mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-05 10:18:41 +00:00
Auto-Update: 2025-04-27T02:00:19.174740+00:00
This commit is contained in:
parent
f458ce4a27
commit
db22e861cd
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-05T22:15:27.180",
|
||||
"lastModified": "2025-02-06T16:15:28.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-17T18:15:42.743",
|
||||
"lastModified": "2025-04-17T20:21:05.203",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context\n\nIf a driver calls can_get_echo_skb() during a hardware IRQ (which is often, but\nnot always, the case), the 'WARN_ON(in_irq)' in\nnet/core/skbuff.c#skb_release_head_state() might be triggered, under network\ncongestion circumstances, together with the potential risk of a NULL pointer\ndereference.\n\nThe root cause of this issue is the call to kfree_skb() instead of\ndev_kfree_skb_irq() in net/core/dev.c#enqueue_to_backlog().\n\nThis patch prevents the skb to be freed within the call to netif_rx() by\nincrementing its reference count with skb_get(). The skb is finally freed by\none of the in-irq-context safe functions: dev_consume_skb_any() or\ndev_kfree_skb_any(). The \"any\" version is used because some drivers might call\ncan_get_echo_skb() in a normal context.\n\nThe reason for this issue to occur is that initially, in the core network\nstack, loopback skb were not supposed to be received in hardware IRQ context.\nThe CAN stack is an exeption.\n\nThis bug was previously reported back in 2017 in [1] but the proposed patch\nnever got accepted.\n\nWhile [1] directly modifies net/core/dev.c, we try to propose here a\nsmoother modification local to CAN network stack (the assumption\nbehind is that only CAN devices are affected by this issue).\n\n[1] http://lore.kernel.org/r/57a3ffb6-3309-3ad5-5a34-e93c3fe3614d@cetitec.com"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: dev: can_get_echo_skb(): evitar la llamada a kfree_skb() en el contexto de IRQ duro Si un controlador llama a can_get_echo_skb() durante un IRQ de hardware (que es a menudo, pero no siempre, el caso), el 'WARN_ON(in_irq)' en net/core/skbuff.c#skb_release_head_state() podr\u00eda activarse, en circunstancias de congesti\u00f3n de la red, junto con el riesgo potencial de una desreferencia de puntero NULL. La causa ra\u00edz de este problema es la llamada a kfree_skb() en lugar de dev_kfree_skb_irq() en net/core/dev.c#enqueue_to_backlog(). Este parche evita que el skb se libere dentro de la llamada a netif_rx() incrementando su contador de referencias con skb_get(). El skb se libera finalmente mediante una de las funciones seguras en contexto IRQ: dev_consume_skb_any() o dev_kfree_skb_any(). Se utiliza la versi\u00f3n \"any\" porque algunos controladores podr\u00edan llamar a can_get_echo_skb() en un contexto normal. Este problema se debe a que, inicialmente, en la pila de red principal, no se esperaba que los skb de bucle invertido se recibieran en el contexto IRQ de hardware. La pila CAN es una excepci\u00f3n. Este error se report\u00f3 previamente en 2017 en [1], pero el parche propuesto nunca fue aceptado. Si bien [1] modifica directamente net/core/dev.c, aqu\u00ed intentamos proponer una modificaci\u00f3n m\u00e1s fluida local en la pila de red CAN (suponiendo que solo los dispositivos CAN se ven afectados por este problema). [1] http://lore.kernel.org/r/57a3ffb6-3309-3ad5-5a34-e93c3fe3614d@cetitec.com"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-20T22:15:28.950",
|
||||
"lastModified": "2025-04-21T14:23:45.950",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
@ -16,6 +16,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The KnowBe4 Security Awareness Training application before 2020-01-10 allows reflected XSS. The response has a SCRIPT element that sets window.location.href to a JavaScript URL."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La aplicaci\u00f3n KnowBe4 Security Awareness Training antes de 2020-01-10 permite XSS reflejado. La respuesta tiene un elemento script que establece window.location.href a una URL de JavaScript."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-20T22:15:29.690",
|
||||
"lastModified": "2025-04-21T14:23:45.950",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
@ -16,6 +16,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The KnowBe4 Security Awareness Training application before 2020-01-10 contains a redirect function that does not validate the destination URL before redirecting. The response has a SCRIPT element that sets window.location.href to an arbitrary https URL."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La aplicaci\u00f3n KnowBe4 Security Awareness Training antes de 2020-01-10 contiene una funci\u00f3n de redirecci\u00f3n que no valida la URL de destino antes de redirigir. La respuesta tiene un elemento script que establece window.location.href a una URL HTTPS arbitraria."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-20T22:15:08.010",
|
||||
"lastModified": "2024-11-21T06:00:34.147",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-20T22:15:08.067",
|
||||
"lastModified": "2024-11-21T06:00:35.950",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Wordpress Plugin Smart Product Review plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Wordpress Plugin Smart Product Review para Wordpress es vulnerable a la carga de archivos arbitrarios debido a la falta de validaci\u00f3n del tipo de archivo en todas las versiones hasta la 1.0.4 incluida. Esto permite que atacantes no autenticados carguen archivos arbitrarios en el servidor del sitio afectado, lo que podr\u00eda posibilitar la ejecuci\u00f3n remota de c\u00f3digo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Due to missing authorization an unauthenticated remote attacker\u00a0can cause a DoS attack by connecting via HTTPS and triggering the shutdown button."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Debido a la falta de autorizaci\u00f3n, un atacante remoto no autenticado puede provocar un ataque DoS al conectarse a trav\u00e9s de HTTPS y activar el bot\u00f3n de apagado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Due to improper\u00a0JSON Web Tokens implementation an unauthenticated remote attacker can guess a valid session ID and therefore impersonate a user to gain full access."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Debido a una implementaci\u00f3n incorrecta de tokens web JSON, un atacante remoto no autenticado puede adivinar una ID de sesi\u00f3n v\u00e1lida y, por lo tanto, hacerse pasar por un usuario para obtener acceso completo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Due to improper authentication mechanism an unauthenticated remote attacker can enumerate valid usernames."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Debido a un mecanismo de autenticaci\u00f3n inadecuado, un atacante remoto no autenticado puede enumerar nombres de usuario v\u00e1lidos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Use of Privileged APIs vulnerability in OpenText\u2122 Operations Bridge Manager, OpenText\u2122 Operations Bridge Suite (Containerized), OpenText\u2122 UCMDB ( Classic and Containerized) allows Privilege Escalation.\u00a0\n\nThe vulnerability could allow\u00a0authenticated attackers\u00a0to elevate user privileges.\u00a0This issue affects Operations Bridge Manager: through 2021.05; Operations Bridge Suite (Containerized): through 2021.05; UCMDB ( Classic and Containerized): through 2021.05."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de uso incorrecto de APIs privilegiadas en OpenText\u2122 Operations Bridge Manager, OpenText\u2122 Operations Bridge Suite (Containerized), OpenText\u2122 UCMDB ( Classic and Containerized) permite la escalada de privilegios. Esta vulnerabilidad podr\u00eda permitir a atacantes autenticados elevar los privilegios de los usuarios. Este problema afecta a Operations Bridge Manager hasta la versi\u00f3n de mayo de 2021; Operations Bridge Suite (en contenedor) hasta la versi\u00f3n de mayo de 2021; y UCMDB (cl\u00e1sico y en contenedor) hasta la versi\u00f3n de mayo de 2021."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-29T01:35:29.187",
|
||||
"lastModified": "2024-11-21T07:13:29.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-04T16:15:48.890",
|
||||
"lastModified": "2024-11-21T07:27:19.760",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper sanitization of SVG files in HCL Leap\nallows client-side script injection in deployed applications."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La depuraci\u00f3n inadecuada de archivos SVG en HCL Leap permite la inyecci\u00f3n de scripts del lado del cliente en aplicaciones implementadas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unsafe default file type filter policy in HCL\nLeap allows execution of unsafe JavaScript in deployed applications."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La pol\u00edtica de filtro de tipo de archivo predeterminado no seguro en HCL Leap permite la ejecuci\u00f3n de JavaScript no seguro en aplicaciones implementadas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "7-Zip 22.01 does not report an error for certain invalid xz files, involving block flags and reserved bits. Some later versions are unaffected."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "7-Zip 22.01 no reporta errores para ciertos archivos xz no v\u00e1lidos, relacionados con indicadores de bloque y bits reservados. Algunas versiones posteriores no se ven afectadas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "7-Zip 22.01 does not report an error for certain invalid xz files, involving stream flags and reserved bits. Some later versions are unaffected."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "7-Zip 22.01 no reporta errores para ciertos archivos xz no v\u00e1lidos, relacionados con indicadores de flujo y bits reservados. Algunas versiones posteriores no se ven afectadas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-02T22:15:46.930",
|
||||
"lastModified": "2024-11-21T07:33:38.493",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2024-01-16T18:15:09.130",
|
||||
"lastModified": "2025-03-17T23:15:16.143",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2024-01-16T18:15:09.170",
|
||||
"lastModified": "2025-03-18T17:15:39.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "cJSON 1.7.15 might allow a denial of service via a crafted JSON document such as {\"a\": true, \"b\": [ null,9999999999999999999999999999999999999999999999912345678901234567]}."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "cJSON 1.7.15 podr\u00eda permitir una denegaci\u00f3n de servicio a trav\u00e9s de un documento JSON manipulado como {\"a\": true, \"b\": [ null,99999999999999999999999999999999999999999999912345678901234567]}."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-29T01:38:30.693",
|
||||
"lastModified": "2024-11-21T07:52:23.580",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "mystrtod in mjson 1.2.7 requires more than a billion iterations during processing of certain digit strings such as 8891110122900e913013935755114."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "mystrtod en mjson 1.2.7 requiere m\u00e1s de mil millones de iteraciones durante el procesamiento de ciertas cadenas de d\u00edgitos como 8891110122900e913013935755114."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-05-06T03:15:09.273",
|
||||
"lastModified": "2025-03-17T17:15:19.013",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2024-02-29T01:40:04.220",
|
||||
"lastModified": "2024-11-21T08:11:49.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing \"no cache\" headers in HCL Leap permits user directory information to be cached."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La falta de encabezados \"sin cach\u00e9\" en HCL Leap permite que la informaci\u00f3n del directorio del usuario se almacene en cach\u00e9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient URI protocol whitelist in HCL Leap\nallows script injection through query parameters."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La lista blanca de protocolos URI insuficiente en HCL Leap permite la inyecci\u00f3n de scripts a trav\u00e9s de par\u00e1metros de consulta."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An app may be able to elevate privileges. This issue is fixed in macOS 14. This issue was addressed by removing the vulnerable code."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una aplicaci\u00f3n puede elevar los privilegios. Este problema se soluciona en MacOS 14. Este problema se abord\u00f3 eliminando el c\u00f3digo vulnerable."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An app may be able to break out of its sandbox. This issue is fixed in iOS 17 and iPadOS 17, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14, macOS Ventura 13.6, macOS Monterey 12.7. The issue was addressed with improved handling of caches."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una aplicaci\u00f3n puede salir de la sandbox. Este problema se soluciona en iOS 17 y iPados 17, iOS 16.7 e iPados 16.7, Macos Sonoma 14, MacOS Ventura 13.6, MacOS Monterey 12.7. El problema se abord\u00f3 con el manejo mejorado de los cach\u00e9s."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14, watchOS 10, tvOS 17, Safari 17. Processing web content may lead to arbitrary code execution."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema use-after-free se abord\u00f3 con una gesti\u00f3n de memoria mejorada. Este problema se soluciona en iOS 17 y iPados 17, Macos Sonoma 14, Watchos 10, Tvos 17, Safari 17. Processing Web Content puede conducir a la ejecuci\u00f3n de c\u00f3digo arbitraria."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Private Browsing tabs may be accessed without authentication. This issue is fixed in iOS 17 and iPadOS 17. The issue was addressed with improved UI."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se puede acceder a las pesta\u00f1as de navegaci\u00f3n privada sin autenticaci\u00f3n. Este problema se soluciona en iOS 17 y iPados 17. El problema se abord\u00f3 con una interfaz de usuario mejorada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path handling issue was addressed with improved validation. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to break out of its sandbox."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se abord\u00f3 un problema de gesti\u00f3n de ruta con una validaci\u00f3n mejorada. Este problema se soluciona en iOS 17 y iPados 17, Macos Sonoma 14. Una aplicaci\u00f3n puede salir de la sandbox."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Processing a file may lead to a denial-of-service or potentially disclose memory contents. This issue is fixed in macOS 14. The issue was addressed with improved checks."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Procesar un archivo puede conducir a una denegaci\u00f3n de servicio o potencialmente revelar el contenido de la memoria. Este problema se soluciona en MacOS 14. El problema se abord\u00f3 con cheques mejorados."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@m-files.com",
|
||||
"published": "2024-03-04T08:15:08.160",
|
||||
"lastModified": "2024-11-21T08:35:15.217",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient default configuration in HCL Leap\nallows anonymous access to directory information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La configuraci\u00f3n predeterminada insuficiente en HCL Leap permite el acceso an\u00f3nimo a la informaci\u00f3n del directorio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-28T22:15:26.070",
|
||||
"lastModified": "2024-11-29T17:15:04.770",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-26T16:27:47.317",
|
||||
"lastModified": "2024-11-21T08:34:05.233",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-02-28T19:15:09.963",
|
||||
"lastModified": "2024-11-21T08:38:19.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-29T01:42:05.557",
|
||||
"lastModified": "2024-11-21T08:38:46.037",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-29T01:42:05.597",
|
||||
"lastModified": "2024-11-21T08:38:46.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-29T01:42:05.637",
|
||||
"lastModified": "2024-11-21T08:38:46.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-28T20:15:41.640",
|
||||
"lastModified": "2024-11-26T16:15:08.977",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-02T22:15:47.640",
|
||||
"lastModified": "2024-11-21T08:39:56.080",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T08:15:37.290",
|
||||
"lastModified": "2024-11-21T08:40:02.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-26T18:15:09.140",
|
||||
"lastModified": "2024-11-21T08:40:14.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans\n\nThere is a kernel API ntb_mw_clear_trans() would pass 0 to both addr and\nsize. This would make xlate_pos negative.\n\n[ 23.734156] switchtec switchtec0: MW 0: part 0 addr 0x0000000000000000 size 0x0000000000000000\n[ 23.734158] ================================================================================\n[ 23.734172] UBSAN: shift-out-of-bounds in drivers/ntb/hw/mscc/ntb_hw_switchtec.c:293:7\n[ 23.734418] shift exponent -1 is negative\n\nEnsuring xlate_pos is a positive or zero before BIT."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ntb_hw_switchtec: Se corrige el desplazamiento fuera de los l\u00edmites en switchtec_ntb_mw_set_trans. Existe una API del kernel ntb_mw_clear_trans() que pasar\u00eda 0 tanto a addr como a size. Esto har\u00eda que xlate_pos fuera negativo. [ 23.734156] switchtec switchtec0: MW 0: parte 0 addr 0x0000000000000000 tama\u00f1o 0x0000000000000000 [ 23.734158] ======================================================================================== [ 23.734172] UBSAN: desplazamiento fuera de los l\u00edmites en drivers/ntb/hw/mscc/ntb_hw_switchtec.c:293:7 [ 23.734418] el exponente de desplazamiento -1 es negativo. Se garantiza que xlate_pos sea positivo o cero antes de BIT."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in mod_proxy_cluster. The issue is that the <Directory> directive should be replaced by the <Location> directive as the former does not restrict IP/host access as `Require ip IP_ADDRESS` would suggest. This means that anyone with access to the host might send MCMP requests that may result in adding/removing/updating nodes for the balancing. However, this host should not be accessible to the public network as it does not serve the general traffic."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en mod_proxy_cluster. El problema radica en que la directiva deber\u00eda reemplazarse por la directiva , ya que esta no restringe el acceso a IP/host como sugiere `Require ip IP_ADDRESS`. Esto significa que cualquier persona con acceso al host podr\u00eda enviar solicitudes MCMP que podr\u00edan resultar en la adici\u00f3n, eliminaci\u00f3n o actualizaci\u00f3n de nodos para el balanceo. Sin embargo, este host no deber\u00eda ser accesible a la red p\u00fablica, ya que no atiende el tr\u00e1fico general."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-04-22T12:15:14.677",
|
||||
"lastModified": "2025-04-23T14:08:13.383",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Icegram Express formerly known as Email Subscribers WordPress plugin before 5.7.52 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Icegram Express formerly known as Email Subscribers WordPress para WordPress antes de la versi\u00f3n 5.7.52 no depura ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados como el administrador realizar ataques de Cross Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue has been discovered in access controls could allow users to view certain restricted project information even when related features are disabled in GitLab EE, affecting all versions from 17.7 prior to 17.9.7, 17.10 prior to 17.10.5, and 17.11 prior to 17.11.1."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto un problema en los controles de acceso que podr\u00eda permitir a los usuarios ver cierta informaci\u00f3n restringida del proyecto incluso cuando las funciones relacionadas est\u00e1n deshabilitadas en GitLab EE, lo que afecta a todas las versiones desde la 17.7 anterior a la 17.9.7, la 17.10 anterior a la 17.10.5 y la 17.11 anterior a la 17.11.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Uncontrolled Search Path Element vulnerability in OpenText Secure Content Manager on Windows allows DLL Side-Loading.This issue affects Secure Content Manager: 23.4.\n\nEnd-users can potentially exploit the vulnerability to execute malicious code in the trusted context of the thick-client application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad del elemento de ruta de b\u00fasqueda no controlada en OpenText Secure Content Manager para Windows permite la carga lateral de DLL. Este problema afecta a Secure Content Manager: versi\u00f3n 23.4. Los usuarios finales podr\u00edan explotar esta vulnerabilidad para ejecutar c\u00f3digo malicioso en el contexto de confianza de la aplicaci\u00f3n de cliente pesado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-29T20:15:05.043",
|
||||
"lastModified": "2025-02-01T19:15:07.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-31T11:15:06.933",
|
||||
"lastModified": "2024-12-31T16:15:25.580",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Reales WP - Real Estate WordPress Theme theme for WordPress is vulnerable to unauthorized modification and loss of data due to a missing capability check on the 'reales_delete_file', 'reales_delete_file_plans', 'reales_add_to_favourites', and 'reales_remove_from_favourites' functions in all versions up to, and including, 2.1.2. This makes it possible for unauthenticated attackers to delete arbitrary attachments, and add or remove favorite property listings for any user."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El tema Reales WP - Real Estate WordPress Theme para WordPress es vulnerable a modificaciones no autorizadas y p\u00e9rdida de datos debido a la falta de comprobaci\u00f3n de las funciones 'reales_delete_file', 'reales_delete_file_plans', 'reales_add_to_favourites' y 'reales_remove_from_favourites' en todas las versiones hasta la 2.1.2 incluida. Esto permite a atacantes no autenticados eliminar archivos adjuntos arbitrarios y a\u00f1adir o eliminar propiedades favoritas de cualquier usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Piotnet Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'PAFE Before After Image Comparison Slider' widget in all versions up to, and including, 2.4.34 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Piotnet Addons para Elementor para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del widget \"PAFE Before After Image Comparison Slider\" en todas las versiones hasta la 2.4.34 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Klarna Checkout for WooCommerce WordPress plugin before 2.13.5 exposes an unauthenticated WooCommerce Ajax endpoint that allows an attacker to flood the log files with data at the maximum size allowed for a POST parameter per request. This can result in rapid consumption of disk space, potentially filling the entire disk."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Klarna Checkout para WooCommerce de WordPress anterior a la versi\u00f3n 2.13.5 expone un endpoint Ajax de WooCommerce no autenticado que permite a un atacante inundar los archivos de registro con datos del tama\u00f1o m\u00e1ximo permitido para un par\u00e1metro POST por solicitud. Esto puede provocar un consumo r\u00e1pido de espacio en disco, llegando incluso a llenarlo por completo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP-Syntax WordPress plugin through 1.2 does not properly handle input, allowing an attacker to create a post containing a large number of tags, thereby exploiting a catastrophic backtracking issue in the regular expression processing to cause a DoS."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento WP-Syntax para WordPress hasta la versi\u00f3n 1.2 no gestiona adecuadamente la entrada, lo que permite que un atacante cree una publicaci\u00f3n que contenga una gran cantidad de etiquetas, explotando as\u00ed un problema de retroceso catastr\u00f3fico en el procesamiento de expresiones regulares para provocar un DoS."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-02T07:15:46.207",
|
||||
"lastModified": "2025-01-16T18:44:36.740",
|
||||
"vulnStatus": "Analyzed",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:07.060",
|
||||
"lastModified": "2024-11-21T08:51:48.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-05-06T03:15:09.477",
|
||||
"lastModified": "2024-11-21T08:51:49.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-05-06T03:15:09.563",
|
||||
"lastModified": "2025-03-13T18:15:36.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-05-06T03:15:09.640",
|
||||
"lastModified": "2025-03-27T17:15:53.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-05-06T03:15:09.710",
|
||||
"lastModified": "2024-11-21T08:51:55.767",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-05-06T03:15:09.787",
|
||||
"lastModified": "2025-03-19T14:15:35.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-05-06T03:15:09.870",
|
||||
"lastModified": "2025-03-20T21:15:19.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2025-01-06T04:15:07.193",
|
||||
"lastModified": "2025-01-06T15:15:12.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2025-01-06T04:15:07.770",
|
||||
"lastModified": "2025-01-06T15:15:13.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "psirt@cisco.com",
|
||||
"published": "2024-02-29T01:43:59.000",
|
||||
"lastModified": "2024-11-21T08:52:14.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "psirt@cisco.com",
|
||||
"published": "2024-02-29T01:43:59.207",
|
||||
"lastModified": "2024-11-21T08:52:14.550",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "psirt@cisco.com",
|
||||
"published": "2024-03-06T17:15:09.973",
|
||||
"lastModified": "2024-11-21T08:52:25.243",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2024-02-20T18:15:51.063",
|
||||
"lastModified": "2024-11-21T08:54:51.163",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -66,7 +66,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Storage Defender - Resiliency Service 2.0.0 through 2.0.12 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM Storage Defender - Resiliency Service 2.0.0 a 2.0.12 utiliza algoritmos criptogr\u00e1ficos m\u00e1s d\u00e9biles de lo esperado que podr\u00edan permitir a un atacante descifrar informaci\u00f3n altamente confidencial."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM InfoSphere Information 11.7 Server does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM InfoSphere Information 11.7 Server no invalida la sesi\u00f3n despu\u00e9s de cerrar la sesi\u00f3n, lo que podr\u00eda permitir que un usuario autenticado se haga pasar por otro usuario en el sistema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-28T23:15:09.507",
|
||||
"lastModified": "2024-11-21T08:56:24.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T06:15:48.280",
|
||||
"lastModified": "2024-11-21T08:56:44.910",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-28T22:15:26.453",
|
||||
"lastModified": "2025-03-27T22:15:15.637",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T15:15:49.317",
|
||||
"lastModified": "2024-11-21T08:58:14.660",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-20T23:15:07.683",
|
||||
"lastModified": "2024-11-21T08:58:19.993",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-31T01:15:09.483",
|
||||
"lastModified": "2025-03-13T14:15:22.767",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-31T01:15:09.593",
|
||||
"lastModified": "2025-03-24T17:15:16.133",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-31T00:15:09.593",
|
||||
"lastModified": "2025-01-31T20:15:31.357",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-31T00:15:09.703",
|
||||
"lastModified": "2025-01-31T19:15:16.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-31T00:15:09.810",
|
||||
"lastModified": "2025-01-31T19:15:16.990",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-31T00:15:09.920",
|
||||
"lastModified": "2025-01-31T19:15:18.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-07T21:15:08.223",
|
||||
"lastModified": "2024-11-21T08:58:51.867",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-23T22:15:54.913",
|
||||
"lastModified": "2024-11-21T08:59:08.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-23T22:15:54.970",
|
||||
"lastModified": "2024-11-21T08:59:08.943",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-21T02:52:10.787",
|
||||
"lastModified": "2024-11-21T08:59:22.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-02-26T16:27:58.503",
|
||||
"lastModified": "2024-11-21T08:59:33.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-29T01:44:14.417",
|
||||
"lastModified": "2024-11-21T09:00:07.557",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-02-29T01:44:14.480",
|
||||
"lastModified": "2025-02-13T18:17:13.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-28T20:15:41.770",
|
||||
"lastModified": "2024-11-21T09:00:23.747",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T06:15:48.347",
|
||||
"lastModified": "2024-11-21T09:00:34.823",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-02-28T23:15:09.660",
|
||||
"lastModified": "2024-11-26T08:15:04.400",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-23T22:15:55.017",
|
||||
"lastModified": "2024-11-21T09:01:17.477",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-26T17:15:10.497",
|
||||
"lastModified": "2024-11-21T09:01:21.100",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-26T18:15:07.757",
|
||||
"lastModified": "2024-11-21T09:01:21.313",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-03T09:15:06.210",
|
||||
"lastModified": "2024-11-21T09:01:25.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-08T02:15:50.477",
|
||||
"lastModified": "2024-11-21T09:01:25.660",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user