Skip to content

Commit 7683f6c

Browse files
committed
Auto-Update: 2025-03-17T23:00:20.271259+00:00
1 parent 23039e7 commit 7683f6c

File tree

28 files changed

+1355
-229
lines changed

28 files changed

+1355
-229
lines changed

CVE-2024/CVE-2024-209xx/CVE-2024-20978.json

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"id": "CVE-2024-20978",
33
"sourceIdentifier": "[email protected]",
44
"published": "2024-02-17T02:15:51.470",
5-
"lastModified": "2024-11-21T08:53:33.140",
5+
"lastModified": "2025-03-17T21:15:11.737",
66
"vulnStatus": "Modified",
77
"cveTags": [],
88
"descriptions": [
@@ -19,7 +19,7 @@
1919
"cvssMetricV31": [
2020
{
2121
"source": "[email protected]",
22-
"type": "Primary",
22+
"type": "Secondary",
2323
"cvssData": {
2424
"version": "3.1",
2525
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
@@ -49,6 +49,16 @@
4949
"value": "NVD-CWE-noinfo"
5050
}
5151
]
52+
},
53+
{
54+
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
55+
"type": "Secondary",
56+
"description": [
57+
{
58+
"lang": "en",
59+
"value": "CWE-400"
60+
}
61+
]
5262
}
5363
],
5464
"configurations": [

CVE-2024/CVE-2024-211xx/CVE-2024-21132.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"id": "CVE-2024-21132",
33
"sourceIdentifier": "[email protected]",
44
"published": "2024-07-16T23:15:13.403",
5-
"lastModified": "2024-11-21T08:53:50.703",
5+
"lastModified": "2025-03-17T22:15:12.270",
66
"vulnStatus": "Modified",
77
"cveTags": [],
88
"descriptions": [
@@ -69,6 +69,16 @@
6969
"value": "NVD-CWE-noinfo"
7070
}
7171
]
72+
},
73+
{
74+
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
75+
"type": "Secondary",
76+
"description": [
77+
{
78+
"lang": "en",
79+
"value": "CWE-284"
80+
}
81+
]
7282
}
7383
],
7484
"configurations": [

CVE-2024/CVE-2024-232xx/CVE-2024-23226.json

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
"id": "CVE-2024-23226",
33
"sourceIdentifier": "[email protected]",
44
"published": "2024-03-08T02:15:47.633",
5-
"lastModified": "2024-12-05T16:33:06.327",
6-
"vulnStatus": "Analyzed",
5+
"lastModified": "2025-03-17T21:15:12.830",
6+
"vulnStatus": "Modified",
77
"cveTags": [],
88
"descriptions": [
99
{
@@ -69,6 +69,16 @@
6969
"value": "NVD-CWE-noinfo"
7070
}
7171
]
72+
},
73+
{
74+
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
75+
"type": "Secondary",
76+
"description": [
77+
{
78+
"lang": "en",
79+
"value": "CWE-787"
80+
}
81+
]
7282
}
7383
],
7484
"configurations": [

CVE-2024/CVE-2024-259xx/CVE-2024-25976.json

Lines changed: 25 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"id": "CVE-2024-25976",
33
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
44
"published": "2024-05-29T13:15:49.563",
5-
"lastModified": "2024-11-21T09:01:41.313",
5+
"lastModified": "2025-03-17T21:15:13.083",
66
"vulnStatus": "Awaiting Analysis",
77
"cveTags": [],
88
"descriptions": [
@@ -15,7 +15,30 @@
1515
"value": "Cuando la autenticaci\u00f3n LDAP est\u00e1 activada en la configuraci\u00f3n, es posible obtener la ejecuci\u00f3n XSS reflejado creando una URL personalizada que la v\u00edctima solo necesita abrir para ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Esto se debe a un fallo en el archivo login.php donde el contenido de \"$_SERVER['PHP_SELF']\" se refleja en el HTML del sitio web. Por lo tanto, el atacante no necesita una cuenta v\u00e1lida para aprovechar este problema."
1616
}
1717
],
18-
"metrics": {},
18+
"metrics": {
19+
"cvssMetricV31": [
20+
{
21+
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
22+
"type": "Secondary",
23+
"cvssData": {
24+
"version": "3.1",
25+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
26+
"baseScore": 6.1,
27+
"baseSeverity": "MEDIUM",
28+
"attackVector": "NETWORK",
29+
"attackComplexity": "LOW",
30+
"privilegesRequired": "NONE",
31+
"userInteraction": "REQUIRED",
32+
"scope": "CHANGED",
33+
"confidentialityImpact": "LOW",
34+
"integrityImpact": "LOW",
35+
"availabilityImpact": "NONE"
36+
},
37+
"exploitabilityScore": 2.8,
38+
"impactScore": 2.7
39+
}
40+
]
41+
},
1942
"weaknesses": [
2043
{
2144
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",

CVE-2024/CVE-2024-376xx/CVE-2024-37624.json

Lines changed: 31 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"id": "CVE-2024-37624",
33
"sourceIdentifier": "[email protected]",
44
"published": "2024-06-17T14:15:11.680",
5-
"lastModified": "2024-11-21T09:24:07.707",
5+
"lastModified": "2025-03-17T22:15:12.450",
66
"vulnStatus": "Modified",
77
"cveTags": [],
88
"descriptions": [
@@ -36,6 +36,26 @@
3636
},
3737
"exploitabilityScore": 2.8,
3838
"impactScore": 2.7
39+
},
40+
{
41+
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
42+
"type": "Secondary",
43+
"cvssData": {
44+
"version": "3.1",
45+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
46+
"baseScore": 6.1,
47+
"baseSeverity": "MEDIUM",
48+
"attackVector": "NETWORK",
49+
"attackComplexity": "LOW",
50+
"privilegesRequired": "NONE",
51+
"userInteraction": "REQUIRED",
52+
"scope": "CHANGED",
53+
"confidentialityImpact": "LOW",
54+
"integrityImpact": "LOW",
55+
"availabilityImpact": "NONE"
56+
},
57+
"exploitabilityScore": 2.8,
58+
"impactScore": 2.7
3959
}
4060
]
4161
},
@@ -49,6 +69,16 @@
4969
"value": "CWE-79"
5070
}
5171
]
72+
},
73+
{
74+
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
75+
"type": "Secondary",
76+
"description": [
77+
{
78+
"lang": "en",
79+
"value": "CWE-79"
80+
}
81+
]
5282
}
5383
],
5484
"configurations": [

CVE-2024/CVE-2024-388xx/CVE-2024-38826.json

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"id": "CVE-2024-38826",
33
"sourceIdentifier": "[email protected]",
44
"published": "2024-11-11T06:15:04.963",
5-
"lastModified": "2024-11-12T13:55:21.227",
5+
"lastModified": "2025-03-17T22:15:12.667",
66
"vulnStatus": "Awaiting Analysis",
77
"cveTags": [],
88
"descriptions": [
@@ -61,6 +61,18 @@
6161
}
6262
]
6363
},
64+
"weaknesses": [
65+
{
66+
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
67+
"type": "Secondary",
68+
"description": [
69+
{
70+
"lang": "en",
71+
"value": "CWE-400"
72+
}
73+
]
74+
}
75+
],
6476
"references": [
6577
{
6678
"url": "https://www.cloudfoundry.org/blog/cve-2024-38826-cloud-controller-denial-of-service-attack/",

CVE-2024/CVE-2024-393xx/CVE-2024-39327.json

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"id": "CVE-2024-39327",
33
"sourceIdentifier": "[email protected]",
44
"published": "2025-02-18T17:15:18.440",
5-
"lastModified": "2025-02-18T17:15:18.440",
5+
"lastModified": "2025-03-17T22:15:12.800",
66
"vulnStatus": "Awaiting Analysis",
77
"cveTags": [],
88
"descriptions": [
@@ -39,6 +39,18 @@
3939
}
4040
]
4141
},
42+
"weaknesses": [
43+
{
44+
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
45+
"type": "Secondary",
46+
"description": [
47+
{
48+
"lang": "en",
49+
"value": "CWE-284"
50+
}
51+
]
52+
}
53+
],
4254
"references": [
4355
{
4456
"url": "https://eviden.com/solutions/digital-security/digital-identity/",

CVE-2024/CVE-2024-406xx/CVE-2024-40603.json

Lines changed: 31 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"id": "CVE-2024-40603",
33
"sourceIdentifier": "[email protected]",
44
"published": "2024-07-07T00:15:10.617",
5-
"lastModified": "2024-11-21T09:31:22.047",
5+
"lastModified": "2025-03-17T22:15:12.950",
66
"vulnStatus": "Modified",
77
"cveTags": [],
88
"descriptions": [
@@ -36,6 +36,26 @@
3636
},
3737
"exploitabilityScore": 2.8,
3838
"impactScore": 1.4
39+
},
40+
{
41+
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
42+
"type": "Secondary",
43+
"cvssData": {
44+
"version": "3.1",
45+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
46+
"baseScore": 4.3,
47+
"baseSeverity": "MEDIUM",
48+
"attackVector": "NETWORK",
49+
"attackComplexity": "LOW",
50+
"privilegesRequired": "NONE",
51+
"userInteraction": "REQUIRED",
52+
"scope": "UNCHANGED",
53+
"confidentialityImpact": "NONE",
54+
"integrityImpact": "LOW",
55+
"availabilityImpact": "NONE"
56+
},
57+
"exploitabilityScore": 2.8,
58+
"impactScore": 1.4
3959
}
4060
]
4161
},
@@ -49,6 +69,16 @@
4969
"value": "CWE-352"
5070
}
5171
]
72+
},
73+
{
74+
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
75+
"type": "Secondary",
76+
"description": [
77+
{
78+
"lang": "en",
79+
"value": "CWE-352"
80+
}
81+
]
5282
}
5383
],
5484
"configurations": [
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
{
2+
"id": "CVE-2024-40635",
3+
"sourceIdentifier": "[email protected]",
4+
"published": "2025-03-17T22:15:13.150",
5+
"lastModified": "2025-03-17T22:15:13.150",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "[email protected]",
18+
"type": "Secondary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
22+
"baseScore": 4.6,
23+
"baseSeverity": "MEDIUM",
24+
"attackVector": "LOCAL",
25+
"attackComplexity": "LOW",
26+
"privilegesRequired": "HIGH",
27+
"userInteraction": "NONE",
28+
"scope": "CHANGED",
29+
"confidentialityImpact": "LOW",
30+
"integrityImpact": "LOW",
31+
"availabilityImpact": "NONE"
32+
},
33+
"exploitabilityScore": 1.5,
34+
"impactScore": 2.7
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "[email protected]",
41+
"type": "Primary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-190"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://github.com/containerd/containerd/commit/05044ec0a9a75232cad458027ca83437aae3f4da",
53+
"source": "[email protected]"
54+
},
55+
{
56+
"url": "https://github.com/containerd/containerd/commit/1a43cb6a1035441f9aca8f5666a9b3ef9e70ab20",
57+
"source": "[email protected]"
58+
},
59+
{
60+
"url": "https://github.com/containerd/containerd/commit/cf158e884cfe4812a6c371b59e4ea9bc4c46e51a",
61+
"source": "[email protected]"
62+
},
63+
{
64+
"url": "https://github.com/containerd/containerd/security/advisories/GHSA-265r-hfxg-fhmg",
65+
"source": "[email protected]"
66+
}
67+
]
68+
}

CVE-2024/CVE-2024-425xx/CVE-2024-42508.json

Lines changed: 22 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
"id": "CVE-2024-42508",
33
"sourceIdentifier": "[email protected]",
44
"published": "2024-10-18T16:15:04.710",
5-
"lastModified": "2024-10-29T17:38:49.330",
6-
"vulnStatus": "Analyzed",
5+
"lastModified": "2025-03-17T22:15:13.330",
6+
"vulnStatus": "Modified",
77
"cveTags": [],
88
"descriptions": [
99
{
@@ -36,6 +36,26 @@
3636
},
3737
"exploitabilityScore": 1.8,
3838
"impactScore": 3.6
39+
},
40+
{
41+
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
42+
"type": "Secondary",
43+
"cvssData": {
44+
"version": "3.1",
45+
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
46+
"baseScore": 5.5,
47+
"baseSeverity": "MEDIUM",
48+
"attackVector": "LOCAL",
49+
"attackComplexity": "LOW",
50+
"privilegesRequired": "LOW",
51+
"userInteraction": "NONE",
52+
"scope": "UNCHANGED",
53+
"confidentialityImpact": "HIGH",
54+
"integrityImpact": "NONE",
55+
"availabilityImpact": "NONE"
56+
},
57+
"exploitabilityScore": 1.8,
58+
"impactScore": 3.6
3959
}
4060
]
4161
},

0 commit comments

Comments
 (0)