FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2F04DDF5-2058-4208-A608-3673872450EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "C9A483AC-A8CF-439C-9009-4DFAB0484BCE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "94E7D836-46E5-4CD5-8BDC-4697D915FE05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "06220CB8-7F16-4D3C-A835-558D5F4D97ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "82917F5C-CF20-4D97-A981-FE3F8476CCFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "47E42025-1D1E-4390-AC21-9A1B0FBE8D82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "52651664-CA65-4812-8226-E104E1BE7864"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "64E0FDB2-D5A4-4749-A182-B0B145DC00D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "23B58490-C403-44D5-BDB9-88FAD19ABC2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DE33A280-84E4-4B5B-AB31-7A78754413F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BA3F9410-02E1-4FE9-9A4B-E504515F4615"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8AAAF924-1ADE-4267-9957-DF060D1D3538"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D02863A-1355-4FFE-A6BD-C912697774A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1755E718-C726-442B-B203-E9536C546DF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AB80FC39-0FCE-49F7-9A28-CE733DBB3572"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F61496C8-9ADE-4A4E-9788-447050691727"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "E0780AD6-4F38-4400-AA63-E41879F74B68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "52C7994F-AA17-467B-919E-A49F0CC9DB47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9F007F6B-1EAA-468C-8159-78B020DF1E58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "C9053FDE-A6BE-4535-AE36-A323F8B7ACA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "6E255975-F952-43AB-A577-B8D331DDB3AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D1D808CD-B030-4334-A286-9B3A1D35C61D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0DFE9115-3E32-4A55-AB5A-83513322FE97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8452BA9A-F56C-48E0-BDBA-9095AF78F521"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B2CE3B06-353C-4623-9EF4-78814DCB0D7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FD968EA0-616D-4A22-A15D-C66918E71761"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "249F9108-758A-4118-94C1-BAC747AF45ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "978284EE-8BE8-43ED-ADA0-B90151D83EA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0BA140F9-4706-4B05-826E-962A277E625A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "270CA092-1AF1-48D4-8695-E7DB694969C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DFA94312-376E-4785-888F-3C07612E1DF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "29E73FBF-2579-4660-AFFA-7F9607004226"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "87FAAFFB-0589-441B-8289-8B8A6E18F705"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "73B92119-793D-4A43-A056-24DB6826E759"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "093A0BC2-037C-463F-AFC5-EF11C2954EAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B881B8DF-A96D-4B64-B98A-71F0D3388641"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F6A97625-D39C-42D5-89E4-415A868A0972"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5E4D83B4-9697-4071-AC9F-7ADC86A6B529"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F81F708-ACED-4E42-8CA9-116B5C4F5141"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3C86116B-8475-40A0-A507-D4A7947F5F2C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A58A2DA5-3EE7-408D-AAFA-82330F0325B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F4C51EE7-866B-410C-B75E-EF260D5062B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD1E4527-AAE2-4DA9-AFDA-6375839F7843"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2ED03874-4071-4382-8A46-8B3A59E601FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BF84E043-DF3C-4A95-8FDA-B0FDCD795377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B9498087-9642-4A86-B3EE-1513C55A86E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "36C229AB-2851-48D4-815A-63AAB4462A24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6DA4BCFC-8237-4F5C-9863-523EE7D8619B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "07693A92-7D84-45A1-ACD6-D83AE41D504B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2C78050A-A5FB-427B-BF0D-0353B240A4FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "85E76AE7-12AC-4419-AE66-43730B173B4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D803EC9-26EE-4799-A435-C782C92739CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6EEF87CD-2335-4886-A65C-4E33775AEC52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "953EB81A-1B53-4A57-9F59-D4A7D37E657E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1CB534BC-3E4D-4484-AFD0-69524B1F07F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D401072-6709-4921-8918-720F28D61E24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C0EA3467-4205-4C41-AF24-689330F7396B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BE94E38-5F29-4AE1-8129-7F7582C2CC75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6BD1665-7824-4D98-A930-432CBDA4EAD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F8056E69-22FA-4935-A576-916805D90C62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A80BBBE-DB5E-460A-8621-6E28D2BD6E44"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inj-LOYAFcfq",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20472",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:11.007",
"lastModified": "2024-10-25T12:56:07.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T18:22:41.030",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,60 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D401072-6709-4921-8918-720F28D61E24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C0EA3467-4205-4C41-AF24-689330F7396B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BE94E38-5F29-4AE1-8129-7F7582C2CC75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6BD1665-7824-4D98-A930-432CBDA4EAD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F8056E69-22FA-4935-A576-916805D90C62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A80BBBE-DB5E-460A-8621-6E28D2BD6E44"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inj-LOYAFcfq",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20473",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:11.280",
"lastModified": "2024-10-25T12:56:07.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T18:09:35.813",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,60 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D401072-6709-4921-8918-720F28D61E24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C0EA3467-4205-4C41-AF24-689330F7396B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BE94E38-5F29-4AE1-8129-7F7582C2CC75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6BD1665-7824-4D98-A930-432CBDA4EAD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F8056E69-22FA-4935-A576-916805D90C62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A80BBBE-DB5E-460A-8621-6E28D2BD6E44"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inj-LOYAFcfq",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20474",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:11.517",
"lastModified": "2024-10-25T12:56:07.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T18:14:56.790",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,215 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.00086:*:*:*:*:*:*:*",
"matchCriteriaId": "03B6618B-2E98-480C-AF79-2A9E9BF29CB3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.01095:*:*:*:*:*:*:*",
"matchCriteriaId": "F2CB76BE-7DD7-40D7-A7C7-DDA7079A286F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.02028:*:*:*:*:*:*:*",
"matchCriteriaId": "C87CEF61-99F2-4845-9FDE-4B6ED62637C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.03047:*:*:*:*:*:*:*",
"matchCriteriaId": "EA80A4E4-061E-4578-B780-9540AE502E66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.03049:*:*:*:*:*:*:*",
"matchCriteriaId": "804366C1-F307-4DC2-9FEA-B4EB60790A32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.04043:*:*:*:*:*:*:*",
"matchCriteriaId": "5AD3244A-5CA8-496C-B189-BCD31B0E40C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.04053:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB00A32-8571-4685-B448-690F8EE373D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.05042:*:*:*:*:*:*:*",
"matchCriteriaId": "F97CC9FF-FDD3-46A1-9025-BAA83160A504"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.06037:*:*:*:*:*:*:*",
"matchCriteriaId": "FF8E83C4-9C5A-4D84-AB19-A4564BBB6625"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:4.10.00093:*:*:*:*:*:*:*",
"matchCriteriaId": "8FDBC52F-F851-4DC4-9DED-45F8689F2A00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:4.10.01075:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D74511-0444-473C-96F7-751C2B9A6ADC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:4.10.02086:*:*:*:*:*:*:*",
"matchCriteriaId": "D89BE767-38C2-4E92-83EB-09E23B48AAF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:4.10.03104:*:*:*:*:*:*:*",
"matchCriteriaId": "DC77CA23-5750-4E35-AD17-4FE0B351ECFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:4.10.04065:*:*:*:*:*:*:*",
"matchCriteriaId": "CDE66231-01C3-4807-AB7B-F2A3C2E2200D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:4.10.04071:*:*:*:*:*:*:*",
"matchCriteriaId": "B003756D-7F3D-4FB9-B3EF-CEAA68334630"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:4.10.05085:*:*:*:*:*:*:*",
"matchCriteriaId": "B06F4BD8-23D2-4C32-B090-F33D50BB5805"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:4.10.05095:*:*:*:*:*:*:*",
"matchCriteriaId": "1EE93BD0-7AAD-4921-A6F1-22F1905F8870"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:4.10.05111:*:*:*:*:*:*:*",
"matchCriteriaId": "222718F2-81E9-40BD-8B2D-ECD70CC423E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:4.10.06079:*:*:*:*:*:*:*",
"matchCriteriaId": "C1150AC7-8E86-471E-87DD-F4C0D0628261"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:4.10.06090:*:*:*:*:*:*:*",
"matchCriteriaId": "585A3B8E-8FD1-4B01-9F82-1038BF50A0FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:4.10.07061:*:*:*:*:*:*:*",
"matchCriteriaId": "61D0138A-EE54-420B-A11B-4580DD130FBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:4.10.07062:*:*:*:*:*:*:*",
"matchCriteriaId": "D45B8E46-AE9E-44F6-B58E-5AF7A32D499B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:4.10.07073:*:*:*:*:*:*:*",
"matchCriteriaId": "FAB896B8-535A-494F-AA21-3DA56CD7A540"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:4.10.08025:*:*:*:*:*:*:*",
"matchCriteriaId": "314BBB39-15FD-4DEB-8286-047644C4D456"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:4.10.08029:*:*:*:*:*:*:*",
"matchCriteriaId": "4877EEBA-CA94-4176-8442-429E9DF1E5AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:5.0.00238:*:*:*:*:*:*:*",
"matchCriteriaId": "7B7B74D9-7D43-48B2-AE6F-4FE75DB1DF61"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:5.0.00529:*:*:*:*:*:*:*",
"matchCriteriaId": "86B5EB44-F814-49AB-BAD2-3E02E9707377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:5.0.00556:*:*:*:*:*:*:*",
"matchCriteriaId": "C33CF946-24CD-471E-8448-445E629789BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:5.0.01242:*:*:*:*:*:*:*",
"matchCriteriaId": "9E39EE52-4A48-430E-A7A5-29276EE51B03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:5.0.02075:*:*:*:*:*:*:*",
"matchCriteriaId": "781CEBDC-3A42-47BA-8509-E35AB6BB56C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:5.0.03072:*:*:*:*:*:*:*",
"matchCriteriaId": "ADF3D714-0475-4E30-8245-159C5BA68F11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:5.0.03076:*:*:*:*:*:*:*",
"matchCriteriaId": "BA2D666F-5EBF-41B7-89C1-32BCF65DABEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:5.0.04032:*:*:*:*:*:*:*",
"matchCriteriaId": "DDDE95F2-E54E-4955-8E07-C8D97BCB2CC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:5.0.05040:*:*:*:*:*:*:*",
"matchCriteriaId": "DEF7A28D-542B-46A1-B428-BA3E71A62B44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:5.1.0.136:*:*:*:*:*:*:*",
"matchCriteriaId": "E38148BD-1C03-43F8-83F2-3043B3442100"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:5.1.1.42:*:*:*:*:*:*:*",
"matchCriteriaId": "C771F3C7-609D-4C66-B1A0-34BD26FFD781"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:5.1.2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D6AB12-BC84-4324-BB4E-AAC3701B28C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_client:5.1.3.62:*:*:*:*:*:*:*",
"matchCriteriaId": "0A560B61-73F1-42E5-9F4F-931610C6954A"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csc-dos-XvPhM3bj",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21536",
"sourceIdentifier": "report@snyk.io",
"published": "2024-10-19T05:15:13.097",
"lastModified": "2024-10-21T17:10:22.857",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T18:03:15.897",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "report@snyk.io",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "report@snyk.io",
"type": "Secondary",
@ -51,22 +81,60 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chimurai:http-proxy-middleware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0.7",
"matchCriteriaId": "A1C31D2C-0CB7-4D28-8658-42632A65F7F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chimurai:http-proxy-middleware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.0.3",
"matchCriteriaId": "A89EB4F5-1978-4172-A52D-8504F87E110E"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/mhassan1/28be67266d82a53708ed59ce5dc3c94a",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/chimurai/http-proxy-middleware/commit/0b4274e8cc9e9a2c5a06f35fbf456ccfcebc55a5",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/chimurai/http-proxy-middleware/commit/788b21e4aff38332d6319557d4a5b1b13b1f9a22",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Patch"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-JS-HTTPPROXYMIDDLEWARE-8229906",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26280",
"sourceIdentifier": "security@apache.org",
"published": "2024-03-01T11:15:08.123",
"lastModified": "2024-05-01T18:15:15.537",
"lastModified": "2024-11-01T18:35:03.183",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Apache Airflow, versiones anteriores a la 2.8.2, tiene una vulnerabilidad que permite a los usuarios autenticados de Ops y Viewers ver toda la informaci\u00f3n en los registros de auditor\u00eda, incluidos los nombres de dag y los nombres de usuario que no ten\u00edan permiso para ver. Con 2.8.2 y versiones posteriores, los usuarios de Ops y Viewer no tienen permiso de registro de auditor\u00eda de forma predeterminada; se les debe otorgar permisos expl\u00edcitamente para ver los registros. De forma predeterminada, solo los usuarios administradores tienen permiso de registro de auditor\u00eda. Se recomienda a los usuarios de Apache Airflow actualizar a la versi\u00f3n 2.8.2 o posterior para mitigar el riesgo asociado con esta vulnerabilidad."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@apache.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26880",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-17T11:15:09.963",
"lastModified": "2024-06-27T12:15:21.847",
"lastModified": "2024-11-01T18:35:03.417",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: dm: llamar al m\u00e9todo de reanudaci\u00f3n en suspensi\u00f3n interna. Se inform\u00f3 este bloqueo al experimentar con el conjunto de pruebas lvm2. La corrupci\u00f3n de la lista se debe al hecho de que los m\u00e9todos de possuspensi\u00f3n y reanudaci\u00f3n no se emparejaron correctamente; hubo dos llamadas consecutivas a la funci\u00f3n origin_postsuspend. La segunda llamada intenta eliminar la entrada \"hash_list\" de una lista, mientras que la primera llamada ya la elimin\u00f3. Corrige __dm_internal_resume para que llame a los m\u00e9todos preresume y resume de los objetivos de la tabla. Si falla un m\u00e9todo de reanudaci\u00f3n previa de alg\u00fan objetivo, estamos en una situaci\u00f3n complicada. No podemos devolver un error porque se supone que dm_internal_resume no devuelve errores. No podemos devolver el \u00e9xito, porque entonces los m\u00e9todos \"reanudar\" y \"postsuspender\" no se emparejar\u00edan correctamente. Entonces, configuramos el indicador DMF_SUSPENDED y simulamos una suspensi\u00f3n normal; puede confundir las herramientas del espacio de usuario, pero no causar\u00e1 una falla del kernel. ------------[ cortar aqu\u00ed ]------------ \u00a1ERROR del kernel en lib/list_debug.c:56! c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP CPU: 1 PID: 8343 Comm: dmsetup Not tainted 6.8.0-rc6 #4 Nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/ 01/2014 RIP: 0010:__list_del_entry_valid_or_report+0x77/0xc0 RSP: 0018:ffff8881b831bcc0 EFLAGS: 00010282 RAX: 000000000000004e RBX: ffff888143b6eb80 0000000000000000 RDX: 0000000000000001 RSI: ffffffff819053d0 RDI: 00000000ffffffff RBP: ffff8881b83a3400 R08: 00000000fffeffff R09: 8 R10: 0000000000000000 R11: ffffffff81a24080 R12: 0000000000000001 R13: ffff88814538e000 R14: ffff888143bc6dc0 R15: fffffffa02e4bb0 FS: 7c0f780(0000) GS:ffff8893f0a40000(0000) knlGS:0000000000000000 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 0000000057fb5000 CR3: 0000000143474000 CR4: 00000000000006b0 Seguimiento de llamadas: ? morir+0x2d/0x80? do_trap+0xeb/0xf0? __list_del_entry_valid_or_report+0x77/0xc0 ? do_error_trap+0x60/0x80? __list_del_entry_valid_or_report+0x77/0xc0 ? exc_invalid_op+0x49/0x60? __list_del_entry_valid_or_report+0x77/0xc0 ? asm_exc_invalid_op+0x16/0x20? table_deps+0x1b0/0x1b0 [dm_mod] ? __list_del_entry_valid_or_report+0x77/0xc0 origin_postsuspend+0x1a/0x50 [dm_snapshot] dm_table_postsuspend_targets+0x34/0x50 [dm_mod] dm_suspend+0xd8/0xf0 [dm_mod] dev_suspend+0x1f2/0x2f0 modo] ? table_deps+0x1b0/0x1b0 [dm_mod] ctl_ioctl+0x300/0x5f0 [dm_mod] dm_compat_ctl_ioctl+0x7/0x10 [dm_mod] __x64_compat_sys_ioctl+0x104/0x170 do_syscall_64+0x184/0x1b0 entrada _SYSCALL_64_after_hwframe+0x46/0x4e RIP: 0033:0xf7e6aead --- [fin de seguimiento 0000000000000000]---"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/03ad5ad53e51abf3a4c7538c1bc67a5982b41dc5",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27058",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T13:15:50.450",
"lastModified": "2024-05-01T19:50:25.633",
"lastModified": "2024-11-01T17:35:04.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: tmpfs: corrige la ejecuci\u00f3n al manejar dquot rbtree Un reproductor syzkaller encontr\u00f3 una ejecuci\u00f3n al intentar eliminar informaci\u00f3n de dquot del \u00e1rbol rb. La recuperaci\u00f3n del nodo ra\u00edz de rb_tree tambi\u00e9n debe estar protegida por dqopt->dqio_sem; de lo contrario, si se da el momento adecuado, shmem_release_dquot() activar\u00e1 una advertencia porque no pudo encontrar un nodo en el \u00e1rbol, cuando la verdadera raz\u00f3n era el nodo ra\u00edz. cambiando antes de que comience la b\u00fasqueda: Hilo 1 Hilo 2 - shmem_release_dquot() - shmem_{acquire,release}_dquot() - buscar ROOT - Obtener ROOT - adquirir dqio_sem - esperar dqio_sem - hacer algo, activar un reequilibrio de \u00e1rbol - liberar dqio_sem - adquirir dqio_sem - comienza a buscar el nodo, pero desde la ubicaci\u00f3n incorrecta, pierde el nodo y genera una advertencia."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/0a69b6b3a026543bc215ccc866d0aea5579e6ce2",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-31837",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T07:15:48.993",
"lastModified": "2024-04-30T13:11:16.690",
"lastModified": "2024-11-01T17:35:04.770",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "DMitry (Herramienta de recopilaci\u00f3n de informaci\u00f3n Deepmagic) 1.3a tiene una vulnerabilidad de cadena de formato, con un modelo de amenaza similar a CVE-2017-7938."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-134"
}
]
}
],
"references": [
{
"url": "https://github.com/jaygreig86/dmitry/pull/12",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33270",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T15:15:53.020",
"lastModified": "2024-04-30T17:52:35.057",
"lastModified": "2024-11-01T17:35:05.610",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en FME Modules fileuploads v.2.0.3 y anteriores y solucionado en v2.0.4 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente uploadfiles.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "http://fileuploads.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33866",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-14T16:17:22.527",
"lastModified": "2024-05-14T19:17:55.627",
"lastModified": "2024-11-01T18:35:03.990",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en linqi anterior a 1.4.0.1 en Windows. Hay /api/DocumentTemplate/{GUID] XSS."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://linqi.help/Updates/en#/SecurityUpdates",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35552",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-22T14:15:09.133",
"lastModified": "2024-05-22T14:30:41.953",
"lastModified": "2024-11-01T18:35:04.837",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/infoMove_deal.php?mudi=del&dataType=logo&dataTypeCN."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/bearman113/1.md/blob/main/20/csrf.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-39459",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-06-26T17:15:27.110",
"lastModified": "2024-06-27T12:47:19.847",
"lastModified": "2024-11-01T17:35:06.707",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En casos excepcionales, el complemento Jenkins Plain Credentials 182.v468b_97b_9dcb_8 y versiones anteriores almacena las credenciales de archivos secretos sin cifrar (solo codificados en Base64) en el sistema de archivos del controlador Jenkins, donde pueden ser vistos por usuarios con acceso al sistema de archivos del controlador Jenkins (credenciales globales) o con Permiso de objeto/lectura extendida (credenciales con \u00e1mbito de carpeta)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/06/26/2",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-41738",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-11-01T17:15:16.033",
"lastModified": "2024-11-01T17:15:16.033",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM TXSeries for Multiplatforms 10.1 could allow an attacker to obtain sensitive information from the query string of an HTTP GET method to process a request which could be obtained using man in the middle techniques."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-598"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7174572",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-41741",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-11-01T17:15:16.320",
"lastModified": "2024-11-01T17:15:16.320",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM TXSeries for Multiplatforms 10.1 could allow an attacker to determine valid usernames due to an observable timing discrepancy which could be used in further attacks against the system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-208"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7174572",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-41744",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-11-01T17:15:16.567",
"lastModified": "2024-11-01T18:35:08.850",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM CICS TX Standard 11.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7174576",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-41745",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-11-01T17:15:16.800",
"lastModified": "2024-11-01T17:15:16.800",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM CICS TX Standard is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7174576",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43684",
"sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"published": "2024-10-04T20:15:06.710",
"lastModified": "2024-10-17T17:39:43.947",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-01T17:15:17.127",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -145,11 +145,8 @@
]
},
{
"url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities",
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"tags": [
"Vendor Advisory"
]
"url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-cross-site-request-forgery",
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-46911",
"sourceIdentifier": "security@apache.org",
"published": "2024-10-14T09:15:04.297",
"lastModified": "2024-10-15T12:57:46.880",
"lastModified": "2024-11-01T17:35:07.877",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Vulnerabilidad de escalada de privilegios por Cross-site Resource Forgery (CSRF) en Apache Roller. En los sitios web de Roller con varios blogs y usuarios, por defecto, se conf\u00eda en los propietarios de los blogs para que publiquen contenido arbitrario en los blogs y esto, combinado con una deficiencia en las protecciones CSRF de Roller, permiti\u00f3 un ataque de escalada de privilegios. Este problema afecta a Apache Roller anterior a la versi\u00f3n 6.1.4. Se recomienda a los usuarios de Roller que ejecutan sitios web de Roller con varios blogs y usuarios que actualicen a la versi\u00f3n 6.1.4, que soluciona el problema. Anuncio de lanzamiento de Roller 6.1.4: https://lists.apache.org/thread/3c3f6rwqptyw6wdc95654fq5vlosqdpw"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@apache.org",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48217",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-01T17:15:17.313",
"lastModified": "2024-11-01T17:15:17.313",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Insecure Direct Object Reference (IDOR) in the dashboard of SiSMART v7.4.0 allows attackers to execute a horizontal-privilege escalation."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ajrielrm/CVE-2024-48217",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48352",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-01T17:15:17.450",
"lastModified": "2024-11-01T17:15:17.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Yealink Meeting Server before V26.0.0.67 is vulnerable to sensitive data exposure in the server response via sending HTTP request with enterprise ID."
}
],
"metrics": {},
"references": [
{
"url": "http://yealink.com",
"source": "cve@mitre.org"
},
{
"url": "https://www.yealink.com/en/trust-center/security-advisories/e5c848c55b894231",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48353",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-01T18:15:07.153",
"lastModified": "2024-11-01T18:15:07.153",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Yealink Meeting Server before V26.0.0.67 allows attackers to obtain static key information from a front-end JS file and decrypt the plaintext passwords based on the obtained key information."
}
],
"metrics": {},
"references": [
{
"url": "http://yealink.com",
"source": "cve@mitre.org"
},
{
"url": "https://www.yealink.com/en/trust-center/security-advisories/b1998ab629254ca3",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48410",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-01T17:15:17.580",
"lastModified": "2024-11-01T17:15:17.580",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in Camtrace v.9.16.2.1 allows a remote attacker to execute arbitrary code via the login.php."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/Youns92/e7cd3f5d18ab089320f72c51fa3977de",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-49661",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-29T12:15:05.793",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T18:56:50.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Lew Ayotte leenk.Me allows Reflected XSS.This issue affects leenk.Me: from n/a through 2.16.0."
},
{
"lang": "es",
"value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Lew Ayotte leenk.Me permite XSS reflejado. Este problema afecta a leenk.Me: desde n/a hasta 2.16.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -47,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:leenk:leenk.me:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.16.0",
"matchCriteriaId": "5EA4ECE3-0FE8-4356-A3D2-EBB19794A913"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/leenkme/wordpress-leenk-me-plugin-2-16-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-49662",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-29T12:15:06.037",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T18:56:19.253",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Webgensis Simple Load More allows Reflected XSS.This issue affects Simple Load More: from n/a through 1.0."
},
{
"lang": "es",
"value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Webgensis Simple Load More permite XSS reflejado. Este problema afecta a Simple Load More: desde n/a hasta 1.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -47,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webgensis:simple_load_more:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "E24A4967-8C44-4933-B7C8-092E40F2D244"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/simple-load-more/wordpress-simple-load-more-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-49663",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-29T12:15:06.290",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T18:55:51.143",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Elena Zhyvohliad uCAT \u2013 Next Story allows Reflected XSS.This issue affects uCAT \u2013 Next Story: from n/a through 2.0.0."
},
{
"lang": "es",
"value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Elena Zhyvohliad uCAT \u2013 Next Story permite XSS reflejado. Este problema afecta a uCAT \u2013 Next Story: desde n/a hasta 2.0.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -47,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:elenazhyvohliad:ucat:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.0.0",
"matchCriteriaId": "735A50FD-3BF4-4B1D-B096-620B62009043"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ucat-next-story/wordpress-ucat-next-story-plugin-2-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-49664",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-29T12:15:06.517",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T18:55:20.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in allows Reflected XSS.This issue affects chatplusjp: from n/a through 1.02."
},
{
"lang": "es",
"value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') permite XSS reflejado. Este problema afecta a chatplusjp: desde n/a hasta 1.02."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -47,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chatplusjp:chatplusjp:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.2",
"matchCriteriaId": "B0D12A5C-F2E3-483D-A317-F6D0E2D5FC47"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/chatplusjp/wordpress-chatplusjp-plugin-1-02-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-49665",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-29T12:15:06.753",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T18:55:01.773",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Web Bricks Web Bricks Addons for Elementor allows Stored XSS.This issue affects Web Bricks Addons for Elementor: from n/a through 1.1.1."
},
{
"lang": "es",
"value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Web Bricks Web Bricks Addons for Elementor permite XSS almacenado. Este problema afecta a Web Bricks Addons for Elementor: desde n/a hasta 1.1.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -47,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webbricks:web_bricks_addons:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1.1",
"matchCriteriaId": "78C7B455-53DF-4D3B-A345-868DF4C42542"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/webbricks-addons/wordpress-web-bricks-addons-for-elementor-plugin-1-1-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-49667",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-29T12:15:06.980",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T18:48:48.797",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in NervyThemes Local Business Addons For Elementor allows Stored XSS.This issue affects Local Business Addons For Elementor: from n/a through 1.1.5."
},
{
"lang": "es",
"value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en NervyThemes Local Business Addons For Elementor permite XSS almacenado. Este problema afecta a Local Business Addons For Elementor: desde n/a hasta 1.1.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -47,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nervythemes:local_business_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1.5",
"matchCriteriaId": "1AC5F420-E7DC-4DC9-8255-4D8D0F160EE3"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/map-addons-for-elementor-waze-map/wordpress-local-business-addons-for-elementor-plugin-1-1-5-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,94 @@
{
"id": "CVE-2024-49770",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-01T17:15:17.710",
"lastModified": "2024-11-01T17:15:17.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "`oak` is a middleware framework for Deno's native HTTP server, Deno Deploy, Node.js 16.5 and later, Cloudflare Workers and Bun. By default `oak` does not allow transferring of hidden files with `Context.send` API. However, prior to version 17.1.3, this can be bypassed by encoding `/` as its URL encoded form `%2F`. For an attacker this has potential to read sensitive user data or to gain access to server secrets. Version 17.1.3 fixes the issue."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 7.7,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
},
{
"lang": "en",
"value": "CWE-35"
}
]
}
],
"references": [
{
"url": "https://github.com/oakserver/oak/blob/3896fe568b25ac0b4c5afbf822ff8344c3d1712a/send.ts#L117-L125",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/oakserver/oak/blob/3896fe568b25ac0b4c5afbf822ff8344c3d1712a/send.ts#L182C10-L182C25",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/oakserver/oak/commit/4b2f27efd5cba5a45b2c3982e610da3af0869209",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/oakserver/oak/security/advisories/GHSA-qm92-93fv-vh7m",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49973",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T18:15:18.163",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T17:11:23.070",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,145 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: r8169: se agregaron campos del contador de recuento con RTL8125. RTL8125 agreg\u00f3 campos al contador de recuento, lo que puede provocar que el chip desactive estos nuevos campos en la memoria no asignada. Por lo tanto, aseg\u00farese de que el \u00e1rea de memoria asignada sea lo suficientemente grande como para contener todos los valores del contador de recuento, incluso si solo usamos partes de ella."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4",
"versionEndExcluding": "5.10.227",
"matchCriteriaId": "114E45ED-C336-4B21-B1A8-759F9542EC7C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.168",
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.113",
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.55",
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.14",
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1c723d785adb711496bc64c24240f952f4faaabf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/21950321ad33d7613b1453f4c503d7b1871deb61",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/585c048d15ed559f20cb94c8fa2f30077efa4fbc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/92bc8647b4d65f4d4bf8afdb206321c1bc55a486",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/991e8b0bab669b7d06927c3e442b3352532e8581",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ced8e8b8f40accfcce4a2bbd8b150aa76d5eff9a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fe44b3bfbf0c74df5712f44458689d0eccccf47d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51060",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T19:15:13.500",
"lastModified": "2024-11-01T12:57:03.417",
"lastModified": "2024-11-01T17:35:08.443",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Projectworlds Online Admission System v1 is vulnerable to SQL Injection in index.php via the 'a_id' parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "http://projectworld.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51063",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T19:15:13.610",
"lastModified": "2024-11-01T12:57:03.417",
"lastModified": "2024-11-01T17:35:09.657",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Phpgurukul Teachers Record Management System v2.1 is vulnerable to SQL Injection in add-teacher.php via the mobile number or email parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "http://phpgurukul.com",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-51244",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-01T17:15:18.093",
"lastModified": "2024-11-01T17:15:18.093",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doIPSec function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-51245",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-01T17:15:18.237",
"lastModified": "2024-11-01T17:15:18.237",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In DrayTek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the rename_table function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-51247",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-01T17:15:18.380",
"lastModified": "2024-11-01T17:15:18.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doPPPo function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-51248",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-01T17:15:18.513",
"lastModified": "2024-11-01T17:15:18.513",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the modifyrow function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-51252",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-01T18:15:07.287",
"lastModified": "2024-11-01T18:15:07.287",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the restore function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-51431",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-01T17:15:18.620",
"lastModified": "2024-11-01T17:15:18.620",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "LB-LINK BL-WR 1300H v.1.0.4 contains hardcoded credentials stored in /etc/shadow which are easily guessable."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/MatJosephs/CVEs/tree/main/CVE-2024-51431",
"source": "cve@mitre.org"
},
{
"url": "https://www.lb-link.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2024-51483",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-01T17:15:18.750",
"lastModified": "2024-11-01T17:15:18.750",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "changedetection.io is free, open source web page change detection software. Prior to version 0.47.5, when a WebDriver is used to fetch files, `source:file:///etc/passwd` can be used to retrieve local system files, where the more traditional `file:///etc/passwd` gets blocked. Version 0.47.5 fixes the issue."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/dgtlmoon/changedetection.io/blob/master/changedetectionio/model/Watch.py#L19",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/dgtlmoon/changedetection.io/blob/master/changedetectionio/processors/__init__.py#L35",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-cwgg-57xj-g77r",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/user-attachments/files/17591630/CL-ChangeDetection.io.Path.Travsersal-311024-181039.pdf",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-51492",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-01T17:15:18.930",
"lastModified": "2024-11-01T17:15:18.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zusam is a free and open-source way to self-host private forums. Prior to version 0.5.6, specially crafted SVG files uploaded to the service as images allow for unrestricted script execution on (raw) image load. With certain payloads, theft of the target user\u2019s long-lived session token is possible. Note that Zusam, at the time of writing, uses a user\u2019s static API key as a long-lived session token, and these terms can be used interchangeably on the platform. This session token/API key remains valid indefinitely, so long as the user doesn\u2019t expressly request a new one via their Settings page. Version 0.5.6 fixes the cross-site scripting vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/zusam/zusam/commit/5930fdf86fa4abed01f0b345c8ec3c443656db9a",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zusam/zusam/releases/tag/0.5.6",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zusam/zusam/security/advisories/GHSA-96fx-5rqv-jfxh",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9219",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-19T04:15:05.560",
"lastModified": "2024-10-21T17:10:22.857",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T17:30:52.750",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -51,22 +61,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:maxfoundry:social_share_buttons:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.19",
"matchCriteriaId": "7EB2670F-7E4A-4343-9C47-EE4026FFE112"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/share-button/tags/1.19/admin/page_editor.php#L60",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3171315/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/tags/1.19/share-button/trunk/admin/page_editor.php#L78",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b19aa8ca-0ce8-4a9a-8f71-7d7e67e8f99b?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-9264",
"sourceIdentifier": "security@grafana.com",
"published": "2024-10-18T04:15:04.723",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T18:14:31.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions."
},
{
"lang": "es",
"value": "La caracter\u00edstica experimental SQL Expressions de Grafana permite la evaluaci\u00f3n de consultas `duckdb` que contienen informaci\u00f3n del usuario. Estas consultas no se desinfectan lo suficiente antes de pasarlas a `duckdb`, lo que genera una vulnerabilidad de inyecci\u00f3n de comandos e inclusi\u00f3n de archivos locales. Cualquier usuario con el permiso VIEWER o superior puede ejecutar este ataque. El binario `duckdb` debe estar presente en $PATH de Grafana para que este ataque funcione; de manera predeterminada, este binario no est\u00e1 instalado en las distribuciones de Grafana."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@grafana.com",
"type": "Secondary",
@ -80,6 +104,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
},
{
"source": "security@grafana.com",
"type": "Secondary",
@ -91,10 +125,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:grafana:grafana:11.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "876CCACF-B9AF-4358-AB56-58C86303B463"
}
]
}
]
}
],
"references": [
{
"url": "https://grafana.com/security/security-advisories/cve-2024-9264/",
"source": "security@grafana.com"
"source": "security@grafana.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-9361",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-18T05:15:06.287",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-01T18:46:32.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Bulk images optimizer: Resize, optimize, convert to webp, rename \u2026 plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'save_configuration' function in all versions up to, and including, 2.0.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update plugin options."
},
{
"lang": "es",
"value": "El complemento Bulk images optimizer: Resize, optimize, convert to webp, rename \u2026 para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de comprobaci\u00f3n de capacidad en la funci\u00f3n 'save_configuration' en todas las versiones hasta la 2.0.1 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen las opciones del complemento."
}
],
"metrics": {
@ -36,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -47,14 +61,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:giuliopanda:bulk_images_optimizer:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.0.1",
"matchCriteriaId": "6530D07C-30F8-48C2-A7E8-1C251A59F4C5"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/bulk-image-resizer/trunk/includes/class-bir-loader.php#L44",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a189e436-e8af-4379-aa6e-2d1a4a2d4bfa?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

102
README.md
View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-01T17:00:20.026664+00:00
2024-11-01T19:00:20.683979+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-01T16:52:49.817000+00:00
2024-11-01T18:56:50.637000+00:00
```
### Last Data Feed Release
@ -33,69 +33,61 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
267987
268004
```
### CVEs added in the last Commit
Recently added CVEs: `182`
Recently added CVEs: `17`
- [CVE-2024-44020](CVE-2024/CVE-2024-440xx/CVE-2024-44020.json) (`2024-11-01T15:15:52.483`)
- [CVE-2024-44021](CVE-2024/CVE-2024-440xx/CVE-2024-44021.json) (`2024-11-01T15:15:52.697`)
- [CVE-2024-44031](CVE-2024/CVE-2024-440xx/CVE-2024-44031.json) (`2024-11-01T15:15:52.897`)
- [CVE-2024-44038](CVE-2024/CVE-2024-440xx/CVE-2024-44038.json) (`2024-11-01T15:15:53.113`)
- [CVE-2024-44052](CVE-2024/CVE-2024-440xx/CVE-2024-44052.json) (`2024-11-01T15:15:53.333`)
- [CVE-2024-47302](CVE-2024/CVE-2024-473xx/CVE-2024-47302.json) (`2024-11-01T15:15:53.547`)
- [CVE-2024-47308](CVE-2024/CVE-2024-473xx/CVE-2024-47308.json) (`2024-11-01T15:15:53.743`)
- [CVE-2024-47311](CVE-2024/CVE-2024-473xx/CVE-2024-47311.json) (`2024-11-01T15:15:53.960`)
- [CVE-2024-47314](CVE-2024/CVE-2024-473xx/CVE-2024-47314.json) (`2024-11-01T15:15:54.170`)
- [CVE-2024-47317](CVE-2024/CVE-2024-473xx/CVE-2024-47317.json) (`2024-11-01T15:15:54.400`)
- [CVE-2024-47318](CVE-2024/CVE-2024-473xx/CVE-2024-47318.json) (`2024-11-01T15:15:54.617`)
- [CVE-2024-47321](CVE-2024/CVE-2024-473xx/CVE-2024-47321.json) (`2024-11-01T15:15:54.840`)
- [CVE-2024-47358](CVE-2024/CVE-2024-473xx/CVE-2024-47358.json) (`2024-11-01T15:15:55.043`)
- [CVE-2024-47359](CVE-2024/CVE-2024-473xx/CVE-2024-47359.json) (`2024-11-01T15:15:55.270`)
- [CVE-2024-47361](CVE-2024/CVE-2024-473xx/CVE-2024-47361.json) (`2024-11-01T15:15:55.490`)
- [CVE-2024-47362](CVE-2024/CVE-2024-473xx/CVE-2024-47362.json) (`2024-11-01T15:15:55.697`)
- [CVE-2024-48039](CVE-2024/CVE-2024-480xx/CVE-2024-48039.json) (`2024-11-01T15:15:55.933`)
- [CVE-2024-48044](CVE-2024/CVE-2024-480xx/CVE-2024-48044.json) (`2024-11-01T15:15:56.143`)
- [CVE-2024-48045](CVE-2024/CVE-2024-480xx/CVE-2024-48045.json) (`2024-11-01T15:15:56.343`)
- [CVE-2024-48289](CVE-2024/CVE-2024-482xx/CVE-2024-48289.json) (`2024-11-01T15:15:56.560`)
- [CVE-2024-49256](CVE-2024/CVE-2024-492xx/CVE-2024-49256.json) (`2024-11-01T15:15:56.650`)
- [CVE-2024-51377](CVE-2024/CVE-2024-513xx/CVE-2024-51377.json) (`2024-11-01T16:15:09.400`)
- [CVE-2024-51398](CVE-2024/CVE-2024-513xx/CVE-2024-51398.json) (`2024-11-01T16:15:09.500`)
- [CVE-2024-51399](CVE-2024/CVE-2024-513xx/CVE-2024-51399.json) (`2024-11-01T16:15:09.597`)
- [CVE-2024-51432](CVE-2024/CVE-2024-514xx/CVE-2024-51432.json) (`2024-11-01T16:15:09.697`)
- [CVE-2024-41738](CVE-2024/CVE-2024-417xx/CVE-2024-41738.json) (`2024-11-01T17:15:16.033`)
- [CVE-2024-41741](CVE-2024/CVE-2024-417xx/CVE-2024-41741.json) (`2024-11-01T17:15:16.320`)
- [CVE-2024-41744](CVE-2024/CVE-2024-417xx/CVE-2024-41744.json) (`2024-11-01T17:15:16.567`)
- [CVE-2024-41745](CVE-2024/CVE-2024-417xx/CVE-2024-41745.json) (`2024-11-01T17:15:16.800`)
- [CVE-2024-48217](CVE-2024/CVE-2024-482xx/CVE-2024-48217.json) (`2024-11-01T17:15:17.313`)
- [CVE-2024-48352](CVE-2024/CVE-2024-483xx/CVE-2024-48352.json) (`2024-11-01T17:15:17.450`)
- [CVE-2024-48353](CVE-2024/CVE-2024-483xx/CVE-2024-48353.json) (`2024-11-01T18:15:07.153`)
- [CVE-2024-48410](CVE-2024/CVE-2024-484xx/CVE-2024-48410.json) (`2024-11-01T17:15:17.580`)
- [CVE-2024-49770](CVE-2024/CVE-2024-497xx/CVE-2024-49770.json) (`2024-11-01T17:15:17.710`)
- [CVE-2024-51244](CVE-2024/CVE-2024-512xx/CVE-2024-51244.json) (`2024-11-01T17:15:18.093`)
- [CVE-2024-51245](CVE-2024/CVE-2024-512xx/CVE-2024-51245.json) (`2024-11-01T17:15:18.237`)
- [CVE-2024-51247](CVE-2024/CVE-2024-512xx/CVE-2024-51247.json) (`2024-11-01T17:15:18.380`)
- [CVE-2024-51248](CVE-2024/CVE-2024-512xx/CVE-2024-51248.json) (`2024-11-01T17:15:18.513`)
- [CVE-2024-51252](CVE-2024/CVE-2024-512xx/CVE-2024-51252.json) (`2024-11-01T18:15:07.287`)
- [CVE-2024-51431](CVE-2024/CVE-2024-514xx/CVE-2024-51431.json) (`2024-11-01T17:15:18.620`)
- [CVE-2024-51483](CVE-2024/CVE-2024-514xx/CVE-2024-51483.json) (`2024-11-01T17:15:18.750`)
- [CVE-2024-51492](CVE-2024/CVE-2024-514xx/CVE-2024-51492.json) (`2024-11-01T17:15:18.930`)
### CVEs modified in the last Commit
Recently modified CVEs: `115`
Recently modified CVEs: `47`
- [CVE-2024-51065](CVE-2024/CVE-2024-510xx/CVE-2024-51065.json) (`2024-11-01T16:35:29.133`)
- [CVE-2024-7991](CVE-2024/CVE-2024-79xx/CVE-2024-7991.json) (`2024-11-01T16:26:17.797`)
- [CVE-2024-7992](CVE-2024/CVE-2024-79xx/CVE-2024-7992.json) (`2024-11-01T16:26:35.113`)
- [CVE-2024-8037](CVE-2024/CVE-2024-80xx/CVE-2024-8037.json) (`2024-11-01T16:35:30.200`)
- [CVE-2024-8588](CVE-2024/CVE-2024-85xx/CVE-2024-8588.json) (`2024-11-01T16:16:19.727`)
- [CVE-2024-8589](CVE-2024/CVE-2024-85xx/CVE-2024-8589.json) (`2024-11-01T16:18:36.457`)
- [CVE-2024-8590](CVE-2024/CVE-2024-85xx/CVE-2024-8590.json) (`2024-11-01T16:18:26.187`)
- [CVE-2024-8591](CVE-2024/CVE-2024-85xx/CVE-2024-8591.json) (`2024-11-01T16:18:22.553`)
- [CVE-2024-8592](CVE-2024/CVE-2024-85xx/CVE-2024-8592.json) (`2024-11-01T16:22:30.597`)
- [CVE-2024-8593](CVE-2024/CVE-2024-85xx/CVE-2024-8593.json) (`2024-11-01T16:18:15.993`)
- [CVE-2024-8594](CVE-2024/CVE-2024-85xx/CVE-2024-8594.json) (`2024-11-01T16:18:11.973`)
- [CVE-2024-8595](CVE-2024/CVE-2024-85xx/CVE-2024-8595.json) (`2024-11-01T16:18:06.317`)
- [CVE-2024-8596](CVE-2024/CVE-2024-85xx/CVE-2024-8596.json) (`2024-11-01T16:17:58.827`)
- [CVE-2024-8597](CVE-2024/CVE-2024-85xx/CVE-2024-8597.json) (`2024-11-01T16:17:52.607`)
- [CVE-2024-8598](CVE-2024/CVE-2024-85xx/CVE-2024-8598.json) (`2024-11-01T16:17:43.263`)
- [CVE-2024-8599](CVE-2024/CVE-2024-85xx/CVE-2024-8599.json) (`2024-11-01T16:17:25.073`)
- [CVE-2024-8600](CVE-2024/CVE-2024-86xx/CVE-2024-8600.json) (`2024-11-01T16:17:19.680`)
- [CVE-2024-8896](CVE-2024/CVE-2024-88xx/CVE-2024-8896.json) (`2024-11-01T16:27:16.693`)
- [CVE-2024-9489](CVE-2024/CVE-2024-94xx/CVE-2024-9489.json) (`2024-11-01T16:27:25.937`)
- [CVE-2024-9826](CVE-2024/CVE-2024-98xx/CVE-2024-9826.json) (`2024-11-01T16:17:10.620`)
- [CVE-2024-9827](CVE-2024/CVE-2024-98xx/CVE-2024-9827.json) (`2024-11-01T16:17:07.187`)
- [CVE-2024-9889](CVE-2024/CVE-2024-98xx/CVE-2024-9889.json) (`2024-11-01T15:27:23.777`)
- [CVE-2024-9897](CVE-2024/CVE-2024-98xx/CVE-2024-9897.json) (`2024-11-01T15:27:56.797`)
- [CVE-2024-9996](CVE-2024/CVE-2024-99xx/CVE-2024-9996.json) (`2024-11-01T16:27:30.387`)
- [CVE-2024-9997](CVE-2024/CVE-2024-99xx/CVE-2024-9997.json) (`2024-11-01T16:27:34.960`)
- [CVE-2024-20473](CVE-2024/CVE-2024-204xx/CVE-2024-20473.json) (`2024-11-01T18:09:35.813`)
- [CVE-2024-20474](CVE-2024/CVE-2024-204xx/CVE-2024-20474.json) (`2024-11-01T18:14:56.790`)
- [CVE-2024-21536](CVE-2024/CVE-2024-215xx/CVE-2024-21536.json) (`2024-11-01T18:03:15.897`)
- [CVE-2024-26280](CVE-2024/CVE-2024-262xx/CVE-2024-26280.json) (`2024-11-01T18:35:03.183`)
- [CVE-2024-26880](CVE-2024/CVE-2024-268xx/CVE-2024-26880.json) (`2024-11-01T18:35:03.417`)
- [CVE-2024-27058](CVE-2024/CVE-2024-270xx/CVE-2024-27058.json) (`2024-11-01T17:35:04.547`)
- [CVE-2024-31837](CVE-2024/CVE-2024-318xx/CVE-2024-31837.json) (`2024-11-01T17:35:04.770`)
- [CVE-2024-33270](CVE-2024/CVE-2024-332xx/CVE-2024-33270.json) (`2024-11-01T17:35:05.610`)
- [CVE-2024-33866](CVE-2024/CVE-2024-338xx/CVE-2024-33866.json) (`2024-11-01T18:35:03.990`)
- [CVE-2024-35552](CVE-2024/CVE-2024-355xx/CVE-2024-35552.json) (`2024-11-01T18:35:04.837`)
- [CVE-2024-39459](CVE-2024/CVE-2024-394xx/CVE-2024-39459.json) (`2024-11-01T17:35:06.707`)
- [CVE-2024-43684](CVE-2024/CVE-2024-436xx/CVE-2024-43684.json) (`2024-11-01T17:15:17.127`)
- [CVE-2024-46911](CVE-2024/CVE-2024-469xx/CVE-2024-46911.json) (`2024-11-01T17:35:07.877`)
- [CVE-2024-49661](CVE-2024/CVE-2024-496xx/CVE-2024-49661.json) (`2024-11-01T18:56:50.637`)
- [CVE-2024-49662](CVE-2024/CVE-2024-496xx/CVE-2024-49662.json) (`2024-11-01T18:56:19.253`)
- [CVE-2024-49663](CVE-2024/CVE-2024-496xx/CVE-2024-49663.json) (`2024-11-01T18:55:51.143`)
- [CVE-2024-49664](CVE-2024/CVE-2024-496xx/CVE-2024-49664.json) (`2024-11-01T18:55:20.817`)
- [CVE-2024-49665](CVE-2024/CVE-2024-496xx/CVE-2024-49665.json) (`2024-11-01T18:55:01.773`)
- [CVE-2024-49667](CVE-2024/CVE-2024-496xx/CVE-2024-49667.json) (`2024-11-01T18:48:48.797`)
- [CVE-2024-49973](CVE-2024/CVE-2024-499xx/CVE-2024-49973.json) (`2024-11-01T17:11:23.070`)
- [CVE-2024-51060](CVE-2024/CVE-2024-510xx/CVE-2024-51060.json) (`2024-11-01T17:35:08.443`)
- [CVE-2024-51063](CVE-2024/CVE-2024-510xx/CVE-2024-51063.json) (`2024-11-01T17:35:09.657`)
- [CVE-2024-9219](CVE-2024/CVE-2024-92xx/CVE-2024-9219.json) (`2024-11-01T17:30:52.750`)
- [CVE-2024-9264](CVE-2024/CVE-2024-92xx/CVE-2024-9264.json) (`2024-11-01T18:14:31.377`)
- [CVE-2024-9361](CVE-2024/CVE-2024-93xx/CVE-2024-9361.json) (`2024-11-01T18:46:32.783`)
## Download and Usage

File diff suppressed because it is too large Load Diff