Metrics
Affected Vendors & Products
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 27 Nov 2024 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:servicenow:servicenow:xanadu:-:*:*:*:*:*:* |
cpe:2.3:a:servicenow:servicenow:vancouver:early_availability:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:early_availability_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:early_availability_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_1_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_3:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_3:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_3:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_4:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_2b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_5_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_6_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_6_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_7:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_3a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_3b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_4:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_3:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_4:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_5:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_9:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_9_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_9_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:washington_dc:early_availability:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:washington_dc:early_availability_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_3b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3_hotfix_3:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:washington_dc:patch_4:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:washington_dc:patch_4_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:xanadu:early_availability:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:xanadu:early_availability_hotfix_1:*:*:*:*:*:* |
Thu, 07 Nov 2024 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:servicenow:servicenow:vancouver:-:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix1a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_4:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_5:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_6:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_1a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_1b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_2a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_2b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:patch_8:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:vancouver:ptach_7:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:washington_dc:-:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:xanadu:-:*:*:*:*:*:* |
Tue, 29 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Servicenow
Servicenow servicenow |
|
| CPEs | cpe:2.3:a:servicenow:servicenow:vancouver:*:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:washington_dc:*:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:xanadu:*:*:*:*:*:*:* |
|
| Vendors & Products |
Servicenow
Servicenow servicenow |
|
| Metrics |
ssvc
|
Tue, 29 Oct 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 |
Tue, 29 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ServiceNow has addressed an input validation vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow deployed an update to hosted instances and ServiceNow provided the update to our partners and self-hosted customers. Further, the vulnerability is addressed in the listed patches and hot fixes. | |
| Title | Sandbox Escape in Now Platform | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: SN
Published: 2024-10-29T16:07:07.310Z
Updated: 2024-10-31T03:55:16.080Z
Reserved: 2024-09-16T23:33:41.375Z
Link: CVE-2024-8923
Updated: 2024-10-29T19:57:20.742Z
Status : Analyzed
Published: 2024-10-29T16:15:06.417
Modified: 2024-11-27T19:31:56.417
Link: CVE-2024-8923
No data.