From 216b2eccb88b4af48dca7ff0580e6208ce0b15e1 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 8 Aug 2024 17:00:38 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2001/0xxx/CVE-2001-0331.json | 89 ++++++++++----------- 2024/0xxx/CVE-2024-0102.json | 84 +++++++++++++++++++- 2024/0xxx/CVE-2024-0107.json | 78 ++++++++++++++++++- 2024/0xxx/CVE-2024-0108.json | 78 ++++++++++++++++++- 2024/3xxx/CVE-2024-3180.json | 2 +- 2024/42xxx/CVE-2024-42365.json | 136 ++++++++++++++++++++++++++++++++- 2024/42xxx/CVE-2024-42366.json | 90 +++++++++++++++++++++- 2024/7xxx/CVE-2024-7394.json | 90 ++++++++++++++++++++-- 2024/7xxx/CVE-2024-7477.json | 85 ++++++++++++++++++++- 2024/7xxx/CVE-2024-7480.json | 85 ++++++++++++++++++++- 2024/7xxx/CVE-2024-7619.json | 18 +++++ 2024/7xxx/CVE-2024-7620.json | 18 +++++ 12 files changed, 772 insertions(+), 81 deletions(-) create mode 100644 2024/7xxx/CVE-2024-7619.json create mode 100644 2024/7xxx/CVE-2024-7620.json diff --git a/2001/0xxx/CVE-2001-0331.json b/2001/0xxx/CVE-2001-0331.json index 5057411cd3f..6bdbe4ab4c7 100644 --- a/2001/0xxx/CVE-2001-0331.json +++ b/2001/0xxx/CVE-2001-0331.json @@ -1,9 +1,32 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0331", + "ASSIGNER": "cve@mitre.org", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer overflow in Embedded Support Partner (ESP) daemon (rpc.espd) in IRIX 6.5.8 and earlier allows remote attackers to execute arbitrary commands." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -27,65 +50,37 @@ ] } }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Buffer overflow in Embedded Support Partner (ESP) daemon (rpc.espd) in IRIX 6.5.8 and earlier allows remote attackers to execute arbitrary commands." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, "references": { "reference_data": [ { - "name": "1822", - "refsource": "OSVDB", - "url": "http://www.osvdb.org/1822" + "url": "http://www.osvdb.org/1822", + "refsource": "MISC", + "name": "http://www.osvdb.org/1822" }, { - "name": "VU#258632", - "refsource": "CERT-VN", - "url": "http://www.kb.cert.org/vuls/id/258632" + "url": "http://www.kb.cert.org/vuls/id/258632", + "refsource": "MISC", + "name": "http://www.kb.cert.org/vuls/id/258632" }, { - "name": "irix-espd-bo(6502)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6502" + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6502", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6502" }, { - "name": "20010501-01-P", - "refsource": "SGI", - "url": "ftp://patches.sgi.com/support/free/security/advisories/20010501-01-P" + "url": "ftp://patches.sgi.com/support/free/security/advisories/20010501-01-P", + "refsource": "MISC", + "name": "ftp://patches.sgi.com/support/free/security/advisories/20010501-01-P" }, { - "refsource": "ISS", - "name": "20010509 Remote Buffer Overflow Vulnerability in IRIX Embedded Support Partner Infrastructure", - "url": "http://xforce.iss.net/alerts/advise76.php" + "url": "http://xforce.iss.net/alerts/advise76.php", + "refsource": "MISC", + "name": "http://xforce.iss.net/alerts/advise76.php" }, { - "name": "2714", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/2714" - }, - { - "name": "20010509 Remote Buffer Overflow Vulnerability in IRIX Embedded Support Partner Infrastructure\t", - "refsource": "ISS", - "url": "http://xforce.iss.net/alerts/advise76.php" + "url": "http://www.securityfocus.com/bid/2714", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/2714" } ] } diff --git a/2024/0xxx/CVE-2024-0102.json b/2024/0xxx/CVE-2024-0102.json index 8df63f793ac..c5c12e5d112 100644 --- a/2024/0xxx/CVE-2024-0102.json +++ b/2024/0xxx/CVE-2024-0102.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-0102", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@nvidia.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NVIDIA CUDA Toolkit for all platforms contains a vulnerability in nvdisasm, where an attacker can cause an out-of-bounds read issue by deceiving a user into reading a malformed ELF file. A successful exploit of this vulnerability might lead to denial of service." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-125 Out-of-bounds Read", + "cweId": "CWE-125" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NVIDIA", + "product": { + "product_data": [ + { + "product_name": "NVIDIA CUDA Toolkit", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "All versions up to and including CUDA Toolkit 12.5U1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5548", + "refsource": "MISC", + "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5548" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Matteo Marini and Daniele Cono D'Elia" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 3.3, + "baseSeverity": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "version": "3.1" } ] } diff --git a/2024/0xxx/CVE-2024-0107.json b/2024/0xxx/CVE-2024-0107.json index 441d59d1a01..f9b948ee17e 100644 --- a/2024/0xxx/CVE-2024-0107.json +++ b/2024/0xxx/CVE-2024-0107.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-0107", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@nvidia.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NVIDIA GPU Display Driver for Windows contains a vulnerability in the user mode layer, where an unprivileged regular user can cause an out-of-bounds read. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-125 Out-of-bounds Read", + "cweId": "CWE-125" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NVIDIA", + "product": { + "product_data": [ + { + "product_name": "GPU Display Driver, vGPU Software, Cloud Gaming", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "All versions up to and including the June 2024 release" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5557", + "refsource": "MISC", + "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5557" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/0xxx/CVE-2024-0108.json b/2024/0xxx/CVE-2024-0108.json index a90ba14e501..5a92f4a3a7b 100644 --- a/2024/0xxx/CVE-2024-0108.json +++ b/2024/0xxx/CVE-2024-0108.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-0108", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@nvidia.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NVIDIA Jetson Linux contains a vulnerability in NvGPU where error handling paths in GPU MMU mapping code fail to clean up a failed mapping attempt. A successful exploit of this vulnerability may lead to denial of service, code execution, and escalation of privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-755 Improper Handling of Exceptional Conditions", + "cweId": "CWE-755" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NVIDIA", + "product": { + "product_data": [ + { + "product_name": "NVIDIA Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson TX1, Jetson Nano series", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "All versions prior to and including 32.7.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5555", + "refsource": "MISC", + "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5555" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L", + "version": "3.1" } ] } diff --git a/2024/3xxx/CVE-2024-3180.json b/2024/3xxx/CVE-2024-3180.json index a6ec6a8b0ec..b8770df95bb 100644 --- a/2024/3xxx/CVE-2024-3180.json +++ b/2024/3xxx/CVE-2024-3180.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Concrete CMS version 9 below 9.2.8 and previous versions below 8.5.16 is vulnerable to Stored XSS in blocks of type file.\u00a0Prior to fix, stored XSS could be caused by a rogue administrator adding malicious code to the link-text field when creating a block of type file.\u00a0The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.1 with a vector of AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator .\u00a0Thanks Alexey Solovyev for reporting.\n\n" + "value": "Concrete CMS version 9 below 9.2.8 and previous versions below 8.5.16 is vulnerable to Stored XSS in blocks of type file.\u00a0Stored XSS could be caused by a rogue administrator adding malicious code to the link-text field when creating a block of type file.\u00a0The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.1 with a vector of AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator .\u00a0Thanks Alexey Solovyev for reporting." } ] }, diff --git a/2024/42xxx/CVE-2024-42365.json b/2024/42xxx/CVE-2024-42365.json index aa4d9d41b57..52f47dee57d 100644 --- a/2024/42xxx/CVE-2024-42365.json +++ b/2024/42xxx/CVE-2024-42365.json @@ -1,17 +1,145 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-42365", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-267: Privilege Defined With Unsafe Actions", + "cweId": "CWE-267" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-1220: Insufficient Granularity of Access Control", + "cweId": "CWE-1220" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "asterisk", + "product": { + "product_data": [ + { + "product_name": "asterisk", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 18.24.2" + }, + { + "version_affected": "=", + "version_value": ">= 19.0.0, < 20.9.2" + }, + { + "version_affected": "=", + "version_value": ">= 21.0.0, < 21.4.2" + }, + { + "version_affected": "=", + "version_value": "< 18.9-cert11" + }, + { + "version_affected": "=", + "version_value": ">= 19.0, < 20.7-cert2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-c4cg-9275-6w44", + "refsource": "MISC", + "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-c4cg-9275-6w44" + }, + { + "url": "https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4", + "refsource": "MISC", + "name": "https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4" + }, + { + "url": "https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8", + "refsource": "MISC", + "name": "https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8" + }, + { + "url": "https://github.com/asterisk/asterisk/commit/b4063bf756272254b160b6d1bd6e9a3f8e16cc71", + "refsource": "MISC", + "name": "https://github.com/asterisk/asterisk/commit/b4063bf756272254b160b6d1bd6e9a3f8e16cc71" + }, + { + "url": "https://github.com/asterisk/asterisk/commit/bbe68db10ab8a80c29db383e4dfe14f6eafaf993", + "refsource": "MISC", + "name": "https://github.com/asterisk/asterisk/commit/bbe68db10ab8a80c29db383e4dfe14f6eafaf993" + }, + { + "url": "https://github.com/asterisk/asterisk/commit/faddd99f2b9408b524e5eb8a01589fe1fa282df2", + "refsource": "MISC", + "name": "https://github.com/asterisk/asterisk/commit/faddd99f2b9408b524e5eb8a01589fe1fa282df2" + }, + { + "url": "https://github.com/asterisk/asterisk/blob/14367caaf7241df1eceea7c45c5b261989c2c6db/main/manager.c#L6426", + "refsource": "MISC", + "name": "https://github.com/asterisk/asterisk/blob/14367caaf7241df1eceea7c45c5b261989c2c6db/main/manager.c#L6426" + }, + { + "url": "https://github.com/asterisk/asterisk/blob/7d28165cb1b2d02d66e8693bd3fe23ee72fc55d8/main/manager.c#L6426", + "refsource": "MISC", + "name": "https://github.com/asterisk/asterisk/blob/7d28165cb1b2d02d66e8693bd3fe23ee72fc55d8/main/manager.c#L6426" + } + ] + }, + "source": { + "advisory": "GHSA-c4cg-9275-6w44", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/42xxx/CVE-2024-42366.json b/2024/42xxx/CVE-2024-42366.json index 1a72ad57356..d829e384b11 100644 --- a/2024/42xxx/CVE-2024-42366.json +++ b/2024/42xxx/CVE-2024-42366.json @@ -1,17 +1,99 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-42366", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "VRCX is an assistant/companion application for VRChat. In versions prior to 2024.03.23, a CefSharp browser with over-permission and cross-site scripting via overlay notification can be combined to result in remote command execution. These vulnerabilities are patched in VRCX 2023.12.24. In addition to the patch, VRCX maintainers worked with the VRC team and blocked the older version of VRCX on the VRC's API side. Users who use the older version of VRCX must update their installation to continue using VRCX." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-269: Improper Privilege Management", + "cweId": "CWE-269" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "vrcx-team", + "product": { + "product_data": [ + { + "product_name": "VRCX", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 2024.03.23" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/vrcx-team/VRCX/security/advisories/GHSA-j98g-mgjm-wqph", + "refsource": "MISC", + "name": "https://github.com/vrcx-team/VRCX/security/advisories/GHSA-j98g-mgjm-wqph" + }, + { + "url": "https://github.com/vrcx-team/VRCX/commit/cd2387aa3289f936ce60049121c24b0765bd4180", + "refsource": "MISC", + "name": "https://github.com/vrcx-team/VRCX/commit/cd2387aa3289f936ce60049121c24b0765bd4180" + } + ] + }, + "source": { + "advisory": "GHSA-j98g-mgjm-wqph", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/7xxx/CVE-2024-7394.json b/2024/7xxx/CVE-2024-7394.json index 9416d0c821f..377db3ea7c5 100644 --- a/2024/7xxx/CVE-2024-7394.json +++ b/2024/7xxx/CVE-2024-7394.json @@ -1,18 +1,98 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-7394", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@concretecms.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Concrete CMS versions 9 through 9.3.2 and below 8.5.18 are vulnerable to Stored XSS in getAttributeSetName(). \u00a0A rogue administrator could inject malicious code. The Concrete CMS team gave this a CVSS v3.1 rank of 2 with vector AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator \u00a0and a CVSS v4.0 rank of 1.8 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N . Thanks, m3dium for reporting." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Concrete CMS", + "product": { + "product_data": [ + { + "product_name": "Concrete CMS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9", + "version_value": "9.3.3" + }, + { + "version_affected": "<", + "version_name": "5", + "version_value": "8.5.18" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/concretecms/concretecms/pull/12166", + "refsource": "MISC", + "name": "https://github.com/concretecms/concretecms/pull/12166" + }, + { + "url": "https://github.com/concretecms/concretecms/commit/c08d9671cec4e7afdabb547339c4bc0bed8eab06", + "refsource": "MISC", + "name": "https://github.com/concretecms/concretecms/commit/c08d9671cec4e7afdabb547339c4bc0bed8eab06" + }, + { + "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/933-release-notes?pk_vid=e367a434ef4830491723055753d52041", + "refsource": "MISC", + "name": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/933-release-notes?pk_vid=e367a434ef4830491723055753d52041" + }, + { + "url": "https://documentation.concretecms.org/developers/introduction/version-history/8518-release-notes?pk_vid=e367a434ef4830491723055758d52041", + "refsource": "MISC", + "name": "https://documentation.concretecms.org/developers/introduction/version-history/8518-release-notes?pk_vid=e367a434ef4830491723055758d52041" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "advisory": "https://hackerone.com/reports/2463288", + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "m3dium" + } + ] } \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7477.json b/2024/7xxx/CVE-2024-7477.json index c76d8c54dd0..d2360caf1ce 100644 --- a/2024/7xxx/CVE-2024-7477.json +++ b/2024/7xxx/CVE-2024-7477.json @@ -1,17 +1,94 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-7477", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "securityalerts@avaya.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A SQL injection vulnerability was found which could allow a command line interface (CLI) user with administrative privileges to execute arbitrary queries against the\u00a0Avaya Aura System Manager\u00a0database.\u00a0\n\nAffected versions include 10.1.x.x and 10.2.x.x. Versions prior to 10.1 are end of manufacturer support." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Avaya", + "product": { + "product_data": [ + { + "product_name": "Aura System Manager", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "10.1.x.x" + }, + { + "version_affected": "=", + "version_value": "10.2.x.x" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://download.avaya.com/css/public/documents/101091159", + "refsource": "MISC", + "name": "https://download.avaya.com/css/public/documents/101091159" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "defect": [ + "ZEPHYR-70310" + ], + "discovery": "EXTERNAL" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/7xxx/CVE-2024-7480.json b/2024/7xxx/CVE-2024-7480.json index 00465bd9ef8..4f61374b4ee 100644 --- a/2024/7xxx/CVE-2024-7480.json +++ b/2024/7xxx/CVE-2024-7480.json @@ -1,17 +1,94 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-7480", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "securityalerts@avaya.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An\u00a0Improper access control vulnerability was found in Avaya Aura System Manager which could allow a command-line interface (CLI) user with administrative privileges to read arbitrary files on the system.\u00a0Affected versions include 10.1.x.x and 10.2.x.x. Versions prior to 10.1 are end of manufacturer support." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-269 Improper Privilege Management", + "cweId": "CWE-269" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Avaya", + "product": { + "product_data": [ + { + "product_name": "Aura System Manager", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "10.1.x.x" + }, + { + "version_affected": "=", + "version_value": "10.2.x.x" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://download.avaya.com/css/public/documents/101091159", + "refsource": "MISC", + "name": "https://download.avaya.com/css/public/documents/101091159" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "defect": [ + "ZEPHYR-70310" + ], + "discovery": "EXTERNAL" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 4.2, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/7xxx/CVE-2024-7619.json b/2024/7xxx/CVE-2024-7619.json new file mode 100644 index 00000000000..c8aa9ad2d01 --- /dev/null +++ b/2024/7xxx/CVE-2024-7619.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7619", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7620.json b/2024/7xxx/CVE-2024-7620.json new file mode 100644 index 00000000000..e4b9be60988 --- /dev/null +++ b/2024/7xxx/CVE-2024-7620.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7620", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file