Auto-Update: 2024-08-04T02:00:16.891362+00:00

This commit is contained in:
cad-safe-bot 2024-08-04 02:03:13 +00:00
parent a17329106d
commit cf6a641989
390 changed files with 1241 additions and 715 deletions

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@lenovo.com", "sourceIdentifier": "psirt@lenovo.com",
"published": "2024-07-31T21:15:12.063", "published": "2024-07-31T21:15:12.063",
"lastModified": "2024-08-01T12:42:36.933", "lastModified": "2024-08-01T12:42:36.933",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@lenovo.com", "sourceIdentifier": "psirt@lenovo.com",
"published": "2024-07-31T21:15:12.340", "published": "2024-07-31T21:15:12.340",
"lastModified": "2024-08-01T12:42:36.933", "lastModified": "2024-08-01T12:42:36.933",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@lenovo.com", "sourceIdentifier": "psirt@lenovo.com",
"published": "2024-07-31T21:15:12.557", "published": "2024-07-31T21:15:12.557",
"lastModified": "2024-08-01T12:42:36.933", "lastModified": "2024-08-01T12:42:36.933",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-32089", "id": "CVE-2021-32089",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-05-11T21:15:08.023", "published": "2021-05-11T21:15:08.023",
"lastModified": "2024-05-17T01:57:27.660", "lastModified": "2024-08-04T00:15:17.737",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-32569", "id": "CVE-2021-32569",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-10-14T17:15:08.590", "published": "2021-10-14T17:15:08.590",
"lastModified": "2024-05-17T01:57:34.637", "lastModified": "2024-08-04T00:15:22.200",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-32571", "id": "CVE-2021-32571",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-10-14T18:15:12.697", "published": "2021-10-14T18:15:12.697",
"lastModified": "2024-05-17T01:57:34.810", "lastModified": "2024-08-04T00:15:22.343",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-32573", "id": "CVE-2021-32573",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-05-11T17:15:07.690", "published": "2021-05-11T17:15:07.690",
"lastModified": "2024-05-17T01:57:34.943", "lastModified": "2024-08-04T00:15:22.467",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-33026", "id": "CVE-2021-33026",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-05-13T23:15:07.367", "published": "2021-05-13T23:15:07.367",
"lastModified": "2024-08-01T13:42:13.313", "lastModified": "2024-08-04T00:15:28.303",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-33226", "id": "CVE-2021-33226",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-02-17T18:15:11.083", "published": "2023-02-17T18:15:11.083",
"lastModified": "2024-05-17T01:57:52.580", "lastModified": "2024-08-04T00:15:30.537",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-33256", "id": "CVE-2021-33256",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-08-09T14:15:31.280", "published": "2021-08-09T14:15:31.280",
"lastModified": "2024-05-17T01:57:52.860", "lastModified": "2024-08-04T00:15:30.707",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-33430", "id": "CVE-2021-33430",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-12-17T19:15:07.500", "published": "2021-12-17T19:15:07.500",
"lastModified": "2024-06-04T19:17:04.897", "lastModified": "2024-08-04T00:15:32.943",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-33558", "id": "CVE-2021-33558",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-05-27T11:15:07.373", "published": "2021-05-27T11:15:07.373",
"lastModified": "2024-06-11T15:15:52.823", "lastModified": "2024-08-04T00:15:35.893",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-33904", "id": "CVE-2021-33904",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-06-07T12:15:09.107", "published": "2021-06-07T12:15:09.107",
"lastModified": "2024-05-17T01:58:07.877", "lastModified": "2024-08-04T00:15:40.440",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-33990", "id": "CVE-2021-33990",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-04-16T04:15:07.967", "published": "2023-04-16T04:15:07.967",
"lastModified": "2024-08-01T13:42:14.200", "lastModified": "2024-08-04T00:15:41.570",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-34369", "id": "CVE-2021-34369",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-06-09T12:15:08.033", "published": "2021-06-09T12:15:08.033",
"lastModified": "2024-05-17T01:58:14.640", "lastModified": "2024-08-04T00:15:44.763",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-34370", "id": "CVE-2021-34370",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-06-09T12:15:08.067", "published": "2021-06-09T12:15:08.067",
"lastModified": "2024-05-17T01:58:14.760", "lastModified": "2024-08-04T00:15:44.863",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-34983", "id": "CVE-2021-34983",
"sourceIdentifier": "zdi-disclosures@trendmicro.com", "sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-07T23:15:13.573", "published": "2024-05-07T23:15:13.573",
"lastModified": "2024-07-03T01:36:50.850", "lastModified": "2024-08-04T01:35:05.720",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -49,16 +49,6 @@
"value": "CWE-306" "value": "CWE-306"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
} }
], ],
"references": [ "references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-35196", "id": "CVE-2021-35196",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-06-21T23:15:10.723", "published": "2021-06-21T23:15:10.723",
"lastModified": "2024-08-01T13:42:15.173", "lastModified": "2024-08-04T01:15:30.987",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-35331", "id": "CVE-2021-35331",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-07-05T15:15:07.997", "published": "2021-07-05T15:15:07.997",
"lastModified": "2024-05-17T01:58:36.660", "lastModified": "2024-08-04T01:15:32.833",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-35958", "id": "CVE-2021-35958",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-06-30T01:15:07.033", "published": "2021-06-30T01:15:07.033",
"lastModified": "2024-05-17T01:58:44.037", "lastModified": "2024-08-04T01:15:37.527",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-36368", "id": "CVE-2021-36368",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-03-13T00:15:07.937", "published": "2022-03-13T00:15:07.937",
"lastModified": "2024-05-17T01:58:53.237", "lastModified": "2024-08-04T01:15:42.867",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-36690", "id": "CVE-2021-36690",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-08-24T14:15:09.797", "published": "2021-08-24T14:15:09.797",
"lastModified": "2024-05-17T01:58:57.110", "lastModified": "2024-08-04T01:15:46.013",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-36741", "id": "CVE-2021-36741",
"sourceIdentifier": "security@trendmicro.com", "sourceIdentifier": "security@trendmicro.com",
"published": "2021-07-29T20:15:07.620", "published": "2021-07-29T20:15:07.620",
"lastModified": "2024-07-26T19:26:16.980", "lastModified": "2024-08-04T01:15:46.910",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"cisaExploitAdd": "2021-11-03", "cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17", "cisaActionDue": "2021-11-17",
@ -12,11 +12,11 @@
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product?s management console in order to exploit this vulnerability." "value": "An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product\ufffds management console in order to exploit this vulnerability."
}, },
{ {
"lang": "es", "lang": "es",
"value": "Una vulnerabilidad de comprobaci\u00f3n de entrada inapropiada en Trend Micro Apex One, Apex One as a Service, OfficeScan XG y Worry-Free Business Security versi\u00f3n 10.0 SP1, permite a un adjunto remoto cargar archivos arbitrarios en las instalaciones afectadas. Nota: un atacante debe obtener primero la habilidad de iniciar sesi\u00f3n en la consola de administraci\u00f3n del producto para poder explotar esta vulnerabilidad" "value": " Una vulnerabilidad de validaci\u00f3n de entrada incorrecta en Trend Micro Apex One, Apex One as a Service, OfficeScan XG y Worry-Free Business Security 10.0 SP1 permite que un control remoto conectado cargue archivos arbitrarios en las instalaciones afectadas. Tenga en cuenta: un atacante primero debe obtener la capacidad de iniciar sesi\u00f3n en la consola de administraci\u00f3n del producto para poder aprovechar esta vulnerabilidad."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-36797", "id": "CVE-2021-36797",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-07-19T17:15:11.870", "published": "2021-07-19T17:15:11.870",
"lastModified": "2024-05-17T01:59:00.180", "lastModified": "2024-08-04T01:15:48.210",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-36799", "id": "CVE-2021-36799",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-07-19T17:15:11.920", "published": "2021-07-19T17:15:11.920",
"lastModified": "2024-05-17T01:59:00.337", "lastModified": "2024-08-04T01:15:48.333",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [ "cveTags": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "security@vmware.com", "sourceIdentifier": "security@vmware.com",
"published": "2022-12-13T16:15:19.733", "published": "2022-12-13T16:15:19.733",
"lastModified": "2023-08-08T14:21:49.707", "lastModified": "2023-08-08T14:21:49.707",
"vulnStatus": "Analyzed", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@lenovo.com", "sourceIdentifier": "psirt@lenovo.com",
"published": "2024-07-31T21:15:15.423", "published": "2024-07-31T21:15:15.423",
"lastModified": "2024-08-01T12:42:36.933", "lastModified": "2024-08-01T12:42:36.933",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2024-07-31T08:15:02.243", "published": "2024-07-31T08:15:02.243",
"lastModified": "2024-07-31T12:57:02.300", "lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-06-12T19:15:50.020", "published": "2024-06-12T19:15:50.020",
"lastModified": "2024-06-13T18:36:09.010", "lastModified": "2024-06-13T18:36:09.010",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-06-30T16:15:02.600", "published": "2024-06-30T16:15:02.600",
"lastModified": "2024-07-01T12:37:24.220", "lastModified": "2024-07-01T12:37:24.220",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -9,6 +9,10 @@
{ {
"lang": "en", "lang": "en",
"value": "bboss-persistent v6.0.9 and below was discovered to contain a code injection vulnerability in the component com.frameworkset.common.poolman.util.SQLManager.createPool. This vulnerability is exploited via passing an unchecked argument." "value": "bboss-persistent v6.0.9 and below was discovered to contain a code injection vulnerability in the component com.frameworkset.common.poolman.util.SQLManager.createPool. This vulnerability is exploited via passing an unchecked argument."
},
{
"lang": "es",
"value": " Se descubri\u00f3 que bboss-persistent v6.0.9 y versiones anteriores conten\u00edan una vulnerabilidad de inyecci\u00f3n de c\u00f3digo en el componente com.frameworkset.common.poolman.util.SQLManager.createPool. Esta vulnerabilidad se explota pasando un argumento no verificado."
} }
], ],
"metrics": { "metrics": {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-12T10:15:25.837", "published": "2024-06-12T10:15:25.837",
"lastModified": "2024-06-13T18:36:09.010", "lastModified": "2024-06-13T18:36:09.010",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-06-27T18:15:13.143", "published": "2024-06-27T18:15:13.143",
"lastModified": "2024-06-27T19:25:12.067", "lastModified": "2024-06-27T19:25:12.067",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-07-01T15:15:13.000", "published": "2024-07-01T15:15:13.000",
"lastModified": "2024-07-01T16:37:39.040", "lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-10-03T21:15:10.573", "published": "2023-10-03T21:15:10.573",
"lastModified": "2023-10-04T18:27:51.783", "lastModified": "2023-10-04T18:27:51.783",
"vulnStatus": "Analyzed", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-07-17T22:15:03.627", "published": "2024-07-17T22:15:03.627",
"lastModified": "2024-07-18T12:28:43.707", "lastModified": "2024-07-18T12:28:43.707",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2024-02-05T21:15:11.183", "published": "2024-02-05T21:15:11.183",
"lastModified": "2024-07-26T22:15:03.550", "lastModified": "2024-07-26T22:15:03.550",
"vulnStatus": "Modified", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-06-30T17:15:02.470", "published": "2024-06-30T17:15:02.470",
"lastModified": "2024-07-01T12:37:24.220", "lastModified": "2024-07-01T12:37:24.220",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-12T09:15:16.067", "published": "2024-06-12T09:15:16.067",
"lastModified": "2024-07-18T19:54:16.287", "lastModified": "2024-07-18T19:54:16.287",
"vulnStatus": "Analyzed", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -9,6 +9,10 @@
{ {
"lang": "en", "lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new\n\nThis patch enhances error handling in scenarios with RTS (Request to\nSend) messages arriving closely. It replaces the less informative WARN_ON_ONCE\nbacktraces with a new error handling method. This provides clearer error\nmessages and allows for the early termination of problematic sessions.\nPreviously, sessions were only released at the end of j1939_xtp_rx_rts().\n\nPotentially this could be reproduced with something like:\ntestj1939 -r vcan0:0x80 &\nwhile true; do\n\t# send first RTS\n\tcansend vcan0 18EC8090#1014000303002301;\n\t# send second RTS\n\tcansend vcan0 18EC8090#1014000303002301;\n\t# send abort\n\tcansend vcan0 18EC8090#ff00000000002301;\ndone" "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new\n\nThis patch enhances error handling in scenarios with RTS (Request to\nSend) messages arriving closely. It replaces the less informative WARN_ON_ONCE\nbacktraces with a new error handling method. This provides clearer error\nmessages and allows for the early termination of problematic sessions.\nPreviously, sessions were only released at the end of j1939_xtp_rx_rts().\n\nPotentially this could be reproduced with something like:\ntestj1939 -r vcan0:0x80 &\nwhile true; do\n\t# send first RTS\n\tcansend vcan0 18EC8090#1014000303002301;\n\t# send second RTS\n\tcansend vcan0 18EC8090#1014000303002301;\n\t# send abort\n\tcansend vcan0 18EC8090#ff00000000002301;\ndone"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: can: j1939: manejo de errores mejorado para mensajes RTS recibidos estrechamente en xtp_rx_rts_session_new Este parche mejora el manejo de errores en escenarios con mensajes RTS (Solicitud de env\u00edo) que llegan cerca. Reemplaza los rastreos WARN_ON_ONCE menos informativos con un nuevo m\u00e9todo de manejo de errores. Esto proporciona mensajes de error m\u00e1s claros y permite la finalizaci\u00f3n anticipada de sesiones problem\u00e1ticas. Anteriormente, las sesiones s\u00f3lo se publicaban al final de j1939_xtp_rx_rts(). Potencialmente, esto podr\u00eda reproducirse con algo como: testj1939 -r vcan0:0x80 & while true; hacer # enviar primero RTS cansend vcan0 18EC8090#1014000303002301; # enviar segundo RTS cansend vcan0 18EC8090#1014000303002301; # enviar cancelar cansend vcan0 18EC8090#ff00000000002301; hecho"
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "iletisim@usom.gov.tr", "sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-07-18T18:15:05.177", "published": "2024-07-18T18:15:05.177",
"lastModified": "2024-07-22T09:15:04.457", "lastModified": "2024-07-22T09:15:04.457",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "security@ubuntu.com", "sourceIdentifier": "security@ubuntu.com",
"published": "2024-07-25T19:15:09.913", "published": "2024-07-25T19:15:09.913",
"lastModified": "2024-07-26T12:38:41.683", "lastModified": "2024-07-26T12:38:41.683",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cybersecurity@hitachienergy.com", "sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2024-06-11T14:15:11.050", "published": "2024-06-11T14:15:11.050",
"lastModified": "2024-06-13T18:36:45.417", "lastModified": "2024-06-13T18:36:45.417",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cybersecurity@hitachienergy.com", "sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2024-06-11T14:15:11.273", "published": "2024-06-11T14:15:11.273",
"lastModified": "2024-06-13T18:36:45.417", "lastModified": "2024-06-13T18:36:45.417",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cybersecurity@hitachienergy.com", "sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2024-06-11T14:15:11.503", "published": "2024-06-11T14:15:11.503",
"lastModified": "2024-06-13T18:36:45.417", "lastModified": "2024-06-13T18:36:45.417",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-06-13T06:15:09.453", "published": "2024-06-13T06:15:09.453",
"lastModified": "2024-06-13T18:36:09.010", "lastModified": "2024-06-13T18:36:09.010",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:11.117", "published": "2024-07-09T17:15:11.117",
"lastModified": "2024-07-09T18:18:38.713", "lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:11.337", "published": "2024-07-09T17:15:11.337",
"lastModified": "2024-07-09T18:18:38.713", "lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:11.573", "published": "2024-07-09T17:15:11.573",
"lastModified": "2024-07-09T18:18:38.713", "lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:11.800", "published": "2024-07-09T17:15:11.800",
"lastModified": "2024-07-09T18:18:38.713", "lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:12.033", "published": "2024-07-09T17:15:12.033",
"lastModified": "2024-07-09T18:18:38.713", "lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:12.260", "published": "2024-07-09T17:15:12.260",
"lastModified": "2024-07-09T18:18:38.713", "lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:12.487", "published": "2024-07-09T17:15:12.487",
"lastModified": "2024-07-09T18:18:38.713", "lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:12.857", "published": "2024-07-09T17:15:12.857",
"lastModified": "2024-07-09T18:18:38.713", "lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:13.103", "published": "2024-07-09T17:15:13.103",
"lastModified": "2024-07-09T18:18:38.713", "lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:13.327", "published": "2024-07-09T17:15:13.327",
"lastModified": "2024-07-09T18:18:38.713", "lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:13.550", "published": "2024-07-09T17:15:13.550",
"lastModified": "2024-07-09T18:18:38.713", "lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:13.770", "published": "2024-07-09T17:15:13.770",
"lastModified": "2024-07-09T18:18:38.713", "lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:13.973", "published": "2024-07-09T17:15:13.973",
"lastModified": "2024-07-09T18:18:38.713", "lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-07-01T15:15:13.387", "published": "2024-07-01T15:15:13.387",
"lastModified": "2024-07-01T16:37:39.040", "lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "sirt@juniper.net", "sourceIdentifier": "sirt@juniper.net",
"published": "2024-07-01T17:15:05.193", "published": "2024-07-01T17:15:05.193",
"lastModified": "2024-07-18T12:15:02.647", "lastModified": "2024-07-18T12:15:02.647",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-06-13T14:15:11.110", "published": "2024-06-13T14:15:11.110",
"lastModified": "2024-06-13T18:35:19.777", "lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "bressers@elastic.co", "sourceIdentifier": "bressers@elastic.co",
"published": "2024-06-19T14:15:13.360", "published": "2024-06-19T14:15:13.360",
"lastModified": "2024-06-20T12:44:01.637", "lastModified": "2024-06-20T12:44:01.637",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T22:15:02.857", "published": "2024-07-01T22:15:02.857",
"lastModified": "2024-07-02T12:09:16.907", "lastModified": "2024-07-02T12:09:16.907",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -9,6 +9,10 @@
{ {
"lang": "en", "lang": "en",
"value": "The Element Pack - Addon for Elementor Page Builder WordPress Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the widget wrapper link URL in all versions up to, and including, 7.9.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." "value": "The Element Pack - Addon for Elementor Page Builder WordPress Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the widget wrapper link URL in all versions up to, and including, 7.9.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Element Pack - Addon for Elementor Page Builder WordPress Plugin para WordPress para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de la URL del enlace del widget en todas las versiones hasta la 7.9.0 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida del usuario insuficientes en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
} }
], ],
"metrics": { "metrics": {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-06-13T14:15:11.370", "published": "2024-06-13T14:15:11.370",
"lastModified": "2024-06-13T18:35:19.777", "lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2024-08-02T10:16:00.250", "published": "2024-08-02T10:16:00.250",
"lastModified": "2024-08-02T12:59:43.990", "lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cybersecurity@hitachienergy.com", "sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2024-06-11T14:15:10.587", "published": "2024-06-11T14:15:10.587",
"lastModified": "2024-06-13T18:36:45.417", "lastModified": "2024-06-13T18:36:45.417",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cna@sap.com", "sourceIdentifier": "cna@sap.com",
"published": "2024-06-11T03:15:09.953", "published": "2024-06-11T03:15:09.953",
"lastModified": "2024-06-11T13:54:12.057", "lastModified": "2024-06-11T13:54:12.057",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-06-12T18:15:11.267", "published": "2024-06-12T18:15:11.267",
"lastModified": "2024-06-13T18:36:09.010", "lastModified": "2024-06-13T18:36:09.010",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-06-30T16:15:02.987", "published": "2024-06-30T16:15:02.987",
"lastModified": "2024-07-01T12:37:24.220", "lastModified": "2024-07-01T12:37:24.220",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:15.447", "published": "2024-07-09T17:15:15.447",
"lastModified": "2024-07-09T18:18:38.713", "lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-12T15:15:50.647", "published": "2024-06-12T15:15:50.647",
"lastModified": "2024-06-13T18:36:09.010", "lastModified": "2024-06-13T18:36:09.010",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-13T15:15:51.033", "published": "2024-06-13T15:15:51.033",
"lastModified": "2024-06-13T18:35:19.777", "lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-13T15:15:51.423", "published": "2024-06-13T15:15:51.423",
"lastModified": "2024-06-13T18:35:19.777", "lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-13T15:15:51.660", "published": "2024-06-13T15:15:51.660",
"lastModified": "2024-06-13T18:35:19.777", "lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-13T15:15:51.890", "published": "2024-06-13T15:15:51.890",
"lastModified": "2024-06-13T18:35:19.777", "lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-13T15:15:52.183", "published": "2024-06-13T15:15:52.183",
"lastModified": "2024-06-13T18:35:19.777", "lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@solarwinds.com", "sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-07-17T15:15:13.860", "published": "2024-07-17T15:15:13.860",
"lastModified": "2024-07-18T12:28:43.707", "lastModified": "2024-07-18T12:28:43.707",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "security@ubuntu.com", "sourceIdentifier": "security@ubuntu.com",
"published": "2024-07-25T20:15:04.280", "published": "2024-07-25T20:15:04.280",
"lastModified": "2024-07-26T12:38:41.683", "lastModified": "2024-07-26T12:38:41.683",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "security@ubuntu.com", "sourceIdentifier": "security@ubuntu.com",
"published": "2024-07-25T20:15:04.483", "published": "2024-07-25T20:15:04.483",
"lastModified": "2024-07-26T12:38:41.683", "lastModified": "2024-07-26T12:38:41.683",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-13T15:15:52.433", "published": "2024-06-13T15:15:52.433",
"lastModified": "2024-06-13T18:35:19.777", "lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -9,6 +9,10 @@
{ {
"lang": "en", "lang": "en",
"value": "Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6 fail to properly validate\u00a0synced reactions, when shared channels are enabled,\u00a0which allows a malicious remote to create arbitrary reactions on arbitrary posts" "value": "Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6 fail to properly validate\u00a0synced reactions, when shared channels are enabled,\u00a0which allows a malicious remote to create arbitrary reactions on arbitrary posts"
},
{
"lang": "es",
"value": " Las versiones 9.9.x &lt;= 9.9.0, 9.5.x &lt;= 9.5.6 de Mattermost no validan correctamente las reacciones sincronizadas cuando los canales compartidos est\u00e1n habilitados, lo que permite que un control remoto malicioso cree reacciones arbitrarias en publicaciones arbitrarias."
} }
], ],
"metrics": { "metrics": {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-06-13T20:15:12.457", "published": "2024-06-13T20:15:12.457",
"lastModified": "2024-06-26T18:15:12.910", "lastModified": "2024-06-26T18:15:12.910",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-07T17:15:50.267", "published": "2024-06-07T17:15:50.267",
"lastModified": "2024-06-07T19:24:09.243", "lastModified": "2024-06-07T19:24:09.243",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-06-12T19:15:50.710", "published": "2024-06-12T19:15:50.710",
"lastModified": "2024-06-13T18:36:09.010", "lastModified": "2024-06-13T18:36:09.010",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-06-27T18:15:17.857", "published": "2024-06-27T18:15:17.857",
"lastModified": "2024-06-27T19:25:12.067", "lastModified": "2024-06-27T19:25:12.067",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T21:15:03.617", "published": "2024-07-01T21:15:03.617",
"lastModified": "2024-07-02T12:09:16.907", "lastModified": "2024-07-02T12:09:16.907",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "productsecurity@jci.com", "sourceIdentifier": "productsecurity@jci.com",
"published": "2024-08-01T22:15:24.640", "published": "2024-08-01T22:15:24.640",
"lastModified": "2024-08-02T12:59:43.990", "lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2024-07-31T09:15:03.297", "published": "2024-07-31T09:15:03.297",
"lastModified": "2024-07-31T12:57:02.300", "lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "productsecurity@jci.com", "sourceIdentifier": "productsecurity@jci.com",
"published": "2024-08-01T22:15:24.783", "published": "2024-08-01T22:15:24.783",
"lastModified": "2024-08-02T12:59:43.990", "lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "productsecurity@jci.com", "sourceIdentifier": "productsecurity@jci.com",
"published": "2024-08-01T21:15:26.920", "published": "2024-08-01T21:15:26.920",
"lastModified": "2024-08-02T12:59:43.990", "lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "productsecurity@jci.com", "sourceIdentifier": "productsecurity@jci.com",
"published": "2024-08-01T21:15:27.150", "published": "2024-08-01T21:15:27.150",
"lastModified": "2024-08-02T12:59:43.990", "lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "productsecurity@jci.com", "sourceIdentifier": "productsecurity@jci.com",
"published": "2024-08-01T22:15:24.987", "published": "2024-08-01T22:15:24.987",
"lastModified": "2024-08-02T12:59:43.990", "lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "productsecurity@jci.com", "sourceIdentifier": "productsecurity@jci.com",
"published": "2024-08-01T22:15:25.190", "published": "2024-08-01T22:15:25.190",
"lastModified": "2024-08-02T12:59:43.990", "lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cna@sap.com", "sourceIdentifier": "cna@sap.com",
"published": "2024-06-11T03:15:10.393", "published": "2024-06-11T03:15:10.393",
"lastModified": "2024-06-11T13:54:12.057", "lastModified": "2024-06-11T13:54:12.057",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-14T15:15:50.170", "published": "2024-06-14T15:15:50.170",
"lastModified": "2024-08-01T13:51:54.967", "lastModified": "2024-08-01T13:51:54.967",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "security@acronis.com", "sourceIdentifier": "security@acronis.com",
"published": "2024-06-14T10:15:10.047", "published": "2024-06-14T10:15:10.047",
"lastModified": "2024-06-17T12:42:04.623", "lastModified": "2024-06-17T12:42:04.623",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cna@sap.com", "sourceIdentifier": "cna@sap.com",
"published": "2024-06-11T03:15:10.623", "published": "2024-06-11T03:15:10.623",
"lastModified": "2024-06-11T13:54:12.057", "lastModified": "2024-06-11T13:54:12.057",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cna@sap.com", "sourceIdentifier": "cna@sap.com",
"published": "2024-06-11T03:15:10.863", "published": "2024-06-11T03:15:10.863",
"lastModified": "2024-06-11T13:54:12.057", "lastModified": "2024-06-11T13:54:12.057",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

Some files were not shown because too many files have changed in this diff Show More