Auto-Update: 2024-07-11T14:00:19.780454+00:00

This commit is contained in:
cad-safe-bot 2024-07-11 14:03:13 +00:00
parent 7d87ce4107
commit 8f68afb969
255 changed files with 1975 additions and 780 deletions

View File

@ -2,13 +2,17 @@
"id": "CVE-2016-15039",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-11T03:15:02.270",
"lastModified": "2024-07-11T03:15:02.270",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in mhuertos phpLDAPadmin up to 665dbc2690ebeb5392d38f1fece0a654225a0b38. Affected by this vulnerability is the function makeHttpRequest of the file htdocs/js/ajax_functions.js. The manipulation leads to http request smuggling. The attack can be launched remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named dd6e9583a2eb2ca085583765e8a63df5904cb036. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-270523."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en mhuertos phpLDAPadmin hasta 665dbc2690ebeb5392d38f1fece0a654225a0b38 y clasificada como cr\u00edtica. La funci\u00f3n makeHttpRequest del archivo htdocs/js/ajax_functions.js es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce al contrabando de solicitudes http. El ataque se puede lanzar de forma remota. Este producto no utiliza versiones. Esta es la raz\u00f3n por la que la informaci\u00f3n sobre las versiones afectadas y no afectadas no est\u00e1 disponible. El parche se llama dd6e9583a2eb2ca085583765e8a63df5904cb036. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-270523."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-21113",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:10.717",
"lastModified": "2024-07-09T21:15:10.717",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple locations, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En m\u00faltiples ubicaciones, existe una posible omisi\u00f3n de permiso debido a un agente confundido. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-21114",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:10.803",
"lastModified": "2024-07-09T21:15:10.803",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple locations, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En m\u00faltiples ubicaciones, existe una posible omisi\u00f3n de permiso debido a un agente confundido. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-32467",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-07-10T03:15:01.870",
"lastModified": "2024-07-10T03:15:01.870",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Edge Gateway BIOS, versions 3200 and 5200, contains an out-of-bounds write vulnerability. A local authenticated malicious user with high privileges could potentially exploit this vulnerability leading to exposure of some UEFI code, leading to arbitrary code execution or escalation of privilege."
},
{
"lang": "es",
"value": "El BIOS de Dell Edge Gateway, versiones 3200 y 5200, contiene una vulnerabilidad de escritura fuera de los l\u00edmites. Un usuario malicioso local autenticado con altos privilegios podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la exposici\u00f3n de alg\u00fan c\u00f3digo UEFI, lo que provocar\u00eda la ejecuci\u00f3n de c\u00f3digo arbitrario o una escalada de privilegios."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-32472",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-07-10T03:15:02.193",
"lastModified": "2024-07-10T03:15:02.193",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Edge Gateway BIOS, versions 3200 and 5200, contains an out-of-bounds write vulnerability. A local authenticated malicious user with high privileges could potentially exploit this vulnerability leading to exposure of some code in System Management Mode, leading to arbitrary code execution or escalation of privilege."
},
{
"lang": "es",
"value": "El BIOS de Dell Edge Gateway, versiones 3200 y 5200, contiene una vulnerabilidad de escritura fuera de los l\u00edmites. Un usuario malintencionado local autenticado con altos privilegios podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la exposici\u00f3n de parte del c\u00f3digo en el modo de administraci\u00f3n del sistema, lo que provocar\u00eda la ejecuci\u00f3n de c\u00f3digo arbitrario o una escalada de privilegios."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-33859",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-07-10T16:15:02.823",
"lastModified": "2024-07-10T16:15:02.823",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security QRadar EDR 3.12 could disclose sensitive information due to an observable login response discrepancy. IBM X-Force ID: 257697."
},
{
"lang": "es",
"value": "IBM Security QRadar EDR 3.12 podr\u00eda revelar informaci\u00f3n confidencial debido a una discrepancia observable en la respuesta de inicio de sesi\u00f3n. ID de IBM X-Force: 257697."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-33860",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-07-10T16:15:03.060",
"lastModified": "2024-07-10T16:15:03.060",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security QRadar EDR 3.12 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 257702."
},
{
"lang": "es",
"value": "IBM Security QRadar EDR 3.12 no establece el atributo seguro en tokens de autorizaci\u00f3n o cookies de sesi\u00f3n. Los atacantes pueden obtener los valores de las cookies enviando un enlace http:// a un usuario o colocando este enlace en un sitio al que accede el usuario. La cookie se enviar\u00e1 al enlace inseguro y el atacante podr\u00e1 obtener el valor de la cookie espiando el tr\u00e1fico. ID de IBM X-Force: 257702."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-35006",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-07-10T16:15:03.300",
"lastModified": "2024-07-10T16:15:03.300",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security QRadar EDR 3.12 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 297165."
},
{
"lang": "es",
"value": "IBM Security QRadar EDR 3.12 es vulnerable a la inyecci\u00f3n de HTML. Un atacante remoto podr\u00eda inyectar c\u00f3digo HTML malicioso que, una vez visto, se ejecutar\u00eda en el navegador web de la v\u00edctima dentro del contexto de seguridad del sitio de alojamiento. ID de IBM X-Force: 297165."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-50805",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T19:15:10.590",
"lastModified": "2024-07-09T19:15:10.590",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in Samsung Mobile Processor, Wearable Processor, and Modems with versions Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300 that allows an out-of-bounds write in the heap in 2G (no auth)."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad en el procesador m\u00f3vil, procesador port\u00e1til y m\u00f3dems de Samsung con versiones Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300 que permite una escritura fuera de los l\u00edmites en el mont\u00f3n en 2G (sin autenticaci\u00f3n)."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-50806",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T19:15:10.820",
"lastModified": "2024-07-09T19:15:10.820",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in Samsung Mobile Processor, Wearable Processor, and Modems with versions Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850 Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380 Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300 that allows out-of-bounds access to a heap buffer in the SIM Proactive Command."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad en el procesador m\u00f3vil, procesador port\u00e1til y m\u00f3dems de Samsung con versiones Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850 Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380 Exynos 1330, Exynos 9110 , Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300 que permite el acceso fuera de los l\u00edmites a un bufer de mont\u00f3n en el comando proactivo SIM."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-50807",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T19:15:11.020",
"lastModified": "2024-07-09T19:15:11.020",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in Samsung Wearable Processor and Modems with versions Exynos 9110, Exynos Modem 5123, Exynos Modem 5300 that allows an out-of-bounds write in the heap in 2G (no auth)."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad en los procesadores y m\u00f3dems port\u00e1tiles Samsung con versiones Exynos 9110, Exynos Modem 5123, Exynos Modem 5300 que permite una escritura fuera de los l\u00edmites en el mont\u00f3n en 2G (sin autenticaci\u00f3n)."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-6813",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-10T08:15:10.760",
"lastModified": "2024-07-10T08:15:10.760",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Login by Auth0 plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018wle\u2019 parameter in all versions up to, and including, 4.6.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento Login by Auth0 para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'wle' en todas las versiones hasta la 4.6.0 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-7061",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-10T02:15:02.740",
"lastModified": "2024-07-10T02:15:02.740",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Advanced File Manager Shortcodes plugin for WordPress is vulnerable to arbitrary file uploads in all versions up to, and including, 2.5.3. This makes it possible for authenticated attackers with contributor access or above to upload arbitrary files on the affected site's server which may make remote code execution possible."
},
{
"lang": "es",
"value": "El complemento Advanced File Manager Shortcodes para WordPress es vulnerable a la carga de archivos arbitrarios en todas las versiones hasta la 2.5.3 incluida. Esto hace posible que atacantes autenticados con acceso de colaborador o superior carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-7062",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-10T02:15:02.960",
"lastModified": "2024-07-10T02:15:02.960",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Advanced File Manager Shortcodes plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.4. This makes it possible for attackers with contributor access or higher to read the contents of arbitrary files on the server, which can contain sensitive information."
},
{
"lang": "es",
"value": "El complemento Advanced File Manager Shortcodes para WordPress es vulnerable a Directory Traversal en todas las versiones hasta la 2.4 incluida. Esto hace posible que los atacantes con acceso de colaborador o superior lean el contenido de archivos arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-0619",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-11T04:15:03.247",
"lastModified": "2024-07-11T04:15:03.247",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Payflex Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the payment_callback() function in all versions up to, and including, 2.5.0. This makes it possible for unauthenticated attackers to update the status of orders, which can potentially lead to revenue loss."
},
{
"lang": "es",
"value": "El complemento Payflex Payment Gateway para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n Payment_callback() en todas las versiones hasta la 2.5.0 incluida. Esto hace posible que atacantes no autenticados actualicen el estado de los pedidos, lo que potencialmente puede provocar una p\u00e9rdida de ingresos."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-1845",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-11T06:15:02.613",
"lastModified": "2024-07-11T06:15:02.613",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The VikRentCar Car Rental Management System WordPress plugin before 1.3.2 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks"
},
{
"lang": "es",
"value": " El complemento VikRentCar Car Rental Management System de WordPress anterior a 1.3.2 no tiene controles CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios registrados realicen acciones no deseadas a trav\u00e9s de ataques CSRF."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20456",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-07-10T16:15:03.703",
"lastModified": "2024-07-10T16:15:03.703",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker with high privileges to bypass the Cisco Secure Boot functionality and load unverified software on an affected device. To exploit this successfully, the attacker must have root-system privileges on the affected device.\r\n\r This vulnerability is due to an error in the software build process. An attacker could exploit this vulnerability by manipulating the system’s configuration options to bypass some of the integrity checks that are performed during the booting process. A successful exploit could allow the attacker to control the boot configuration, which could enable them to bypass of the requirement to run Cisco signed images or alter the security properties of the running system."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el proceso de arranque del software Cisco IOS XR podr\u00eda permitir que un atacante local autenticado con altos privilegios omita la funcionalidad de arranque seguro de Cisco y cargue software no verificado en un dispositivo afectado. Para aprovechar esto con \u00e9xito, el atacante debe tener privilegios de system root en el dispositivo afectado. Esta vulnerabilidad se debe a un error en el proceso de compilaci\u00f3n del software. Un atacante podr\u00eda aprovechar esta vulnerabilidad manipulando las opciones de configuraci\u00f3n del sistema para omitir algunas de las comprobaciones de integridad que se realizan durante el proceso de arranque. Un exploit exitoso podr\u00eda permitir al atacante controlar la configuraci\u00f3n de arranque, lo que podr\u00eda permitirle eludir el requisito de ejecutar im\u00e1genes firmadas de Cisco o alterar las propiedades de seguridad del sistema en ejecuci\u00f3n."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20781",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-07-09T20:15:09.290",
"lastModified": "2024-07-09T20:15:09.290",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InDesign Desktop versions ID19.3, ID18.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
},
{
"lang": "es",
"value": "Las versiones ID19.3, ID18.5.2 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20782",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-07-09T20:15:09.510",
"lastModified": "2024-07-09T20:15:09.510",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InDesign Desktop versions ID19.3, ID18.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
},
{
"lang": "es",
"value": "Las versiones ID19.3, ID18.5.2 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20783",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-07-09T20:15:09.727",
"lastModified": "2024-07-09T20:15:09.727",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InDesign Desktop versions ID19.3, ID18.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
},
{
"lang": "es",
"value": "Las versiones ID19.3, ID18.5.2 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20785",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-07-09T20:15:09.943",
"lastModified": "2024-07-09T20:15:09.943",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InDesign Desktop versions ID19.3, ID18.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
},
{
"lang": "es",
"value": "Las versiones ID19.3, ID18.5.2 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21417",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-10T00:15:03.027",
"lastModified": "2024-07-10T00:15:03.027",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Text Services Framework Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Text Services Framework"
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21521",
"sourceIdentifier": "report@snyk.io",
"published": "2024-07-10T05:15:10.653",
"lastModified": "2024-07-10T05:15:10.653",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of the package @discordjs/opus are vulnerable to Denial of Service (DoS) due to providing an input object with a property toString to several different functions. Exploiting this vulnerability could lead to a system crash."
},
{
"lang": "es",
"value": "Todas las versiones del paquete @discordjs/opus son vulnerables a la Denegaci\u00f3n de Servicio (DoS) debido a que proporcionan un objeto de entrada con una propiedad toString para varias funciones diferentes. La explotaci\u00f3n de esta vulnerabilidad podr\u00eda provocar una ca\u00edda del sistema."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21522",
"sourceIdentifier": "report@snyk.io",
"published": "2024-07-10T05:15:10.953",
"lastModified": "2024-07-10T05:15:10.953",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of the package audify are vulnerable to Improper Validation of Array Index when frameSize is provided to the new OpusDecoder().decode or new OpusDecoder().decodeFloat functions it is not checked for negative values. This can lead to a process crash."
},
{
"lang": "es",
"value": "Todas las versiones del paquete audify son vulnerables a una validaci\u00f3n inadecuada del \u00edndice de matriz cuando se proporciona frameSize a las nuevas funciones OpusDecoder().decode o OpusDecoder().decodeFloat y no se verifican los valores negativos. Esto puede provocar un fallo del proceso."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21523",
"sourceIdentifier": "report@snyk.io",
"published": "2024-07-10T05:15:11.153",
"lastModified": "2024-07-10T05:15:11.153",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of the package images are vulnerable to Denial of Service (DoS) due to providing unexpected input types to several different functions. This makes it possible to reach an assert macro, leading to a process crash.\r\r**Note:**\rBy providing some specific integer values (like 0) to the size function, it is possible to obtain a Segmentation fault error, leading to the process crash."
},
{
"lang": "es",
"value": "Todas las versiones del paquete images son vulnerables a la denegaci\u00f3n de servicio (DoS) debido a que proporcionan tipo is de entradanesperados para varias funciones diferentes. Esto hace posible alcanzar una macro de afirmaci\u00f3n, lo que provoca un fallo del proceso. **Nota:** Al proporcionar algunos valores enteros espec\u00edficos (como 0) a la funci\u00f3n de tama\u00f1o, es posible obtener un error de fallo de segmentaci\u00f3n, lo que provoca el fallo del proceso."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21524",
"sourceIdentifier": "report@snyk.io",
"published": "2024-07-10T05:15:11.340",
"lastModified": "2024-07-10T05:15:11.340",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of the package node-stringbuilder are vulnerable to Out-of-bounds Read due to incorrect memory length calculation, by calling ToBuffer, ToString, or CharAt on a StringBuilder object with a non-empty string value input. It's possible to return previously allocated memory, for example, by providing negative indexes, leading to an Information Disclosure."
},
{
"lang": "es",
"value": "Todas las versiones del paquete node-stringbuilder son vulnerables a lecturas fuera de los l\u00edmites debido a un c\u00e1lculo incorrecto de la longitud de la memoria, al llamar a ToBuffer, ToString o CharAt en un objeto StringBuilder con una entrada de valor de cadena no vac\u00eda. Es posible devolver memoria previamente asignada, por ejemplo, proporcionando \u00edndices negativos, lo que lleva a una divulgaci\u00f3n de informaci\u00f3n."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21525",
"sourceIdentifier": "report@snyk.io",
"published": "2024-07-10T05:15:11.530",
"lastModified": "2024-07-10T05:15:11.530",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of the package node-twain are vulnerable to Improper Check or Handling of Exceptional Conditions due to the length of the source data not being checked. Creating a new twain.TwainSDK with a productName or productFamily, manufacturer, version.info property of length >= 34 chars leads to a buffer overflow vulnerability."
},
{
"lang": "es",
"value": "Todas las versiones del paquete node-twain son vulnerables a una verificaci\u00f3n inadecuada o al manejo de condiciones excepcionales debido a la longitud de los datos de origen que no se verifican. La creaci\u00f3n de un nuevo twain.TwainSDK con una propiedad productName o productFamily, manufacturer, version.info de longitud >= 34 caracteres conduce a una vulnerabilidad de desbordamiento del b\u00fafer."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21526",
"sourceIdentifier": "report@snyk.io",
"published": "2024-07-10T05:15:11.733",
"lastModified": "2024-07-10T05:15:11.733",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of the package speaker are vulnerable to Denial of Service (DoS) when providing unexpected input types to the channels property of the Speaker object makes it possible to reach an assert macro. Exploiting this vulnerability can lead to a process crash."
},
{
"lang": "es",
"value": "Todas las versiones del paquete Speaker son vulnerables a la denegaci\u00f3n de servicio (DoS) cuando se proporcionan tipos de entrada inesperados a la propiedad de canales del objeto Speaker hace posible alcanzar una macro de afirmaci\u00f3n. La explotaci\u00f3n de esta vulnerabilidad puede provocar un fallo del proceso."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21832",
"sourceIdentifier": "responsible-disclosure@pingidentity.com",
"published": "2024-07-09T23:15:10.397",
"lastModified": "2024-07-09T23:15:10.397",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A potential JSON injection attack vector exists in PingFederate REST API data stores using the POST method and a JSON request body."
},
{
"lang": "es",
"value": "Existe un posible vector de ataque de inyecci\u00f3n JSON en los almacenes de datos de la API REST de PingFederate utilizando el m\u00e9todo POST y un cuerpo de solicitud JSON."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21993",
"sourceIdentifier": "security-alert@netapp.com",
"published": "2024-07-09T22:15:01.990",
"lastModified": "2024-07-09T22:15:01.990",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SnapCenter versions prior to 5.0p1 are susceptible to a vulnerability\n which could allow an authenticated attacker to discover plaintext \ncredentials."
},
{
"lang": "es",
"value": "Las versiones de SnapCenter anteriores a la 5.0p1 son susceptibles a una vulnerabilidad que podr\u00eda permitir a un atacante autenticado descubrir credenciales en texto plano."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-22018",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-07-10T02:15:03.160",
"lastModified": "2024-07-10T02:15:03.160",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used.\nThis flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to.\nThis vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad en Node.js que afecta a los usuarios del modelo de permisos experimental cuando se utiliza el indicador --allow-fs-read. Este fallo surge de un modelo de permisos inadecuado que no logra restringir las estad\u00edsticas de archivos a trav\u00e9s de la API fs.lstat. Como resultado, los actores malintencionados pueden recuperar estad\u00edsticas de archivos a los que no tienen acceso de lectura expl\u00edcito. Esta vulnerabilidad afecta a todos los usuarios que utilizan el modelo de permiso experimental en Node.js 20 y Node.js 21. Tenga en cuenta que en el momento en que se emiti\u00f3 este CVE, el modelo de permiso es una caracter\u00edstica experimental de Node.js."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-22280",
"sourceIdentifier": "security@vmware.com",
"published": "2024-07-11T05:15:10.123",
"lastModified": "2024-07-11T05:15:10.123",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VMware Aria Automation does not apply correct input validation which allows for SQL-injection in the product.\u00a0An authenticated malicious user could enter specially crafted SQL queries and perform unauthorised read/write operations in the database."
},
{
"lang": "es",
"value": "VMware Aria Automation no aplica la validaci\u00f3n de entrada correcta que permite la inyecci\u00f3n de SQL en el producto. Un usuario malintencionado autenticado podr\u00eda ingresar consultas SQL especialmente manipuladas y realizar operaciones de lectura/escritura no autorizadas en la base de datos."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-22377",
"sourceIdentifier": "responsible-disclosure@pingidentity.com",
"published": "2024-07-09T23:15:10.620",
"lastModified": "2024-07-09T23:15:10.620",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The deploy directory in PingFederate runtime nodes is reachable to unauthorized users."
},
{
"lang": "es",
"value": "El directorio de implementaci\u00f3n en los nodos de tiempo de ejecuci\u00f3n de PingFederate es accesible para usuarios no autorizados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-22387",
"sourceIdentifier": "disclosures@gallagher.com",
"published": "2024-07-11T03:15:02.660",
"lastModified": "2024-07-11T03:15:02.660",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "External Control of Critical State Data (CWE-642) in the Controller 6000 and Controller 7000 diagnostic web interface allows an authenticated user to modify device I/O connections leading to unexpected behavior that in some circumstances could compromise site physical security controls. Gallagher recommend the diagnostic web page is not enabled (default is off) unless advised by Gallagher Technical support. This interface is intended only for diagnostic purposes.\n\n\n\nThis issue affects:\u00a0Gallagher Controller 6000 and 7000 \n\n9.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1)), 9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3)), 8.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4)),\u00a08.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5)), 8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7)), all versions of 8.60 and prior."
},
{
"lang": "es",
"value": "El control externo de datos de estado cr\u00edtico (CWE-642) en la interfaz web de diagn\u00f3stico del Controlador 6000 y del Controlador 7000 permite a un usuario autenticado modificar las conexiones de E/S del dispositivo, lo que genera un comportamiento inesperado que, en algunas circunstancias, podr\u00eda comprometer los controles de seguridad f\u00edsica del sitio. Gallagher recomienda que la p\u00e1gina web de diagn\u00f3stico no est\u00e9 habilitada (la opci\u00f3n predeterminada est\u00e1 desactivada) a menos que as\u00ed lo indique el soporte t\u00e9cnico de Gallagher. Esta interfaz est\u00e1 destinada \u00fanicamente a fines de diagn\u00f3stico. Este problema afecta a: Gallagher Controller 6000 y 7000 9.10 antes de vCR9.10.240520a (distribuido en 9.10.1268(MR1)), 9.00 antes de vCR9.00.240521a (distribuido en 9.00.1990(MR3)), 8.90 antes de vCR8. 90.240520a (distribuido en 8.90.1947 (MR4)), 8.80 antes de vCR8.80.240520a (distribuido en 8.80.1726 (MR5)), 8.70 antes de vCR8.70.240520a (distribuido en 8.70.2824 (MR7)), todos Versiones de 8.60 y anteriores."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-22477",
"sourceIdentifier": "responsible-disclosure@pingidentity.com",
"published": "2024-07-09T23:15:10.827",
"lastModified": "2024-07-09T23:15:10.827",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting vulnerability exists in the admin console OIDC Policy Management Editor. The impact is contained to admin console users only."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Cross Site Scripting en la consola de administraci\u00f3n de OIDC Policy Management Editor. El impacto est\u00e1 limitado a los usuarios de la consola de administraci\u00f3n \u00fanicamente."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23194",
"sourceIdentifier": "disclosures@gallagher.com",
"published": "2024-07-11T03:15:02.903",
"lastModified": "2024-07-11T03:15:02.903",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper output Neutralization for Logs (CWE-117) in the Command Centre API\u00a0Diagnostics Endpoint could allow an attacker limited ability to modify Command Centre log files. \n\nThis issue affects:\u00a0Gallagher Command Centre v9.10 prior to vEL9.10.1268 (MR1)."
},
{
"lang": "es",
"value": "Una neutralizaci\u00f3n de salida incorrecta para registros (CWE-117) en el endpoint de diagn\u00f3stico de la API del Command Center podr\u00eda permitir que un atacante tenga una capacidad limitada para modificar los archivos de registro del Command Center. Este problema afecta a: Gallagher Command Center v9.10 anterior a vEL9.10.1268 (MR1)."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23317",
"sourceIdentifier": "disclosures@gallagher.com",
"published": "2024-07-11T03:15:03.130",
"lastModified": "2024-07-11T03:15:03.130",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "External Control of File Name or Path (CWE-73) in the Controller 6000 and Controller 7000 allows an attacker with local access to the Controller to perform arbitrary code execution. \n\nThis issue affects:\u00a09.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1)), 9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3)), 8.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4)), 8.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5)), 8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7)), all versions of 8.60 and prior."
},
{
"lang": "es",
"value": "El control externo del nombre o ruta del archivo (CWE-73) en el Controlador 6000 y el Controlador 7000 permite a un atacante con acceso local al Controlador realizar la ejecuci\u00f3n de c\u00f3digo arbitrario. Este problema afecta a: 9.10 anterior a vCR9.10.240520a (distribuido en 9.10.1268(MR1)), 9.00 anterior a vCR9.00.240521a (distribuido en 9.00.1990(MR3)), 8.90 anterior a vCR8.90.240520a (distribuido en 8.90.1947 (MR4)), 8.80 antes de vCR8.80.240520a (distribuido en 8.80.1726 (MR5)), 8.70 antes de vCR8.70.240520a (distribuido en 8.70.2824 (MR7)), todas las versiones de 8.60 y anteriores ."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23485",
"sourceIdentifier": "disclosures@gallagher.com",
"published": "2024-07-11T03:15:03.327",
"lastModified": "2024-07-11T03:15:03.327",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation (CWE-1304) in the Controller 6000 and 7000 can lead to secured door locks connected via Aperio Communication Hubs to momentarily allow free access.\u00a0\n\nThis issue affects:\u00a0Gallagher Controller 6000 and 7000\u00a09.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1)), 9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3)), \u00a08.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4)),\u00a08.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5)), 8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7)), all versions of 8.60 and prior."
},
{
"lang": "es",
"value": "La integridad preservada inadecuadamente del estado de configuraci\u00f3n del hardware durante una operaci\u00f3n de ahorro/restauraci\u00f3n de energ\u00eda (CWE-1304) en el controlador 6000 y 7000 puede provocar que puertas cerradas seguras conectadas a trav\u00e9s de concentradores de comunicaci\u00f3n Aperio permitan moment\u00e1neamente el libre acceso. Este problema afecta a: Gallagher Controller 6000 y 7000 9.10 antes de vCR9.10.240520a (distribuido en 9.10.1268(MR1)), 9.00 antes de vCR9.00.240521a (distribuido en 9.00.1990(MR3)), 8.90 antes de vCR8. 90.240520a (distribuido en 8.90.1947 (MR4)), 8.80 antes de vCR8.80.240520a (distribuido en 8.80.1726 (MR5)), 8.70 antes de vCR8.70.240520a (distribuido en 8.70.2824 (MR7)), todos Versiones de 8.60 y anteriores."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23695",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:11.857",
"lastModified": "2024-07-09T21:15:11.857",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In CacheOpPMRExec of cache_km.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En CacheOpPMRExec de cache_km.c, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de enteros. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23696",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:11.973",
"lastModified": "2024-07-09T21:15:11.973",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In RGXCreateZSBufferKM of rgxta3d.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En RGXCreateZSBufferKM de rgxta3d.c existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a un uso after free. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23697",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:12.047",
"lastModified": "2024-07-09T21:15:12.047",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In RGXCreateHWRTData_aux of rgxta3d.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En RGXCreateHWRTData_aux de rgxta3d.c existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a un uso after free. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23698",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:12.113",
"lastModified": "2024-07-09T21:15:12.113",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In RGXFWChangeOSidPriority of rgxfwutils.c, there is a possible arbitrary code execution due to a missing bounds check. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En RGXFWChangeOSidPriority de rgxfwutils.c, existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a una verificaci\u00f3n de l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23711",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:12.227",
"lastModified": "2024-07-09T21:15:12.227",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In DevmemXIntUnreserveRange of devicemem_server.c, there is a possible arbitrary code execution due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En DevmemXIntUnreserveRange de devicemem_server.c, existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-25023",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-07-10T01:15:09.633",
"lastModified": "2024-07-10T01:15:09.633",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 and IBM QRadar Suite Software 1.10.12.0 through 1.10.22.0 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 281429."
},
{
"lang": "es",
"value": "IBM Cloud Pak for Security 1.10.0.0 a 1.10.11.0 e IBM QRadar Suite Software 1.10.12.0 a 1.10.22.0 almacenan informaci\u00f3n potencialmente confidencial en archivos de registro que un usuario local podr\u00eda leer. ID de IBM X-Force: 281429."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-25076",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-10T20:15:02.933",
"lastModified": "2024-07-10T20:15:02.933",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on Renesas SmartBond DA14691, DA14695, DA14697, and DA14699 devices. The bootrom function responsible for validating the Flash Product Header directly uses a user-controllable size value (Length of Flash Config Section) to control a read from the QSPI device into a fixed sized buffer, resulting in a buffer overflow and execution of arbitrary code."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en los dispositivos Renesas SmartBond DA14691, DA14695, DA14697 y DA14699. La funci\u00f3n bootrom responsable de validar el encabezado del producto Flash utiliza directamente un valor de tama\u00f1o controlable por el usuario (Longitud de la secci\u00f3n de configuraci\u00f3n de Flash) para controlar una lectura desde el dispositivo QSPI en un b\u00fafer de tama\u00f1o fijo, lo que resulta en un desbordamiento del b\u00fafer y la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-25077",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-10T20:15:03.023",
"lastModified": "2024-07-10T20:15:03.023",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on Renesas SmartBond DA14691, DA14695, DA14697, and DA14699 devices. The Nonce used for on-the-fly decryption of flash images is stored in an unsigned header, allowing its value to be modified without invalidating the signature used for secureboot image verification. Because the encryption engine for on-the-fly decryption uses AES in CTR mode without authentication, an attacker-modified Nonce can result in execution of arbitrary code."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en los dispositivos Renesas SmartBond DA14691, DA14695, DA14697 y DA14699. El Nonce utilizado para el descifrado sobre la marcha de im\u00e1genes flash se almacena en un encabezado sin firmar, lo que permite modificar su valor sin invalidar la firma utilizada para la verificaci\u00f3n de im\u00e1genes de arranque seguro. Debido a que el motor de cifrado para el descifrado sobre la marcha utiliza AES en modo CTR sin autenticaci\u00f3n, un Nonce modificado por un atacante puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-2602",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-07-11T09:15:03.030",
"lastModified": "2024-07-11T09:15:03.030",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path\nTraversal') vulnerability exists that could result in remote code execution when an authenticated\nuser executes a saved project file that has been tampered by a malicious actor."
},
{
"lang": "es",
"value": "CWE-22: Existe una vulnerabilidad de limitaci\u00f3n inadecuada de un nombre de ruta a un directorio restringido (\"Path Traversal\") que podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo cuando un usuario autenticado ejecuta un archivo de proyecto guardado que ha sido manipulado por un actor malintencionado."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-27090",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-10T19:15:10.133",
"lastModified": "2024-07-10T19:15:10.133",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Decidim is a participatory democracy framework, written in Ruby on Rails, originally developed for the Barcelona City government online and offline participation website. If an attacker can infer the slug or URL of an unpublished or private resource, and this resource can be embbeded (such as a Participatory Process, an Assembly, a Proposal, a Result, etc), then some data of this resource could be accessed. This vulnerability is fixed in 0.27.6."
},
{
"lang": "es",
"value": "Decidim es un framework de democracia participativa, escrito en Ruby on Rails, desarrollado originalmente para el sitio web de participaci\u00f3n en l\u00ednea y fuera de l\u00ednea del gobierno de la ciudad de Barcelona. Si un atacante puede inferir el slug o la URL de un recurso privado o no publicado, y este recurso puede estar incrustado (como un proceso participativo, una asamblea, una propuesta, un resultado, etc.), entonces se podr\u00eda acceder a algunos datos de este recurso. . Esta vulnerabilidad se solucion\u00f3 en 0.27.6."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-27095",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-10T19:15:10.407",
"lastModified": "2024-07-10T19:15:10.407",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Decidim is a participatory democracy framework. The admin panel is subject to potential XSS attach in case the attacker manages to modify some records being uploaded to the server. This vulnerability is fixed in 0.27.6 and 0.28.1."
},
{
"lang": "es",
"value": "Decidim es un framework de democracia participativa. El panel de administraci\u00f3n est\u00e1 sujeto a un posible adjunto XSS en caso de que el atacante logre modificar algunos registros que se cargan en el servidor. Esta vulnerabilidad se solucion\u00f3 en 0.27.6 y 0.28.1."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-27361",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T20:15:10.167",
"lastModified": "2024-07-09T20:15:10.167",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in Samsung Mobile Processor Exynos 980, Exynos 990, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, and Exynos 2400 that involves a time-of-check to time-of-use (TOCTOU) race condition, which can lead to a Denial of Service."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad en los procesadores m\u00f3viles Samsung Exynos 980, Exynos 990, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380 y Exynos 2400 que involucra condici\u00f3n de ejecuci\u00f3n time-of-check to time-of-use (TOCTOU) , que puede conducir a una Denegaci\u00f3n de Servicio."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-27363",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T20:15:10.403",
"lastModified": "2024-07-09T20:15:10.403",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in Samsung Mobile Processor Exynos 850, Exynos 9610, Exynos 980, Exynos 1280, Exynos 1380, Exynos 1330, Exynos W920, and Exynos W930 where it does not properly check a pointer address, which can lead to a Information disclosure."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad en el procesador m\u00f3vil Samsung Exynos 850, Exynos 9610, Exynos 980, Exynos 1280, Exynos 1380, Exynos 1330, Exynos W920 y Exynos W930 donde no verifica correctamente una direcci\u00f3n de puntero, lo que puede provocar una divulgaci\u00f3n de informaci\u00f3n."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-27385",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T21:15:12.287",
"lastModified": "2024-07-09T21:15:12.287",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in the slsi_handle_nan_rx_event_log_ind function in Samsung Mobile Processor Exynos 1380 and Exynos 1480 related to no input validation check on tag_len for rx coming from userspace, which can lead to heap overwrite."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad en la funci\u00f3n slsi_handle_nan_rx_event_log_ind en Samsung Mobile Processor Exynos 1380 y Exynos 1480 relacionada con la falta de verificaci\u00f3n de validaci\u00f3n de entrada en tag_len para rx provenientes del espacio de usuario, lo que puede provocar una sobrescritura del mont\u00f3n."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-27386",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T21:15:12.483",
"lastModified": "2024-07-09T21:15:12.483",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in the slsi_handle_nan_rx_event_log_ind function in Samsung Mobile Processor Exynos 1380 and Exynos 1480 related to no input validation check on tag_len for tx coming from userspace, which can lead to heap overwrite."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad en la funci\u00f3n slsi_handle_nan_rx_event_log_ind en Samsung Mobile Processor Exynos 1380 y Exynos 1480 relacionada con la falta de verificaci\u00f3n de validaci\u00f3n de entrada en tag_len para tx provenientes del espacio de usuario, lo que puede provocar una sobrescritura del mont\u00f3n."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-28068",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T20:15:10.603",
"lastModified": "2024-07-09T20:15:10.603",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in SS in Samsung Mobile Processor, Wearable Processor, and Modems with versions Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 2400, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, and Exynos Modem 5300 that involves a NULL pointer dereference which can cause abnormal termination of a mobile phone via a manipulated packet."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad en SS en Procesador M\u00f3vil, Procesador Wearable y M\u00f3dems Samsung con versiones Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330 , Exynos 2400, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123 y Exynos Modem 5300 que implica una desreferencia de puntero NULL que puede causar una terminaci\u00f3n anormal de un tel\u00e9fono m\u00f3vil a trav\u00e9s de un paquete manipulado."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-28827",
"sourceIdentifier": "security@checkmk.com",
"published": "2024-07-10T13:15:10.017",
"lastModified": "2024-07-10T13:15:10.017",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect permissions on the Checkmk Windows Agent's data directory in Checkmk < 2.3.0p8, < 2.2.0p29, < 2.1.0p45, and <= 2.0.0p39 (EOL) allows a local attacker to gain SYSTEM privileges."
},
{
"lang": "es",
"value": "Permisos incorrectos en el directorio de datos del agente de Windows Checkmk en Checkmk &lt; 2.3.0p8, &lt; 2.2.0p29, &lt; 2.1.0p45 y &lt;= 2.0.0p39 (EOL) permiten a un atacante local obtener privilegios de SYSTEM."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-28828",
"sourceIdentifier": "security@checkmk.com",
"published": "2024-07-10T13:15:10.297",
"lastModified": "2024-07-10T13:15:10.297",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site request forgery in Checkmk < 2.3.0p8, < 2.2.0p29, < 2.1.0p45, and <= 2.0.0p39 (EOL) could lead to 1-click compromize of the site."
},
{
"lang": "es",
"value": "Cross-Site Request Forgery en Checkmk &lt; 2.3.0p8, &lt; 2.2.0p29, &lt; 2.1.0p45 y &lt;= 2.0.0p39 (EOL) podr\u00eda provocar que el sitio se comprometa con 1 clic."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-2880",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-07-11T07:15:02.840",
"lastModified": "2024-07-11T07:15:02.840",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.5 prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2 in which a user with `admin_group_member` custom role permission could ban group members."
},
{
"lang": "es",
"value": " Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde 16.5 anterior a 16.11.6, desde 17.0 anterior a 17.0.4 y desde 17.1 anterior a 17.1.2 en el que un usuario con permiso de rol personalizado `admin_group_member` podr\u00eda banear a los miembros del grupo."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-29153",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T20:15:10.827",
"lastModified": "2024-07-09T20:15:10.827",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in Samsung Mobile Processor, Wearable Processor, and Modems with versions Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, and Exynos Modem 5300 that involves incorrect authorization of LTE NAS messages and leads to downgrading to lower network generations and repeated DDOS."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad en el procesador m\u00f3vil, procesador port\u00e1til y m\u00f3dems de Samsung con versiones Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123 y Exynos Modem 5300 que implica una autorizaci\u00f3n incorrecta de mensajes LTE NAS y conduce a una degradaci\u00f3n a generaciones de red m\u00e1s bajas y DDOS repetidos."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29784",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-06-13T21:15:52.110",
"lastModified": "2024-07-03T01:52:34.030",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-11T13:53:03.173",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-06-01",
"source": "dsap-vuln-management@google.com"
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31310",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:12.773",
"lastModified": "2024-07-09T21:15:12.773",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In newServiceInfoLocked of AutofillManagerServiceImpl.java, there is a possible way to hide an enabled Autofill service app in the Autofill service settings due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
},
{
"lang": "es",
"value": "En newServiceInfoLocked de AutofillManagerServiceImpl.java, existe una manera posible de ocultar una aplicaci\u00f3n de servicio de Autocompletar habilitada en la configuraci\u00f3n del servicio de Autocompletar debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31311",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:12.840",
"lastModified": "2024-07-09T21:15:12.840",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In increment_annotation_count of stats_event.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En increment_annotation_count de stats_event.c, hay una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de l\u00edmites faltante. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31312",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:12.900",
"lastModified": "2024-07-09T21:15:12.900",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple locations, there is a possible information leak due to a missing permission check. This could lead to local information disclosure exposing played media with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En varias ubicaciones, existe una posible fuga de informaci\u00f3n debido a la falta de una verificaci\u00f3n de permiso. Esto podr\u00eda llevar a la divulgaci\u00f3n de informaci\u00f3n local exponiendo los medios reproducidos sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31313",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:12.960",
"lastModified": "2024-07-09T21:15:12.960",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In availableToWriteBytes of MessageQueueBase.h, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En availableToWriteBytes de MessageQueueBase.h, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de l\u00edmites incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31314",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:13.020",
"lastModified": "2024-07-09T21:15:13.020",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple functions of ShortcutService.java, there is a possible persistent DOS due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En m\u00faltiples funciones de ShortcutService.java, existe una posible DOS persistente debido al agotamiento de recursos. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31315",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:13.080",
"lastModified": "2024-07-09T21:15:13.080",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple functions of ManagedServices.java, there is a possible way to hide an app with notification access in the Device & app notifications settings due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
},
{
"lang": "es",
"value": "En m\u00faltiples funciones de ManagedServices.java, existe una forma posible de ocultar una aplicaci\u00f3n con acceso a notificaciones en la configuraci\u00f3n de notificaciones de dispositivos y aplicaciones debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31316",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:13.140",
"lastModified": "2024-07-09T21:15:13.140",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In onResult of AccountManagerService.java, there is a possible way to perform an arbitrary background activity launch due to parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En onResult de AccountManagerService.java, existe una forma posible de realizar un inicio de actividad en segundo plano arbitrario debido a una falta de coincidencia de paquetes. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31317",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:13.197",
"lastModified": "2024-07-09T21:15:13.197",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple functions of ZygoteProcess.java, there is a possible way to achieve code execution as any app via WRITE_SECURE_SETTINGS due to unsafe deserialization. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En m\u00faltiples funciones de ZygoteProcess.java, existe una manera posible de lograr la ejecuci\u00f3n de c\u00f3digo como cualquier aplicaci\u00f3n a trav\u00e9s de WRITE_SECURE_SETTINGS debido a una deserializaci\u00f3n insegura. Esto podr\u00eda conducir a una escalada local de privilegios con privilegios de ejecuci\u00f3n del usuario necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31318",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:13.260",
"lastModified": "2024-07-09T21:15:13.260",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In CompanionDeviceManagerService.java, there is a possible way to pair a companion device without user acceptance due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En CompanionDeviceManagerService.java, existe una forma posible de emparejar un dispositivo complementario sin la aceptaci\u00f3n del usuario debido a que falta una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31319",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:13.313",
"lastModified": "2024-07-09T21:15:13.313",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In updateNotificationChannelFromPrivilegedListener of NotificationManagerService.java, there is a possible cross-user data leak due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En updateNotificationChannelFromPrivilegedListener de NotificationManagerService.java, existe una posible fuga de datos entre usuarios debido a un diputado confundido. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31320",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:13.373",
"lastModified": "2024-07-09T21:15:13.373",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In setSkipPrompt of AssociationRequest.java , there is a possible way to establish a companion device association without any confirmation due to CDM. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En setSkipPrompt de AssociationRequest.java, existe una forma posible de establecer una asociaci\u00f3n de dispositivo complementario sin ninguna confirmaci\u00f3n debido a CDM. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31322",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:13.433",
"lastModified": "2024-07-09T21:15:13.433",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In updateServicesLocked of AccessibilityManagerService.java, there is a possible way for an app to be hidden from the Setting while retaining Accessibility Service due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
},
{
"lang": "es",
"value": "En updateServicesLocked de AccessibilityManagerService.java, existe una forma posible de ocultar una aplicaci\u00f3n de la Configuraci\u00f3n mientras se conserva el Servicio de Accesibilidad debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31323",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:13.490",
"lastModified": "2024-07-09T21:15:13.490",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In onCreate of multiple files, there is a possible way to trick the user into granting health permissions due to tapjacking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En onCreate de m\u00faltiples archivos, existe una manera posible de enga\u00f1ar al usuario para que otorgue permisos de salud debido al tapjacking. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31324",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:13.563",
"lastModified": "2024-07-09T21:15:13.563",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In hide of WindowState.java, there is a possible way to bypass tapjacking/overlay protection by launching the activity in portrait mode first and then rotating it to landscape mode. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation."
},
{
"lang": "es",
"value": "En hide de WindowState.java, existe una forma posible de omitir la protecci\u00f3n contra secuestro/superposici\u00f3n iniciando la actividad en modo vertical primero y luego rot\u00e1ndola al modo horizontal. Esto podr\u00eda conducir a una escalada local de privilegios con privilegios de ejecuci\u00f3n del usuario necesarios. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31325",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:13.677",
"lastModified": "2024-07-09T21:15:13.677",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple locations, there is a possible way to reveal images across users data due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En varias ubicaciones, existe una forma posible de revelar im\u00e1genes entre los datos de los usuarios debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31326",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:13.757",
"lastModified": "2024-07-09T21:15:13.757",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple locations, there is a possible way in which policy migration code will never be executed due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En varias ubicaciones, existe una forma posible en la que el c\u00f3digo de migraci\u00f3n de pol\u00edticas nunca se ejecutar\u00e1 debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31327",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:13.820",
"lastModified": "2024-07-09T21:15:13.820",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple functions of MessageQueueBase.h, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En m\u00faltiples funciones de MessageQueueBase.h, existe una posible escritura fuera de los l\u00edmites debido a una condici\u00f3n de ejecuci\u00f3n. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31331",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:13.883",
"lastModified": "2024-07-09T21:15:13.883",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In setMimeGroup of PackageManagerService.java, there is a possible way to hide the service from Settings due to a logic error in the code. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation."
},
{
"lang": "es",
"value": "En setMimeGroup de PackageManagerService.java, existe una forma posible de ocultar el servicio de la Configuraci\u00f3n debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios con privilegios de ejecuci\u00f3n del usuario necesarios. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31332",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:13.947",
"lastModified": "2024-07-09T21:15:13.947",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple locations, there is a possible way to bypass a restriction on adding new Wi-Fi connections due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En varias ubicaciones, existe una manera posible de evitar una restricci\u00f3n para agregar nuevas conexiones Wi-Fi debido a una falta de verificaci\u00f3n de permiso. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31334",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:14.010",
"lastModified": "2024-07-09T21:15:14.010",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In DevmemIntFreeDefBackingPage of devicemem_server.c, there is a possible arbitrary code execution due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En DevmemIntFreeDefBackingPage de devicemem_server.c, existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31335",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:14.070",
"lastModified": "2024-07-09T21:15:14.070",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In DevmemIntChangeSparse2 of devicemem_server.c, there is a possible arbitrary code execution due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En DevmemIntChangeSparse2 de devicemem_server.c, existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31339",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:14.137",
"lastModified": "2024-07-09T21:15:14.137",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple functions of StatsService.cpp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En m\u00faltiples funciones de StatsService.cpp, existe una posible corrupci\u00f3n de la memoria debido a un use after free. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-32469",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-10T19:15:10.667",
"lastModified": "2024-07-10T19:15:10.667",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Decidim is a participatory democracy framework. The pagination feature used in searches and filters is subject to potential XSS attack through a malformed URL using the GET parameter `per_page`. This vulnerability is fixed in 0.27.6 and 0.28.1.\n"
},
{
"lang": "es",
"value": "Decidim es un framework de democracia participativa. La funci\u00f3n de paginaci\u00f3n utilizada en b\u00fasquedas y filtros est\u00e1 sujeta a posibles ataques XSS a trav\u00e9s de una URL con formato incorrecto utilizando el par\u00e1metro GET `per_page`. Esta vulnerabilidad se solucion\u00f3 en 0.27.6 y 0.28.1."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-32670",
"sourceIdentifier": "PSIRT@samsung.com",
"published": "2024-07-10T01:15:09.893",
"lastModified": "2024-07-10T01:15:09.893",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive Information to an Unauthorized Actor in Samsung Galaxy SmartTag2 prior to 0.20.04 allows attackes to potentially identify the tag's location by scanning the BLE adversting."
},
{
"lang": "es",
"value": "La exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en Samsung Galaxy SmartTag2 anterior a 0.20.04 permite a los ataques identificar potencialmente la ubicaci\u00f3n de la etiqueta al escanear la publicidad BLE."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-32759",
"sourceIdentifier": "productsecurity@jci.com",
"published": "2024-07-10T18:15:03.220",
"lastModified": "2024-07-10T18:15:03.220",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Under certain circumstances the Software House C\u25cfCURE 9000 installer will utilize weak credentials."
"value": "Under certain circumstances the Software House C?CURE 9000 installer will utilize weak credentials."
},
{
"lang": "es",
"value": "En determinadas circunstancias, el instalador de Software House C?CURE 9000 utilizar\u00e1 credenciales d\u00e9biles."
}
],
"metrics": {

View File

@ -2,8 +2,9 @@
"id": "CVE-2024-32895",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-06-13T21:15:53.997",
"lastModified": "2024-06-17T12:43:31.090",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-11T13:58:33.960",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -14,11 +15,66 @@
"value": "En BCMFASTPATH de dhd_msgbuf.c, existe una posible escritura fuera de los l\u00edmites debido a una comprobaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-06-01",
"source": "dsap-vuln-management@google.com"
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-3325",
"sourceIdentifier": "security@tibco.com",
"published": "2024-07-10T17:15:11.783",
"lastModified": "2024-07-10T17:15:11.783",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in Jaspersoft JasperReport Servers.This issue affects JasperReport Servers: from 8.0.4 through 9.0.0."
},
{
"lang": "es",
"value": "Vulnerabilidad en Jaspersoft JasperReport Servers. Este problema afecta a JasperReport Servers: desde 8.0.4 hasta 9.0.0."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34123",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-07-09T19:15:11.493",
"lastModified": "2024-07-09T19:15:11.493",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Premiere Pro versions 23.6.5, 24.4.1 and earlier are affected by an Untrusted Search Path vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by inserting a malicious file into the search path, which the application might execute instead of the legitimate file. This could occur when the application uses a search path to locate executables or libraries. Exploitation of this issue requires user interaction, attack complexity is high."
},
{
"lang": "es",
"value": "Las versiones 23.6.5, 24.4.1 y anteriores de Premiere Pro se ven afectadas por una vulnerabilidad de ruta de b\u00fasqueda no confiable que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante podr\u00eda aprovechar esta vulnerabilidad insertando un archivo malicioso en la ruta de b\u00fasqueda, que la aplicaci\u00f3n podr\u00eda ejecutar en lugar del archivo leg\u00edtimo. Esto podr\u00eda ocurrir cuando la aplicaci\u00f3n utiliza una ruta de b\u00fasqueda para localizar ejecutables o bibliotecas. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario y la complejidad del ataque es alta."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34139",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-07-09T20:15:11.147",
"lastModified": "2024-07-09T20:15:11.147",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Bridge versions 14.0.4, 13.0.7, 14.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
},
{
"lang": "es",
"value": "Las versiones de Bridge 14.0.4, 13.0.7, 14.1 y anteriores se ven afectadas por una vulnerabilidad de desbordamiento de enteros o Wraparound que podr\u00eda resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34140",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-07-09T20:15:11.360",
"lastModified": "2024-07-09T20:15:11.360",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Bridge versions 14.0.4, 13.0.7, 14.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
},
{
"lang": "es",
"value": "Las versiones de Bridge 14.0.4, 13.0.7, 14.1 y anteriores se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34720",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:14.213",
"lastModified": "2024-07-09T21:15:14.213",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In com_android_internal_os_ZygoteCommandBuffer_nativeForkRepeatedly of com_android_internal_os_ZygoteCommandBuffer.cpp, there is a possible method to perform arbitrary code execution in any app zygote processes due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En com_android_internal_os_ZygoteCommandBuffer_nativeForkRepeatedly de com_android_internal_os_ZygoteCommandBuffer.cpp, existe un m\u00e9todo posible para realizar la ejecuci\u00f3n de c\u00f3digo arbitrario en cualquier proceso de cigoto de aplicaci\u00f3n debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34721",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:14.277",
"lastModified": "2024-07-09T21:15:14.277",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In ensureFileColumns of MediaProvider.java, there is a possible disclosure of files owned by another user due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En sureFileColumns de MediaProvider.java, existe una posible divulgaci\u00f3n de archivos propiedad de otro usuario debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34722",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:14.343",
"lastModified": "2024-07-09T21:15:14.343",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In smp_proc_rand of smp_act.cc, there is a possible authentication bypass during legacy BLE pairing due to incorrect implementation of a protocol. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En smp_proc_rand de smp_act.cc, existe una posible omisi\u00f3n de autenticaci\u00f3n durante el emparejamiento BLE heredado debido a una implementaci\u00f3n incorrecta de un protocolo. Esto podr\u00eda conducir a una escalada remota de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34723",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:14.407",
"lastModified": "2024-07-09T21:15:14.407",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In onTransact of ParcelableListBinder.java , there is a possible way to steal mAllowlistToken to launch an app from background due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En onTransact de ParcelableListBinder.java, existe una forma posible de robar mAllowlistToken para iniciar una aplicaci\u00f3n en segundo plano debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34724",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:14.487",
"lastModified": "2024-07-09T21:15:14.487",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In _UnrefAndMaybeDestroy of pmr.c, there is a possible arbitrary code execution due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En _UnrefAndMaybeDestroy de pmr.c, existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a una condici\u00f3n de ejecuci\u00f3n. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34725",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:14.593",
"lastModified": "2024-07-09T21:15:14.593",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In DevmemIntUnexportCtx of devicemem_server.c, there is a possible arbitrary code execution due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En DevmemIntUnexportCtx de devicemem_server.c, existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a una condici\u00f3n de ejecuci\u00f3n. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34726",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:14.680",
"lastModified": "2024-07-09T21:15:14.680",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In PVRSRV_MMap of pvr_bridge_k.c, there is a possible arbitrary code execution due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En PVRSRV_MMap de pvr_bridge_k.c, existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-35154",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-07-09T22:15:02.227",
"lastModified": "2024-07-09T22:15:02.227",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM WebSphere Application Server 8.5 and 9.0 could allow a remote authenticated attacker, who has authorized access to the administrative console, to execute arbitrary code. Using specially crafted input, the attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 292641."
},
{
"lang": "es",
"value": "IBM WebSphere Application Server 8.5 y 9.0 podr\u00eda permitir que un atacante remoto autenticado, que haya autorizado acceso a la consola administrativa, ejecute c\u00f3digo arbitrario. Utilizando entradas especialmente manipuladas, el atacante podr\u00eda aprovechar esta vulnerabilidad para ejecutar c\u00f3digo arbitrario en el sistema. ID de IBM X-Force: 292641."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-36450",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-07-10T07:15:02.893",
"lastModified": "2024-07-10T07:15:02.893",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting vulnerability exists in sysinfo.cgi of Webmin versions prior to 1.910. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a session ID may be obtained, a webpage may be altered, or a server may be halted."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Cross Site Scripting en sysinfo.cgi de versiones de Webmin anteriores a la 1.910. Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en el navegador web del usuario que accedi\u00f3 al sitio web utilizando el producto. Como resultado, se puede obtener una ID de sesi\u00f3n, se puede modificar una p\u00e1gina web o se puede detener un servidor."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-36451",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-07-10T07:15:03.040",
"lastModified": "2024-07-10T07:15:03.040",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper handling of insufficient permissions or privileges vulnerability exists in ajaxterm module of Webmin prior to 2.003. If this vulnerability is exploited, a console session may be hijacked by an unauthorized user. As a result, data within a system may be referred, a webpage may be altered, or a server may be permanently halted."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de manejo incorrecto de permisos o privilegios insuficientes en el m\u00f3dulo ajaxterm de Webmin anterior a 2.003. Si se aprovecha esta vulnerabilidad, un usuario no autorizado puede secuestrar una sesi\u00f3n de consola. Como resultado, se pueden hacer referencias a datos dentro de un sistema, se puede alterar una p\u00e1gina web o se puede detener permanentemente un servidor."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-36452",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-07-10T07:15:03.103",
"lastModified": "2024-07-10T07:15:03.103",
"vulnStatus": "Received",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery vulnerability exists in ajaxterm module of Webmin versions prior to 2.003. If this vulnerability is exploited, unintended operations may be performed when a user views a malicious page while logged in. As a result, data within a system may be referred, a webpage may be altered, or a server may be permanently halted."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Cross-site request forgery en el m\u00f3dulo ajaxterm de las versiones de Webmin anteriores a la 2.003. Si se explota esta vulnerabilidad, se pueden realizar operaciones no deseadas cuando un usuario ve una p\u00e1gina maliciosa mientras est\u00e1 conectado. Como resultado, se pueden hacer referencia a datos dentro de un sistema, se puede alterar una p\u00e1gina web o se puede detener permanentemente un servidor."
}
],
"metrics": {},

Some files were not shown because too many files have changed in this diff Show More