"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-04-11 03:00:34 +00:00
parent 18839486d0
commit 0a37be9ff6
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
5 changed files with 369 additions and 20 deletions

View File

@ -1,17 +1,72 @@
{ {
"data_version": "4.0",
"data_type": "CVE", "data_type": "CVE",
"data_format": "MITRE", "data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2024-25572", "ID": "CVE-2024-25572",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "RESERVED" "STATE": "PUBLIC"
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "Cross-site request forgery (CSRF) vulnerability exists in Ninja Forms prior to 3.4.31. If a website administrator views a malicious page while logging in, unintended operations may be performed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site request forgery (CSRF)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Saturday Drive",
"product": {
"product_data": [
{
"product_name": "Ninja Forms",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "prior to 3.4.31"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/ninja-forms/",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/ninja-forms/"
},
{
"url": "https://ninjaforms.com/",
"refsource": "MISC",
"name": "https://ninjaforms.com/"
},
{
"url": "https://jvn.jp/en/jp/JVN50361500/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN50361500/"
} }
] ]
} }

View File

@ -1,17 +1,72 @@
{ {
"data_version": "4.0",
"data_type": "CVE", "data_type": "CVE",
"data_format": "MITRE", "data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2024-26019", "ID": "CVE-2024-26019",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "RESERVED" "STATE": "PUBLIC"
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "Ninja Forms prior to 3.8.1 contains a cross-site scripting vulnerability in submit processing. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is accessing to the website using the product."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Saturday Drive",
"product": {
"product_data": [
{
"product_name": "Ninja Forms",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "prior to 3.8.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/ninja-forms/",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/ninja-forms/"
},
{
"url": "https://ninjaforms.com/",
"refsource": "MISC",
"name": "https://ninjaforms.com/"
},
{
"url": "https://jvn.jp/en/jp/JVN50361500/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN50361500/"
} }
] ]
} }

View File

@ -1,17 +1,72 @@
{ {
"data_version": "4.0",
"data_type": "CVE", "data_type": "CVE",
"data_format": "MITRE", "data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2024-29220", "ID": "CVE-2024-29220",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "RESERVED" "STATE": "PUBLIC"
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "Ninja Forms prior to 3.8.1 contains a cross-site scripting vulnerability in custom fields for labels. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is accessing to the website using the product."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Saturday Drive",
"product": {
"product_data": [
{
"product_name": "Ninja Forms",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "prior to 3.8.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/ninja-forms/",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/ninja-forms/"
},
{
"url": "https://ninjaforms.com/",
"refsource": "MISC",
"name": "https://ninjaforms.com/"
},
{
"url": "https://jvn.jp/en/jp/JVN50361500/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN50361500/"
} }
] ]
} }

View File

@ -1,17 +1,109 @@
{ {
"data_version": "4.0",
"data_type": "CVE", "data_type": "CVE",
"data_format": "MITRE", "data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2024-3618", "ID": "CVE-2024-3618",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cna@vuldb.com",
"STATE": "RESERVED" "STATE": "PUBLIC"
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "A vulnerability, which was classified as critical, was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. Affected is an unknown function of the file /control/activate_case.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-260274 is the identifier assigned to this vulnerability."
},
{
"lang": "deu",
"value": "Es wurde eine Schwachstelle in SourceCodester Kortex Lite Advocate Office Management System 1.0 gefunden. Sie wurde als kritisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Datei /control/activate_case.php. Durch die Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SourceCodester",
"product": {
"product_data": [
{
"product_name": "Kortex Lite Advocate Office Management System",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.260274",
"refsource": "MISC",
"name": "https://vuldb.com/?id.260274"
},
{
"url": "https://vuldb.com/?ctiid.260274",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.260274"
},
{
"url": "https://vuldb.com/?submit.312807",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.312807"
},
{
"url": "https://github.com/zyairelai/CVE-submissions/blob/main/kortex-activate_case-sqli.md",
"refsource": "MISC",
"name": "https://github.com/zyairelai/CVE-submissions/blob/main/kortex-activate_case-sqli.md"
}
]
},
"credits": [
{
"lang": "en",
"value": "zyairelai (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 4.7,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 4.7,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 5.8,
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P"
} }
] ]
} }

View File

@ -1,17 +1,109 @@
{ {
"data_version": "4.0",
"data_type": "CVE", "data_type": "CVE",
"data_format": "MITRE", "data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2024-3619", "ID": "CVE-2024-3619",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cna@vuldb.com",
"STATE": "RESERVED" "STATE": "PUBLIC"
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "A vulnerability has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /control/addcase_stage.php. The manipulation of the argument cname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-260275."
},
{
"lang": "deu",
"value": "In SourceCodester Kortex Lite Advocate Office Management System 1.0 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Es geht um eine nicht n\u00e4her bekannte Funktion der Datei /control/addcase_stage.php. Durch Manipulation des Arguments cname mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SourceCodester",
"product": {
"product_data": [
{
"product_name": "Kortex Lite Advocate Office Management System",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.260275",
"refsource": "MISC",
"name": "https://vuldb.com/?id.260275"
},
{
"url": "https://vuldb.com/?ctiid.260275",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.260275"
},
{
"url": "https://vuldb.com/?submit.312813",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.312813"
},
{
"url": "https://github.com/zyairelai/CVE-submissions/blob/main/kortex-addcase_stage-sqli.md",
"refsource": "MISC",
"name": "https://github.com/zyairelai/CVE-submissions/blob/main/kortex-addcase_stage-sqli.md"
}
]
},
"credits": [
{
"lang": "en",
"value": "zyairelai (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 4.7,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 4.7,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 5.8,
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P"
} }
] ]
} }