Auto-Update: 2025-02-12T17:00:21.136541+00:00

This commit is contained in:
cad-safe-bot 2025-02-12 17:03:47 +00:00
parent 03f1cd5b13
commit b010b15f73
122 changed files with 5645 additions and 622 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-19678",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-06T18:15:08.210",
"lastModified": "2024-11-21T05:09:19.213",
"lastModified": "2025-02-12T16:15:31.977",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-3432",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-02-12T00:15:07.670",
"lastModified": "2025-02-12T00:15:07.670",
"lastModified": "2025-02-12T15:15:10.460",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -12,6 +12,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 4.2
}
],
"cvssMetricV30": [
{
"source": "psirt@cisco.com",
@ -45,6 +67,16 @@
"value": "CWE-59"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-36071",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-06T15:15:08.543",
"lastModified": "2024-11-21T05:28:43.697",
"lastModified": "2025-02-12T16:15:32.337",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-36072",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-06T15:15:08.587",
"lastModified": "2024-11-21T05:28:43.910",
"lastModified": "2025-02-12T16:15:32.520",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-36074",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-06T15:15:08.667",
"lastModified": "2024-11-21T05:28:44.210",
"lastModified": "2025-02-12T16:15:32.700",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-36077",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-10T13:15:06.843",
"lastModified": "2024-11-21T05:28:44.360",
"lastModified": "2025-02-12T15:15:09.483",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-45985",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-10T09:15:07.250",
"lastModified": "2024-11-21T06:33:25.743",
"lastModified": "2025-02-12T16:15:33.000",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3180",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-11T22:15:24.180",
"lastModified": "2025-02-11T22:15:24.180",
"lastModified": "2025-02-12T15:15:10.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "The WPGateway Plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 3.5. This allows unauthenticated attackers to create arbitrary malicious administrator accounts."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
@ -22,6 +45,16 @@
"value": "CWE-290"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-32599",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-04-06T18:15:08.293",
"lastModified": "2024-11-21T07:06:42.767",
"lastModified": "2025-02-12T16:15:33.257",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-42452",
"sourceIdentifier": "psirt@hcl.com",
"published": "2023-04-02T21:15:08.183",
"lastModified": "2024-11-21T07:24:59.450",
"lastModified": "2025-02-12T15:15:10.903",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-46781",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-06T16:15:07.613",
"lastModified": "2024-11-21T07:31:02.250",
"lastModified": "2025-02-12T16:15:33.610",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-119"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0805",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-03T22:15:16.553",
"lastModified": "2024-11-21T07:37:52.330",
"lastModified": "2025-02-12T16:15:34.123",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1522",
"sourceIdentifier": "security@genetec.com",
"published": "2023-04-05T19:15:07.737",
"lastModified": "2024-11-21T07:39:21.427",
"lastModified": "2025-02-12T16:15:34.290",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1855",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-04-05T20:15:07.817",
"lastModified": "2024-11-21T07:40:01.733",
"lastModified": "2025-02-12T16:15:34.520",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.0,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.2
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20676",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-04-06T18:15:09.313",
"lastModified": "2024-11-21T07:41:20.067",
"lastModified": "2025-02-12T16:15:35.000",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20679",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-04-06T18:15:09.400",
"lastModified": "2024-11-21T07:41:20.437",
"lastModified": "2025-02-12T16:15:35.183",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20680",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-04-06T18:15:09.443",
"lastModified": "2024-11-21T07:41:20.577",
"lastModified": "2025-02-12T16:15:35.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20681",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-04-06T18:15:09.497",
"lastModified": "2024-11-21T07:41:20.690",
"lastModified": "2025-02-12T16:15:35.610",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20682",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-04-06T18:15:09.560",
"lastModified": "2024-11-21T07:41:20.807",
"lastModified": "2025-02-12T16:15:35.787",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-190"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20684",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-04-06T18:15:09.617",
"lastModified": "2024-11-21T07:41:20.937",
"lastModified": "2025-02-12T16:15:35.960",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-362"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20685",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-04-06T18:15:09.663",
"lastModified": "2024-11-21T07:41:21.053",
"lastModified": "2025-02-12T16:15:36.130",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-362"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20686",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-04-06T18:15:09.710",
"lastModified": "2024-11-21T07:41:21.160",
"lastModified": "2025-02-12T16:15:36.297",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-362"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20687",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-04-06T18:15:09.757",
"lastModified": "2024-11-21T07:41:21.267",
"lastModified": "2025-02-12T16:15:36.453",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-362"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20688",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-04-06T18:15:09.810",
"lastModified": "2024-11-21T07:41:21.377",
"lastModified": "2025-02-12T16:15:36.617",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26991",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-04T15:15:09.183",
"lastModified": "2024-11-21T07:52:09.787",
"lastModified": "2025-02-12T16:15:37.270",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27727",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-09T20:15:56.650",
"lastModified": "2024-11-21T07:53:23.520",
"lastModified": "2025-02-12T16:15:37.670",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27729",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-09T20:15:56.740",
"lastModified": "2024-11-21T07:53:23.817",
"lastModified": "2025-02-12T16:15:37.867",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28726",
"sourceIdentifier": "product-security@gg.jp.panasonic.com",
"published": "2023-03-31T07:15:06.503",
"lastModified": "2024-11-21T07:55:52.873",
"lastModified": "2025-02-12T15:15:11.567",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28727",
"sourceIdentifier": "product-security@gg.jp.panasonic.com",
"published": "2023-03-31T07:15:06.687",
"lastModified": "2024-11-21T07:55:53.000",
"lastModified": "2025-02-12T15:15:11.747",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-287"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-305"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29375",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-10T15:15:07.310",
"lastModified": "2024-11-21T07:56:57.613",
"lastModified": "2025-02-12T15:15:11.883",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29389",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-05T16:15:08.100",
"lastModified": "2024-11-21T07:56:59.087",
"lastModified": "2025-02-12T16:15:38.110",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-74"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35949",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-05-28T14:15:08.420",
"lastModified": "2024-11-21T08:09:02.477",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:10:50.810",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,24 +49,76 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libigl:libigl:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "00680208-AE67-4A4C-9512-53D47F04C096"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366"
}
]
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35950",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-05-28T14:15:08.697",
"lastModified": "2024-11-21T08:09:02.610",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:10:35.737",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,24 +49,76 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libigl:libigl:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "00680208-AE67-4A4C-9512-53D47F04C096"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366"
}
]
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35951",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-05-28T14:15:08.920",
"lastModified": "2024-11-21T08:09:02.737",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:10:26.800",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,24 +49,76 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libigl:libigl:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "00680208-AE67-4A4C-9512-53D47F04C096"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366"
}
]
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35952",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-05-28T14:15:09.313",
"lastModified": "2024-11-21T08:09:02.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:10:13.873",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,24 +49,74 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libigl:libigl:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "00680208-AE67-4A4C-9512-53D47F04C096"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366"
}
]
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35953",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-05-28T14:15:09.540",
"lastModified": "2024-11-21T08:09:02.973",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:10:01.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,24 +49,76 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libigl:libigl:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "00680208-AE67-4A4C-9512-53D47F04C096"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366"
}
]
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49600",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-05-28T14:15:09.763",
"lastModified": "2024-11-21T08:33:37.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:14:59.787",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,24 +69,67 @@
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366"
}
]
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1879",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1879",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1879",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1879",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-49780",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-02-12T08:15:08.013",
"lastModified": "2025-02-12T08:15:08.013",
"lastModified": "2025-02-12T15:15:12.077",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -12,6 +12,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
@ -45,6 +67,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4947",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-10-20T07:15:16.740",
"lastModified": "2024-11-21T08:36:19.570",
"vulnStatus": "Modified",
"lastModified": "2025-02-12T16:02:11.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,9 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpfactory:ean_for_woocommerce:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:yanco:woocommerce_ean_payment_gateway:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "6.1.0",
"matchCriteriaId": "C044AC86-0734-435F-9C68-30946167FF3F"
"matchCriteriaId": "CC8AD8DD-12D3-4CC9-B977-F3072D24A61F"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6533",
"sourceIdentifier": "product-security@silabs.com",
"published": "2024-02-21T20:15:46.283",
"lastModified": "2024-11-21T08:44:02.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:57:31.787",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -53,16 +73,50 @@
"value": "CWE-419"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:silabs:z-wave_pc-based_controller:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.54",
"matchCriteriaId": "0ACB7BA3-6720-44E9-A822-F4673C4B81A9"
}
]
}
]
}
],
"references": [
{
"url": "https://community.silabs.com/068Vm000001HdNm",
"source": "product-security@silabs.com"
"source": "product-security@silabs.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://community.silabs.com/068Vm000001HdNm",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6640",
"sourceIdentifier": "product-security@silabs.com",
"published": "2024-02-21T20:15:46.497",
"lastModified": "2024-11-21T08:44:16.297",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:52:28.897",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,16 +69,50 @@
"value": "CWE-248"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:silabs:z-wave_pc-based_controller:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.54",
"matchCriteriaId": "0ACB7BA3-6720-44E9-A822-F4673C4B81A9"
}
]
}
]
}
],
"references": [
{
"url": "https://community.silabs.com/068Vm000001HdNm",
"source": "product-security@silabs.com"
"source": "product-security@silabs.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://community.silabs.com/068Vm000001HdNm",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11343",
"sourceIdentifier": "security@progress.com",
"published": "2025-02-12T16:15:39.100",
"lastModified": "2025-02-12T16:15:39.100",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Progress\u00ae Telerik\u00ae Document Processing Libraries, versions prior to 2025 Q1 (2025.1.205), unzipping an archive can lead to arbitrary file system access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@progress.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "security@progress.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://docs.telerik.com/devtools/document-processing/knowledge-base/kb-security-path-traversal-cve-2024-11343",
"source": "security@progress.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11651",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-25T03:15:07.973",
"lastModified": "2024-12-10T23:12:34.057",
"lastModified": "2025-02-12T15:33:04.513",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -191,8 +191,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
}
]
},
@ -202,8 +202,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
}
]
}
@ -218,8 +218,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
}
]
},
@ -229,8 +229,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
"criteria": "cpe:2.3:h:engeniustech:ens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07C3A46A-BB2E-4A7A-BA32-7E02E75E8AE0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11652",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-25T03:15:08.533",
"lastModified": "2024-12-10T23:13:23.947",
"lastModified": "2025-02-12T15:32:54.593",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -202,8 +202,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
"criteria": "cpe:2.3:h:engeniustech:ens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07C3A46A-BB2E-4A7A-BA32-7E02E75E8AE0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11653",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-25T04:15:05.337",
"lastModified": "2024-12-10T23:13:40.990",
"lastModified": "2025-02-12T15:33:07.360",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -191,8 +191,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
}
]
},
@ -202,8 +202,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
}
]
}
@ -218,8 +218,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
}
]
},
@ -229,8 +229,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
"criteria": "cpe:2.3:h:engeniustech:ens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07C3A46A-BB2E-4A7A-BA32-7E02E75E8AE0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11654",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-25T04:15:05.577",
"lastModified": "2024-12-10T23:13:58.150",
"lastModified": "2025-02-12T15:32:56.980",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -191,8 +191,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
}
]
},
@ -202,8 +202,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
}
]
}
@ -218,8 +218,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
}
]
},
@ -229,8 +229,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
"criteria": "cpe:2.3:h:engeniustech:ens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07C3A46A-BB2E-4A7A-BA32-7E02E75E8AE0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11655",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-25T05:15:09.447",
"lastModified": "2024-12-10T23:14:37.130",
"lastModified": "2025-02-12T15:33:09.620",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -191,8 +191,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
}
]
},
@ -202,8 +202,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
}
]
}
@ -218,8 +218,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
}
]
},
@ -229,8 +229,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
"criteria": "cpe:2.3:h:engeniustech:ens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07C3A46A-BB2E-4A7A-BA32-7E02E75E8AE0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11656",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-25T05:15:10.387",
"lastModified": "2024-12-10T23:14:44.037",
"lastModified": "2025-02-12T15:32:59.883",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -191,8 +191,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
}
]
},
@ -202,8 +202,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
}
]
}
@ -218,8 +218,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
}
]
},
@ -229,8 +229,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
"criteria": "cpe:2.3:h:engeniustech:ens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07C3A46A-BB2E-4A7A-BA32-7E02E75E8AE0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11657",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-25T06:15:06.073",
"lastModified": "2024-12-10T23:14:54.933",
"lastModified": "2025-02-12T15:33:12.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -191,8 +191,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
}
]
},
@ -202,8 +202,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
}
]
}
@ -218,8 +218,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
}
]
},
@ -229,8 +229,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
"criteria": "cpe:2.3:h:engeniustech:ens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07C3A46A-BB2E-4A7A-BA32-7E02E75E8AE0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11658",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-25T06:15:06.593",
"lastModified": "2024-12-10T23:15:02.890",
"lastModified": "2025-02-12T15:33:02.140",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -191,8 +191,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
}
]
},
@ -202,8 +202,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
}
]
}
@ -218,8 +218,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
}
]
},
@ -229,8 +229,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
"criteria": "cpe:2.3:h:engeniustech:ens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07C3A46A-BB2E-4A7A-BA32-7E02E75E8AE0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11659",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-25T07:15:04.837",
"lastModified": "2024-12-10T23:15:14.893",
"lastModified": "2025-02-12T15:33:14.057",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -191,8 +191,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
}
]
},
@ -202,8 +202,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
}
]
}
@ -218,8 +218,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
}
]
},
@ -229,8 +229,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
"criteria": "cpe:2.3:h:engeniustech:ens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07C3A46A-BB2E-4A7A-BA32-7E02E75E8AE0"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-12251",
"sourceIdentifier": "security@progress.com",
"published": "2025-02-12T15:15:12.370",
"lastModified": "2025-02-12T15:15:12.370",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Progress\u00ae Telerik\u00ae UI for WinUI versions prior to 2025 Q1 (3.0.0), a command injection attack is possible through improper neutralization of hyperlink elements."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@progress.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@progress.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://docs.telerik.com/devtools/winui/security/kb-security-command-injection-cve-2024-12251",
"source": "security@progress.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12315",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T09:15:08.247",
"lastModified": "2025-02-12T09:15:08.247",
"lastModified": "2025-02-12T15:15:12.527",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -15,7 +15,27 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
@ -45,6 +65,16 @@
"value": "CWE-922"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12379",
"sourceIdentifier": "cve@gitlab.com",
"published": "2025-02-12T15:15:12.707",
"lastModified": "2025-02-12T15:15:12.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A denial of service vulnerability in GitLab CE/EE affecting all versions from 14.1 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows an attacker to impact the availability of GitLab via unbounded symbol creation via the scopes parameter in a Personal Access Token."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cve@gitlab.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/508559",
"source": "cve@gitlab.com"
},
{
"url": "https://hackerone.com/reports/2871791",
"source": "cve@gitlab.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-12629",
"sourceIdentifier": "security@progress.com",
"published": "2025-02-12T16:15:39.810",
"lastModified": "2025-02-12T16:15:39.810",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Progress\u00ae Telerik\u00ae KendoReact versions v3.5.0 through v9.4.0, an attacker can introduce or modify properties within the global prototype chain which can result in denial of service or command injection."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@progress.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 0.7,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@progress.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1321"
}
]
}
],
"references": [
{
"url": "https://www.telerik.com/kendo-react-ui/components/knowledge-base/kb-security-protoype-pollution-2024-12629",
"source": "security@progress.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-13365",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:10.547",
"lastModified": "2025-02-12T10:15:10.547",
"lastModified": "2025-02-12T15:15:12.860",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -15,7 +15,27 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
@ -45,6 +65,16 @@
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-13435",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:10.727",
"lastModified": "2025-02-12T10:15:10.727",
"lastModified": "2025-02-12T15:15:13.093",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -15,7 +15,27 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-13473",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:11.610",
"lastModified": "2025-02-12T10:15:11.610",
"lastModified": "2025-02-12T15:15:13.270",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -15,7 +15,27 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-13794",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T08:15:08.430",
"lastModified": "2025-02-12T08:15:08.430",
"lastModified": "2025-02-12T15:15:14.040",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -15,7 +15,27 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
@ -45,6 +65,16 @@
"value": "CWE-693"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-693"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-13821",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T08:15:08.660",
"lastModified": "2025-02-12T08:15:08.660",
"lastModified": "2025-02-12T15:15:14.643",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -15,7 +15,27 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
@ -45,6 +65,16 @@
"value": "CWE-285"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1700",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-21T16:15:49.707",
"lastModified": "2024-11-21T08:51:06.933",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:58:29.373",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -76,30 +96,65 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/omarexala/PHP-MYSQL-User-Login-System---Stored-XSS",
"source": "cna@vuldb.com"
},
"nodes": [
{
"url": "https://vuldb.com/?ctiid.254388",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?id.254388",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/omarexala/PHP-MYSQL-User-Login-System---Stored-XSS",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://vuldb.com/?ctiid.254388",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://vuldb.com/?id.254388",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:keerti1924:php_mysql_user_signup_login_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C400362C-F44F-4C21-ADA4-E1547FFAF327"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/omarexala/PHP-MYSQL-User-Login-System---Stored-XSS",
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.254388",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.254388",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://github.com/omarexala/PHP-MYSQL-User-Login-System---Stored-XSS",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.254388",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.254388",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1701",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-21T16:15:50.013",
"lastModified": "2024-11-21T08:51:07.080",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:57:05.487",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -74,32 +94,77 @@
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:keerti1924:php_mysql_user_signup_login_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C400362C-F44F-4C21-ADA4-E1547FFAF327"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/omarexala/PHP-MYSQL-User-Login-System---Broken-Access-Control",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.254389",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.254389",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://github.com/omarexala/PHP-MYSQL-User-Login-System---Broken-Access-Control",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.254389",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.254389",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21891",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-02-20T02:15:50.347",
"lastModified": "2024-11-21T08:55:12.330",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T15:08:32.153",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "support@hackerone.com",
@ -39,30 +61,89 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/11/1",
"source": "support@hackerone.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://hackerone.com/reports/2259914",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240315-0005/",
"source": "support@hackerone.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/11/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://hackerone.com/reports/2259914",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240315-0005/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.0.0",
"versionEndExcluding": "20.11.1",
"matchCriteriaId": "1C20DA8F-2F0C-4323-B67D-8ADF50D5983A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.0.0",
"versionEndExcluding": "21.6.2",
"matchCriteriaId": "211B62F4-4CC3-41CA-91FA-E14C5AC0335A"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/11/1",
"source": "support@hackerone.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://hackerone.com/reports/2259914",
"source": "support@hackerone.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240315-0005/",
"source": "support@hackerone.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/11/1",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://hackerone.com/reports/2259914",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240315-0005/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21892",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-02-20T02:15:50.567",
"lastModified": "2024-11-21T08:55:12.463",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T15:17:34.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "support@hackerone.com",
@ -39,30 +61,109 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/11/1",
"source": "support@hackerone.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://hackerone.com/reports/2237545",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240322-0003/",
"source": "support@hackerone.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/11/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://hackerone.com/reports/2237545",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240322-0003/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.0.0",
"versionEndExcluding": "18.19.1",
"matchCriteriaId": "D2FD72E7-64E4-4F5C-B39D-3DBB87CF8675"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.0.0",
"versionEndExcluding": "20.11.1",
"matchCriteriaId": "1C20DA8F-2F0C-4323-B67D-8ADF50D5983A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.0.0",
"versionEndExcluding": "21.6.2",
"matchCriteriaId": "211B62F4-4CC3-41CA-91FA-E14C5AC0335A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/11/1",
"source": "support@hackerone.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://hackerone.com/reports/2237545",
"source": "support@hackerone.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240322-0003/",
"source": "support@hackerone.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/11/1",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://hackerone.com/reports/2237545",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240322-0003/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22181",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-05-28T14:15:09.997",
"lastModified": "2024-11-21T08:55:44.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:15:53.237",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,24 +49,67 @@
"value": "CWE-129"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366"
}
]
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1930",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1930",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1930",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1930",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22235",
"sourceIdentifier": "security@vmware.com",
"published": "2024-02-21T05:15:08.880",
"lastModified": "2024-11-21T08:55:51.637",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:59:46.897",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,17 +36,81 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:aria_operations:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.6.0",
"versionEndExcluding": "8.16.0",
"matchCriteriaId": "7C91C3D9-96EE-4A38-B722-B629014DC9E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndIncluding": "5.2",
"matchCriteriaId": "BC8A0BB4-A21B-4914-8F4B-37D300A4BBB9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.vmware.com/security/advisories/VMSA-2024-0004.html",
"source": "security@vmware.com"
"source": "security@vmware.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.vmware.com/security/advisories/VMSA-2024-0004.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22473",
"sourceIdentifier": "product-security@silabs.com",
"published": "2024-02-21T19:15:08.813",
"lastModified": "2024-11-21T08:56:20.573",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:52:42.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 4.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -53,16 +73,50 @@
"value": "CWE-1279"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-331"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:silabs:gecko_software_development_kit:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.4.0",
"matchCriteriaId": "F8DA3192-03D2-4218-9561-641A2E54C46F"
}
]
}
]
}
],
"references": [
{
"url": "https://community.silabs.com/068Vm000001FrjT",
"source": "product-security@silabs.com"
"source": "product-security@silabs.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://community.silabs.com/068Vm000001FrjT",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23949",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-05-28T14:15:10.687",
"lastModified": "2024-11-21T08:58:44.733",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T15:27:09.327",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,55 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "talos-cna@cisco.com"
},
"nodes": [
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "talos-cna@cisco.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366"
}
]
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "talos-cna@cisco.com",
"tags": [
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "talos-cna@cisco.com",
"tags": [
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Technical Description",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23950",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-05-28T14:15:10.907",
"lastModified": "2024-11-21T08:58:44.840",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T15:27:11.963",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,55 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "talos-cna@cisco.com"
},
"nodes": [
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "talos-cna@cisco.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366"
}
]
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "talos-cna@cisco.com",
"tags": [
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "talos-cna@cisco.com",
"tags": [
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Technical Description",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23951",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-05-28T14:15:11.133",
"lastModified": "2024-11-21T08:58:44.960",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T15:27:18.610",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,55 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "talos-cna@cisco.com"
},
"nodes": [
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "talos-cna@cisco.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366"
}
]
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "talos-cna@cisco.com",
"tags": [
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "talos-cna@cisco.com",
"tags": [
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Technical Description",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2338",
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"published": "2024-03-08T20:15:45.960",
"lastModified": "2024-11-21T09:09:32.700",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:44:27.073",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.3,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
@ -49,16 +69,49 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dalibo:anonymizer:1.2.0:*:*:*:*:postgresql:*:*",
"matchCriteriaId": "502E5DD4-11FB-47F1-8F8C-ECA6C02130B6"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/dalibo/postgresql_anonymizer/-/commit/f55daadba3fa8226029687964aa8889d01a79778",
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007"
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"tags": [
"Patch"
]
},
{
"url": "https://gitlab.com/dalibo/postgresql_anonymizer/-/commit/f55daadba3fa8226029687964aa8889d01a79778",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2339",
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"published": "2024-03-08T20:15:46.170",
"lastModified": "2024-11-21T09:09:32.830",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:44:09.467",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.3,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,49 @@
"value": "CWE-20"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dalibo:anonymizer:1.2.0:*:*:*:*:postgresql:*:*",
"matchCriteriaId": "502E5DD4-11FB-47F1-8F8C-ECA6C02130B6"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/dalibo/postgresql_anonymizer/-/commit/e517b38e62e50871b04011598e73a7308bdae9d9",
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007"
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"tags": [
"Patch"
]
},
{
"url": "https://gitlab.com/dalibo/postgresql_anonymizer/-/commit/e517b38e62e50871b04011598e73a7308bdae9d9",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25249",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T20:15:46.670",
"lastModified": "2024-11-21T09:00:31.800",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:44:43.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,101 @@
"value": "Un problema en la aplicaci\u00f3n He3 para macOS versi\u00f3n 2.0.17 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de la configuraci\u00f3n RunAsNode y enableNodeClilnspectArguments."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://github.com/intbjw",
"source": "cve@mitre.org"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
{
"url": "https://github.com/intbjw/CVE-2024-25249",
"source": "cve@mitre.org"
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"url": "https://www.electronjs.org/blog/statement-run-as-node-cves",
"source": "cve@mitre.org"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://github.com/intbjw",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/intbjw/CVE-2024-25249",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.electronjs.org/blog/statement-run-as-node-cves",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:he3app:he3_app:2.0.17:*:*:*:*:macos:*:*",
"matchCriteriaId": "E66913F9-7434-4A4F-BC50-048A4AB71F46"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/intbjw",
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://github.com/intbjw/CVE-2024-25249",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.electronjs.org/blog/statement-run-as-node-cves",
"source": "cve@mitre.org",
"tags": [
"Technical Description"
]
},
{
"url": "https://github.com/intbjw",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
]
},
{
"url": "https://github.com/intbjw/CVE-2024-25249",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.electronjs.org/blog/statement-run-as-node-cves",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28194",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-13T19:15:47.110",
"lastModified": "2024-11-21T09:06:00.183",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T15:19:53.610",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,16 +69,52 @@
"value": "CWE-798"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yooooomi:your_spotify:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.0",
"matchCriteriaId": "4B8BF8EC-918E-446C-B00C-345B7A707F07"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-gvcr-g265-j827",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-gvcr-g265-j827",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28195",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-13T18:15:07.360",
"lastModified": "2024-11-21T09:06:00.303",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T15:16:31.260",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,24 +69,66 @@
"value": "CWE-352"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yooooomi:your_spotify:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.9.0",
"matchCriteriaId": "D4D16B98-81FE-426E-BD95-42B155B9C613"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Yooooomi/your_spotify/commit/c3ae87673910c9903bb53088c8b71ed2c9aa54e4",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-hfgf-99p3-6fjj",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://github.com/Yooooomi/your_spotify/commit/c3ae87673910c9903bb53088c8b71ed2c9aa54e4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-hfgf-99p3-6fjj",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28196",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-13T18:15:07.620",
"lastModified": "2024-11-21T09:06:00.430",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T15:18:34.053",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,16 +69,52 @@
"value": "CWE-1021"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1021"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yooooomi:your_spotify:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.9.0",
"matchCriteriaId": "D4D16B98-81FE-426E-BD95-42B155B9C613"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-m5x2-6hjm-cggq",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-m5x2-6hjm-cggq",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28868",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-20T20:15:09.110",
"lastModified": "2024-11-21T09:07:04.723",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T15:23:09.683",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -49,24 +69,65 @@
"value": "CWE-204"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "10.8.5",
"matchCriteriaId": "CF8F4945-0845-4C1C-B088-CA288F15583A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/umbraco/Umbraco-CMS/commit/7e1d1a1968000226cd882fff078b122b8d46c44d",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-552f-97wf-pmpq",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/commit/7e1d1a1968000226cd882fff078b122b8d46c44d",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-552f-97wf-pmpq",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29035",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-17T15:15:07.037",
"lastModified": "2024-11-21T09:07:25.233",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T15:26:10.717",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -49,24 +69,65 @@
"value": "CWE-918"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0.0",
"versionEndExcluding": "13.1.1",
"matchCriteriaId": "070BDE45-92F3-4C27-BDDF-BD98E344B2B8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/umbraco/Umbraco-CMS/commit/6b8067815c02ae43161966a8075a3585e1bc4de0",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-74p6-39f2-23v3",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/commit/6b8067815c02ae43161966a8075a3585e1bc4de0",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-74p6-39f2-23v3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33891",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-28T23:15:07.200",
"lastModified": "2024-11-21T09:17:40.487",
"lastModified": "2025-02-12T15:15:14.827",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -83,6 +83,10 @@
{
"url": "https://trust.delinea.com/?tcuUid=17aaf4ef-ada9-46d5-bf97-abd3b07daae3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/straightblast/My-PoC-Exploits/blob/master/CVE-2024-33891.py",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34071",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-21T14:15:11.783",
"lastModified": "2024-11-21T09:18:01.820",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T15:39:05.367",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,48 +69,128 @@
"value": "CWE-601"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.18.5",
"versionEndExcluding": "8.18.14",
"matchCriteriaId": "DD5C0BF1-29AF-4606-B02A-F73EE2DD71A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.5.0",
"versionEndExcluding": "10.8.6",
"matchCriteriaId": "6B804252-12EB-4EA3-A14A-F45375164046"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.3.10",
"matchCriteriaId": "891B2FBA-B687-4028-9832-B3B71EBA74D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0.0",
"versionEndExcluding": "13.3.1",
"matchCriteriaId": "76E06544-41C1-4D73-A8AA-BA1FE815D02A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/umbraco/Umbraco-CMS/commit/5f24de308584b9771240a6db1a34630a5114c450",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/commit/c17d4e1a600098ec524e4126f4395255476bc33f",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/commit/c8f71af646171074c13e5c34f74312def4512031",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/commit/d8df405db4ea884bb4b96f088d10d9a2070cf024",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-j74q-mv2c-rxmp",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/commit/5f24de308584b9771240a6db1a34630a5114c450",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/commit/c17d4e1a600098ec524e4126f4395255476bc33f",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/commit/c8f71af646171074c13e5c34f74312def4512031",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/commit/d8df405db4ea884bb4b96f088d10d9a2070cf024",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-j74q-mv2c-rxmp",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34370",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-17T09:15:43.753",
"lastModified": "2024-11-21T09:18:31.687",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T15:42:09.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -49,16 +69,50 @@
"value": "CWE-269"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpfactory:ean_for_woocommerce:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.9.0",
"matchCriteriaId": "8EEB00E2-F8F0-4F51-9DAF-5EB4F0BBE741"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ean-for-woocommerce/wordpress-ean-for-woocommerce-plugin-4-8-9-arbitrary-option-update-to-privilege-escalation-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/ean-for-woocommerce/wordpress-ean-for-woocommerce-plugin-4-8-9-arbitrary-option-update-to-privilege-escalation-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3460",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-05-14T15:41:12.850",
"lastModified": "2024-11-21T09:29:38.773",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T15:36:15.813",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.4,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
@ -49,32 +69,82 @@
"value": "CWE-424"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kioware:kioware:*:*:*:*:*:windows:*:*",
"versionEndIncluding": "8.34",
"matchCriteriaId": "08120DB6-BEF8-4C1E-B969-3F661CB25C70"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/04/CVE-2024-3459",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://cert.pl/posts/2024/04/CVE-2024-3459",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://www.kioware.com/",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Product"
]
},
{
"url": "https://cert.pl/en/posts/2024/04/CVE-2024-3459",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://cert.pl/posts/2024/04/CVE-2024-3459",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://www.kioware.com/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3461",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-05-14T15:41:13.350",
"lastModified": "2024-11-21T09:29:38.900",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T15:37:59.677",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,32 +69,82 @@
"value": "CWE-307"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kioware:kioware:*:*:*:*:*:windows:*:*",
"versionEndIncluding": "8.35",
"matchCriteriaId": "FA48DE1E-8A39-439D-BE91-A8FA7E84C1D7"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/04/CVE-2024-3459",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://cert.pl/posts/2024/04/CVE-2024-3459",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://www.kioware.com/",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Product"
]
},
{
"url": "https://cert.pl/en/posts/2024/04/CVE-2024-3459",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://cert.pl/posts/2024/04/CVE-2024-3459",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://www.kioware.com/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3943",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-30T05:15:55.373",
"lastModified": "2024-11-21T09:30:45.133",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:26:27.347",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:delower:wp_to_do:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.3.0",
"matchCriteriaId": "48CF09FC-8FBD-4B6D-97E0-91F39CD1B51F"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L225",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/406f6bd7-f57f-4725-a36f-9846ac04f945?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L225",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/406f6bd7-f57f-4725-a36f-9846ac04f945?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3945",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-30T05:15:55.590",
"lastModified": "2024-11-21T09:30:45.320",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:26:04.993",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L273",
"source": "security@wordfence.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/69475bec-1f27-4793-8697-1132ac701c62?source=cve",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L273",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/69475bec-1f27-4793-8697-1132ac701c62?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:delower:wp_to_do:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.3.0",
"matchCriteriaId": "48CF09FC-8FBD-4B6D-97E0-91F39CD1B51F"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L273",
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/69475bec-1f27-4793-8697-1132ac701c62?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L273",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/69475bec-1f27-4793-8697-1132ac701c62?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3946",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-30T05:15:55.800",
"lastModified": "2024-11-21T09:30:45.437",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:25:25.547",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:delower:wp_to_do:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.3.0",
"matchCriteriaId": "48CF09FC-8FBD-4B6D-97E0-91F39CD1B51F"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L304",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de648bea-35c5-4611-aa2f-79e37a0299bb?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L304",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de648bea-35c5-4611-aa2f-79e37a0299bb?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3947",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-30T05:15:55.993",
"lastModified": "2024-11-21T09:30:45.547",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:23:45.067",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L304",
"source": "security@wordfence.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c132cfc1-03b3-4616-9a66-871e88c857cb?source=cve",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L304",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c132cfc1-03b3-4616-9a66-871e88c857cb?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:delower:wp_to_do:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.3.0",
"matchCriteriaId": "48CF09FC-8FBD-4B6D-97E0-91F39CD1B51F"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L304",
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c132cfc1-03b3-4616-9a66-871e88c857cb?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L304",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c132cfc1-03b3-4616-9a66-871e88c857cb?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4317",
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"published": "2024-05-14T15:43:16.473",
"lastModified": "2024-11-21T09:42:36.813",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:17:31.043",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -49,16 +69,67 @@
"value": "CWE-862"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.12",
"matchCriteriaId": "7AC0DA70-323D-4C0A-9993-9155CC2E0898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.7",
"matchCriteriaId": "A7C08BC1-1F35-48B5-A159-87988C64EED1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0",
"versionEndExcluding": "16.3",
"matchCriteriaId": "30634752-81D1-43A4-9BAF-329307A5B9AD"
}
]
}
]
}
],
"references": [
{
"url": "https://www.postgresql.org/support/security/CVE-2024-4317/",
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007"
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.postgresql.org/support/security/CVE-2024-4317/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4422",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-30T09:15:10.020",
"lastModified": "2024-11-21T09:42:47.860",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:29:48.533",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:comparisonslider:comparison_slider:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.5",
"matchCriteriaId": "0500397E-8876-4712-BF58-A58E5E041877"
}
]
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/comparison-slider/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0907c74e-0bb8-4761-aabf-79d880c78415?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/comparison-slider/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0907c74e-0bb8-4761-aabf-79d880c78415?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4426",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-30T09:15:10.230",
"lastModified": "2024-11-21T09:42:48.490",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:29:15.587",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:comparisonslider:comparison_slider:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.5",
"matchCriteriaId": "0500397E-8876-4712-BF58-A58E5E041877"
}
]
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/comparison-slider/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5a9b284a-2af9-4d20-9663-a40b9330da35?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/comparison-slider/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5a9b284a-2af9-4d20-9663-a40b9330da35?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4427",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-30T09:15:10.453",
"lastModified": "2024-11-21T09:42:48.593",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T16:28:31.400",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wordpress.org/plugins/comparison-slider/",
"source": "security@wordfence.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab68a08d-a6d4-4424-a7bf-219951f752fa?source=cve",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/comparison-slider/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab68a08d-a6d4-4424-a7bf-219951f752fa?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:comparisonslider:comparison_slider:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.5",
"matchCriteriaId": "0500397E-8876-4712-BF58-A58E5E041877"
}
]
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/comparison-slider/",
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab68a08d-a6d4-4424-a7bf-219951f752fa?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/comparison-slider/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab68a08d-a6d4-4424-a7bf-219951f752fa?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-54160",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-12T15:15:15.050",
"lastModified": "2025-02-12T15:15:15.050",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "dashboards-reporting (aka Dashboards Reports) before 2.19.0.0, as shipped in OpenSearch before 2.19, allows XSS because Markdown is not sanitized when previewing a header or footer."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/Jflye/CVE-2024-54160--Opensearch-HTML-Injection",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/opensearch-project/dashboards-reporting/compare/2.18.0.0...2.19.0.0",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/opensearch-project/dashboards-reporting/pull/476",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/opensearch-project/opensearch-build/blob/main/release-notes/opensearch-release-notes-2.19.0.md",
"source": "cve@mitre.org"
},
{
"url": "https://opensearch.org/releases.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-54909",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-06T22:15:38.250",
"lastModified": "2025-02-11T22:15:28.733",
"lastModified": "2025-02-12T15:15:15.220",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -22,20 +22,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-22"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-54916",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-11T23:15:09.227",
"lastModified": "2025-02-11T23:15:09.227",
"lastModified": "2025-02-12T16:15:42.160",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An issue in the SharedConfig class of Telegram Android APK v.11.7.0 allows a physically proximate attacker to bypass authentication and escalate privileges by manipulating the return value of the checkPasscode method."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/1knf8-_fFUSLd3ZmbEpy0_OVzSN1UR1JR/view?usp=sharing",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57000",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-11T23:15:09.337",
"lastModified": "2025-02-11T23:15:09.337",
"lastModified": "2025-02-12T16:15:42.317",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An issue in Anyscale Inc Ray between v.2.9.3 and v.2.40.0 allows a remote attacker to execute arbitrary code via a crafted script."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/honysyang/Ray.git",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-9870",
"sourceIdentifier": "cve@gitlab.com",
"published": "2025-02-12T16:15:42.563",
"lastModified": "2025-02-12T16:15:42.563",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An external service interaction vulnerability in GitLab EE affecting all versions from 15.11 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows an attacker to send requests from the GitLab server to unintended services."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@gitlab.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-441"
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/498911",
"source": "cve@gitlab.com"
},
{
"url": "https://hackerone.com/reports/2734142",
"source": "cve@gitlab.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0332",
"sourceIdentifier": "security@progress.com",
"published": "2025-02-12T16:15:42.703",
"lastModified": "2025-02-12T16:15:42.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Progress\u00ae Telerik\u00ae UI for WinForms, versions prior to 2025 Q1 (2025.1.211), using the improper limitation of a target path can lead to decompressing an archive's content into a restricted directory."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@progress.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@progress.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://docs.telerik.com/devtools/winforms/knowledge-base/kb-security-path-traversal-cve-2025-0332",
"source": "security@progress.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-0376",
"sourceIdentifier": "cve@gitlab.com",
"published": "2025-02-12T15:15:15.477",
"lastModified": "2025-02-12T15:15:15.477",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An XSS vulnerability exists in GitLab CE/EE affecting all versions from 13.3 prior to 17.6.5, 17.7 prior to 17.7.4 and 17.8 prior to 17.8.2 that allows an attacker to execute unauthorized actions via a change page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "cve@gitlab.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/512603",
"source": "cve@gitlab.com"
},
{
"url": "https://hackerone.com/reports/2930243",
"source": "cve@gitlab.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-0506",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:14.360",
"lastModified": "2025-02-12T10:15:14.360",
"lastModified": "2025-02-12T15:15:15.613",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -15,7 +15,27 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -45,6 +65,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-0516",
"sourceIdentifier": "cve@gitlab.com",
"published": "2025-02-12T16:15:42.883",
"lastModified": "2025-02-12T16:15:42.883",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Authorization in GitLab CE/EE affecting all versions from 17.7 prior to 17.7.4, 17.8 prior to 17.8.2 allow users with limited permissions to perform unauthorized actions on critical project data."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@gitlab.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/513540",
"source": "cve@gitlab.com"
},
{
"url": "https://hackerone.com/reports/2914644",
"source": "cve@gitlab.com"
}
]
}

Some files were not shown because too many files have changed in this diff Show More