From d5b0f2797f823f0c0df15a62043a0bdff3a4ad74 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 13 Dec 2024 15:03:57 +0000 Subject: [PATCH] Auto-Update: 2024-12-13T15:00:34.276447+00:00 --- CVE-2017/CVE-2017-92xx/CVE-2017-9217.json | 6 +- CVE-2018/CVE-2018-121xx/CVE-2018-12122.json | 6 +- CVE-2018/CVE-2018-121xx/CVE-2018-12123.json | 6 +- CVE-2018/CVE-2018-77xx/CVE-2018-7738.json | 6 +- CVE-2023/CVE-2023-294xx/CVE-2023-29400.json | 6 +- CVE-2023/CVE-2023-294xx/CVE-2023-29402.json | 6 +- CVE-2023/CVE-2023-438xx/CVE-2023-43804.json | 8 ++- CVE-2024/CVE-2024-116xx/CVE-2024-11691.json | 8 ++- CVE-2024/CVE-2024-116xx/CVE-2024-11694.json | 8 ++- CVE-2024/CVE-2024-119xx/CVE-2024-11986.json | 56 +++++++++++++++ CVE-2024/CVE-2024-224xx/CVE-2024-22461.json | 56 +++++++++++++++ CVE-2024/CVE-2024-291xx/CVE-2024-29131.json | 6 +- CVE-2024/CVE-2024-294xx/CVE-2024-29404.json | 39 ++++++++++- CVE-2024/CVE-2024-384xx/CVE-2024-38488.json | 56 +++++++++++++++ CVE-2024/CVE-2024-472xx/CVE-2024-47241.json | 46 ++++++++++++- CVE-2024/CVE-2024-480xx/CVE-2024-48007.json | 44 ++++++++++++ CVE-2024/CVE-2024-480xx/CVE-2024-48008.json | 56 +++++++++++++++ CVE-2024/CVE-2024-531xx/CVE-2024-53143.json | 45 +++++++++++- CVE-2024/CVE-2024-558xx/CVE-2024-55889.json | 60 ++++++++++++++++ CVE-2024/CVE-2024-72xx/CVE-2024-7254.json | 6 +- CVE-2024/CVE-2024-80xx/CVE-2024-8075.json | 6 +- CVE-2024/CVE-2024-80xx/CVE-2024-8076.json | 8 +-- CVE-2024/CVE-2024-80xx/CVE-2024-8077.json | 8 +-- CVE-2024/CVE-2024-80xx/CVE-2024-8078.json | 8 +-- CVE-2024/CVE-2024-80xx/CVE-2024-8079.json | 8 +-- CVE-2024/CVE-2024-96xx/CVE-2024-9681.json | 8 ++- README.md | 51 ++++++++------ _state.csv | 76 +++++++++++---------- 28 files changed, 605 insertions(+), 98 deletions(-) create mode 100644 CVE-2024/CVE-2024-119xx/CVE-2024-11986.json create mode 100644 CVE-2024/CVE-2024-224xx/CVE-2024-22461.json create mode 100644 CVE-2024/CVE-2024-384xx/CVE-2024-38488.json create mode 100644 CVE-2024/CVE-2024-480xx/CVE-2024-48007.json create mode 100644 CVE-2024/CVE-2024-480xx/CVE-2024-48008.json create mode 100644 CVE-2024/CVE-2024-558xx/CVE-2024-55889.json diff --git a/CVE-2017/CVE-2017-92xx/CVE-2017-9217.json b/CVE-2017/CVE-2017-92xx/CVE-2017-9217.json index 87e486f8f6a..ea8feb897ee 100644 --- a/CVE-2017/CVE-2017-92xx/CVE-2017-9217.json +++ b/CVE-2017/CVE-2017-92xx/CVE-2017-9217.json @@ -2,7 +2,7 @@ "id": "CVE-2017-9217", "sourceIdentifier": "cve@mitre.org", "published": "2017-05-24T05:29:00.223", - "lastModified": "2024-11-21T03:35:36.520", + "lastModified": "2024-12-13T14:15:18.280", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -162,6 +162,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20241213-0003/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-121xx/CVE-2018-12122.json b/CVE-2018/CVE-2018-121xx/CVE-2018-12122.json index 538ce2d6e22..dffc17b1636 100644 --- a/CVE-2018/CVE-2018-121xx/CVE-2018-12122.json +++ b/CVE-2018/CVE-2018-121xx/CVE-2018-12122.json @@ -2,7 +2,7 @@ "id": "CVE-2018-12122", "sourceIdentifier": "cve-request@iojs.org", "published": "2018-11-28T17:29:00.370", - "lastModified": "2024-11-21T03:44:38.317", + "lastModified": "2024-12-13T14:15:19.043", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -221,6 +221,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20241213-0009/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-121xx/CVE-2018-12123.json b/CVE-2018/CVE-2018-121xx/CVE-2018-12123.json index 682f3ec473d..1f91320728e 100644 --- a/CVE-2018/CVE-2018-121xx/CVE-2018-12123.json +++ b/CVE-2018/CVE-2018-121xx/CVE-2018-12123.json @@ -2,7 +2,7 @@ "id": "CVE-2018-12123", "sourceIdentifier": "cve-request@iojs.org", "published": "2018-11-28T17:29:00.417", - "lastModified": "2024-11-21T03:44:38.440", + "lastModified": "2024-12-13T14:15:19.250", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -170,6 +170,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20241213-0008/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-77xx/CVE-2018-7738.json b/CVE-2018/CVE-2018-77xx/CVE-2018-7738.json index 4018e0fccc1..cb917c80186 100644 --- a/CVE-2018/CVE-2018-77xx/CVE-2018-7738.json +++ b/CVE-2018/CVE-2018-77xx/CVE-2018-7738.json @@ -2,7 +2,7 @@ "id": "CVE-2018-7738", "sourceIdentifier": "cve@mitre.org", "published": "2018-03-07T02:29:03.533", - "lastModified": "2024-11-21T04:12:38.423", + "lastModified": "2024-12-13T14:15:19.380", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -170,6 +170,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.netapp.com/advisory/ntap-20241213-0002/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, { "url": "https://usn.ubuntu.com/4512-1/", "source": "af854a3a-2127-422b-91ae-364da2661108" diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29400.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29400.json index a1dd49e8336..f574a3a5540 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29400.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29400.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29400", "sourceIdentifier": "security@golang.org", "published": "2023-05-11T16:15:09.850", - "lastModified": "2024-11-21T07:56:59.223", + "lastModified": "2024-12-13T14:15:19.623", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -132,6 +132,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20241213-0005/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29402.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29402.json index 7a3da55ac61..ced56c53cf8 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29402.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29402.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29402", "sourceIdentifier": "security@golang.org", "published": "2023-06-08T21:15:16.770", - "lastModified": "2024-11-21T07:56:59.447", + "lastModified": "2024-12-13T14:15:20.403", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -175,6 +175,10 @@ { "url": "https://security.gentoo.org/glsa/202311-09", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20241213-0004/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43804.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43804.json index 53f2b101e49..786b040a40a 100644 --- a/CVE-2023/CVE-2023-438xx/CVE-2023-43804.json +++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43804.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43804", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-04T17:15:10.163", - "lastModified": "2024-11-21T08:24:49.197", + "lastModified": "2024-12-13T14:15:20.570", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -255,6 +255,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.netapp.com/advisory/ntap-20241213-0007/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, { "url": "https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3", "source": "af854a3a-2127-422b-91ae-364da2661108" diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11691.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11691.json index 4a8f08b4fb5..b8eb10fd277 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11691.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11691.json @@ -2,13 +2,13 @@ "id": "CVE-2024-11691", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:18.633", - "lastModified": "2024-11-27T16:15:12.330", + "lastModified": "2024-12-13T14:15:20.863", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Certain WebGL operations on Apple silicon M series devices could have lead to an out-of-bounds write and memory corruption due to a flaw in Apple's GPU driver. \n*This bug only affected the application on Apple M series hardware. Other platforms were unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5." + "value": "Certain WebGL operations on Apple silicon M series devices could have lead to an out-of-bounds write and memory corruption due to a flaw in Apple's GPU driver. \n*This bug only affected the application on Apple M series hardware. Other platforms were unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Firefox ESR < 115.18." }, { "lang": "es", @@ -67,6 +67,10 @@ { "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/", "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-70/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11694.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11694.json index 6d8488c2792..743f9d1d8ca 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11694.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11694.json @@ -2,13 +2,13 @@ "id": "CVE-2024-11694", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:18.943", - "lastModified": "2024-11-27T17:15:09.703", + "lastModified": "2024-12-13T14:15:21.053", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5." + "value": "Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Firefox ESR < 115.18." }, { "lang": "es", @@ -75,6 +75,10 @@ { "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/", "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-70/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11986.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11986.json new file mode 100644 index 00000000000..140e68192a4 --- /dev/null +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11986.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-11986", + "sourceIdentifier": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158", + "published": "2024-12-13T14:15:21.207", + "lastModified": "2024-12-13T14:15:21.207", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input handling in the 'Host Header' allows an unauthenticated attacker to store a payload in web application logs. When an Administrator views the logs using the application's standard functionality, it enables the execution of the payload, resulting in Stored XSS or 'Cross-Site Scripting'." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://crushftp.com/crush11wiki/Wiki.jsp?page=Update", + "source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22461.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22461.json new file mode 100644 index 00000000000..3ae1f482dfe --- /dev/null +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22461.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-22461", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-12-13T14:15:21.383", + "lastModified": "2024-12-13T14:15:21.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell RecoverPoint for Virtual Machines 6.0.x contains an OS Command injection vulnerability. A low privileged remote attacker could potentially exploit this vulnerability by running any command as root, leading to gaining of root-level access and compromise of complete system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29131.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29131.json index 332ca5d201d..c2769e7c019 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29131.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29131.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29131", "sourceIdentifier": "security@apache.org", "published": "2024-03-21T09:15:07.807", - "lastModified": "2024-11-21T09:07:37.410", + "lastModified": "2024-12-13T14:15:21.547", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -83,6 +83,10 @@ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YD4AFTIIQW662LUAQRMWS6BBKYSZG3YS/", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20241213-0001/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29404.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29404.json index 47be2cd8d76..c56cec7d015 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29404.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29404.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29404", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-03T17:15:10.087", - "lastModified": "2024-12-03T17:15:10.087", + "lastModified": "2024-12-13T14:15:21.740", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Un problema en Razer Synapse 3 v.3.9.131.20813 y Synapse 3 App v.20240213 permite que un atacante local ejecute c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de export de la funci\u00f3n Chroma Effects en el componente Profiles ." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/mansk1es/CVE-2024-29404_Razer", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38488.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38488.json new file mode 100644 index 00000000000..f65fed54f5a --- /dev/null +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38488.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38488", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-12-13T14:15:21.993", + "lastModified": "2024-12-13T14:15:21.993", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell RecoverPoint for Virtual Machines 6.0.x contains a vulnerability. An improper Restriction of Excessive Authentication vulnerability where a Network attacker could potentially exploit this vulnerability, leading to a brute force attack or a dictionary attack against the RecoverPoint login form and a complete system compromise.\nThis allows attackers to brute-force the password of valid users in an automated manner." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47241.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47241.json index 65f833bc3fd..d8dae1a4f60 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47241.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47241.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47241", "sourceIdentifier": "security_alert@emc.com", "published": "2024-10-18T17:15:12.880", - "lastModified": "2024-10-21T17:10:22.857", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-13T14:37:10.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:secure_connect_gateway:5.24.00.14:*:*:*:*:*:*:*", + "matchCriteriaId": "9A8CE3A7-E200-4F68-88D2-878FA0E5EC68" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000237211/dsa-2024-407-dell-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48007.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48007.json new file mode 100644 index 00000000000..56f54694b8e --- /dev/null +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48007.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-48007", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-12-13T14:15:22.147", + "lastModified": "2024-12-13T14:15:22.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell RecoverPoint for Virtual Machines 6.0.x contains use of hard-coded credentials vulnerability. A Remote unauthenticated attacker could potentially exploit this vulnerability by gaining access to the source code, easily retrieving these secrets and reusing them to access the system leading to gaining access to unauthorized data." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48008.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48008.json new file mode 100644 index 00000000000..d1116847946 --- /dev/null +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48008.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48008", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-12-13T14:15:22.273", + "lastModified": "2024-12-13T14:15:22.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell RecoverPoint for Virtual Machines 6.0.x contains a OS Command Injection vulnerability. An Low privileged remote attacker could potentially exploit this vulnerability leading to information disclosure ,allowing of unintended actions like reading files that may contain sensitive information" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-11" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53143.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53143.json index c25e47d6ffa..34eb1b2c3b1 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53143.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53143.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53143", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-07T07:15:03.780", - "lastModified": "2024-12-07T07:15:03.780", - "vulnStatus": "Received", + "lastModified": "2024-12-13T14:15:22.443", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfsnotify: Fix ordering of iput() and watched_objects decrement\n\nEnsure the superblock is kept alive until we're done with iput().\nHolding a reference to an inode is not allowed unless we ensure the\nsuperblock stays alive, which fsnotify does by keeping the\nwatched_objects count elevated, so iput() must happen before the\nwatched_objects decrement.\nThis can lead to a UAF of something like sb->s_fs_info in tmpfs, but the\nUAF is hard to hit because race orderings that oops are more likely, thanks\nto the CHECK_DATA_CORRUPTION() block in generic_shutdown_super().\n\nAlso, ensure that fsnotify_put_sb_watched_objects() doesn't call\nfsnotify_sb_watched_objects() on a superblock that may have already been\nfreed, which would cause a UAF read of sb->s_fsnotify_info." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fsnotify: Arreglar el orden de iput() y el decremento de watching_objects Asegurarse de que el superbloque se mantenga activo hasta que terminemos con iput(). No se permite mantener una referencia a un inodo a menos que aseguremos que el superbloque se mantenga activo, lo que fsnotify hace manteniendo elevado el conteo de watching_objects, por lo que iput() debe ocurrir antes del decremento de watching_objects. Esto puede llevar a un UAF de algo como sb->s_fs_info en tmpfs, pero el UAF es dif\u00edcil de alcanzar porque los \u00f3rdenes de carrera que oops son m\u00e1s probables, gracias al bloque CHECK_DATA_CORRUPTION() en generic_shutdown_super(). Adem\u00e1s, aseg\u00farese de que fsnotify_put_sb_watched_objects() no llame a fsnotify_sb_watched_objects() en un superbloque que ya puede haber sido liberado, lo que causar\u00eda una lectura UAF de sb->s_fsnotify_info." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/21d1b618b6b9da46c5116c640ac4b1cc8d40d63a", diff --git a/CVE-2024/CVE-2024-558xx/CVE-2024-55889.json b/CVE-2024/CVE-2024-558xx/CVE-2024-55889.json new file mode 100644 index 00000000000..488600f1950 --- /dev/null +++ b/CVE-2024/CVE-2024-558xx/CVE-2024-55889.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-55889", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-13T14:15:22.653", + "lastModified": "2024-12-13T14:15:22.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "phpMyFAQ is an open source FAQ web application. Prior to version 3.2.10, a vulnerability exists in the FAQ Record component where a privileged attacker can trigger a file download on a victim's machine upon page visit by embedding it in an