Auto-Update: 2024-09-26T14:00:24.064954+00:00

This commit is contained in:
cad-safe-bot 2024-09-26 14:03:23 +00:00
parent 853140a947
commit d01186c811
375 changed files with 4149 additions and 1224 deletions

View File

@ -2,13 +2,17 @@
"id": "CVE-2018-20072",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-09-23T22:15:02.587",
"lastModified": "2024-09-23T22:15:02.587",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient data validation in PDF in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform out of bounds memory access via a crafted PDF file. (Chromium security severity: Low)"
},
{
"lang": "es",
"value": "La validaci\u00f3n de datos insuficiente en PDF en Google Chrome anterior a la versi\u00f3n 73.0.3683.75 permiti\u00f3 que un atacante remoto accediera a la memoria fuera de los l\u00edmites a trav\u00e9s de un archivo PDF manipulado por un usuario. (Gravedad de seguridad de Chromium: baja)"
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-25212",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-11T09:15:01.887",
"lastModified": "2024-09-11T16:26:11.920",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-26T13:36:48.280",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
@ -51,18 +71,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:i13websolution:video_carousel_slider_with_lightbox:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.7",
"matchCriteriaId": "05321703-CAFC-481D-BEF8-B62CE6B06BFA"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?old_path=/wp-responsive-video-gallery-with-lightbox/tags/1.0.6&new_path=/wp-responsive-video-gallery-with-lightbox/tags/1.0.7&sfp_email=&sfph_mail=#file41",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://wordpress.org/plugins/wp-responsive-video-gallery-with-lightbox",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/85e70be3-3ed7-4ce1-a20c-046fb7c4ec31?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-38023",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-09-23T22:15:02.763",
"lastModified": "2024-09-25T01:35:08.607",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2021-38963",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-09-25T01:15:26.607",
"lastModified": "2024-09-25T01:15:26.607",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Aspera Console 3.4.0 through 3.4.4 could allow a remote authenticated attacker to execute arbitrary code on the system, caused by a CSV injection vulnerability. By persuading a victim to open a specially crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system."
},
{
"lang": "es",
"value": "IBM Aspera Console 3.4.0 a 3.4.4 podr\u00eda permitir que un atacante remoto autenticado ejecute c\u00f3digo arbitrario en el sistema, debido a una vulnerabilidad de inyecci\u00f3n CSV. Al persuadir a una v\u00edctima para que abra un archivo especialmente manipulado, un atacante podr\u00eda aprovechar esta vulnerabilidad para ejecutar c\u00f3digo arbitrario en el sistema."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2022-2439",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-24T03:15:02.040",
"lastModified": "2024-09-24T03:15:02.040",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Easy Digital Downloads \u2013 Simple eCommerce for Selling Digital Files plugin for WordPress is vulnerable to deserialization of untrusted input via the 'upload[file]' parameter in versions up to, and including 3.3.3. This makes it possible for authenticated administrative users to call files using a PHAR wrapper, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present."
},
{
"lang": "es",
"value": "El complemento Easy Digital Downloads \u2013 Simple eCommerce for Selling Digital Files para WordPress es vulnerable a la deserializaci\u00f3n de entradas no confiables a trav\u00e9s del par\u00e1metro 'upload[file]' en versiones hasta la 3.3.3 incluida. Esto permite que los usuarios administrativos autenticados llamen a archivos mediante un contenedor PHAR, que deserializar\u00e1 y llamar\u00e1 a objetos PHP arbitrarios que se pueden usar para realizar una variedad de acciones maliciosas siempre que tambi\u00e9n est\u00e9 presente una cadena POP."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2022-43845",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-09-25T01:15:32.757",
"lastModified": "2024-09-25T01:15:32.757",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Aspera Console 3.4.0 through 3.4.4 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie."
},
{
"lang": "es",
"value": "IBM Aspera Console 3.4.0 a 3.4.4 podr\u00eda permitir que un atacante remoto obtenga informaci\u00f3n confidencial, debido a la falla al configurar el indicador HTTPOnly. Un atacante remoto podr\u00eda aprovechar esta vulnerabilidad para obtener informaci\u00f3n confidencial de la cookie."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4541",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-26T10:15:02.437",
"lastModified": "2024-09-26T10:15:02.437",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48945",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-23T10:15:02.467",
"lastModified": "2024-09-23T10:15:02.467",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2022-49037",
"sourceIdentifier": "security@synology.com",
"published": "2024-09-26T04:15:03.770",
"lastModified": "2024-09-26T04:15:03.770",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insertion of sensitive information into log file vulnerability in proxy settings component in Synology Drive Client before 3.3.0-15082 allows remote authenticated users to obtain sensitive information via unspecified vectors."
},
{
"lang": "es",
"value": "La vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en el archivo de registro en el componente de configuraci\u00f3n de proxy en Synology Drive Client anterior a 3.3.0-15082 permite que usuarios remotos autenticados obtengan informaci\u00f3n confidencial a trav\u00e9s de vectores no especificados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2022-49038",
"sourceIdentifier": "security@synology.com",
"published": "2024-09-26T04:15:04.940",
"lastModified": "2024-09-26T04:15:04.940",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inclusion of functionality from untrusted control sphere vulnerability in OpenSSL DLL component in Synology Drive Client before 3.3.0-15082 allows local users to execute arbitrary code via unspecified vectors."
},
{
"lang": "es",
"value": "La inclusi\u00f3n de funcionalidad de una vulnerabilidad de esfera de control no confiable en el componente DLL de OpenSSL en Synology Drive Client anterior a 3.3.0-15082 permite a los usuarios locales ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2022-49039",
"sourceIdentifier": "security@synology.com",
"published": "2024-09-26T04:15:05.187",
"lastModified": "2024-09-26T04:15:05.187",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write vulnerability in backup task management functionality in Synology Drive Client before 3.4.0-15721 allows local users with administrator privileges to execute arbitrary commands via unspecified vectors."
},
{
"lang": "es",
"value": "La vulnerabilidad de escritura fuera de los l\u00edmites en la funcionalidad de administraci\u00f3n de tareas de respaldo en Synology Drive Client anterior a 3.4.0-15721 permite que los usuarios locales con privilegios de administrador ejecuten comandos arbitrarios a trav\u00e9s de vectores no especificados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2022-49040",
"sourceIdentifier": "security@synology.com",
"published": "2024-09-26T04:15:05.390",
"lastModified": "2024-09-26T04:15:05.390",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in connection management functionality in Synology Drive Client before 3.4.0-15721 allows local users with administrator privileges to crash the client via unspecified vectors."
},
{
"lang": "es",
"value": "La vulnerabilidad de copia de b\u00fafer sin verificar el tama\u00f1o de la entrada ('Desbordamiento de b\u00fafer cl\u00e1sico') en la funcionalidad de administraci\u00f3n de conexi\u00f3n en Synology Drive Client anterior a 3.4.0-15721 permite que los usuarios locales con privilegios de administrador bloqueen el cliente a trav\u00e9s de vectores no especificados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2022-49041",
"sourceIdentifier": "security@synology.com",
"published": "2024-09-26T04:15:05.620",
"lastModified": "2024-09-26T04:15:05.620",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in backup task management functionality in Synology Drive Client before 3.4.0-15721 allows local users with administrator privileges to crash the client via unspecified vectors."
},
{
"lang": "es",
"value": "La vulnerabilidad de copia de b\u00fafer sin verificar el tama\u00f1o de la entrada ('Desbordamiento de b\u00fafer cl\u00e1sico') en la funcionalidad de administraci\u00f3n de tareas de copia de seguridad en Synology Drive Client anterior a 3.4.0-15721 permite que los usuarios locales con privilegios de administrador bloqueen el cliente a trav\u00e9s de vectores no especificados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-25189",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T16:15:06.827",
"lastModified": "2024-09-25T16:15:06.827",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BTS is affected by information disclosure vulnerability where mobile network operator personnel connected over BTS Web Element Manager, regardless of the access privileges, having a possibility to read BTS service operation details performed by Nokia Care service personnel via SSH."
},
{
"lang": "es",
"value": "BTS se ve afectado por una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n donde el personal del operador de red m\u00f3vil conectado a trav\u00e9s de BTS Web Element Manager, independientemente de los privilegios de acceso, tiene la posibilidad de leer los detalles de las operaciones del servicio BTS realizadas por el personal de servicio de Nokia Care a trav\u00e9s de SSH."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-26686",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T01:15:33.760",
"lastModified": "2024-09-25T01:35:39.633",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "File Upload vulnerability in CS-Cart MultiVendor 4.16.1 allows remote attackers to run arbitrary code via the image upload feature when customizing a shop."
},
{
"lang": "es",
"value": "La vulnerabilidad de carga de archivos en CS-Cart MultiVendor 4.16.1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n de carga de im\u00e1genes al personalizar una tienda."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-26687",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T01:15:33.837",
"lastModified": "2024-09-25T01:35:40.363",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory Traversal vulnerability in CS-Cart MultiVendor 4.16.1 allows remote attackers to obtain sensitive information via the product_data parameter in the PDF Add-on."
},
{
"lang": "es",
"value": "La vulnerabilidad de Directory Traversal en CS-Cart MultiVendor 4.16.1 permite a atacantes remotos obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro product_data en el complemento PDF."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-26688",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T01:15:33.887",
"lastModified": "2024-09-25T01:35:41.087",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting (XSS) vulnerability in CS-Cart MultiVendor 4.16.1 allows remote attackers to run arbitrary code via the product_data parameter of add/edit product in the administration interface."
},
{
"lang": "es",
"value": "La vulnerabilidad de Cross Site Scripting (XSS) en CS-Cart MultiVendor 4.16.1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro product_data de agregar/editar producto en la interfaz de administraci\u00f3n."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-26689",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T01:15:33.943",
"lastModified": "2024-09-25T01:35:41.817",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue discovered in CS-Cart MultiVendor 4.16.1 allows attackers to alter arbitrary user account profiles via crafted post request."
},
{
"lang": "es",
"value": "Un problema descubierto en CS-Cart MultiVendor 4.16.1 permite a los atacantes alterar perfiles de cuentas de usuario arbitrarias a trav\u00e9s de solicitudes de publicaciones manipuladas."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-26690",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T01:15:33.997",
"lastModified": "2024-09-25T01:35:42.567",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "File Upload vulnerability in CS-Cart MultiVendor 4.16.1 allows remote attackers to run arbitrary code via File Manager/Editor component in the vendor or admin menu."
},
{
"lang": "es",
"value": "La vulnerabilidad de carga de archivos en CS-Cart MultiVendor 4.16.1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente Administrador/Editor de archivos en el men\u00fa de administraci\u00f3n o del proveedor."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-26691",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T01:15:34.057",
"lastModified": "2024-09-25T01:35:43.300",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory Traversal vulnerability in CS-Cart MultiVendor 4.16.1 allows remote attackers to run arbitrary code via crafted zip file when installing a new add-on."
},
{
"lang": "es",
"value": "La vulnerabilidad de Directory Traversal en CS-Cart MultiVendor 4.16.1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo zip creado al instalar un nuevo complemento."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32472",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-07-10T03:15:02.193",
"lastModified": "2024-09-10T18:43:36.990",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-26T12:15:02.800",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -61,7 +61,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
@ -71,12 +71,12 @@
]
},
{
"source": "security_alert@emc.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
"value": "CWE-787"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39517",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-21T20:15:12.307",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-26T13:36:19.963",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,18 +81,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:*",
"versionEndExcluding": "2.12.8",
"matchCriteriaId": "23F5CA99-69DB-4D33-AE9A-E4BEAD09F57A"
}
]
}
]
}
],
"references": [
{
"url": "https://developer.mozilla.org/en-US/docs/Web/HTML/Element/iframe#sandbox",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Not Applicable"
]
},
{
"url": "https://github.com/laurent22/joplin/commit/7c52c3e9a81a52ef1b42a951f9deb9d378d59b0f",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/laurent22/joplin/security/advisories/GHSA-2h88-m32f-qh5m",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-46948",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-23T18:15:03.860",
"lastModified": "2024-09-23T18:35:11.547",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A reflected Cross-Site Scripting (XSS) vulnerability was found on Temenos T24 Browser R19.40 that enables a remote attacker to execute arbitrary JavaScript code via the skin parameter in the about.jsp and genrequest.jsp components."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad de cross-site scripting (XSS) reflejado en Temenos T24 Browser R19.40 que permite a un atacante remoto ejecutar c\u00f3digo JavaScript arbitrario a trav\u00e9s del par\u00e1metro skin en los componentes about.jsp y genrequest.jsp."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-47480",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-20T17:15:14.673",
"lastModified": "2024-09-20T19:35:03.700",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Pure Data 0.54-0 and fixed in 0.54-1 allows a local attacker to escalate privileges via the set*id () function."
},
{
"lang": "es",
"value": "Un problema en Pure Data 0.54-0 y solucionado en 0.54-1 permite a un atacante local escalar privilegios a trav\u00e9s de la funci\u00f3n set*id()."
}
],
"metrics": {

View File

@ -2,20 +2,13 @@
"id": "CVE-2023-4972",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2023-09-14T20:15:13.403",
"lastModified": "2024-08-26T14:15:07.190",
"lastModified": "2024-09-26T12:15:03.037",
"vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "iletisim@usom.gov.tr",
"tags": [
"unsupported-when-assigned"
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Use of Privileged APIs vulnerability in Yepas Digital Yepas allows Collect Data as Provided by Users.This issue affects all versions.\u00a0NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
"value": "Incorrect Use of Privileged APIs vulnerability in Yepas Digital Yepas allows Collect Data as Provided by Users.This issue affects Digital Yepas: before 1.0.1."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-4993",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-02-15T16:15:45.643",
"lastModified": "2024-08-26T14:15:07.457",
"lastModified": "2024-09-26T12:15:03.223",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Privilege Management vulnerability in Utarit Information Technologies SoliPay Mobile App allows Collect Data as Provided by Users.This issue affects SoliPay Mobile App: before 5.0.8."
"value": "Incorrect Use of Privileged APIs vulnerability in Utarit Information Technologies SoliPay Mobile App allows Collect Data as Provided by Users.This issue affects SoliPay Mobile App: before 5.0.8."
},
{
"lang": "es",

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-51157",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T19:15:04.453",
"lastModified": "2024-09-25T20:35:27.440",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in ZKTeco WDMS v.5.1.3 Pro allows a remote attacker to execute arbitrary code and obtain sensitive information via a crafted script to the Emp Name parameter."
},
{
"lang": "es",
"value": "La vulnerabilidad de Cross Site Scripting en ZKTeco WDMS v.5.1.3 Pro permite a un atacante remoto ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de una secuencia de comandos manipulada espec\u00edficamente para el par\u00e1metro Emp Name."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-52946",
"sourceIdentifier": "security@synology.com",
"published": "2024-09-26T04:15:05.863",
"lastModified": "2024-09-26T04:15:05.863",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in vss service component in Synology Drive Client before 3.5.0-16084 allows remote attackers to overwrite trivial buffers and crash the client via unspecified vectors."
},
{
"lang": "es",
"value": "La vulnerabilidad de copia de b\u00fafer sin verificar el tama\u00f1o de la entrada ('Desbordamiento de b\u00fafer cl\u00e1sico') en el componente de servicio vss en Synology Drive Client anterior a 3.5.0-16084 permite a atacantes remotos sobrescribir b\u00faferes triviales y bloquear el cliente a trav\u00e9s de vectores no especificados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-52947",
"sourceIdentifier": "security@synology.com",
"published": "2024-09-26T04:15:06.110",
"lastModified": "2024-09-26T04:15:06.110",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing authentication for critical function vulnerability in logout functionality in Synology Active Backup for Business Agent before 2.6.3-3101 allows local users to logout the client via unspecified vectors. The backup functionality will continue to operate and will not be affected by the logout."
},
{
"lang": "es",
"value": "La vulnerabilidad de falta de autenticaci\u00f3n para funciones cr\u00edticas en la funcionalidad de cierre de sesi\u00f3n en Synology Active Backup for Business Agent anterior a la versi\u00f3n 2.6.3-3101 permite que los usuarios locales cierren la sesi\u00f3n del cliente a trav\u00e9s de vectores no especificados. La funcionalidad de copia de seguridad seguir\u00e1 funcionando y no se ver\u00e1 afectada por el cierre de sesi\u00f3n."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-52948",
"sourceIdentifier": "security@synology.com",
"published": "2024-09-26T04:15:06.327",
"lastModified": "2024-09-26T04:15:06.327",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing encryption of sensitive data vulnerability in settings functionality in Synology Active Backup for Business Agent before 2.7.0-3221 allows local users to obtain user credential via unspecified vectors."
},
{
"lang": "es",
"value": "La vulnerabilidad de falta de cifrado de datos confidenciales en la funcionalidad de configuraci\u00f3n en Synology Active Backup for Business Agent anterior a 2.7.0-3221 permite que los usuarios locales obtengan credenciales de usuario a trav\u00e9s de vectores no especificados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-52949",
"sourceIdentifier": "security@synology.com",
"published": "2024-09-26T04:15:06.550",
"lastModified": "2024-09-26T04:15:06.550",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing authentication for critical function vulnerability in proxy settings functionality in Synology Active Backup for Business Agent before 2.7.0-3221 allows local users to obtain user credential via unspecified vectors."
},
{
"lang": "es",
"value": "La vulnerabilidad de falta de autenticaci\u00f3n para funciones cr\u00edticas en la funcionalidad de configuraci\u00f3n de proxy en Synology Active Backup for Business Agent anterior a 2.7.0-3221 permite que los usuarios locales obtengan credenciales de usuario a trav\u00e9s de vectores no especificados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-52950",
"sourceIdentifier": "security@synology.com",
"published": "2024-09-26T04:15:06.780",
"lastModified": "2024-09-26T04:15:06.780",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing encryption of sensitive data vulnerability in login component in Synology Active Backup for Business Agent before 2.7.0-3221 allows adjacent man-in-the-middle attackers to obtain user credential via unspecified vectors."
},
{
"lang": "es",
"value": "La vulnerabilidad de cifrado faltante de datos confidenciales en el componente de inicio de sesi\u00f3n en Synology Active Backup for Business Agent anterior a 2.7.0-3221 permite a atacantes intermediarios adyacentes obtener credenciales de usuario a trav\u00e9s de vectores no especificados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-5359",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-25T01:15:39.730",
"lastModified": "2024-09-25T01:15:39.730",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The W3 Total Cache plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 2.7.5 via Google OAuth API secrets stored in plaintext in the publicly visible plugin source. This can allow unauthenticated attackers to impersonate W3 Total Cache and gain access to user account information in successful conditions. This would not impact the WordPress users site in any way."
},
{
"lang": "es",
"value": "El complemento W3 Total Cache para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en versiones hasta la 2.7.5 incluida, a trav\u00e9s de secretos de la API de Google OAuth almacenados en texto plano en la fuente del complemento visible p\u00fablicamente. Esto puede permitir que atacantes no autenticados se hagan pasar por W3 Total Cache y obtengan acceso a la informaci\u00f3n de la cuenta del usuario en condiciones exitosas. Esto no afectar\u00eda al sitio de los usuarios de WordPress de ninguna manera."
}
],
"metrics": {

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-5983",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2023-11-22T12:15:22.777",
"lastModified": "2024-08-26T14:15:07.593",
"lastModified": "2024-09-26T12:15:03.340",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Botanik Software Pharmacy Automation allows Retrieve Embedded Sensitive Data.This issue affects Pharmacy Automation: before 2.1.133.0."
"value": "Exposure of Private Personal Information to an Unauthorized Actor vulnerability in Botanik Software Pharmacy Automation allows Retrieve Embedded Sensitive Data.This issue affects Pharmacy Automation: before 2.1.133.0."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-6150",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2023-11-28T10:15:07.397",
"lastModified": "2024-08-26T15:15:07.527",
"lastModified": "2024-09-26T12:15:03.463",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Privilege Management vulnerability in ESKOM Computer e-municipality module allows Collect Data as Provided by Users.This issue affects e-municipality module: before v.105."
"value": "Incorrect Use of Privileged APIs vulnerability in ESKOM Computer e-municipality module allows Collect Data as Provided by Users.This issue affects e-municipality module: before v.105."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-6151",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2023-11-28T10:15:07.610",
"lastModified": "2024-08-26T15:15:07.653",
"lastModified": "2024-09-26T12:15:03.583",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Privilege Management vulnerability in ESKOM Computer e-municipality module allows Collect Data as Provided by Users.This issue affects e-municipality module: before v.105."
"value": "Incorrect Use of Privileged APIs vulnerability in ESKOM Computer e-municipality module allows Collect Data as Provided by Users.This issue affects e-municipality module: before v.105."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-6190",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2023-12-27T15:15:45.900",
"lastModified": "2024-08-27T09:15:03.540",
"lastModified": "2024-09-26T13:15:03.870",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Input Validation vulnerability in \u0130zmir Katip \u00c7elebi University University Information Management System allows Absolute Path Traversal.This issue affects University Information Management System: before 30.11.2023."
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in \u0130zmir Katip \u00c7elebi University University Information Management System allows Absolute Path Traversal.This issue affects University Information Management System: before 30.11.2023."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-6522",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-04-05T12:15:36.267",
"lastModified": "2024-08-26T15:15:07.763",
"lastModified": "2024-09-26T12:15:03.690",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Privilege Management vulnerability in ExtremePacs Extreme XDS allows Collect Data as Provided by Users.This issue affects Extreme XDS: before 3914."
"value": "Incorrect Use of Privileged APIs vulnerability in ExtremePacs Extreme XDS allows Collect Data as Provided by Users.This issue affects Extreme XDS: before 3914."
},
{
"lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7281",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-09-23T22:15:03.027",
"lastModified": "2024-09-25T01:36:49.143",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7282",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-09-23T22:15:03.083",
"lastModified": "2024-09-25T01:36:49.867",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-0001",
"sourceIdentifier": "psirt@purestorage.com",
"published": "2024-09-23T18:15:04.070",
"lastModified": "2024-09-23T18:15:04.070",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A condition exists in FlashArray Purity whereby a local account intended for initial array configuration remains active potentially allowing a malicious actor to gain elevated privileges."
},
{
"lang": "es",
"value": "Existe una condici\u00f3n en FlashArray Purity por la cual una cuenta local destinada a la configuraci\u00f3n inicial de la matriz permanece activa, lo que potencialmente permite que un actor malintencionado obtenga privilegios elevados."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-0002",
"sourceIdentifier": "psirt@purestorage.com",
"published": "2024-09-23T18:15:04.410",
"lastModified": "2024-09-23T18:15:04.410",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A condition exists in FlashArray Purity whereby an attacker can employ a privileged account allowing remote access to the array."
},
{
"lang": "es",
"value": "Existe una condici\u00f3n en FlashArray Purity mediante la cual un atacante puede emplear una cuenta privilegiada que permita el acceso remoto a la matriz."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-0003",
"sourceIdentifier": "psirt@purestorage.com",
"published": "2024-09-23T18:15:04.697",
"lastModified": "2024-09-23T18:15:04.697",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A condition exists in FlashArray Purity whereby a malicious user could use a remote administrative service to create an account on the array allowing privileged access."
},
{
"lang": "es",
"value": "Existe una condici\u00f3n en FlashArray Purity por la cual un usuario malintencionado podr\u00eda usar un servicio administrativo remoto para crear una cuenta en la matriz que permita acceso privilegiado."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-0004",
"sourceIdentifier": "psirt@purestorage.com",
"published": "2024-09-23T18:15:04.973",
"lastModified": "2024-09-23T18:15:04.973",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A condition exists in FlashArray Purity whereby an user with array admin role can execute arbitrary commands remotely to escalate privilege on the array."
},
{
"lang": "es",
"value": "Existe una condici\u00f3n en FlashArray Purity por la cual un usuario con rol de administrador de matriz puede ejecutar comandos arbitrarios de forma remota para escalar privilegios en la matriz."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-0005",
"sourceIdentifier": "psirt@purestorage.com",
"published": "2024-09-23T18:15:05.233",
"lastModified": "2024-09-23T18:15:05.233",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A condition exists in FlashArray and FlashBlade Purity whereby a malicious user could execute arbitrary commands remotely through a specifically crafted SNMP configuration."
},
{
"lang": "es",
"value": "Existe una condici\u00f3n en FlashArray y FlashBlade Purity por la cual un usuario malintencionado podr\u00eda ejecutar comandos arbitrarios de forma remota a trav\u00e9s de una configuraci\u00f3n SNMP espec\u00edficamente manipulada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-0132",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-09-26T06:15:02.397",
"lastModified": "2024-09-26T06:15:02.397",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access to the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering."
},
{
"lang": "es",
"value": "NVIDIA Container Toolkit 1.16.1 o versiones anteriores contienen una vulnerabilidad de tipo TOCTOU (Time-of-check Time-of-Use) cuando se utiliza con la configuraci\u00f3n predeterminada, en la que una imagen de contenedor manipulada espec\u00edficamente puede obtener acceso al sistema de archivos del host. Esto no afecta a los casos de uso en los que se utiliza CDI. Una explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar la ejecuci\u00f3n de c\u00f3digo, la denegaci\u00f3n de servicio, la escalada de privilegios, la divulgaci\u00f3n de informaci\u00f3n y la manipulaci\u00f3n de datos."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-0133",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-09-26T06:15:04.053",
"lastModified": "2024-09-26T06:15:04.053",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering."
},
{
"lang": "es",
"value": "NVIDIA Container Toolkit 1.16.1 o versiones anteriores contienen una vulnerabilidad en el modo de funcionamiento predeterminado que permite que una imagen de contenedor especialmente manipulada cree archivos vac\u00edos en el sistema de archivos del host. Esto no afecta a los casos de uso en los que se utiliza CDI. Una explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar la manipulaci\u00f3n de datos."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20350",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:15.000",
"lastModified": "2024-09-25T17:15:15.000",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the SSH server of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an unauthenticated, remote attacker to impersonate a Cisco Catalyst Center appliance.\r\n\r\nThis vulnerability is due to the presence of a static SSH host key. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on SSH connections, which could allow the attacker to intercept traffic between SSH clients and a Cisco Catalyst Center appliance. A successful exploit could allow the attacker to impersonate the affected appliance, inject commands into the terminal session, and steal valid user credentials."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el servidor SSH de Cisco Catalyst Center, anteriormente Cisco DNA Center, podr\u00eda permitir que un atacante remoto no autenticado se haga pasar por un dispositivo Cisco Catalyst Center. Esta vulnerabilidad se debe a la presencia de una clave de host SSH est\u00e1tica. Un atacante podr\u00eda aprovechar esta vulnerabilidad realizando un ataque de tipo m\u00e1quina intermedia en las conexiones SSH, lo que podr\u00eda permitir al atacante interceptar el tr\u00e1fico entre los clientes SSH y un dispositivo Cisco Catalyst Center. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante hacerse pasar por el dispositivo afectado, inyectar comandos en la sesi\u00f3n de terminal y robar credenciales de usuario v\u00e1lidas."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20414",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:15.413",
"lastModified": "2024-09-25T17:15:15.413",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web UI feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system through the web UI.\r\n\r This vulnerability is due to incorrectly accepting configuration changes through the HTTP GET method. An attacker could exploit this vulnerability by persuading a currently authenticated administrator to follow a crafted link. A successful exploit could allow the attacker to change the configuration of the affected device."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la funci\u00f3n de interfaz de usuario web de Cisco IOS Software y Cisco IOS XE Software podr\u00eda permitir que un atacante remoto no autenticado realice un ataque de Cross-Site Request Forgery (CSRF) en un sistema afectado a trav\u00e9s de la interfaz de usuario web. Esta vulnerabilidad se debe a la aceptaci\u00f3n incorrecta de cambios de configuraci\u00f3n a trav\u00e9s del m\u00e9todo HTTP GET. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un administrador actualmente autenticado para que siga un enlace manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante cambiar la configuraci\u00f3n del dispositivo afectado."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20433",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:15.677",
"lastModified": "2024-09-25T17:15:15.677",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Resource Reservation Protocol (RSVP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to a buffer overflow when processing crafted RSVP packets. An attacker could exploit this vulnerability by sending RSVP traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la funci\u00f3n de Protocolo de reserva de recursos (RSVP) de Cisco IOS Software y Cisco IOS XE Software podr\u00eda permitir que un atacante remoto no autenticado haga que un dispositivo afectado se recargue inesperadamente, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad se debe a un desbordamiento de b\u00fafer al procesar paquetes RSVP manipulados. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando tr\u00e1fico RSVP a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante haga que el dispositivo afectado se recargue, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS)."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20434",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:16.090",
"lastModified": "2024-09-25T17:15:16.090",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the control plane of an affected device.\r\n\r This vulnerability is due to improper handling of frames with VLAN tag information. An attacker could exploit this vulnerability by sending crafted frames to an affected device. A successful exploit could allow the attacker to render the control plane of the affected device unresponsive. The device would not be accessible through the console or CLI, and it would not respond to ping requests, SNMP requests, or requests from other control plane protocols. Traffic that is traversing the device through the data plane is not affected. A reload of the device is required to restore control plane services."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el software Cisco IOS XE podr\u00eda permitir que un atacante adyacente no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en el plano de control de un dispositivo afectado. Esta vulnerabilidad se debe a un manejo inadecuado de tramas con informaci\u00f3n de etiqueta VLAN. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando tramas manipuladas a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante dejar inoperante el plano de control del dispositivo afectado. El dispositivo no ser\u00eda accesible a trav\u00e9s de la consola o la CLI, y no responder\u00eda a las solicitudes de ping, solicitudes SNMP o solicitudes de otros protocolos del plano de control. El tr\u00e1fico que atraviesa el dispositivo a trav\u00e9s del plano de datos no se ve afectado. Se requiere una recarga del dispositivo para restaurar los servicios del plano de control."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20436",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:16.400",
"lastModified": "2024-09-25T17:15:16.400",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the HTTP Server feature of Cisco IOS XE Software when the Telephony Service feature is enabled could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to a null pointer dereference when accessing specific URLs. An attacker could exploit this vulnerability by sending crafted HTTP traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, causing a DoS condition on the affected device."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la funci\u00f3n de servidor HTTP del software Cisco IOS XE cuando la funci\u00f3n de servicio de telefon\u00eda est\u00e1 habilitada podr\u00eda permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a una desreferencia de puntero nulo al acceder a URL espec\u00edficas. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando tr\u00e1fico HTTP manipulado a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante haga que el dispositivo afectado se recargue, lo que provocar\u00eda una condici\u00f3n de DoS en el dispositivo afectado."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20437",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:16.630",
"lastModified": "2024-09-25T17:15:16.630",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform a cross-site request forgery (CSRF) attack and execute commands on the CLI of an affected device.\r\n\r This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an already authenticated user to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del software Cisco IOS XE podr\u00eda permitir que un atacante remoto no autenticado realice un ataque de Cross-Site Request Forgery (CSRF) y ejecute comandos en la CLI de un dispositivo afectado. Esta vulnerabilidad se debe a que no hay suficientes protecciones CSRF para la interfaz de administraci\u00f3n basada en web de un dispositivo afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario ya autenticado para que siga un enlace manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante realizar acciones arbitrarias en el dispositivo afectado con los privilegios del usuario objetivo."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20455",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:16.827",
"lastModified": "2024-09-25T17:15:16.827",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the process that classifies traffic that is going to the Unified Threat Defense (UTD) component of Cisco IOS XE Software in controller mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability exists because UTD improperly handles certain packets as those packets egress an SD-WAN IPsec tunnel. An attacker could exploit this vulnerability by sending crafted traffic through an SD-WAN IPsec tunnel that is configured on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.\r\n\r Note: SD-WAN tunnels that are configured with Generic Routing Encapsulation (GRE) are not affected by this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el proceso que clasifica el tr\u00e1fico que se dirige al componente Unified Threat Defense (UTD) del software Cisco IOS XE en modo controlador podr\u00eda permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad existe porque UTD maneja incorrectamente ciertos paquetes cuando esos paquetes salen de un t\u00fanel IPsec SD-WAN. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando tr\u00e1fico manipulado a trav\u00e9s de un t\u00fanel IPsec SD-WAN que est\u00e9 configurado en un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante haga que el dispositivo se recargue, lo que da como resultado una condici\u00f3n de DoS. Nota: Los t\u00faneles SD-WAN que est\u00e1n configurados con Encapsulaci\u00f3n de enrutamiento gen\u00e9rico (GRE) no se ven afectados por esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20464",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:17.043",
"lastModified": "2024-09-25T17:15:17.043",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Protocol Independent Multicast (PIM) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to insufficient validation of received IPv4 PIMv2 packets. An attacker could exploit this vulnerability by sending a crafted PIMv2 packet to a PIM-enabled interface on an affected device. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition.\r\n\r Note: This vulnerability can be exploited with either an IPv4 multicast or unicast packet."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la funci\u00f3n de multidifusi\u00f3n independiente del protocolo (PIM) del software Cisco IOS XE podr\u00eda permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de los paquetes PIMv2 IPv4 recibidos. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un paquete PIMv2 manipulado a una interfaz habilitada para PIM en un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante haga que un dispositivo afectado se recargue, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio. Nota: Esta vulnerabilidad se puede aprovechar con un paquete de multidifusi\u00f3n o unidifusi\u00f3n IPv4."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20465",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:17.220",
"lastModified": "2024-09-25T17:15:17.220",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the access control list (ACL) programming of Cisco IOS Software running on Cisco Industrial Ethernet 4000, 4010, and 5000 Series Switches could allow an unauthenticated, remote attacker to bypass a configured ACL.\r\n\r This vulnerability is due to the incorrect handling of IPv4 ACLs on switched virtual interfaces when an administrator enables and disables Resilient Ethernet Protocol (REP). An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la programaci\u00f3n de la lista de control de acceso (ACL) del software Cisco IOS que se ejecuta en los switches Cisco Industrial Ethernet de las series 4000, 4010 y 5000 podr\u00eda permitir que un atacante remoto no autenticado omita una ACL configurada. Esta vulnerabilidad se debe al manejo incorrecto de las ACL de IPv4 en las interfaces virtuales conmutadas cuando un administrador habilita y deshabilita el protocolo Resilient Ethernet (REP). Un atacante podr\u00eda aprovechar esta vulnerabilidad al intentar enviar tr\u00e1fico a trav\u00e9s de un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante omitir una ACL en el dispositivo afectado."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20467",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:17.393",
"lastModified": "2024-09-25T17:15:17.393",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the implementation of the IPv4 fragmentation reassembly code in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper management of resources during fragment reassembly. An attacker could exploit this vulnerability by sending specific sizes of fragmented packets to an affected device or through a Virtual Fragmentation Reassembly (VFR)-enabled interface on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.\r\n\r Note: This vulnerability affects Cisco ASR 1000 Series Aggregation Services Routers and Cisco cBR-8 Converged Broadband Routers if they are running Cisco IOS XE Software Release 17.12.1 or 17.12.1a."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la implementaci\u00f3n del c\u00f3digo de reensamblado de fragmentaci\u00f3n de IPv4 en el software Cisco IOS XE podr\u00eda permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a una administraci\u00f3n incorrecta de los recursos durante el reensamblado de fragmentos. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando tama\u00f1os espec\u00edficos de paquetes fragmentados a un dispositivo afectado o a trav\u00e9s de una interfaz habilitada para reensamblado de fragmentaci\u00f3n virtual (VFR) en un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante haga que el dispositivo se recargue, lo que da como resultado una condici\u00f3n de DoS. Nota: Esta vulnerabilidad afecta a los enrutadores de servicios de agregaci\u00f3n de la serie Cisco ASR 1000 y a los enrutadores de banda ancha convergentes Cisco cBR-8 si ejecutan la versi\u00f3n 17.12.1 o 17.12.1a del software Cisco IOS XE."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20475",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:17.587",
"lastModified": "2024-09-25T17:15:17.587",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Catalyst SD-WAN Manager, anteriormente Cisco SD-WAN vManage, podr\u00eda permitir que un atacante remoto autenticado realice un ataque de Cross Site Scripting (XSS) contra un usuario de la interfaz. Esta vulnerabilidad existe porque la interfaz de administraci\u00f3n basada en web no valida correctamente la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad insertando datos maliciosos en un campo de datos espec\u00edfico en una interfaz afectada. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de secuencia de comandos arbitrario en el contexto de la interfaz afectada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20480",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:17.787",
"lastModified": "2024-09-25T17:15:17.787",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the DHCP Snooping feature of Cisco IOS XE Software on Software-Defined Access (SD-Access) fabric edge nodes could allow an unauthenticated, remote attacker to cause high CPU utilization on an affected device, resulting in a denial of service (DoS) condition that requires a manual reload to recover. \r\n\r This vulnerability is due to improper handling of IPv4 DHCP packets. An attacker could exploit this vulnerability by sending certain IPv4 DHCP packets to an affected device. A successful exploit could allow the attacker to cause the device to exhaust CPU resources and stop processing traffic, resulting in a DoS condition that requires a manual reload to recover."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la funci\u00f3n DHCP Snooping del software Cisco IOS XE en los nodos de borde de la estructura de acceso definido por software (SD-Access) podr\u00eda permitir que un atacante remoto no autenticado provoque un alto uso de la CPU en un dispositivo afectado, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS) que requiere una recarga manual para recuperarse. Esta vulnerabilidad se debe a un manejo inadecuado de los paquetes DHCP de IPv4. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando ciertos paquetes DHCP de IPv4 a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante haga que el dispositivo agote los recursos de la CPU y deje de procesar el tr\u00e1fico, lo que da como resultado una condici\u00f3n de DoS que requiere una recarga manual para recuperarse."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20496",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:18.020",
"lastModified": "2024-09-25T17:15:18.020",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the UDP packet validation code of Cisco SD-WAN vEdge Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected system.\r\n\r\nThis vulnerability is due to incorrect handling of a specific type of malformed UDP packet. An attacker in a machine-in-the-middle position could exploit this vulnerability by sending crafted UDP packets to an affected device. A successful exploit could allow the attacker to cause the device to reboot, resulting in a DoS condition on the affected system."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el c\u00f3digo de validaci\u00f3n de paquetes UDP del software Cisco SD-WAN vEdge podr\u00eda permitir que un atacante adyacente no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un sistema afectado. Esta vulnerabilidad se debe al manejo incorrecto de un tipo espec\u00edfico de paquete UDP malformado. Un atacante en una posici\u00f3n de m\u00e1quina intermedia podr\u00eda aprovechar esta vulnerabilidad enviando paquetes UDP manipulados a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante haga que el dispositivo se reinicie, lo que provocar\u00eda una condici\u00f3n de DoS en el sistema afectado."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20508",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:18.267",
"lastModified": "2024-09-25T17:15:18.267",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Cisco Unified Threat Defense (UTD) Snort Intrusion Prevention System (IPS) Engine for Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass configured security policies or cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of HTTP requests when they are processed by Cisco UTD Snort IPS Engine. An attacker could exploit this vulnerability by sending a crafted HTTP request through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process. If the action in case of Cisco UTD Snort IPS Engine failure is set to the default, fail-open, successful exploitation of this vulnerability could allow the attacker to bypass configured security policies. If the action in case of Cisco UTD Snort IPS Engine failure is set to fail-close, successful exploitation of this vulnerability could cause traffic that is configured to be inspected by Cisco UTD Snort IPS Engine to be dropped."
},
{
"lang": "es",
"value": "Una vulnerabilidad en Cisco Unified Threat Defense (UTD) Snort Intrusion Prevention System (IPS) Engine para Cisco IOS XE Software podr\u00eda permitir que un atacante remoto no autenticado omita las pol\u00edticas de seguridad configuradas o provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de las solicitudes HTTP cuando son procesadas por Cisco UTD Snort IPS Engine. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una solicitud HTTP manipulada a trav\u00e9s de un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante activar una recarga del proceso Snort. Si la acci\u00f3n en caso de falla de Cisco UTD Snort IPS Engine est\u00e1 configurada en la predeterminada, fail-open, la explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda permitir al atacante omitir las pol\u00edticas de seguridad configuradas. Si la acci\u00f3n en caso de falla de Cisco UTD Snort IPS Engine est\u00e1 configurada en fail-close, la explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda hacer que se descarte el tr\u00e1fico que est\u00e1 configurado para ser inspeccionado por Cisco UTD Snort IPS Engine."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-20510",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:18.470",
"lastModified": "2024-09-25T17:15:18.470",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Central Web Authentication (CWA) feature of Cisco IOS XE Software for Wireless Controllers could allow an unauthenticated, adjacent attacker to bypass the pre-authentication access control list (ACL), which could allow access to network resources before user authentication.\r\n\r This vulnerability is due to a logic error when activating the pre-authentication ACL that is received from the authentication, authorization, and accounting (AAA) server. An attacker could exploit this vulnerability by connecting to a wireless network that is configured for CWA and sending traffic through an affected device that should be denied by the configured ACL before user authentication. A successful exploit could allow the attacker to bypass configured ACL protections on the affected device before the user authentication is completed, allowing the attacker to access trusted networks that the device might be protecting."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la funci\u00f3n de autenticaci\u00f3n web central (CWA) del software Cisco IOS XE para controladores inal\u00e1mbricos podr\u00eda permitir que un atacante adyacente no autenticado eluda la lista de control de acceso (ACL) de autenticaci\u00f3n previa, lo que podr\u00eda permitir el acceso a los recursos de la red antes de la autenticaci\u00f3n del usuario. Esta vulnerabilidad se debe a un error l\u00f3gico al activar la ACL de autenticaci\u00f3n previa que se recibe del servidor de autenticaci\u00f3n, autorizaci\u00f3n y contabilidad (AAA). Un atacante podr\u00eda aprovechar esta vulnerabilidad conect\u00e1ndose a una red inal\u00e1mbrica configurada para CWA y enviando tr\u00e1fico a trav\u00e9s de un dispositivo afectado que deber\u00eda ser rechazado por la ACL configurada antes de la autenticaci\u00f3n del usuario. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante eludir las protecciones de la ACL configurada en el dispositivo afectado antes de que se complete la autenticaci\u00f3n del usuario, lo que le permitir\u00eda acceder a redes confiables que el dispositivo podr\u00eda estar protegiendo."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21545",
"sourceIdentifier": "report@snyk.io",
"published": "2024-09-25T01:15:40.180",
"lastModified": "2024-09-25T01:36:51.560",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Proxmox Virtual Environment is an open-source server management platform for enterprise virtualization. Insufficient safeguards against malicious API response values allow authenticated attackers with 'Sys.Audit' or 'VM.Monitor' privileges to download arbitrary host files via the API.\nWhen handling the result from a request handler before returning it to the user, the handle_api2_request function will check for the \u2018download\u2019 or \u2018data\u2019->\u2019download\u2019 objects inside the request handler call response object. If present, handle_api2_request will read a local file defined by this object and return it to the user.\nTwo endpoints were identified which can control the object returned by a request handler sufficiently that the \u2019download\u2019 object is defined and user controlled. This results in arbitrary file read.\nThe privileges of this file read can result in full compromise of the system by various impacts such as disclosing sensitive files allowing for privileged session forgery."
},
{
"lang": "es",
"value": "Proxmox Virtual Environment es una plataforma de administraci\u00f3n de servidores de c\u00f3digo abierto para la virtualizaci\u00f3n empresarial. Las protecciones insuficientes contra valores de respuesta de API maliciosos permiten que atacantes autenticados con privilegios 'Sys.Audit' o 'VM.Monitor' descarguen archivos de host arbitrarios a trav\u00e9s de la API. Al manejar el resultado de un controlador de solicitud antes de devolverlo al usuario, la funci\u00f3n handle_api2_request verificar\u00e1 los objetos 'download' o 'data'->'download' dentro del objeto de respuesta de llamada del controlador de solicitud. Si est\u00e1 presente, handle_api2_request leer\u00e1 un archivo local definido por este objeto y lo devolver\u00e1 al usuario. Se identificaron dos endpoints que pueden controlar el objeto devuelto por un controlador de solicitud lo suficiente como para que el objeto 'download' est\u00e9 definido y controlado por el usuario. Esto da como resultado la lectura de archivos arbitrarios. Los privilegios de esta lectura de archivos pueden provocar un compromiso total del sistema por varios impactos, como la divulgaci\u00f3n de archivos confidenciales que permiten la falsificaci\u00f3n de sesiones privilegiadas."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-22892",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T15:15:13.430",
"lastModified": "2024-09-25T15:15:13.430",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenSlides 4.0.15 was discovered to be using a weak hashing algorithm to store passwords."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que OpenSlides 4.0.15 utilizaba un algoritmo hash d\u00e9bil para almacenar contrase\u00f1as."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-22893",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T15:15:13.520",
"lastModified": "2024-09-25T15:15:13.520",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenSlides 4.0.15 verifies passwords by comparing password hashes using a function with content-dependent runtime. This can allow attackers to obtain information about the password hash using a timing attack."
},
{
"lang": "es",
"value": "OpenSlides 4.0.15 verifica las contrase\u00f1as comparando los hashes de contrase\u00f1as mediante una funci\u00f3n con un entorno de ejecuci\u00f3n dependiente del contenido. Esto puede permitir a los atacantes obtener informaci\u00f3n sobre el hash de la contrase\u00f1a mediante un ataque de tiempo."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23454",
"sourceIdentifier": "security@apache.org",
"published": "2024-09-25T08:15:04.317",
"lastModified": "2024-09-25T08:15:04.317",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23922",
"sourceIdentifier": "cve@asrg.io",
"published": "2024-09-23T15:15:13.010",
"lastModified": "2024-09-23T15:15:13.010",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sony XAV-AX5500 Insufficient Firmware Update Validation Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Sony XAV-AX5500 devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of software updates. The issue results from the lack of proper validation of software update packages. An attacker can leverage this vulnerability to execute code in the context of the device.\n\nWas ZDI-CAN-22939"
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por validaci\u00f3n insuficiente de actualizaciones de firmware en Sony XAV-AX5500. Esta vulnerabilidad permite a atacantes f\u00edsicamente presentes ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de dispositivos Sony XAV-AX5500. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica existe en el manejo de actualizaciones de software. El problema es el resultado de la falta de validaci\u00f3n adecuada de los paquetes de actualizaci\u00f3n de software. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del dispositivo. Era ZDI-CAN-22939"
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23933",
"sourceIdentifier": "cve@asrg.io",
"published": "2024-09-23T15:15:13.297",
"lastModified": "2024-09-23T15:35:02.163",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sony XAV-AX5500 CarPlay TLV Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of \tSony XAV-AX5500 devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the Apple CarPlay protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.\n\nWas ZDI-CAN-23238"
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por desbordamiento de b\u00fafer basado en pila TLV en Sony XAV-AX5500 CarPlay. Esta vulnerabilidad permite a atacantes f\u00edsicamente presentes ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de dispositivos Sony XAV-AX5500. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro de la implementaci\u00f3n del protocolo Apple CarPlay. El problema resulta de la falta de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos a un b\u00fafer basado en pila de longitud fija. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del dispositivo. Era ZDI-CAN-23238"
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23934",
"sourceIdentifier": "cve@asrg.io",
"published": "2024-09-23T15:15:13.500",
"lastModified": "2024-09-23T15:35:03.923",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sony XAV-AX5500 WMV/ASF Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sony XAV-AX5500 devices. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of WMV/ASF files. A crafted Extended Content Description Object in a WMV media file can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.\n\n. Was ZDI-CAN-22994."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por desbordamiento de b\u00fafer basado en pila de an\u00e1lisis WMV/ASF en Sony XAV-AX5500. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de los dispositivos Sony XAV-AX5500. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos WMV/ASF. Un objeto de descripci\u00f3n de contenido extendido creado en un archivo multimedia WMV puede provocar un desbordamiento de un b\u00fafer basado en pila de longitud fija. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del dispositivo... Era ZDI-CAN-22994."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23972",
"sourceIdentifier": "cve@asrg.io",
"published": "2024-09-23T15:15:13.703",
"lastModified": "2024-09-23T15:15:13.703",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sony XAV-AX5500 USB Configuration Descriptor Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Sony XAV-AX5500 devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the USB host driver. A crafted USB configuration descriptor can trigger an overflow of a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of the device.\n\nWas ZDI-CAN-23185"
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por desbordamiento del b\u00fafer del descriptor de configuraci\u00f3n USB de Sony XAV-AX5500. Esta vulnerabilidad permite a atacantes f\u00edsicamente presentes ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de dispositivos Sony XAV-AX5500. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro del controlador del host USB. Un descriptor de configuraci\u00f3n USB manipulado puede provocar un desbordamiento de un b\u00fafer de longitud fija. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del dispositivo. Era ZDI-CAN-23185"
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-30128",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-09-25T15:15:13.717",
"lastModified": "2024-09-25T16:35:10.083",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HCL Nomad server on Domino is affected by an open proxy vulnerability in which an unauthenticated attacker can mask their original source IP address. This may enable an attacker to trick the user into exposing sensitive information."
},
{
"lang": "es",
"value": "El servidor HCL Nomad en Domino se ve afectado por una vulnerabilidad de proxy abierto en la que un atacante no autenticado puede ocultar su direcci\u00f3n IP de origen original. Esto puede permitirle a un atacante enga\u00f1ar al usuario para que exponga informaci\u00f3n confidencial."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31145",
"sourceIdentifier": "security@xen.org",
"published": "2024-09-25T11:15:12.133",
"lastModified": "2024-09-25T14:35:05.397",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain PCI devices in a system might be assigned Reserved Memory\nRegions (specified via Reserved Memory Region Reporting, \"RMRR\") for\nIntel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used\nfor platform tasks such as legacy USB emulation.\n\nSince the precise purpose of these regions is unknown, once a device\nassociated with such a region is active, the mappings of these regions\nneed to remain continuouly accessible by the device. In the logic\nestablishing these mappings, error handling was flawed, resulting in\nsuch mappings to potentially remain in place when they should have been\nremoved again. Respective guests would then gain access to memory\nregions which they aren't supposed to have access to."
},
{
"lang": "es",
"value": "Ciertos dispositivos PCI de un sistema se les pueden asignar regiones de memoria reservadas (especificadas a trav\u00e9s de informes de regiones de memoria reservadas, \"RMRR\") para Intel VT-d o rangos de mapeo de Unity para AMD-Vi. Por lo general, se utilizan para tareas de plataforma como la emulaci\u00f3n USB heredada. Dado que se desconoce el prop\u00f3sito preciso de estas regiones, una vez que un dispositivo asociado con dicha regi\u00f3n est\u00e1 activo, las asignaciones de estas regiones deben permanecer accesibles continuamente para el dispositivo. En la l\u00f3gica que establece estas asignaciones, el manejo de errores era defectuoso, lo que result\u00f3 en que dichas asignaciones potencialmente permanecieran en su lugar cuando deber\u00edan haberse eliminado nuevamente. Los invitados respectivos obtendr\u00edan entonces acceso a regiones de memoria a las que se supone que no deber\u00edan tener acceso."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-31146",
"sourceIdentifier": "security@xen.org",
"published": "2024-09-25T11:15:12.220",
"lastModified": "2024-09-25T14:35:06.133",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When multiple devices share resources and one of them is to be passed\nthrough to a guest, security of the entire system and of respective\nguests individually cannot really be guaranteed without knowing\ninternals of any of the involved guests. Therefore such a configuration\ncannot really be security-supported, yet making that explicit was so far\nmissing.\n\nResources the sharing of which is known to be problematic include, but\nare not limited to\n- - PCI Base Address Registers (BARs) of multiple devices mapping to the\n same page (4k on x86),\n- - INTx lines."
},
{
"lang": "es",
"value": "Cuando varios dispositivos comparten recursos y uno de ellos debe pasarse a un invitado, la seguridad de todo el sistema y de los respectivos invitados individualmente no se puede garantizar realmente sin conocer los detalles internos de cualquiera de los invitados involucrados. Por lo tanto, una configuraci\u00f3n de este tipo no puede realmente ser compatible con la seguridad, aunque hasta ahora no se hab\u00eda hecho expl\u00edcita. Los recursos cuyo uso compartido se sabe que es problem\u00e1tico incluyen, entre otros: - Registros de direcci\u00f3n base PCI (BAR) de varios dispositivos que se asignan a la misma p\u00e1gina (4k en x86), - L\u00edneas INTx."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31359",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T18:15:10.387",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-26T13:58:57.017",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:premmerce:premmerce_product_filter_for_woocommerce:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.7.3",
"matchCriteriaId": "C26F17EB-D8E0-4CF8-BBFB-ABB0148E4089"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/premmerce-woocommerce-product-filter/wordpress-premmerce-product-filter-for-woocommerce-plugin-3-7-2-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3375",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-04-29T09:15:09.017",
"lastModified": "2024-08-27T07:15:03.533",
"lastModified": "2024-09-26T12:15:03.810",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-276"
"value": "CWE-732"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-34331",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-23T16:15:05.400",
"lastModified": "2024-09-23T17:35:14.613",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A lack of code signature verification in Parallels Desktop for Mac v19.3.0 and below allows attackers to escalate privileges via a crafted macOS installer, because Parallels Service is setuid root."
},
{
"lang": "es",
"value": "La falta de verificaci\u00f3n de la firma de c\u00f3digo en Parallels Desktop para Mac v19.3.0 y anteriores permite a los atacantes escalar privilegios a trav\u00e9s de un instalador de macOS manipulado espec\u00edficamente, porque Parallels Service est\u00e1 configurado como superusuario."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-37779",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-23T20:15:04.637",
"lastModified": "2024-09-23T20:35:12.320",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WoodWing Elvis DAM v6.98.1 was discovered to contain an authenticated remote command execution (RCE) vulnerability via the Apache Ant script functionality."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que WoodWing Elvis DAM v6.98.1 conten\u00eda una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) autenticada a trav\u00e9s de la funcionalidad del script Apache Ant."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-37879",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-20T17:15:14.970",
"lastModified": "2024-09-20T17:15:14.970",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in /admin/config/save in User-friendly SVN (USVN) before v1.0.12 and below allows administrators to execute arbitrary code via the fields \"siteTitle\", \"siteIco\" and \"siteLogo\"."
},
{
"lang": "es",
"value": "La validaci\u00f3n de entrada incorrecta en /admin/config/save en User-friendly SVN (USVN) anterior a v1.0.12 y anteriores permite a los administradores ejecutar c\u00f3digo arbitrario a trav\u00e9s de los campos \"siteTitle\", \"siteIco\" y \"siteLogo\"."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38266",
"sourceIdentifier": "security@zyxel.com.tw",
"published": "2024-09-24T02:15:02.220",
"lastModified": "2024-09-24T02:15:02.220",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper restriction of operations within the bounds of a memory buffer in the parameter type parser of the Zyxel VMG8825-T50K firmware versions through 5.50(ABOM.8)C0 could allow an authenticated attacker with administrator privileges to cause potential memory corruptions, resulting in a thread crash on an affected device."
},
{
"lang": "es",
"value": "Una restricci\u00f3n incorrecta de las operaciones dentro de los l\u00edmites de un b\u00fafer de memoria en el analizador de tipo de par\u00e1metro de las versiones de firmware Zyxel VMG8825-T50K hasta la 5.50(ABOM.8)C0 podr\u00eda permitir que un atacante autenticado con privilegios de administrador provoque posibles corrupciones de memoria, lo que resultar\u00eda en un bloqueo del hilo en un dispositivo afectado."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38267",
"sourceIdentifier": "security@zyxel.com.tw",
"published": "2024-09-24T02:15:02.750",
"lastModified": "2024-09-24T02:15:02.750",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper restriction of operations within the bounds of a memory buffer in the IPv6 address parser of the Zyxel VMG8825-T50K firmware versions through 5.50(ABOM.8)C0 could allow an authenticated attacker with administrator privileges to cause potential memory corruptions, resulting in a thread crash on an affected device."
},
{
"lang": "es",
"value": "Una restricci\u00f3n incorrecta de las operaciones dentro de los l\u00edmites de un b\u00fafer de memoria en el analizador de direcciones IPv6 de las versiones de firmware Zyxel VMG8825-T50K hasta la 5.50(ABOM.8)C0 podr\u00eda permitir que un atacante autenticado con privilegios de administrador provoque posibles corrupciones de memoria, lo que resultar\u00eda en un bloqueo del hilo en un dispositivo afectado."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38268",
"sourceIdentifier": "security@zyxel.com.tw",
"published": "2024-09-24T02:15:02.987",
"lastModified": "2024-09-24T02:15:02.987",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper restriction of operations within the bounds of a memory buffer in the MAC address parser of the Zyxel VMG8825-T50K firmware versions through 5.50(ABOM.8)C0 could allow an authenticated attacker with administrator privileges to cause potential memory corruptions, resulting in a thread crash on an affected device."
},
{
"lang": "es",
"value": "Una restricci\u00f3n incorrecta de las operaciones dentro de los l\u00edmites de un b\u00fafer de memoria en el analizador de direcciones MAC de las versiones de firmware Zyxel VMG8825-T50K hasta la 5.50(ABOM.8)C0 podr\u00eda permitir que un atacante autenticado con privilegios de administrador provoque posibles corrupciones de memoria, lo que resultar\u00eda en un bloqueo del hilo en un dispositivo afectado."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38269",
"sourceIdentifier": "security@zyxel.com.tw",
"published": "2024-09-24T02:15:03.230",
"lastModified": "2024-09-24T02:15:03.230",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper restriction of operations within the bounds of a memory buffer in the USB file-sharing handler of the Zyxel VMG8825-T50K firmware versions through 5.50(ABOM.8)C0 could allow an authenticated attacker with administrator privileges to cause potential memory corruptions, resulting in a thread crash on an affected device."
},
{
"lang": "es",
"value": "Una restricci\u00f3n incorrecta de las operaciones dentro de los l\u00edmites de un b\u00fafer de memoria en el controlador de uso compartido de archivos USB de las versiones de firmware Zyxel VMG8825-T50K hasta la 5.50(ABOM.8)C0 podr\u00eda permitir que un atacante autenticado con privilegios de administrador provoque posibles corrupciones de memoria, lo que resultar\u00eda en un bloqueo del hilo en un dispositivo afectado."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38324",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-09-25T01:15:40.493",
"lastModified": "2024-09-25T01:15:40.493",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Storage Defender 2.0.0 through 2.0.7 on-prem defender-sensor-cmd CLI does not validate server name during registration and unregistration operations which could expose sensitive information to an attacker with access to the system."
},
{
"lang": "es",
"value": "La CLI de defender-sensor-cmd local de IBM Storage Defender 2.0.0 a 2.0.7 no valida el nombre del servidor durante las operaciones de registro y anulaci\u00f3n de registro, lo que podr\u00eda exponer informaci\u00f3n confidencial a un atacante con acceso al sistema."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-3866",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-25T07:15:02.433",
"lastModified": "2024-09-25T07:15:02.433",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Ninja Forms Contact Form plugin for WordPress is vulnerable to Reflected Self-Based Cross-Site Scripting via the 'Referer' header in all versions up to, and including, 3.8.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Successful exploitation of this vulnerability requires \"maintenance mode\" for a targeted form to be enabled. However, there is no setting available to the attacker or even an administrator-level user to enable this mode. The mode is only enabled during a required update, which is a very short window of time. Additionally, because of the self-based nature of this vulnerability, attackers would have to rely on additional techniques to execute a supplied payload in the context of targeted user."
},
{
"lang": "es",
"value": "El complemento Ninja Forms Contact Form para WordPress es vulnerable a Reflected Self-Based Cross-Site Scripting a trav\u00e9s del encabezado \"Referer\" en todas las versiones hasta la 3.8.15 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace. Para explotar con \u00e9xito esta vulnerabilidad, es necesario habilitar el \"modo de mantenimiento\" para un formulario espec\u00edfico. Sin embargo, no hay ninguna configuraci\u00f3n disponible para el atacante o incluso para un usuario de nivel administrador para habilitar este modo. El modo solo se habilita durante una actualizaci\u00f3n requerida, que es un per\u00edodo de tiempo muy breve. Adem\u00e1s, debido a la naturaleza basada en el auto-reflejo de esta vulnerabilidad, los atacantes tendr\u00edan que depender de t\u00e9cnicas adicionales para ejecutar un payload proporcionado en el contexto del usuario espec\u00edfico."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-39341",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-23T18:15:05.507",
"lastModified": "2024-09-23T18:15:05.507",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Entrust Instant Financial Issuance (On Premise) Software (formerly known as Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, and 6.8.x and earlier leaves behind a configuration file (i.e. WebAPI.cfg.xml) after the installation process. This file can be accessed without authentication on HTTP port 80 by guessing the correct IIS webroot path. It includes system configuration parameter names and values with sensitive configuration values encrypted."
},
{
"lang": "es",
"value": "El software Entrust Instant Financial Issuance (On Premise) (antes conocido como Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, 6.8.x y versiones anteriores deja un archivo de configuraci\u00f3n (es decir, WebAPI.cfg.xml) despu\u00e9s del proceso de instalaci\u00f3n. Se puede acceder a este archivo sin autenticaci\u00f3n en el puerto HTTP 80 adivinando la ruta webroot de IIS correcta. Incluye los nombres y valores de los par\u00e1metros de configuraci\u00f3n del sistema con valores de configuraci\u00f3n confidenciales cifrados."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-39342",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-23T18:15:05.570",
"lastModified": "2024-09-23T20:35:13.310",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Entrust Instant Financial Issuance (formerly known as Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, and 6.8.x and earlier uses a DLL library (i.e. DCG.Security.dll) with a custom AES encryption process that relies on static hard-coded key values. These keys are not uniquely generated per installation of the software. Combined with the encrypted password that can be obtained from \"WebAPI.cfg.xml\" in CVE-2024-39341, the decryption is trivial and can lead to privilege escalation on the Windows host."
},
{
"lang": "es",
"value": "Entrust Instant Financial Issuance (antes conocido como Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, 6.8.x y versiones anteriores utilizan una librer\u00eda DLL (es decir, DCG.Security.dll) con un proceso de cifrado AES personalizado que se basa en valores de clave est\u00e1ticos codificados. Estas claves no se generan de forma \u00fanica por instalaci\u00f3n del software. Combinado con la contrase\u00f1a cifrada que se puede obtener de \"WebAPI.cfg.xml\" en CVE-2024-39341, el descifrado es trivial y puede provocar una escalada de privilegios en el host de Windows."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-39842",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-23T19:15:13.437",
"lastModified": "2024-09-23T19:35:16.317",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability in Centreon 24.04.2 allows a remote high-privileged attacker to execute arbitrary SQL command via user massive changes inputs."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en Centreon 24.04.2 permite a un atacante remoto con altos privilegios ejecutar un comando SQL arbitrario a trav\u00e9s de entradas de cambios masivos del usuario."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-39843",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-23T19:15:13.510",
"lastModified": "2024-09-23T20:35:14.160",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability in Centreon 24.04.2 allows a remote high-privileged attacker to execute arbitrary SQL command via create user form inputs."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en Centreon 24.04.2 permite a un atacante remoto con altos privilegios ejecutar un comando SQL arbitrario a trav\u00e9s de las entradas del formulario de creaci\u00f3n de usuario."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-39928",
"sourceIdentifier": "security@apache.org",
"published": "2024-09-25T01:15:40.693",
"lastModified": "2024-09-25T01:36:52.690",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Apache Linkis <= 1.5.0, a Random string security vulnerability in Spark EngineConn,\u00a0random string generated by the Token when starting Py4j uses the Commons Lang's RandomStringUtils.\nUsers are recommended to upgrade to version 1.6.0, which fixes this issue."
},
{
"lang": "es",
"value": "En Apache Linkis &lt;= 1.5.0, existe una vulnerabilidad de seguridad de cadenas aleatorias en Spark EngineConn. La cadena aleatoria generada por el token al iniciar Py4j utiliza RandomStringUtils de Commons Lang. Se recomienda a los usuarios actualizar a la versi\u00f3n 1.6.0, que soluciona este problema."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40441",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-23T17:15:13.580",
"lastModified": "2024-09-25T01:36:53.897",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40442",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-23T17:15:13.700",
"lastModified": "2024-09-25T01:36:54.607",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-40703",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-09-22T13:15:10.960",
"lastModified": "2024-09-22T13:15:10.960",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Cognos Analytics 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.2.4, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and IBM Cognos Analytics Reports for iOS 11.0.0.7 could allow a local attacker to obtain sensitive information in the form of an API key. An attacker could use this information to launch further attacks against affected applications."
},
{
"lang": "es",
"value": "IBM Cognos Analytics 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.2.4, 12.0.0, 12.0.1, 12.0.2, 12.0.3 e IBM Cognos Analytics Reports para iOS 11.0.0.7 podr\u00edan permitir que un atacante local obtenga informaci\u00f3n confidencial en forma de una clave API. Un atacante podr\u00eda utilizar esta informaci\u00f3n para lanzar otros ataques contra las aplicaciones afectadas."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40761",
"sourceIdentifier": "security@apache.org",
"published": "2024-09-25T08:15:04.437",
"lastModified": "2024-09-25T16:35:10.803",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-41228",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-23T16:15:05.773",
"lastModified": "2024-09-23T17:35:15.547",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A symlink following vulnerability in the pouch cp function of AliyunContainerService pouch v1.3.1 allows attackers to escalate privileges and write arbitrary files."
},
{
"lang": "es",
"value": "Un enlace simb\u00f3lico que sigue a una vulnerabilidad en la funci\u00f3n cp de AliyunContainerService pouch v1.3.1 permite a los atacantes escalar privilegios y escribir archivos arbitrarios."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-41445",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T17:15:18.740",
"lastModified": "2024-09-25T17:15:18.740",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Library MDF (mdflib) v2.1 is vulnerable to a heap-based buffer overread via a crafted mdf4 file is parsed using the ReadData function"
},
{
"lang": "es",
"value": "Library MDF (mdflib) v2.1 es vulnerable a una sobrelectura de b\u00fafer basada en mont\u00f3n a trav\u00e9s de un archivo mdf4 manipulado que se analiza utilizando la funci\u00f3n ReadData"
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-41708",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T17:15:18.823",
"lastModified": "2024-09-25T17:15:18.823",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in AdaCore ada_web_services 20.0 allows an attacker to escalate privileges and steal sessions via the Random_String() function in the src/core/aws-utils.adb module."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en AdaCore ada_web_services 20.0 que permite a un atacante escalar privilegios y robar sesiones a trav\u00e9s de la funci\u00f3n Random_String() en el m\u00f3dulo src/core/aws-utils.adb."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-41725",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-25T01:15:41.833",
"lastModified": "2024-09-25T01:15:41.833",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ProGauge MAGLINK LX CONSOLE does not have sufficient filtering on input \nfields that are used to render pages which may allow cross site \nscripting."
},
{
"lang": "es",
"value": "ProGauge MAGLINK LX CONSOLE no tiene filtrado suficiente en los campos de entrada que se utilizan para renderizar p\u00e1ginas, lo que puede permitir Cross Site Scripting."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42323",
"sourceIdentifier": "security@apache.org",
"published": "2024-09-21T10:15:06.160",
"lastModified": "2024-09-23T16:35:10.560",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-42346",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-20T19:15:15.547",
"lastModified": "2024-09-20T19:15:15.547",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Galaxy is a free, open-source system for analyzing data, authoring workflows, training and education, publishing tools, managing infrastructure, and more. The editor visualization, /visualizations endpoint, can be used to store HTML tags and trigger javascript execution upon edit operation. All supported branches of Galaxy (and more back to release_20.05) were amended with the supplied patches. Users are advised to upgrade. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "Galaxy es un sistema gratuito de c\u00f3digo abierto para analizar datos, crear flujos de trabajo, realizar formaci\u00f3n y educaci\u00f3n, publicar herramientas, gestionar infraestructura y mucho m\u00e1s. La visualizaci\u00f3n del editor, endpoint /visualizations, se puede utilizar para almacenar etiquetas HTML y activar la ejecuci\u00f3n de JavaScript tras una operaci\u00f3n de edici\u00f3n. Todas las ramas compatibles de Galaxy (y m\u00e1s desde la versi\u00f3n release_20.05) se modificaron con los parches proporcionados. Se recomienda a los usuarios que actualicen. No existen workarounds para esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-42351",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-20T19:15:15.857",
"lastModified": "2024-09-20T19:15:15.857",
"vulnStatus": "Received",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Galaxy is a free, open-source system for analyzing data, authoring workflows, training and education, publishing tools, managing infrastructure, and more. An attacker can potentially replace the contents of public datasets resulting in data loss or tampering. All supported branches of Galaxy (and more back to release_21.05) were amended with the below patch. Users are advised to upgrade. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "Galaxy es un sistema gratuito de c\u00f3digo abierto para analizar datos, crear flujos de trabajo, brindar capacitaci\u00f3n y educaci\u00f3n, publicar herramientas, administrar infraestructura y m\u00e1s. Un atacante podr\u00eda reemplazar el contenido de conjuntos de datos p\u00fablicos, lo que provocar\u00eda la p\u00e9rdida o manipulaci\u00f3n de datos. Todas las ramas compatibles de Galaxy (y m\u00e1s desde la versi\u00f3n release_21.05) se modificaron con el siguiente parche. Se recomienda a los usuarios que actualicen. No existen workarounds para esta vulnerabilidad."
}
],
"metrics": {

Some files were not shown because too many files have changed in this diff Show More