Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-38517 (GCVE-0-2024-38517)
Vulnerability from cvelistv5
- CWE-191 - Integer Underflow (Wrap or Wraparound)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-38517",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-23T18:59:16.631348Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-23T18:59:29.792Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-09-05T08:03:35.926Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517"
},
{
"name": "https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001"
},
{
"name": "https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240905-0001/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "RapidJSON",
"vendor": "Tencent",
"versions": [
{
"status": "affected",
"version": "\u003c= 1.1.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-191",
"description": "CWE-191: Integer Underflow (Wrap or Wraparound)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-09T18:51:50.563Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517"
},
{
"name": "https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001"
},
{
"name": "https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001"
}
],
"source": {
"advisory": "GHSA-p37c-r349-qq33",
"discovery": "UNKNOWN"
},
"title": "Tencent RapidJSON include/rapidjson/reader.h GenericReader::ParseNumber() Function Template Exponent Parsing Integer Underflow"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-38517",
"datePublished": "2024-07-09T18:51:50.563Z",
"dateReserved": "2024-06-18T16:37:02.727Z",
"dateUpdated": "2024-09-05T08:03:35.926Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-38517\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-07-09T19:15:12.470\",\"lastModified\":\"2024-11-21T09:26:08.690\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.\"},{\"lang\":\"es\",\"value\":\"Tencent RapidJSON es vulnerable a la escalada de privilegios debido a un desbordamiento insuficiente de enteros en la funci\u00f3n `GenericReader::ParseNumber()` de `include/rapidjson/reader.h` al analizar texto JSON de una secuencia. Un atacante debe enviar a la v\u00edctima un archivo manipulado que debe abrirse; esto desencadena la vulnerabilidad de desbordamiento de enteros (cuando se analiza el archivo), lo que lleva a la elevaci\u00f3n de privilegios.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-191\"}]}],\"references\":[{\"url\":\"https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240905-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517\", \"name\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001\", \"name\": \"https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001\", \"name\": \"https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240905-0001/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-09-05T08:03:35.926Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-38517\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-23T18:59:16.631348Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-23T18:59:26.287Z\"}}], \"cna\": {\"title\": \"Tencent RapidJSON include/rapidjson/reader.h GenericReader::ParseNumber() Function Template Exponent Parsing Integer Underflow\", \"source\": {\"advisory\": \"GHSA-p37c-r349-qq33\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Tencent\", \"product\": \"RapidJSON\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c= 1.1.0\"}]}], \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517\", \"name\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001\", \"name\": \"https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001\", \"name\": \"https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-191\", \"description\": \"CWE-191: Integer Underflow (Wrap or Wraparound)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-07-09T18:51:50.563Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-38517\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-05T08:03:35.926Z\", \"dateReserved\": \"2024-06-18T16:37:02.727Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-07-09T18:51:50.563Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
ncsc-2024-0279
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in Windows.\n\n",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Omzeilen van beveiligingsmaatregel\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- SQL Injection\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\n\nDe ernstigste kwetsbaarheden hebben kenmerk CVE-2024-38076, CVE-2024-38074 en CVE-2024-38076 toegewezen gekregen en bevindt zich in Windows Remote Desktop Licensing Service. Een ongeauthenticeerde kwaadwillende kan de kwetsbaarheid misbruiken om willekeurige code uit te voeren met verhoogde rechten. \n\n```\n\n---\nWindows Server Backup: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38013 | 6.70 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows PowerShell: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38043 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38033 | 7.30 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38047 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38015 | 7.50 | Denial-of-Service | \n| CVE-2024-38076 | 9.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Image Acquisition: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38022 | 7.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Internet Connection Sharing (ICS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38102 | 6.50 | Denial-of-Service | \n| CVE-2024-38053 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38101 | 6.50 | Denial-of-Service | \n| CVE-2024-38105 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nIntel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-37985 | 5.90 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Online Certificate Status Protocol (OCSP): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38031 | 7.50 | Denial-of-Service | \n| CVE-2024-38067 | 7.50 | Denial-of-Service | \n| CVE-2024-38068 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows COM Session: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38100 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38041 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Secure Boot: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-28899 | 8.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37969 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37970 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37974 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37981 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37986 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37987 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-26184 | 6.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37971 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37972 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37973 | 7.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37975 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37977 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37978 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37984 | 8.40 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37988 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37989 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38010 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38011 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38065 | 6.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Kernel-Mode Drivers: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38062 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Win32 Kernel Subsystem: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38085 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Windows Codecs Library: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38055 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38056 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38060 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Workstation Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38050 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows LockDown Policy (WLDP): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38070 | 7.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nMicrosoft Graphics Component: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38051 | 7.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38079 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows MultiPoint Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30013 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nLine Printer Daemon Service (LPD): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38027 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nNDIS: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38048 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows CoreMessaging: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-21417 | 8.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Access Connection Manager: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30071 | 4.70 | Toegang tot gevoelige gegevens | \n| CVE-2024-30079 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Cryptographic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30098 | 7.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - GRFX: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38066 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nRole: Windows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38080 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nNPS RADIUS Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-3596 | 7.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nMicrosoft Streaming Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38054 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38052 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38057 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Licensing Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38071 | 7.50 | Denial-of-Service | \n| CVE-2024-38072 | 7.50 | Denial-of-Service | \n| CVE-2024-38077 | 9.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38073 | 7.50 | Denial-of-Service | \n| CVE-2024-38074 | 9.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38099 | 5.90 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows NTLM: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30081 | 7.10 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nMicrosoft WS-Discovery: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38091 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Distributed Transaction Coordinator: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38049 | 6.60 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Performance Monitor: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38025 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38019 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38028 | 7.20 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nXBox Crypto Graphic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38032 | 7.10 | Uitvoeren van willekeurige code | \n| CVE-2024-38078 | 7.50 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows iSCSI: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-35270 | 5.30 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Enroll Engine: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38069 | 7.00 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Fax and Scan Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38104 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows TCP/IP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38064 | 7.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows DHCP Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38044 | 7.20 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Themes: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38030 | 6.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows Message Queuing: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38017 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - ICOMP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38059 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nActive Directory Rights Management Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38517 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-39684 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\n\nWindows BitLocker: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38058 | 6.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nRole: Active Directory Certificate Services; Active Directory Domain Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38061 | 7.50 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Filtering: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38034 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows MSHTML Platform: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38112 | 7.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\n\n---\n\n```",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
"title": "Oplossingen"
},
{
"category": "description",
"text": " ",
"title": "Dreigingsinformatie"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Improper Handling of Missing Special Element",
"title": "CWE-166"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "general",
"text": "Numeric Truncation Error",
"title": "CWE-197"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "general",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
},
{
"category": "general",
"text": "External Control of File Name or Path",
"title": "CWE-73"
},
{
"category": "general",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "general",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"title": "Kwetsbaarheden verholpen in Microsoft Windows",
"tracking": {
"current_release_date": "2024-07-09T18:40:21.043319Z",
"id": "NCSC-2024-0279",
"initial_release_date": "2024-07-09T18:40:21.043319Z",
"revision_history": [
{
"date": "2024-07-09T18:40:21.043319Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "rfc",
"product": {
"name": "rfc",
"product_id": "CSAFPID-1497114",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ietf:rfc:2865:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "ietf"
},
{
"branches": [
{
"category": "product_name",
"name": "windows_10_version_1507",
"product": {
"name": "windows_10_version_1507",
"product_id": "CSAFPID-1453769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_10_version_1507:10.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21417",
"references": [
{
"category": "self",
"summary": "CVE-2024-21417",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21417.json"
}
],
"title": "CVE-2024-21417"
},
{
"cve": "CVE-2024-28899",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28899",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28899.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-28899"
},
{
"cve": "CVE-2024-30081",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30081",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30081.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-30081"
},
{
"cve": "CVE-2024-30098",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30098",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30098.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-30098"
},
{
"cve": "CVE-2024-35270",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35270",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35270.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-35270"
},
{
"cve": "CVE-2024-37969",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37969",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37969.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37969"
},
{
"cve": "CVE-2024-37970",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37970",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37970.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37970"
},
{
"cve": "CVE-2024-37974",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37974",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37974.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37974"
},
{
"cve": "CVE-2024-37981",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37981.json"
}
],
"title": "CVE-2024-37981"
},
{
"cve": "CVE-2024-37986",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37986",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37986.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37986"
},
{
"cve": "CVE-2024-37987",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37987",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37987.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37987"
},
{
"cve": "CVE-2024-38013",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38013",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38013.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38013"
},
{
"cve": "CVE-2024-38022",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38022",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38022.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38022"
},
{
"cve": "CVE-2024-38025",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38025"
},
{
"cve": "CVE-2024-38034",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38034",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38034.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38034"
},
{
"cve": "CVE-2024-38041",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38041",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38041.json"
}
],
"title": "CVE-2024-38041"
},
{
"cve": "CVE-2024-38043",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38043",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38043.json"
}
],
"title": "CVE-2024-38043"
},
{
"cve": "CVE-2024-38517",
"references": [
{
"category": "self",
"summary": "CVE-2024-38517",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38517.json"
}
],
"title": "CVE-2024-38517"
},
{
"cve": "CVE-2024-38051",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38051",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38051.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38051"
},
{
"cve": "CVE-2024-38054",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38054",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38054.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38054"
},
{
"cve": "CVE-2024-38055",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38055",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38055.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38055"
},
{
"cve": "CVE-2024-38056",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38056",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38056.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38056"
},
{
"cve": "CVE-2024-38060",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38060",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38060.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38060"
},
{
"cve": "CVE-2024-38061",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38061",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38061.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38061"
},
{
"cve": "CVE-2024-38062",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38062",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38062.json"
}
],
"title": "CVE-2024-38062"
},
{
"cve": "CVE-2024-38064",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38064",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38064.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38064"
},
{
"cve": "CVE-2024-38085",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38085",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38085.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38085"
},
{
"cve": "CVE-2024-38091",
"cwe": {
"id": "CWE-166",
"name": "Improper Handling of Missing Special Element"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Missing Special Element",
"title": "CWE-166"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38091",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38091.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38091"
},
{
"cve": "CVE-2024-38102",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38102",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38102.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38102"
},
{
"cve": "CVE-2024-38104",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38104",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38104.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38104"
},
{
"cve": "CVE-2024-30013",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-30013",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30013.json"
}
],
"title": "CVE-2024-30013"
},
{
"cve": "CVE-2024-30071",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30071",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30071.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-30071"
},
{
"cve": "CVE-2024-30079",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30079",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30079.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-30079"
},
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "other",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1497114"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-3596",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1497114"
]
}
],
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-37971",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37971",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37971.json"
}
],
"title": "CVE-2024-37971"
},
{
"cve": "CVE-2024-37972",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37972",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37972.json"
}
],
"title": "CVE-2024-37972"
},
{
"cve": "CVE-2024-37973",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37973",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37973.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37973"
},
{
"cve": "CVE-2024-37975",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37975",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37975.json"
}
],
"title": "CVE-2024-37975"
},
{
"cve": "CVE-2024-37984",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37984",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37984.json"
}
],
"title": "CVE-2024-37984"
},
{
"cve": "CVE-2024-37988",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37988",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37988.json"
}
],
"title": "CVE-2024-37988"
},
{
"cve": "CVE-2024-37989",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37989",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37989.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37989"
},
{
"cve": "CVE-2024-38010",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38010",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38010.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38010"
},
{
"cve": "CVE-2024-38011",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38011",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38011.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38011"
},
{
"cve": "CVE-2024-38017",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38017",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38017.json"
}
],
"title": "CVE-2024-38017"
},
{
"cve": "CVE-2024-38019",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38019",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38019.json"
}
],
"title": "CVE-2024-38019"
},
{
"cve": "CVE-2024-38027",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38027",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38027.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38027"
},
{
"cve": "CVE-2024-38028",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38028",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38028.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38028"
},
{
"cve": "CVE-2024-38030",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38030",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38030.json"
}
],
"title": "CVE-2024-38030"
},
{
"cve": "CVE-2024-38033",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38033",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38033.json"
}
],
"title": "CVE-2024-38033"
},
{
"cve": "CVE-2024-38047",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38047",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38047.json"
}
],
"title": "CVE-2024-38047"
},
{
"cve": "CVE-2024-38048",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38048",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38048.json"
}
],
"title": "CVE-2024-38048"
},
{
"cve": "CVE-2024-38049",
"cwe": {
"id": "CWE-73",
"name": "External Control of File Name or Path"
},
"notes": [
{
"category": "other",
"text": "External Control of File Name or Path",
"title": "CWE-73"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38049",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38049.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38049"
},
{
"cve": "CVE-2024-38050",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38050",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38050.json"
}
],
"title": "CVE-2024-38050"
},
{
"cve": "CVE-2024-38052",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38052",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38052.json"
}
],
"title": "CVE-2024-38052"
},
{
"cve": "CVE-2024-38053",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38053",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38053.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38053"
},
{
"cve": "CVE-2024-38057",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38057",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38057.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38057"
},
{
"cve": "CVE-2024-38058",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38058",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38058.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38058"
},
{
"cve": "CVE-2024-38065",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38065",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38065.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38065"
},
{
"cve": "CVE-2024-38066",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38066",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38066.json"
}
],
"title": "CVE-2024-38066"
},
{
"cve": "CVE-2024-38068",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38068",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38068.json"
}
],
"title": "CVE-2024-38068"
},
{
"cve": "CVE-2024-38069",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38069",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38069.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38069"
},
{
"cve": "CVE-2024-38070",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38070",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38070.json"
}
],
"title": "CVE-2024-38070"
},
{
"cve": "CVE-2024-38079",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38079",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38079.json"
}
],
"title": "CVE-2024-38079"
},
{
"cve": "CVE-2024-38101",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38101",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38101.json"
}
],
"title": "CVE-2024-38101"
},
{
"cve": "CVE-2024-38105",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38105",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38105.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38105"
},
{
"cve": "CVE-2024-39684",
"references": [
{
"category": "self",
"summary": "CVE-2024-39684",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39684.json"
}
],
"title": "CVE-2024-39684"
},
{
"cve": "CVE-2024-38015",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38015",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38015.json"
}
],
"title": "CVE-2024-38015"
},
{
"cve": "CVE-2024-38071",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38071",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38071.json"
}
],
"title": "CVE-2024-38071"
},
{
"cve": "CVE-2024-38072",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38072.json"
}
],
"title": "CVE-2024-38072"
},
{
"cve": "CVE-2024-38077",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38077",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38077.json"
}
],
"title": "CVE-2024-38077"
},
{
"cve": "CVE-2024-38100",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38100",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38100.json"
}
],
"title": "CVE-2024-38100"
},
{
"cve": "CVE-2024-38031",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38031",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38031.json"
}
],
"title": "CVE-2024-38031"
},
{
"cve": "CVE-2024-38044",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"notes": [
{
"category": "other",
"text": "Numeric Truncation Error",
"title": "CWE-197"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38044",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38044.json"
}
],
"title": "CVE-2024-38044"
},
{
"cve": "CVE-2024-38067",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38067",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38067.json"
}
],
"title": "CVE-2024-38067"
},
{
"cve": "CVE-2024-38073",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38073",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38073.json"
}
],
"title": "CVE-2024-38073"
},
{
"cve": "CVE-2024-38074",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38074",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38074.json"
}
],
"title": "CVE-2024-38074"
},
{
"cve": "CVE-2024-38076",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38076",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38076.json"
}
],
"title": "CVE-2024-38076"
},
{
"cve": "CVE-2024-38099",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38099",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38099.json"
}
],
"title": "CVE-2024-38099"
},
{
"cve": "CVE-2024-38059",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38059",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38059.json"
}
],
"title": "CVE-2024-38059"
},
{
"cve": "CVE-2024-38080",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38080",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38080.json"
}
],
"title": "CVE-2024-38080"
},
{
"cve": "CVE-2024-26184",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-26184",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26184.json"
}
],
"title": "CVE-2024-26184"
},
{
"cve": "CVE-2024-37977",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37977",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37977.json"
}
],
"title": "CVE-2024-37977"
},
{
"cve": "CVE-2024-38032",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38032",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38032.json"
}
],
"title": "CVE-2024-38032"
},
{
"cve": "CVE-2024-38078",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38078",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38078.json"
}
],
"title": "CVE-2024-38078"
},
{
"cve": "CVE-2024-37985",
"references": [
{
"category": "self",
"summary": "CVE-2024-37985",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37985.json"
}
],
"title": "CVE-2024-37985"
},
{
"cve": "CVE-2024-37978",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37978",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37978.json"
}
],
"title": "CVE-2024-37978"
}
]
}
NCSC-2024-0279
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in Windows.\n\n",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Omzeilen van beveiligingsmaatregel\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- SQL Injection\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\n\nDe ernstigste kwetsbaarheden hebben kenmerk CVE-2024-38076, CVE-2024-38074 en CVE-2024-38076 toegewezen gekregen en bevindt zich in Windows Remote Desktop Licensing Service. Een ongeauthenticeerde kwaadwillende kan de kwetsbaarheid misbruiken om willekeurige code uit te voeren met verhoogde rechten. \n\n```\n\n---\nWindows Server Backup: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38013 | 6.70 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows PowerShell: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38043 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38033 | 7.30 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38047 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38015 | 7.50 | Denial-of-Service | \n| CVE-2024-38076 | 9.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Image Acquisition: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38022 | 7.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Internet Connection Sharing (ICS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38102 | 6.50 | Denial-of-Service | \n| CVE-2024-38053 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38101 | 6.50 | Denial-of-Service | \n| CVE-2024-38105 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nIntel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-37985 | 5.90 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Online Certificate Status Protocol (OCSP): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38031 | 7.50 | Denial-of-Service | \n| CVE-2024-38067 | 7.50 | Denial-of-Service | \n| CVE-2024-38068 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows COM Session: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38100 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38041 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Secure Boot: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-28899 | 8.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37969 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37970 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37974 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37981 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37986 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37987 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-26184 | 6.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37971 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37972 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37973 | 7.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37975 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37977 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37978 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37984 | 8.40 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37988 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37989 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38010 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38011 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38065 | 6.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Kernel-Mode Drivers: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38062 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Win32 Kernel Subsystem: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38085 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Windows Codecs Library: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38055 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38056 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38060 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Workstation Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38050 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows LockDown Policy (WLDP): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38070 | 7.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nMicrosoft Graphics Component: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38051 | 7.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38079 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows MultiPoint Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30013 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nLine Printer Daemon Service (LPD): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38027 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nNDIS: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38048 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows CoreMessaging: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-21417 | 8.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Access Connection Manager: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30071 | 4.70 | Toegang tot gevoelige gegevens | \n| CVE-2024-30079 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Cryptographic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30098 | 7.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - GRFX: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38066 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nRole: Windows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38080 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nNPS RADIUS Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-3596 | 7.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nMicrosoft Streaming Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38054 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38052 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38057 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Licensing Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38071 | 7.50 | Denial-of-Service | \n| CVE-2024-38072 | 7.50 | Denial-of-Service | \n| CVE-2024-38077 | 9.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38073 | 7.50 | Denial-of-Service | \n| CVE-2024-38074 | 9.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38099 | 5.90 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows NTLM: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30081 | 7.10 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nMicrosoft WS-Discovery: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38091 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Distributed Transaction Coordinator: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38049 | 6.60 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Performance Monitor: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38025 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38019 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38028 | 7.20 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nXBox Crypto Graphic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38032 | 7.10 | Uitvoeren van willekeurige code | \n| CVE-2024-38078 | 7.50 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows iSCSI: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-35270 | 5.30 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Enroll Engine: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38069 | 7.00 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Fax and Scan Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38104 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows TCP/IP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38064 | 7.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows DHCP Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38044 | 7.20 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Themes: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38030 | 6.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows Message Queuing: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38017 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - ICOMP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38059 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nActive Directory Rights Management Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38517 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-39684 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\n\nWindows BitLocker: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38058 | 6.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nRole: Active Directory Certificate Services; Active Directory Domain Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38061 | 7.50 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Filtering: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38034 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows MSHTML Platform: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38112 | 7.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\n\n---\n\n```",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
"title": "Oplossingen"
},
{
"category": "description",
"text": " ",
"title": "Dreigingsinformatie"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Improper Handling of Missing Special Element",
"title": "CWE-166"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "general",
"text": "Numeric Truncation Error",
"title": "CWE-197"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "general",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
},
{
"category": "general",
"text": "External Control of File Name or Path",
"title": "CWE-73"
},
{
"category": "general",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "general",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"title": "Kwetsbaarheden verholpen in Microsoft Windows",
"tracking": {
"current_release_date": "2024-07-09T18:40:21.043319Z",
"id": "NCSC-2024-0279",
"initial_release_date": "2024-07-09T18:40:21.043319Z",
"revision_history": [
{
"date": "2024-07-09T18:40:21.043319Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "rfc",
"product": {
"name": "rfc",
"product_id": "CSAFPID-1497114",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ietf:rfc:2865:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "ietf"
},
{
"branches": [
{
"category": "product_name",
"name": "windows_10_version_1507",
"product": {
"name": "windows_10_version_1507",
"product_id": "CSAFPID-1453769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_10_version_1507:10.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21417",
"references": [
{
"category": "self",
"summary": "CVE-2024-21417",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21417.json"
}
],
"title": "CVE-2024-21417"
},
{
"cve": "CVE-2024-28899",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28899",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28899.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-28899"
},
{
"cve": "CVE-2024-30081",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30081",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30081.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-30081"
},
{
"cve": "CVE-2024-30098",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30098",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30098.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-30098"
},
{
"cve": "CVE-2024-35270",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35270",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35270.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-35270"
},
{
"cve": "CVE-2024-37969",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37969",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37969.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37969"
},
{
"cve": "CVE-2024-37970",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37970",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37970.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37970"
},
{
"cve": "CVE-2024-37974",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37974",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37974.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37974"
},
{
"cve": "CVE-2024-37981",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37981.json"
}
],
"title": "CVE-2024-37981"
},
{
"cve": "CVE-2024-37986",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37986",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37986.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37986"
},
{
"cve": "CVE-2024-37987",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37987",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37987.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37987"
},
{
"cve": "CVE-2024-38013",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38013",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38013.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38013"
},
{
"cve": "CVE-2024-38022",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38022",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38022.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38022"
},
{
"cve": "CVE-2024-38025",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38025"
},
{
"cve": "CVE-2024-38034",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38034",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38034.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38034"
},
{
"cve": "CVE-2024-38041",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38041",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38041.json"
}
],
"title": "CVE-2024-38041"
},
{
"cve": "CVE-2024-38043",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38043",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38043.json"
}
],
"title": "CVE-2024-38043"
},
{
"cve": "CVE-2024-38517",
"references": [
{
"category": "self",
"summary": "CVE-2024-38517",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38517.json"
}
],
"title": "CVE-2024-38517"
},
{
"cve": "CVE-2024-38051",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38051",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38051.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38051"
},
{
"cve": "CVE-2024-38054",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38054",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38054.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38054"
},
{
"cve": "CVE-2024-38055",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38055",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38055.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38055"
},
{
"cve": "CVE-2024-38056",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38056",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38056.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38056"
},
{
"cve": "CVE-2024-38060",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38060",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38060.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38060"
},
{
"cve": "CVE-2024-38061",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38061",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38061.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38061"
},
{
"cve": "CVE-2024-38062",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38062",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38062.json"
}
],
"title": "CVE-2024-38062"
},
{
"cve": "CVE-2024-38064",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38064",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38064.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38064"
},
{
"cve": "CVE-2024-38085",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38085",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38085.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38085"
},
{
"cve": "CVE-2024-38091",
"cwe": {
"id": "CWE-166",
"name": "Improper Handling of Missing Special Element"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Missing Special Element",
"title": "CWE-166"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38091",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38091.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38091"
},
{
"cve": "CVE-2024-38102",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38102",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38102.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38102"
},
{
"cve": "CVE-2024-38104",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38104",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38104.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38104"
},
{
"cve": "CVE-2024-30013",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-30013",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30013.json"
}
],
"title": "CVE-2024-30013"
},
{
"cve": "CVE-2024-30071",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30071",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30071.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-30071"
},
{
"cve": "CVE-2024-30079",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30079",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30079.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-30079"
},
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "other",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1497114"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-3596",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1497114"
]
}
],
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-37971",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37971",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37971.json"
}
],
"title": "CVE-2024-37971"
},
{
"cve": "CVE-2024-37972",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37972",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37972.json"
}
],
"title": "CVE-2024-37972"
},
{
"cve": "CVE-2024-37973",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37973",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37973.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37973"
},
{
"cve": "CVE-2024-37975",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37975",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37975.json"
}
],
"title": "CVE-2024-37975"
},
{
"cve": "CVE-2024-37984",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37984",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37984.json"
}
],
"title": "CVE-2024-37984"
},
{
"cve": "CVE-2024-37988",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37988",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37988.json"
}
],
"title": "CVE-2024-37988"
},
{
"cve": "CVE-2024-37989",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37989",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37989.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37989"
},
{
"cve": "CVE-2024-38010",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38010",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38010.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38010"
},
{
"cve": "CVE-2024-38011",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38011",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38011.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38011"
},
{
"cve": "CVE-2024-38017",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38017",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38017.json"
}
],
"title": "CVE-2024-38017"
},
{
"cve": "CVE-2024-38019",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38019",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38019.json"
}
],
"title": "CVE-2024-38019"
},
{
"cve": "CVE-2024-38027",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38027",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38027.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38027"
},
{
"cve": "CVE-2024-38028",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38028",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38028.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38028"
},
{
"cve": "CVE-2024-38030",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38030",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38030.json"
}
],
"title": "CVE-2024-38030"
},
{
"cve": "CVE-2024-38033",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38033",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38033.json"
}
],
"title": "CVE-2024-38033"
},
{
"cve": "CVE-2024-38047",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38047",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38047.json"
}
],
"title": "CVE-2024-38047"
},
{
"cve": "CVE-2024-38048",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38048",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38048.json"
}
],
"title": "CVE-2024-38048"
},
{
"cve": "CVE-2024-38049",
"cwe": {
"id": "CWE-73",
"name": "External Control of File Name or Path"
},
"notes": [
{
"category": "other",
"text": "External Control of File Name or Path",
"title": "CWE-73"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38049",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38049.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38049"
},
{
"cve": "CVE-2024-38050",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38050",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38050.json"
}
],
"title": "CVE-2024-38050"
},
{
"cve": "CVE-2024-38052",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38052",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38052.json"
}
],
"title": "CVE-2024-38052"
},
{
"cve": "CVE-2024-38053",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38053",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38053.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38053"
},
{
"cve": "CVE-2024-38057",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38057",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38057.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38057"
},
{
"cve": "CVE-2024-38058",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38058",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38058.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38058"
},
{
"cve": "CVE-2024-38065",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38065",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38065.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38065"
},
{
"cve": "CVE-2024-38066",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38066",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38066.json"
}
],
"title": "CVE-2024-38066"
},
{
"cve": "CVE-2024-38068",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38068",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38068.json"
}
],
"title": "CVE-2024-38068"
},
{
"cve": "CVE-2024-38069",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38069",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38069.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38069"
},
{
"cve": "CVE-2024-38070",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38070",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38070.json"
}
],
"title": "CVE-2024-38070"
},
{
"cve": "CVE-2024-38079",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38079",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38079.json"
}
],
"title": "CVE-2024-38079"
},
{
"cve": "CVE-2024-38101",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38101",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38101.json"
}
],
"title": "CVE-2024-38101"
},
{
"cve": "CVE-2024-38105",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38105",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38105.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38105"
},
{
"cve": "CVE-2024-39684",
"references": [
{
"category": "self",
"summary": "CVE-2024-39684",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39684.json"
}
],
"title": "CVE-2024-39684"
},
{
"cve": "CVE-2024-38015",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38015",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38015.json"
}
],
"title": "CVE-2024-38015"
},
{
"cve": "CVE-2024-38071",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38071",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38071.json"
}
],
"title": "CVE-2024-38071"
},
{
"cve": "CVE-2024-38072",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38072.json"
}
],
"title": "CVE-2024-38072"
},
{
"cve": "CVE-2024-38077",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38077",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38077.json"
}
],
"title": "CVE-2024-38077"
},
{
"cve": "CVE-2024-38100",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38100",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38100.json"
}
],
"title": "CVE-2024-38100"
},
{
"cve": "CVE-2024-38031",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38031",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38031.json"
}
],
"title": "CVE-2024-38031"
},
{
"cve": "CVE-2024-38044",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"notes": [
{
"category": "other",
"text": "Numeric Truncation Error",
"title": "CWE-197"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38044",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38044.json"
}
],
"title": "CVE-2024-38044"
},
{
"cve": "CVE-2024-38067",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38067",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38067.json"
}
],
"title": "CVE-2024-38067"
},
{
"cve": "CVE-2024-38073",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38073",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38073.json"
}
],
"title": "CVE-2024-38073"
},
{
"cve": "CVE-2024-38074",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38074",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38074.json"
}
],
"title": "CVE-2024-38074"
},
{
"cve": "CVE-2024-38076",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38076",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38076.json"
}
],
"title": "CVE-2024-38076"
},
{
"cve": "CVE-2024-38099",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38099",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38099.json"
}
],
"title": "CVE-2024-38099"
},
{
"cve": "CVE-2024-38059",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38059",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38059.json"
}
],
"title": "CVE-2024-38059"
},
{
"cve": "CVE-2024-38080",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38080",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38080.json"
}
],
"title": "CVE-2024-38080"
},
{
"cve": "CVE-2024-26184",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-26184",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26184.json"
}
],
"title": "CVE-2024-26184"
},
{
"cve": "CVE-2024-37977",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37977",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37977.json"
}
],
"title": "CVE-2024-37977"
},
{
"cve": "CVE-2024-38032",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38032",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38032.json"
}
],
"title": "CVE-2024-38032"
},
{
"cve": "CVE-2024-38078",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38078",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38078.json"
}
],
"title": "CVE-2024-38078"
},
{
"cve": "CVE-2024-37985",
"references": [
{
"category": "self",
"summary": "CVE-2024-37985",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37985.json"
}
],
"title": "CVE-2024-37985"
},
{
"cve": "CVE-2024-37978",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37978",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37978.json"
}
],
"title": "CVE-2024-37978"
}
]
}
fkie_cve-2024-38517
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001 | ||
| security-advisories@github.com | https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001 | ||
| security-advisories@github.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20240905-0001/ |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege."
},
{
"lang": "es",
"value": "Tencent RapidJSON es vulnerable a la escalada de privilegios debido a un desbordamiento insuficiente de enteros en la funci\u00f3n `GenericReader::ParseNumber()` de `include/rapidjson/reader.h` al analizar texto JSON de una secuencia. Un atacante debe enviar a la v\u00edctima un archivo manipulado que debe abrirse; esto desencadena la vulnerabilidad de desbordamiento de enteros (cuando se analiza el archivo), lo que lleva a la elevaci\u00f3n de privilegios."
}
],
"id": "CVE-2024-38517",
"lastModified": "2024-11-21T09:26:08.690",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2024-07-09T19:15:12.470",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001"
},
{
"source": "security-advisories@github.com",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20240905-0001/"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-191"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
wid-sec-w-2024-1579
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Windows ist ein Betriebssystem von Microsoft.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1579 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1579.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1579 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1579"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2024-07-09",
"url": "https://msrc.microsoft.com/update-guide"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2024-307 vom 2024-08-09",
"url": "https://www.hitachi.com/products/it/storage-solutions/sec_info/2024/07.html"
},
{
"category": "external",
"summary": "Exploit CVE-2024-38054 vom 2024-08-22",
"url": "https://github.com/Black-Frost/windows-learning/tree/main/CVE-2024-38054"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-013 vom 2024-09-05",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/09/Xerox-Security-Bulletin-XRX24-013-for-Xerox-FreeFlow-Print-Server-v2-_Windows10.pdf"
}
],
"source_lang": "en-US",
"title": "Microsoft Windows: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-09-05T22:00:00.000+00:00",
"generator": {
"date": "2024-09-06T08:13:56.495+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.6"
}
},
"id": "WID-SEC-W-2024-1579",
"initial_release_date": "2024-07-09T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-09T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "2",
"summary": "Hinweis auf Ausnutzung von zwei CVE erg\u00e4nzt"
},
{
"date": "2024-08-08T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von HITACHI aufgenommen"
},
{
"date": "2024-08-22T22:00:00.000+00:00",
"number": "4",
"summary": "Exploit f\u00fcr CVE-2024-38054 aufgenommen"
},
{
"date": "2024-09-05T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von XEROX aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Hitachi Storage",
"product": {
"name": "Hitachi Storage",
"product_id": "T009295",
"product_identification_helper": {
"cpe": "cpe:/h:hitachi:storage:-"
}
}
}
],
"category": "vendor",
"name": "Hitachi"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Version 1607",
"product": {
"name": "Microsoft Windows 10 Version 1607",
"product_id": "T011520",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_1607"
}
}
},
{
"category": "product_version",
"name": "Version 21H2",
"product": {
"name": "Microsoft Windows 10 Version 21H2",
"product_id": "T021306",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_21h2"
}
}
},
{
"category": "product_version",
"name": "Version 22H2",
"product": {
"name": "Microsoft Windows 10 Version 22H2",
"product_id": "T025256",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_22h2"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows 10",
"product": {
"name": "Microsoft Windows 10",
"product_id": "T025566",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:windows_terminal"
}
}
},
{
"category": "product_version",
"name": "Version 1809",
"product": {
"name": "Microsoft Windows 10 Version 1809",
"product_id": "T034033",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_1809"
}
}
}
],
"category": "product_name",
"name": "Windows 10"
},
{
"branches": [
{
"category": "product_version",
"name": "Version 23H2",
"product": {
"name": "Microsoft Windows 11 Version 23H2",
"product_id": "T031172",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_11:version_23h2"
}
}
},
{
"category": "product_version",
"name": "Version 22H2",
"product": {
"name": "Microsoft Windows 11 Version 22H2",
"product_id": "T034034",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_11:version_22h2"
}
}
},
{
"category": "product_version_range",
"name": "version 21H2",
"product": {
"name": "Microsoft Windows 11 version 21H2",
"product_id": "T034035"
}
}
],
"category": "product_name",
"name": "Windows 11"
},
{
"branches": [
{
"category": "product_version",
"name": "2008 SP2",
"product": {
"name": "Microsoft Windows Server 2008 SP2",
"product_id": "T012853",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server:2008_sp2"
}
}
},
{
"category": "product_version",
"name": "2008 R2 SP1",
"product": {
"name": "Microsoft Windows Server 2008 R2 SP1",
"product_id": "T012855",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server:2008_r2_sp1"
}
}
}
],
"category": "product_name",
"name": "Windows Server"
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2012",
"product": {
"name": "Microsoft Windows Server 2012",
"product_id": "T006125",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2012:::server_core_installation"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2012 R2",
"product": {
"name": "Microsoft Windows Server 2012 R2",
"product_id": "T014786",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2012_r2:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2016",
"product": {
"name": "Microsoft Windows Server 2016",
"product_id": "T008900",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2016:server_2016:r2"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2019",
"product": {
"name": "Microsoft Windows Server 2019",
"product_id": "T014557",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2019:server_core_installation"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Microsoft Windows Server 2022",
"product": {
"name": "Microsoft Windows Server 2022",
"product_id": "T025255",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2022:datacenter_azure_edition"
}
}
},
{
"category": "product_version",
"name": "23H2 Edition",
"product": {
"name": "Microsoft Windows Server 2022 23H2 Edition",
"product_id": "T034036",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2022:23h2_edition"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2022"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Xerox FreeFlow Print Server",
"product": {
"name": "Xerox FreeFlow Print Server",
"product_id": "T010509",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:-"
}
}
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21417",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-21417"
},
{
"cve": "CVE-2024-26184",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-26184"
},
{
"cve": "CVE-2024-28899",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-28899"
},
{
"cve": "CVE-2024-30013",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30013"
},
{
"cve": "CVE-2024-30071",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30071"
},
{
"cve": "CVE-2024-30079",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30079"
},
{
"cve": "CVE-2024-30081",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30081"
},
{
"cve": "CVE-2024-30098",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30098"
},
{
"cve": "CVE-2024-35270",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-35270"
},
{
"cve": "CVE-2024-3596",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-37969",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37969"
},
{
"cve": "CVE-2024-37970",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37970"
},
{
"cve": "CVE-2024-37971",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37971"
},
{
"cve": "CVE-2024-37972",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37972"
},
{
"cve": "CVE-2024-37973",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37973"
},
{
"cve": "CVE-2024-37974",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37974"
},
{
"cve": "CVE-2024-37975",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37975"
},
{
"cve": "CVE-2024-37977",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37977"
},
{
"cve": "CVE-2024-37978",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37978"
},
{
"cve": "CVE-2024-37981",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37981"
},
{
"cve": "CVE-2024-37984",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37984"
},
{
"cve": "CVE-2024-37985",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37985"
},
{
"cve": "CVE-2024-37986",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37986"
},
{
"cve": "CVE-2024-37987",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37987"
},
{
"cve": "CVE-2024-37988",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37988"
},
{
"cve": "CVE-2024-37989",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37989"
},
{
"cve": "CVE-2024-38010",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38010"
},
{
"cve": "CVE-2024-38011",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38011"
},
{
"cve": "CVE-2024-38013",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38013"
},
{
"cve": "CVE-2024-38015",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38015"
},
{
"cve": "CVE-2024-38017",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38017"
},
{
"cve": "CVE-2024-38019",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38019"
},
{
"cve": "CVE-2024-38022",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38022"
},
{
"cve": "CVE-2024-38025",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38025"
},
{
"cve": "CVE-2024-38027",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38027"
},
{
"cve": "CVE-2024-38028",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38028"
},
{
"cve": "CVE-2024-38030",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38030"
},
{
"cve": "CVE-2024-38031",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38031"
},
{
"cve": "CVE-2024-38032",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38032"
},
{
"cve": "CVE-2024-38033",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38033"
},
{
"cve": "CVE-2024-38034",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38034"
},
{
"cve": "CVE-2024-38041",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38041"
},
{
"cve": "CVE-2024-38043",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38043"
},
{
"cve": "CVE-2024-38044",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38044"
},
{
"cve": "CVE-2024-38047",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38047"
},
{
"cve": "CVE-2024-38048",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38048"
},
{
"cve": "CVE-2024-38049",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38049"
},
{
"cve": "CVE-2024-38050",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38050"
},
{
"cve": "CVE-2024-38051",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38051"
},
{
"cve": "CVE-2024-38052",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38052"
},
{
"cve": "CVE-2024-38053",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38053"
},
{
"cve": "CVE-2024-38054",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38054"
},
{
"cve": "CVE-2024-38055",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38055"
},
{
"cve": "CVE-2024-38056",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38056"
},
{
"cve": "CVE-2024-38057",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38057"
},
{
"cve": "CVE-2024-38058",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38058"
},
{
"cve": "CVE-2024-38059",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38059"
},
{
"cve": "CVE-2024-38060",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38060"
},
{
"cve": "CVE-2024-38061",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38061"
},
{
"cve": "CVE-2024-38062",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38062"
},
{
"cve": "CVE-2024-38064",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38064"
},
{
"cve": "CVE-2024-38065",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38065"
},
{
"cve": "CVE-2024-38066",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38066"
},
{
"cve": "CVE-2024-38067",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38067"
},
{
"cve": "CVE-2024-38068",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38068"
},
{
"cve": "CVE-2024-38069",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38069"
},
{
"cve": "CVE-2024-38070",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38070"
},
{
"cve": "CVE-2024-38071",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38071"
},
{
"cve": "CVE-2024-38072",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38072"
},
{
"cve": "CVE-2024-38073",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38073"
},
{
"cve": "CVE-2024-38074",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38074"
},
{
"cve": "CVE-2024-38076",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38076"
},
{
"cve": "CVE-2024-38077",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38077"
},
{
"cve": "CVE-2024-38078",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38078"
},
{
"cve": "CVE-2024-38079",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38079"
},
{
"cve": "CVE-2024-38080",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38080"
},
{
"cve": "CVE-2024-38085",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38085"
},
{
"cve": "CVE-2024-38091",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38091"
},
{
"cve": "CVE-2024-38099",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38099"
},
{
"cve": "CVE-2024-38100",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38100"
},
{
"cve": "CVE-2024-38101",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38101"
},
{
"cve": "CVE-2024-38102",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38102"
},
{
"cve": "CVE-2024-38104",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38104"
},
{
"cve": "CVE-2024-38105",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38105"
},
{
"cve": "CVE-2024-38112",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38112"
},
{
"cve": "CVE-2024-38517",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38517"
},
{
"cve": "CVE-2024-39684",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-39684"
}
]
}
WID-SEC-W-2024-1579
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Windows ist ein Betriebssystem von Microsoft.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1579 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1579.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1579 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1579"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2024-07-09",
"url": "https://msrc.microsoft.com/update-guide"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2024-307 vom 2024-08-09",
"url": "https://www.hitachi.com/products/it/storage-solutions/sec_info/2024/07.html"
},
{
"category": "external",
"summary": "Exploit CVE-2024-38054 vom 2024-08-22",
"url": "https://github.com/Black-Frost/windows-learning/tree/main/CVE-2024-38054"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-013 vom 2024-09-05",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/09/Xerox-Security-Bulletin-XRX24-013-for-Xerox-FreeFlow-Print-Server-v2-_Windows10.pdf"
}
],
"source_lang": "en-US",
"title": "Microsoft Windows: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-09-05T22:00:00.000+00:00",
"generator": {
"date": "2024-09-06T08:13:56.495+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.6"
}
},
"id": "WID-SEC-W-2024-1579",
"initial_release_date": "2024-07-09T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-09T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "2",
"summary": "Hinweis auf Ausnutzung von zwei CVE erg\u00e4nzt"
},
{
"date": "2024-08-08T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von HITACHI aufgenommen"
},
{
"date": "2024-08-22T22:00:00.000+00:00",
"number": "4",
"summary": "Exploit f\u00fcr CVE-2024-38054 aufgenommen"
},
{
"date": "2024-09-05T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von XEROX aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Hitachi Storage",
"product": {
"name": "Hitachi Storage",
"product_id": "T009295",
"product_identification_helper": {
"cpe": "cpe:/h:hitachi:storage:-"
}
}
}
],
"category": "vendor",
"name": "Hitachi"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Version 1607",
"product": {
"name": "Microsoft Windows 10 Version 1607",
"product_id": "T011520",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_1607"
}
}
},
{
"category": "product_version",
"name": "Version 21H2",
"product": {
"name": "Microsoft Windows 10 Version 21H2",
"product_id": "T021306",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_21h2"
}
}
},
{
"category": "product_version",
"name": "Version 22H2",
"product": {
"name": "Microsoft Windows 10 Version 22H2",
"product_id": "T025256",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_22h2"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows 10",
"product": {
"name": "Microsoft Windows 10",
"product_id": "T025566",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:windows_terminal"
}
}
},
{
"category": "product_version",
"name": "Version 1809",
"product": {
"name": "Microsoft Windows 10 Version 1809",
"product_id": "T034033",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_1809"
}
}
}
],
"category": "product_name",
"name": "Windows 10"
},
{
"branches": [
{
"category": "product_version",
"name": "Version 23H2",
"product": {
"name": "Microsoft Windows 11 Version 23H2",
"product_id": "T031172",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_11:version_23h2"
}
}
},
{
"category": "product_version",
"name": "Version 22H2",
"product": {
"name": "Microsoft Windows 11 Version 22H2",
"product_id": "T034034",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_11:version_22h2"
}
}
},
{
"category": "product_version_range",
"name": "version 21H2",
"product": {
"name": "Microsoft Windows 11 version 21H2",
"product_id": "T034035"
}
}
],
"category": "product_name",
"name": "Windows 11"
},
{
"branches": [
{
"category": "product_version",
"name": "2008 SP2",
"product": {
"name": "Microsoft Windows Server 2008 SP2",
"product_id": "T012853",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server:2008_sp2"
}
}
},
{
"category": "product_version",
"name": "2008 R2 SP1",
"product": {
"name": "Microsoft Windows Server 2008 R2 SP1",
"product_id": "T012855",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server:2008_r2_sp1"
}
}
}
],
"category": "product_name",
"name": "Windows Server"
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2012",
"product": {
"name": "Microsoft Windows Server 2012",
"product_id": "T006125",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2012:::server_core_installation"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2012 R2",
"product": {
"name": "Microsoft Windows Server 2012 R2",
"product_id": "T014786",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2012_r2:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2016",
"product": {
"name": "Microsoft Windows Server 2016",
"product_id": "T008900",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2016:server_2016:r2"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2019",
"product": {
"name": "Microsoft Windows Server 2019",
"product_id": "T014557",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2019:server_core_installation"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Microsoft Windows Server 2022",
"product": {
"name": "Microsoft Windows Server 2022",
"product_id": "T025255",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2022:datacenter_azure_edition"
}
}
},
{
"category": "product_version",
"name": "23H2 Edition",
"product": {
"name": "Microsoft Windows Server 2022 23H2 Edition",
"product_id": "T034036",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2022:23h2_edition"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2022"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Xerox FreeFlow Print Server",
"product": {
"name": "Xerox FreeFlow Print Server",
"product_id": "T010509",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:-"
}
}
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21417",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-21417"
},
{
"cve": "CVE-2024-26184",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-26184"
},
{
"cve": "CVE-2024-28899",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-28899"
},
{
"cve": "CVE-2024-30013",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30013"
},
{
"cve": "CVE-2024-30071",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30071"
},
{
"cve": "CVE-2024-30079",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30079"
},
{
"cve": "CVE-2024-30081",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30081"
},
{
"cve": "CVE-2024-30098",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30098"
},
{
"cve": "CVE-2024-35270",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-35270"
},
{
"cve": "CVE-2024-3596",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-37969",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37969"
},
{
"cve": "CVE-2024-37970",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37970"
},
{
"cve": "CVE-2024-37971",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37971"
},
{
"cve": "CVE-2024-37972",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37972"
},
{
"cve": "CVE-2024-37973",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37973"
},
{
"cve": "CVE-2024-37974",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37974"
},
{
"cve": "CVE-2024-37975",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37975"
},
{
"cve": "CVE-2024-37977",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37977"
},
{
"cve": "CVE-2024-37978",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37978"
},
{
"cve": "CVE-2024-37981",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37981"
},
{
"cve": "CVE-2024-37984",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37984"
},
{
"cve": "CVE-2024-37985",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37985"
},
{
"cve": "CVE-2024-37986",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37986"
},
{
"cve": "CVE-2024-37987",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37987"
},
{
"cve": "CVE-2024-37988",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37988"
},
{
"cve": "CVE-2024-37989",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37989"
},
{
"cve": "CVE-2024-38010",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38010"
},
{
"cve": "CVE-2024-38011",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38011"
},
{
"cve": "CVE-2024-38013",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38013"
},
{
"cve": "CVE-2024-38015",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38015"
},
{
"cve": "CVE-2024-38017",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38017"
},
{
"cve": "CVE-2024-38019",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38019"
},
{
"cve": "CVE-2024-38022",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38022"
},
{
"cve": "CVE-2024-38025",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38025"
},
{
"cve": "CVE-2024-38027",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38027"
},
{
"cve": "CVE-2024-38028",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38028"
},
{
"cve": "CVE-2024-38030",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38030"
},
{
"cve": "CVE-2024-38031",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38031"
},
{
"cve": "CVE-2024-38032",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38032"
},
{
"cve": "CVE-2024-38033",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38033"
},
{
"cve": "CVE-2024-38034",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38034"
},
{
"cve": "CVE-2024-38041",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38041"
},
{
"cve": "CVE-2024-38043",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38043"
},
{
"cve": "CVE-2024-38044",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38044"
},
{
"cve": "CVE-2024-38047",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38047"
},
{
"cve": "CVE-2024-38048",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38048"
},
{
"cve": "CVE-2024-38049",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38049"
},
{
"cve": "CVE-2024-38050",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38050"
},
{
"cve": "CVE-2024-38051",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38051"
},
{
"cve": "CVE-2024-38052",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38052"
},
{
"cve": "CVE-2024-38053",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38053"
},
{
"cve": "CVE-2024-38054",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38054"
},
{
"cve": "CVE-2024-38055",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38055"
},
{
"cve": "CVE-2024-38056",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38056"
},
{
"cve": "CVE-2024-38057",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38057"
},
{
"cve": "CVE-2024-38058",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38058"
},
{
"cve": "CVE-2024-38059",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38059"
},
{
"cve": "CVE-2024-38060",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38060"
},
{
"cve": "CVE-2024-38061",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38061"
},
{
"cve": "CVE-2024-38062",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38062"
},
{
"cve": "CVE-2024-38064",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38064"
},
{
"cve": "CVE-2024-38065",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38065"
},
{
"cve": "CVE-2024-38066",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38066"
},
{
"cve": "CVE-2024-38067",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38067"
},
{
"cve": "CVE-2024-38068",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38068"
},
{
"cve": "CVE-2024-38069",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38069"
},
{
"cve": "CVE-2024-38070",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38070"
},
{
"cve": "CVE-2024-38071",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38071"
},
{
"cve": "CVE-2024-38072",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38072"
},
{
"cve": "CVE-2024-38073",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38073"
},
{
"cve": "CVE-2024-38074",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38074"
},
{
"cve": "CVE-2024-38076",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38076"
},
{
"cve": "CVE-2024-38077",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38077"
},
{
"cve": "CVE-2024-38078",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38078"
},
{
"cve": "CVE-2024-38079",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38079"
},
{
"cve": "CVE-2024-38080",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38080"
},
{
"cve": "CVE-2024-38085",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38085"
},
{
"cve": "CVE-2024-38091",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38091"
},
{
"cve": "CVE-2024-38099",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38099"
},
{
"cve": "CVE-2024-38100",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38100"
},
{
"cve": "CVE-2024-38101",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38101"
},
{
"cve": "CVE-2024-38102",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38102"
},
{
"cve": "CVE-2024-38104",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38104"
},
{
"cve": "CVE-2024-38105",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38105"
},
{
"cve": "CVE-2024-38112",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38112"
},
{
"cve": "CVE-2024-38517",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38517"
},
{
"cve": "CVE-2024-39684",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-39684"
}
]
}
sca-2025-0006
Vulnerability from csaf_sick
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "summary",
"text": "SICK has identified a Denial of Service vulnerability (CVE-2025-32472) in picoScan and multiScan, which can cause the web page to become unresponsive. Due to their architectural design, these products are not affected by the other vulnerabilities listed in this advisory. Currently SICK is not aware of any public exploits specifically targeting the vulnerability. SICK recommends applying the mitigation for CVE-2025-32472.",
"title": "summary"
},
{
"category": "general",
"text": "As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.",
"title": "General Security Measures"
},
{
"category": "general",
"text": "SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer\u2019s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.",
"title": "Vulnerability Classification"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@sick.de",
"issuing_authority": "SICK AG issues and issues in EHS products (when related to the Endress+Hauser SICK (EHS) joint venture).",
"name": "SICK PSIRT",
"namespace": "https://www.sick.com/psirt"
},
"references": [
{
"summary": "SICK PSIRT Security Advisories",
"url": "https://sick.com/psirt"
},
{
"summary": "SICK Operating Guidelines",
"url": "https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf"
},
{
"summary": "ICS-CERT recommended practices on Industrial Security",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"summary": "CVSS v3.1 Calculator",
"url": "https://www.first.org/cvss/calculator/3.1"
},
{
"category": "self",
"summary": "The canonical URL.",
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0006.json"
}
],
"title": "Vulnerability affecting picoScan and multiScan",
"tracking": {
"current_release_date": "2025-04-28T13:00:00.000Z",
"generator": {
"date": "2025-04-28T06:38:33.857Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.24"
}
},
"id": "SCA-2025-0006",
"initial_release_date": "2025-04-28T13:00:00.000Z",
"revision_history": [
{
"date": "2025-04-28T13:00:00.000Z",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-30T07:30:49.000Z",
"number": "2",
"summary": "Updated Advisory: URL for SICK Operating Guidelines has been updated"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICK picoScan1XX all versions",
"product_id": "CSAFPID-0001",
"product_identification_helper": {
"skus": [
"1134607",
"1134608",
"1134609",
"1134610",
"1141395",
"1141396",
"1141397",
"1141751",
"1142269",
"1142270",
"1142272",
"1142273"
]
}
}
}
],
"category": "product_name",
"name": "picoScan1XX"
}
],
"category": "product_family",
"name": "picoScan100"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICK multiScan1XX all versions",
"product_id": "CSAFPID-0002",
"product_identification_helper": {
"skus": [
"1131164",
"1137723",
"1140110",
"1140133",
"1140134",
"1141496",
"1143873"
]
}
}
}
],
"category": "product_name",
"name": "multiScan1XX"
}
],
"category": "product_family",
"name": "multiScan100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICK picoScan1XX Firmware all versions",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "picoScan1XX Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICK multiScan1XX Firmware all versions",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "multiScan1XX Firmware"
}
],
"category": "vendor",
"name": "SICK AG"
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "SICK picoScan1XX all Firmware versions",
"product_id": "CSAFPID-0005"
},
"product_reference": "CSAFPID-0003",
"relates_to_product_reference": "CSAFPID-0001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "SICK multiScan1XX all Firmware versions",
"product_id": "CSAFPID-0006"
},
"product_reference": "CSAFPID-0004",
"relates_to_product_reference": "CSAFPID-0002"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-32472",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "The multiScan and picoScan are vulnerable to a denial-of-service (DoS) attack. A remote attacker can exploit this vulnerability by conducting a Slowloris-type attack, causing the web page to become unresponsive.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "workaround",
"details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \u201dSICK Operating Guidelines\u201d and \u201dICS-CERT recommended practices on Industrial Security\u201d could help to implement the general security practices. Additionally, the web server can be disabled via the CyberSecurity page in the UI.",
"product_ids": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "Denial-of-Service Vulnerability in multiScan and picoScan via Slowloris Attack"
},
{
"cve": "CVE-2024-38517",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "Tencent RapidJSON Vulnerable to Privilege Escalation via Integer Underflow in GenericReader::ParseNumber() Function"
},
{
"cve": "CVE-2024-39684",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the GenericReader::ParseNumber() function of include/rapidjson/reader.h when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "Tencent RapidJSON Vulnerable to Privilege Escalation via Integer Overflow in GenericReader::ParseNumber() Function"
},
{
"cve": "CVE-2022-46908",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "SQLite through 3.40.0, when relying on --safe for execution of an untrusted CLI script, does not properly implement the azProhibitedFunctions protection mechanism, and instead allows UDF functions such as WRITEFILE.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.3,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.3,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "SQLite Vulnerable to Protection Mechanism Bypass via Improper Implementation of \u0027azProhibitedFunctions\u0027"
},
{
"cve": "CVE-2021-36690",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "SQLite Vulnerable to Denial-of-Service (DoS) via Segmentation Fault in \u0027idxGetTableInfo\u0027 Function"
},
{
"cve": "CVE-2022-35737",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "SQLite Vulnerable to Memory Corruption via Stack-Based Buffer Overflow in \u0027sqlite3_str_vappendf()\u0027 Function Used by \u0027printf\u0027 Family API Implementations"
},
{
"cve": "CVE-2021-45346",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 4.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 4.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "SQLite Vulnerable to Information Disclosure via Maliciously Crafted Queries"
},
{
"cve": "CVE-2023-7104",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"environmentalScore": 7.3,
"environmentalSeverity": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.3,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "SQLite Vulnerable to Out-of-Bounds Memory Access via Insufficient Input Validation in \u0027sessionReadRecord\u0027 Function of \u0027Sessions\u0027 Extension"
},
{
"cve": "CVE-2022-28805",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.1,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.1,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "Lua Vulnerable to Denial-of-Service (DoS) and Information Disclosure via Heap-Based Buffer Over-Read in \u0027luaH_getshortstr\u0027 Function"
},
{
"cve": "CVE-2020-24370",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "Lua Vulnerable to Denial-of-Service (DoS) via Integer Overflow in \u0027ldebug.c\u0027 File"
},
{
"cve": "CVE-2021-43519",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "Lua Vulnerable to Denial-of-Service (DoS) via Stack-Based Buffer Overflow in \u0027ldo.c\u0027"
},
{
"cve": "CVE-2020-24369",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "ldebug.c in Lua 5.4.0 attempts to access debug information via the line hook of a stripped function, leading to a NULL pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "Lua Vulnerable to Denial-of-Service (DoS) via Stack-Based Buffer Overflow in \u0027ldo.c\u0027"
},
{
"cve": "CVE-2020-24371",
"cwe": {
"id": "CWE-763",
"name": "Release of Invalid Pointer or Reference"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "lgc.c in Lua 5.4.0 mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "Lua Vulnerable to Information Disclosure via Mishandled Interaction Between Barriers and Sweep Phase"
},
{
"cve": "CVE-2022-33099",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "Lua Vulnerable to Denial-of-Service (DoS) via Stack Overflow in \u0027luaG_runerror\u0027 Function"
},
{
"cve": "CVE-2020-15945",
"cwe": {
"id": "CWE-229",
"name": "Improper Handling of Values"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Lua 5.4.0 (fixed in 5.4.1) has a segmentation fault in changedline in ldebug.c (e.g., when called by luaG_traceexec) because it incorrectly expects that an oldpc value is always updated upon a return of the flow of control to a function.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "Lua Vulnerable to Denial-of-Service via \u0027changedline\u0027 Function"
},
{
"cve": "CVE-2020-15888",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "Lua Vulnerable to Denial-of-Service (DoS) via Multiple Heap Related Memory Errors via Garbage Collection \u0027Stack Resizing\u0027"
},
{
"cve": "CVE-2020-24342",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Lua through 5.4.0 allows a stack redzone cross in luaO_pushvfstring because a protection mechanism wrongly calls luaD_callnoyield twice in a row.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "Lua Vulnerable to Denial-of-Service (DoS) via Stack Overflow in \u0027luaD_callnoyield\u0027 Function"
},
{
"cve": "CVE-2024-10525",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "In Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its on_subscribe callback. This affects the mosquitto_sub and mosquitto_rr clients.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "Eclipse Mosquitto Vulnerable to Memory Corruption via Heap-Based-Buffer Overflow in Crafted SUBACK Packet in libmosquitto Component"
},
{
"cve": "CVE-2024-8376",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "In Eclipse Mosquitto up to version 2.0.18a, an attacker can achieve memory leaking, segmentation fault or heap-use-after-free by sending specific sequences of \"CONNECT\", \"DISCONNECT\", \"SUBSCRIBE\", \"UNSUBSCRIBE\" and \"PUBLISH\" packets.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "Eclipse Mosquitto Vulnerable to Memory Corruption via Specific Sequences in Packet Handling Component"
},
{
"cve": "CVE-2023-28366",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "The broker in Eclipse Mosquitto 1.3.2 through 2.x before 2.0.16 has a memory leak that can be abused remotely when a client sends many QoS 2 messages with duplicate message IDs, and fails to respond to PUBREC commands. This occurs because of mishandling of EAGAIN from the libc send function.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "Mosquitto Vulnerable to Denial-of-Service (DoS) via Memory Leak Triggered by Duplicate QoS 2 Messages"
},
{
"cve": "CVE-2023-3592",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "In Mosquitto before 2.0.16, a memory leak occurs when clients send v5 CONNECT packets with a will message that contains invalid property types.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "Mosquitto Vulnerable to Denial-of-Service (DoS) via Memory Leak in \u0027v5 CONNECT\u0027 Packets"
},
{
"cve": "CVE-2024-3935",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "In Eclipse Mosquito, versions from 2.0.0 through 2.0.18, if a Mosquitto broker is configured to create an outgoing bridge connection, and that bridge connection has an incoming topic configured that makes use of topic remapping, then if the remote connection sends a crafted PUBLISH packet to the broker a double free will occur with a subsequent crash of the broker.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "Eclipse Mosquitto Vulnerable to Memory Corruption via Double Free in Crafted PUBLISH Packet in Outgoing Bridge Connection"
},
{
"cve": "CVE-2023-0809",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "In Mosquitto before 2.0.16, excessive memory is allocated based on malicious initial packets that are not CONNECT packets.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "Mosquitto Vulnerable to Denial-of-Service (DoS) via Excessive Memory Allocation"
}
]
}
CERTFR-2024-AVI-0557
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Microsoft indique que les vulnérabilités CVE-2024-38080 et CVE-2024-38112 sont activement exploitées.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.22769 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.4651 | ||
| Microsoft | N/A | Windows Server 2012 versions antérieures à 6.2.9200.24975 | ||
| Microsoft | N/A | Windows 10 Version 1809 pour systèmes ARM64 versions antérieures à 10.0.17763.6054 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27219 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 1.001 | ||
| Microsoft | N/A | Windows Server 2016 versions antérieures à 10.0.14393.7159 | ||
| Microsoft | N/A | Windows Server 2019 versions antérieures à 10.0.17763.6054 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.4651 | ||
| Microsoft | N/A | Windows Server 2012 R2 versions antérieures à 6.3.9600.22074 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.4651 | ||
| Microsoft | N/A | Windows Server 2022 versions antérieures à 10.0.20348.2582 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 1.001 | ||
| Microsoft | N/A | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.3880 | ||
| Microsoft | N/A | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.7159 | ||
| Microsoft | N/A | Windows Server 2012 R2 versions antérieures à 1.001 | ||
| Microsoft | N/A | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.7159 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.4651 | ||
| Microsoft | N/A | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.7159 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.22769 | ||
| Microsoft | N/A | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.2582 | ||
| Microsoft | N/A | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.3880 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.22769 | ||
| Microsoft | N/A | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.20710 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.22769 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.4651 | ||
| Microsoft | N/A | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.3880 | ||
| Microsoft | N/A | Windows 11 version 21H2 pour systèmes x64 antérieures à 10.0.22000.3079 | ||
| Microsoft | N/A | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.6054 | ||
| Microsoft | N/A | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.24975 | ||
| Microsoft | N/A | Windows 11 version 21H2 pour systèmes ARM64 antérieures à 10.0.22000.3079 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27219 | ||
| Microsoft | N/A | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1009 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.4651 | ||
| Microsoft | N/A | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22074 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 1.001 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 1.001 | ||
| Microsoft | N/A | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.20710 | ||
| Microsoft | N/A | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.3880 | ||
| Microsoft | N/A | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.6054 | ||
| Microsoft | N/A | Azure Network Watcher VM Extension pour Windows versions antérieures à 1.4.3320.1 | ||
| Microsoft | N/A | Windows Server 2012 R2 (Server Core installation) versions antérieures à 1.001 | ||
| Microsoft | N/A | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.6054 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.22769",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.4651",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.24975",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.17763.6054",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27219",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.7159",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.6054",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.4651",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22074",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.4651",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.2582",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.3880",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.7159",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.7159",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.4651",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.7159",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.22769",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.2582",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.3880",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.22769",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.20710",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.22769",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.4651",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.3880",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes x64 ant\u00e9rieures \u00e0 10.0.22000.3079",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.6054",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.24975",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes ARM64 ant\u00e9rieures \u00e0 10.0.22000.3079",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27219",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1009",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.4651",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22074",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.20710",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.3880",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.6054",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Network Watcher VM Extension pour Windows versions ant\u00e9rieures \u00e0 1.4.3320.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.6054",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-28899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28899"
},
{
"name": "CVE-2024-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38010"
},
{
"name": "CVE-2024-38028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38028"
},
{
"name": "CVE-2024-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37970"
},
{
"name": "CVE-2024-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38077"
},
{
"name": "CVE-2024-38049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38049"
},
{
"name": "CVE-2024-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37989"
},
{
"name": "CVE-2024-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37987"
},
{
"name": "CVE-2024-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38074"
},
{
"name": "CVE-2024-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37973"
},
{
"name": "CVE-2024-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37984"
},
{
"name": "CVE-2024-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37975"
},
{
"name": "CVE-2024-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38055"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-38054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38054"
},
{
"name": "CVE-2024-38041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38041"
},
{
"name": "CVE-2024-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38102"
},
{
"name": "CVE-2024-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38101"
},
{
"name": "CVE-2024-38050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38050"
},
{
"name": "CVE-2024-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38080"
},
{
"name": "CVE-2024-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38011"
},
{
"name": "CVE-2024-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38062"
},
{
"name": "CVE-2024-30081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30081"
},
{
"name": "CVE-2024-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38112"
},
{
"name": "CVE-2024-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38104"
},
{
"name": "CVE-2024-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38067"
},
{
"name": "CVE-2024-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38043"
},
{
"name": "CVE-2024-38047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38047"
},
{
"name": "CVE-2024-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39684"
},
{
"name": "CVE-2024-38056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38056"
},
{
"name": "CVE-2024-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38057"
},
{
"name": "CVE-2024-35270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35270"
},
{
"name": "CVE-2024-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38071"
},
{
"name": "CVE-2024-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37974"
},
{
"name": "CVE-2024-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37978"
},
{
"name": "CVE-2024-37971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37971"
},
{
"name": "CVE-2024-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38085"
},
{
"name": "CVE-2024-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38053"
},
{
"name": "CVE-2024-38032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38032"
},
{
"name": "CVE-2024-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38076"
},
{
"name": "CVE-2024-37981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37981"
},
{
"name": "CVE-2024-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38052"
},
{
"name": "CVE-2024-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38015"
},
{
"name": "CVE-2024-38025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38025"
},
{
"name": "CVE-2024-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37988"
},
{
"name": "CVE-2024-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38061"
},
{
"name": "CVE-2024-38030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38030"
},
{
"name": "CVE-2024-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38065"
},
{
"name": "CVE-2024-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38078"
},
{
"name": "CVE-2024-26184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26184"
},
{
"name": "CVE-2024-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37969"
},
{
"name": "CVE-2024-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38072"
},
{
"name": "CVE-2024-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37972"
},
{
"name": "CVE-2024-30079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30079"
},
{
"name": "CVE-2024-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38013"
},
{
"name": "CVE-2024-38069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38069"
},
{
"name": "CVE-2024-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38022"
},
{
"name": "CVE-2024-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38034"
},
{
"name": "CVE-2024-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21417"
},
{
"name": "CVE-2024-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38048"
},
{
"name": "CVE-2024-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38051"
},
{
"name": "CVE-2024-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38079"
},
{
"name": "CVE-2024-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37985"
},
{
"name": "CVE-2024-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38066"
},
{
"name": "CVE-2024-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38100"
},
{
"name": "CVE-2024-30071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30071"
},
{
"name": "CVE-2024-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38031"
},
{
"name": "CVE-2024-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38105"
},
{
"name": "CVE-2024-38073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38073"
},
{
"name": "CVE-2024-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38060"
},
{
"name": "CVE-2024-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38070"
},
{
"name": "CVE-2024-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37986"
},
{
"name": "CVE-2024-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38058"
},
{
"name": "CVE-2024-38517",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38517"
},
{
"name": "CVE-2024-30013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30013"
},
{
"name": "CVE-2024-38033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38033"
},
{
"name": "CVE-2024-38064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38064"
},
{
"name": "CVE-2024-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38059"
},
{
"name": "CVE-2024-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38068"
},
{
"name": "CVE-2024-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38019"
},
{
"name": "CVE-2024-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38099"
},
{
"name": "CVE-2024-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38027"
},
{
"name": "CVE-2024-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38044"
},
{
"name": "CVE-2024-38091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38091"
},
{
"name": "CVE-2024-38017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38017"
},
{
"name": "CVE-2024-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37977"
},
{
"name": "CVE-2024-30098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30098"
}
],
"initial_release_date": "2024-07-10T00:00:00",
"last_revision_date": "2024-07-10T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0557",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\nMicrosoft indique que les vuln\u00e9rabilit\u00e9s CVE-2024-38080 et CVE-2024-38112 sont activement exploit\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38031",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38031"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37969",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37969"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38044",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38044"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38053",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38053"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38028",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38028"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38054",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38054"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38068",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38068"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38073",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38073"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38105",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38105"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38059",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38059"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37978",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37978"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38074",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38074"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38022"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38057",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38057"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-26184",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26184"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38061",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38061"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38099",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38099"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38112",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38025",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38025"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38071",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38071"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38048",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38048"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37985",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37985"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38034",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38034"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38010",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38010"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38032",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38032"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38019",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38019"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38104",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38104"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38011",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38011"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37987",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37987"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37973",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37973"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38055",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38055"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-30098",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30098"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38058",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38058"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38062",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38062"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-30081",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30081"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38041",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38041"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37975",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37975"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37989",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37989"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38060",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38060"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37988",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37988"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37972",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37972"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38027",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38027"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38102",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38102"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38091",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38091"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-39684",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39684"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38080",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38015",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38015"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38047",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38047"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38077",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38077"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38076",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38076"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-30079",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30079"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38101",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38101"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38064",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38064"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38079",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38079"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-21417",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21417"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-28899",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28899"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37970",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37970"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38517",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38017",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38017"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38069",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38069"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37984",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37984"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38070",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38070"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38065",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38065"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-3596",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-3596"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38050",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38050"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38085",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38085"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38033",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38033"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-35270",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35270"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38072",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38072"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-30013",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30013"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38013",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38013"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38100",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38100"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38067",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38067"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37977",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37977"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38043",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38043"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38030",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38030"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38052",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38052"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37986",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37986"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38078",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38078"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-30071",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30071"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37971",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37971"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37981",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37981"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38049",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38049"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38051",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38051"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38056",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38056"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38066",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38066"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37974",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37974"
}
]
}
CERTFR-2024-AVI-0825
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans NetApp StorageGRID. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| NetApp | StorageGRID | StorageGRID versions antérieures à 11.8.0.7 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "StorageGRID versions ant\u00e9rieures \u00e0 11.8.0.7",
"product": {
"name": "StorageGRID",
"vendor": {
"name": "NetApp",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-38517",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38517"
}
],
"initial_release_date": "2024-10-01T00:00:00",
"last_revision_date": "2024-10-01T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0825",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans NetApp StorageGRID. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
"title": "Vuln\u00e9rabilit\u00e9 dans NetApp StorageGRID",
"vendor_advisories": [
{
"published_at": "2024-09-30",
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20240905-0001",
"url": "https://security.netapp.com/advisory/ntap-20240905-0001/"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.