-
Notifications
You must be signed in to change notification settings - Fork 16
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Auto-Update: 2024-10-25T22:00:18.929491+00:00
- Loading branch information
1 parent
d6f3730
commit a1fcef6
Showing
75 changed files
with
3,969 additions
and
564 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2019-19755", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-04-30T18:15:19.557", | ||
"lastModified": "2024-08-15T19:35:01.400", | ||
"lastModified": "2024-10-25T20:35:00.763", | ||
"vulnStatus": "Awaiting Analysis", | ||
"cveTags": [], | ||
"descriptions": [ | ||
|
@@ -46,7 +46,7 @@ | |
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-300" | ||
"value": "CWE-639" | ||
} | ||
] | ||
} | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2022-30357", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-10-25T17:15:03.450", | ||
"lastModified": "2024-10-25T17:15:03.450", | ||
"lastModified": "2024-10-25T20:35:01.917", | ||
"vulnStatus": "Received", | ||
"cveTags": [], | ||
"descriptions": [ | ||
|
@@ -11,7 +11,42 @@ | |
"value": "OvalEdge 5.2.8.0 and earlier is affected by an Account Takeover vulnerability via a POST request to /profile/updateProfile via the userId and email parameters. Authentication is required." | ||
} | ||
], | ||
"metrics": {}, | ||
"metrics": { | ||
"cvssMetricV31": [ | ||
{ | ||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", | ||
"type": "Secondary", | ||
"cvssData": { | ||
"version": "3.1", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", | ||
"attackVector": "NETWORK", | ||
"attackComplexity": "LOW", | ||
"privilegesRequired": "NONE", | ||
"userInteraction": "NONE", | ||
"scope": "UNCHANGED", | ||
"confidentialityImpact": "HIGH", | ||
"integrityImpact": "HIGH", | ||
"availabilityImpact": "HIGH", | ||
"baseScore": 9.8, | ||
"baseSeverity": "CRITICAL" | ||
}, | ||
"exploitabilityScore": 3.9, | ||
"impactScore": 5.9 | ||
} | ||
] | ||
}, | ||
"weaknesses": [ | ||
{ | ||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", | ||
"type": "Secondary", | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-352" | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/account-takeover#cve-2022-30357", | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2022-48684", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-04-27T23:15:06.110", | ||
"lastModified": "2024-07-03T01:39:07.940", | ||
"lastModified": "2024-10-25T20:35:02.740", | ||
"vulnStatus": "Awaiting Analysis", | ||
"cveTags": [], | ||
"descriptions": [ | ||
|
@@ -44,10 +44,6 @@ | |
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", | ||
"type": "Secondary", | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-1336" | ||
}, | ||
{ | ||
"lang": "en", | ||
"value": "CWE-78" | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,8 +2,8 @@ | |
"id": "CVE-2022-48946", | ||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"published": "2024-10-21T20:15:06.020", | ||
"lastModified": "2024-10-23T15:13:25.583", | ||
"vulnStatus": "Awaiting Analysis", | ||
"lastModified": "2024-10-25T20:13:39.847", | ||
"vulnStatus": "Analyzed", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
|
@@ -15,43 +15,175 @@ | |
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: udf: Se corrige el descarte de preasignaci\u00f3n en el l\u00edmite de extensi\u00f3n indirecta. Cuando la extensi\u00f3n de preasignaci\u00f3n es la primera en el bloque de extensi\u00f3n, el c\u00f3digo corromper\u00eda el encabezado del \u00e1rbol de extensi\u00f3n. Corrija el problema y use udf_delete_aext() para eliminar la extensi\u00f3n y evitar la duplicaci\u00f3n de c\u00f3digo." | ||
} | ||
], | ||
"metrics": {}, | ||
"metrics": { | ||
"cvssMetricV31": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"cvssData": { | ||
"version": "3.1", | ||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", | ||
"attackVector": "LOCAL", | ||
"attackComplexity": "LOW", | ||
"privilegesRequired": "LOW", | ||
"userInteraction": "NONE", | ||
"scope": "UNCHANGED", | ||
"confidentialityImpact": "NONE", | ||
"integrityImpact": "NONE", | ||
"availabilityImpact": "HIGH", | ||
"baseScore": 5.5, | ||
"baseSeverity": "MEDIUM" | ||
}, | ||
"exploitabilityScore": 1.8, | ||
"impactScore": 3.6 | ||
} | ||
] | ||
}, | ||
"weaknesses": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "NVD-CWE-noinfo" | ||
} | ||
] | ||
} | ||
], | ||
"configurations": [ | ||
{ | ||
"nodes": [ | ||
{ | ||
"operator": "OR", | ||
"negate": false, | ||
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", | ||
"versionEndExcluding": "4.9.337", | ||
"matchCriteriaId": "9FFBA9B5-26DC-4802-9A86-F7B886954E4A" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", | ||
"versionStartIncluding": "4.10", | ||
"versionEndExcluding": "4.14.303", | ||
"matchCriteriaId": "1E7450AD-4739-46F0-B81B-C02E7B35A97B" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", | ||
"versionStartIncluding": "4.15", | ||
"versionEndExcluding": "4.19.270", | ||
"matchCriteriaId": "AE8904A3-99BE-4E49-9682-1F90A6373F4F" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", | ||
"versionStartIncluding": "4.20", | ||
"versionEndExcluding": "5.4.229", | ||
"matchCriteriaId": "A0C0D95E-414A-445E-941B-3EF6A4D3A093" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", | ||
"versionStartIncluding": "5.5", | ||
"versionEndExcluding": "5.10.161", | ||
"matchCriteriaId": "6CD83369-DB79-46EF-B731-E327A63A4E1B" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", | ||
"versionStartIncluding": "5.11", | ||
"versionEndExcluding": "5.15.85", | ||
"matchCriteriaId": "E0D49B1E-E996-4A13-9C5C-23C64BBD0E0F" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", | ||
"versionStartIncluding": "5.16", | ||
"versionEndExcluding": "6.0.15", | ||
"matchCriteriaId": "3E66ABBB-C60E-481F-88C6-ED81661DFC31" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "EB047947-8B25-46FD-8AEA-A916F4A3DC71" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1.1:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "6DFB454D-4F85-4BE2-8CC9-70245EAE4D31" | ||
} | ||
] | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://git.kernel.org/stable/c/12a88f572d6d94b5c0b72e2d1782cc2e96ac06cf", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
}, | ||
{ | ||
"url": "https://git.kernel.org/stable/c/1a075f4a549481ce6e8518d8379f193ccec6b746", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
}, | ||
{ | ||
"url": "https://git.kernel.org/stable/c/4d835efd561dfb9bf5409f11f4ecd428d5d29226", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
}, | ||
{ | ||
"url": "https://git.kernel.org/stable/c/63dbbd8f1499b0a161e701a04aa50148d60bd1f7", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
}, | ||
{ | ||
"url": "https://git.kernel.org/stable/c/72f651c96c8aadf087fd782d551bf7db648a8c2e", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
}, | ||
{ | ||
"url": "https://git.kernel.org/stable/c/7665857f88557c372da35534165721156756f77f", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
}, | ||
{ | ||
"url": "https://git.kernel.org/stable/c/ae56d9a017724f130cf1a263dd82a78d2a6e3852", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
}, | ||
{ | ||
"url": "https://git.kernel.org/stable/c/c8b6fa4511a7900db9fb0353b630d4d2ed1ba99c", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
}, | ||
{ | ||
"url": "https://git.kernel.org/stable/c/cfe4c1b25dd6d2f056afc00b7c98bcb3dd0b1fc3", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
} | ||
] | ||
} |
Oops, something went wrong.