mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-03-17T23:00:38.202265+00:00
This commit is contained in:
parent
44a3c851d7
commit
e2a49590ae
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47109",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:06.457",
|
||||
"lastModified": "2024-03-15T21:15:06.457",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47110",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:06.530",
|
||||
"lastModified": "2024-03-15T21:15:06.530",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47111",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:06.577",
|
||||
"lastModified": "2024-03-15T21:15:06.577",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47112",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:06.627",
|
||||
"lastModified": "2024-03-15T21:15:06.627",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47113",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:06.673",
|
||||
"lastModified": "2024-03-15T21:15:06.673",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47114",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:06.723",
|
||||
"lastModified": "2024-03-15T21:15:06.723",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47115",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:06.780",
|
||||
"lastModified": "2024-03-15T21:15:06.780",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47116",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:06.837",
|
||||
"lastModified": "2024-03-15T21:15:06.837",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47117",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:06.887",
|
||||
"lastModified": "2024-03-15T21:15:06.887",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47118",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:06.943",
|
||||
"lastModified": "2024-03-15T21:15:06.943",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47119",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:07.013",
|
||||
"lastModified": "2024-03-15T21:15:07.013",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47120",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:07.060",
|
||||
"lastModified": "2024-03-15T21:15:07.060",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47121",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:07.107",
|
||||
"lastModified": "2024-03-15T21:15:07.107",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47122",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:07.157",
|
||||
"lastModified": "2024-03-15T21:15:07.157",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47123",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:07.217",
|
||||
"lastModified": "2024-03-15T21:15:07.217",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47124",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:07.260",
|
||||
"lastModified": "2024-03-15T21:15:07.260",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47125",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:07.307",
|
||||
"lastModified": "2024-03-15T21:15:07.307",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47126",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:07.357",
|
||||
"lastModified": "2024-03-15T21:15:07.357",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47127",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:07.417",
|
||||
"lastModified": "2024-03-15T21:15:07.417",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47128",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:07.470",
|
||||
"lastModified": "2024-03-15T21:15:07.470",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47129",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:07.523",
|
||||
"lastModified": "2024-03-15T21:15:07.523",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47130",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:07.577",
|
||||
"lastModified": "2024-03-15T21:15:07.577",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47131",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:07.623",
|
||||
"lastModified": "2024-03-15T21:15:07.623",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47132",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:07.690",
|
||||
"lastModified": "2024-03-15T21:15:07.690",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47133",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:07.733",
|
||||
"lastModified": "2024-03-15T21:15:07.733",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47134",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:07.780",
|
||||
"lastModified": "2024-03-15T21:15:07.780",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47135",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:07.823",
|
||||
"lastModified": "2024-03-15T21:15:07.823",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-36483",
|
||||
"sourceIdentifier": "productsecurity@carrier.com",
|
||||
"published": "2024-03-16T05:15:18.577",
|
||||
"lastModified": "2024-03-16T05:15:18.577",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51407",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-16T01:15:48.523",
|
||||
"lastModified": "2024-03-16T01:15:48.523",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51474",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-16T02:15:07.403",
|
||||
"lastModified": "2024-03-16T02:15:07.403",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51486",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-16T02:15:07.623",
|
||||
"lastModified": "2024-03-16T02:15:07.623",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51487",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-16T02:15:07.817",
|
||||
"lastModified": "2024-03-16T02:15:07.817",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51489",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-16T01:15:49.300",
|
||||
"lastModified": "2024-03-16T01:15:49.300",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51491",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-16T01:15:49.537",
|
||||
"lastModified": "2024-03-16T01:15:49.537",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51510",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-16T01:15:49.747",
|
||||
"lastModified": "2024-03-16T01:15:49.747",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51512",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-16T01:15:49.950",
|
||||
"lastModified": "2024-03-16T01:15:49.950",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51521",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-16T01:15:50.117",
|
||||
"lastModified": "2024-03-16T01:15:50.117",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51699",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-15T19:15:06.810",
|
||||
"lastModified": "2024-03-15T19:15:06.810",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6525",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-16T03:15:06.730",
|
||||
"lastModified": "2024-03-16T03:15:06.730",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-6960",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2024-03-15T17:15:07.157",
|
||||
"lastModified": "2024-03-15T17:15:07.157",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "TTLock App virtual keys and settings are only deleted client side, and if preserved, can access the lock after intended deletion."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las claves virtuales y la configuraci\u00f3n de la aplicaci\u00f3n TTLock solo se eliminan del lado del cliente y, si se conservan, pueden acceder al bloqueo despu\u00e9s de la eliminaci\u00f3n prevista."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-7003",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2024-03-15T17:15:07.630",
|
||||
"lastModified": "2024-03-15T17:15:07.630",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The AES key utilized in the pairing process between a lock using Sciener firmware and a wireless keypad is not unique, and can be reused to compromise other locks using the Sciener firmware."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La clave AES utilizada en el proceso de emparejamiento entre una cerradura que usa el firmware Sciener y un teclado inal\u00e1mbrico no es \u00fanica y puede reutilizarse para comprometer otras cerraduras que usan el firmware Sciener."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-7004",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2024-03-15T17:15:07.677",
|
||||
"lastModified": "2024-03-15T17:15:07.677",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The TTLock App does not employ proper verification procedures to ensure that it is communicating with the expected device, allowing for connection to a device that spoofs the MAC address of a lock, which compromises the legitimate locks integrity."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La aplicaci\u00f3n TTLock no emplea procedimientos de verificaci\u00f3n adecuados para garantizar que se est\u00e9 comunicando con el dispositivo esperado, lo que permite la conexi\u00f3n a un dispositivo que falsifica la direcci\u00f3n MAC de un candado, lo que compromete la integridad de los candados leg\u00edtimos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-7006",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2024-03-15T17:15:07.717",
|
||||
"lastModified": "2024-03-15T17:15:07.717",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The unlockKey character in a lock using Sciener firmware can be brute forced through repeated challenge requests, compromising the locks integrity."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El car\u00e1cter de clave de desbloqueo en una cerradura que utiliza el firmware Sciener puede ser forzado de forma bruta mediante solicitudes de desaf\u00edo repetidas, comprometiendo la integridad de la cerradura."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-7007",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2024-03-15T17:15:07.763",
|
||||
"lastModified": "2024-03-15T17:15:07.763",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Sciener server does not validate connection requests from the GatewayG2, allowing an impersonation attack that provides the attacker the unlockKey field."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El servidor Sciener no valida las solicitudes de conexi\u00f3n de GatewayG2, lo que permite un ataque de suplantaci\u00f3n de identidad que proporciona al atacante el campo unlockKey."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-7009",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2024-03-15T17:15:07.810",
|
||||
"lastModified": "2024-03-15T17:15:07.810",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Some Sciener-based locks support plaintext message processing over Bluetooth Low Energy, allowing unencrypted malicious commands to be passed to the lock. These malicious commands, less then 16 bytes in length, will be processed by the lock as if they were encrypted communications. This can be further exploited by an attacker to compromise the lock's integrity."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Algunas cerraduras basadas en Sciener admiten el procesamiento de mensajes de texto plano a trav\u00e9s de Bluetooth Low Energy, lo que permite pasar comandos maliciosos sin cifrar a la cerradura. Estos comandos maliciosos, de menos de 16 bytes de longitud, ser\u00e1n procesados por la cerradura como si fueran comunicaciones cifradas. Un atacante puede aprovechar a\u00fan m\u00e1s esto para comprometer la integridad del bloqueo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-7017",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2024-03-15T17:15:07.857",
|
||||
"lastModified": "2024-03-15T17:15:07.857",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Sciener locks' firmware update mechanism do not authenticate or validate firmware updates if passed to the lock through the Bluetooth Low Energy service. A challenge request can be sent to the lock with a command to prepare for an update, rather than an unlock request, allowing an attacker to compromise the device."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El mecanismo de actualizaci\u00f3n de firmware de las cerraduras Sciener no autentica ni valida las actualizaciones de firmware si se pasan a la cerradura a trav\u00e9s del servicio Bluetooth Low Energy. Se puede enviar una solicitud de desaf\u00edo a la cerradura con un comando para prepararse para una actualizaci\u00f3n, en lugar de una solicitud de desbloqueo, lo que permite a un atacante comprometer el dispositivo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7060",
|
||||
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
|
||||
"published": "2024-03-15T19:15:07.010",
|
||||
"lastModified": "2024-03-15T19:15:07.010",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7248",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-03-15T20:15:07.280",
|
||||
"lastModified": "2024-03-15T20:15:07.280",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1239",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-16T03:15:06.900",
|
||||
"lastModified": "2024-03-16T03:15:06.900",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1685",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-16T06:15:10.180",
|
||||
"lastModified": "2024-03-16T06:15:10.180",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1733",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-16T06:15:13.010",
|
||||
"lastModified": "2024-03-16T06:15:13.010",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1857",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-16T09:15:06.897",
|
||||
"lastModified": "2024-03-16T09:15:06.897",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2042",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-16T03:15:07.143",
|
||||
"lastModified": "2024-03-16T03:15:07.143",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2193",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2024-03-15T18:15:08.530",
|
||||
"lastModified": "2024-03-16T16:15:07.160",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22259",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2024-03-16T05:15:20.830",
|
||||
"lastModified": "2024-03-16T05:15:20.830",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22513",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-16T07:15:06.513",
|
||||
"lastModified": "2024-03-16T07:15:06.513",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2294",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-16T02:15:09.200",
|
||||
"lastModified": "2024-03-16T02:15:09.200",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23298",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-15T23:15:07.403",
|
||||
"lastModified": "2024-03-15T23:15:07.403",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23523",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-16T05:15:21.373",
|
||||
"lastModified": "2024-03-16T05:15:21.373",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2308",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-16T02:15:09.380",
|
||||
"lastModified": "2024-03-16T02:15:09.380",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24156",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-16T06:15:13.547",
|
||||
"lastModified": "2024-03-16T06:15:13.547",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24748",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-15T20:15:07.677",
|
||||
"lastModified": "2024-03-15T20:15:07.677",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24827",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-15T20:15:07.900",
|
||||
"lastModified": "2024-03-15T20:15:07.900",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24845",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-16T05:15:21.860",
|
||||
"lastModified": "2024-03-16T05:15:21.860",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24867",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-17T16:15:08.157",
|
||||
"lastModified": "2024-03-17T16:15:08.157",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2497",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-15T17:15:08.177",
|
||||
"lastModified": "2024-03-15T17:15:08.177",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in RaspAP raspap-webgui 3.0.9 and classified as critical. This issue affects some unknown processing of the file includes/provider.php of the component HTTP POST Request Handler. The manipulation of the argument country leads to code injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256919. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en RaspAP raspap-webgui 3.0.9 y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo include/provider.php del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento pa\u00eds conduce a la inyecci\u00f3n de c\u00f3digo. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-256919. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25591",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-17T17:15:06.133",
|
||||
"lastModified": "2024-03-17T17:15:06.133",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25903",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-17T17:15:06.323",
|
||||
"lastModified": "2024-03-17T17:15:06.323",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25933",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-17T16:15:08.390",
|
||||
"lastModified": "2024-03-17T16:15:08.390",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2514",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-15T23:15:08.423",
|
||||
"lastModified": "2024-03-15T23:15:08.423",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2515",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T09:15:07.417",
|
||||
"lastModified": "2024-03-16T09:15:07.417",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2516",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T12:15:14.363",
|
||||
"lastModified": "2024-03-16T12:15:14.363",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2517",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T12:15:15.630",
|
||||
"lastModified": "2024-03-16T12:15:15.630",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2518",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T13:15:05.727",
|
||||
"lastModified": "2024-03-16T13:15:05.727",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2519",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T15:15:08.580",
|
||||
"lastModified": "2024-03-16T15:15:08.580",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2520",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T16:15:07.270",
|
||||
"lastModified": "2024-03-16T16:15:07.270",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2521",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T16:15:07.497",
|
||||
"lastModified": "2024-03-16T16:15:07.497",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2522",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T17:15:05.777",
|
||||
"lastModified": "2024-03-16T17:15:05.777",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2523",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T17:15:05.997",
|
||||
"lastModified": "2024-03-16T17:15:05.997",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2524",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T18:15:07.037",
|
||||
"lastModified": "2024-03-16T18:15:07.037",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2525",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T18:15:07.290",
|
||||
"lastModified": "2024-03-16T18:15:07.290",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2526",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T19:15:06.087",
|
||||
"lastModified": "2024-03-16T19:15:06.087",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2527",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T19:15:06.317",
|
||||
"lastModified": "2024-03-16T19:15:06.317",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2528",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T20:15:06.713",
|
||||
"lastModified": "2024-03-16T20:15:06.713",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2529",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T20:15:06.947",
|
||||
"lastModified": "2024-03-16T20:15:06.947",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2530",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T21:15:29.733",
|
||||
"lastModified": "2024-03-16T21:15:29.733",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2531",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T22:15:07.400",
|
||||
"lastModified": "2024-03-16T22:15:07.400",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2532",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T22:15:07.613",
|
||||
"lastModified": "2024-03-16T22:15:07.613",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2533",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T23:15:06.823",
|
||||
"lastModified": "2024-03-16T23:15:06.823",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2534",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-17T00:15:06.977",
|
||||
"lastModified": "2024-03-17T00:15:06.977",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2535",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-17T01:15:50.107",
|
||||
"lastModified": "2024-03-17T01:15:50.107",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2537",
|
||||
"sourceIdentifier": "cve-coordination@logitech.com",
|
||||
"published": "2024-03-15T18:15:08.583",
|
||||
"lastModified": "2024-03-15T18:15:08.583",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Control of Dynamically-Managed Code Resources vulnerability in Logitech Logi Tune on MacOS allows Local Code Inclusion."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad del control inadecuado de los recursos de c\u00f3digo administrados din\u00e1micamente en Logitech Logi Tune en MacOS permite la inclusi\u00f3n de c\u00f3digo local."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2546",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-17T02:15:06.190",
|
||||
"lastModified": "2024-03-17T02:15:06.190",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2547",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-17T04:15:06.750",
|
||||
"lastModified": "2024-03-17T04:15:06.750",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2553",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-17T04:15:07.073",
|
||||
"lastModified": "2024-03-17T04:15:07.073",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2554",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-17T05:15:06.040",
|
||||
"lastModified": "2024-03-17T05:15:06.040",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2555",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-17T07:15:05.803",
|
||||
"lastModified": "2024-03-17T07:15:05.803",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2556",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-17T08:15:05.997",
|
||||
"lastModified": "2024-03-17T08:15:05.997",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2557",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-17T09:15:07.007",
|
||||
"lastModified": "2024-03-17T09:15:07.007",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2558",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-17T09:15:07.253",
|
||||
"lastModified": "2024-03-17T09:15:07.253",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user