"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-02-06 01:00:33 +00:00
parent 63473e31ed
commit 66ed533157
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
22 changed files with 1837 additions and 78 deletions

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-46359",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-46359",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An OS command injection vulnerability in Hardy Barth cPH2 eCharge Ladestation v1.87.0 and earlier, may allow an unauthenticated remote attacker to execute arbitrary commands on the system via a specifically crafted arguments passed to the connectivity check feature."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://hardy.com",
"refsource": "MISC",
"name": "http://hardy.com"
},
{
"refsource": "MISC",
"name": "https://www.offensity.com/en/blog/os-command-injection-in-cph2-charging-station-200-cve-2023-46359-and-cve-2023-46360/",
"url": "https://www.offensity.com/en/blog/os-command-injection-in-cph2-charging-station-200-cve-2023-46359-and-cve-2023-46360/"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-46360",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-46360",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Hardy Barth cPH2 eCharge Ladestation v1.87.0 and earlier is vulnerable to Execution with Unnecessary Privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://hardy.com",
"refsource": "MISC",
"name": "http://hardy.com"
},
{
"refsource": "MISC",
"name": "https://www.offensity.com/en/blog/os-command-injection-in-cph2-charging-station-200-cve-2023-46359-and-cve-2023-46360/",
"url": "https://www.offensity.com/en/blog/os-command-injection-in-cph2-charging-station-200-cve-2023-46359-and-cve-2023-46360/"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-47022",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-47022",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue in NCR Terminal Handler v.1.5.1 allows a remote attacker to execute arbitrary code via a crafted script to the payload parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://docs.google.com/document/d/15s7NftTX2dxfcFnMqkFIyeN48xq3LceesWOhP-9xL4Y/edit?usp=sharing",
"refsource": "MISC",
"name": "https://docs.google.com/document/d/15s7NftTX2dxfcFnMqkFIyeN48xq3LceesWOhP-9xL4Y/edit?usp=sharing"
},
{
"refsource": "MISC",
"name": "https://github.com/Patrick0x41/Security-Advisories/tree/main/CVE-2023-47022",
"url": "https://github.com/Patrick0x41/Security-Advisories/tree/main/CVE-2023-47022"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-47353",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-47353",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue in the com.oneed.dvr.service.DownloadFirmwareService component of IMOU GO v1.0.11 allows attackers to force the download of arbitrary files."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/actuator/imou/blob/main/com.dahua.imou.go-V1.0.11.md",
"refsource": "MISC",
"name": "https://github.com/actuator/imou/blob/main/com.dahua.imou.go-V1.0.11.md"
},
{
"url": "https://play.google.com/store/apps/details?id=com.dahua.imou.go",
"refsource": "MISC",
"name": "https://play.google.com/store/apps/details?id=com.dahua.imou.go"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-47354",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-47354",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue in the PowerOffWidgetReceiver function of Super Reboot (Root) Recovery v1.0.3 allows attackers to arbitrarily reset or power off the device via a crafted intent"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/actuator/com.bdrm.superreboot/blob/main/CWE-925.md",
"refsource": "MISC",
"name": "https://github.com/actuator/com.bdrm.superreboot/blob/main/CWE-925.md"
},
{
"url": "https://play.google.com/store/apps/details?id=com.bdrm.superreboot",
"refsource": "MISC",
"name": "https://play.google.com/store/apps/details?id=com.bdrm.superreboot"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-47889",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-47889",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The Android application BINHDRM26 com.bdrm.superreboot 1.0.3, exposes several critical actions through its exported broadcast receivers. These exposed actions can allow any app on the device to send unauthorized broadcasts, leading to unintended consequences. The vulnerability is particularly concerning because these actions include powering off, system reboot & entering recovery mode."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/actuator/com.bdrm.superreboot/blob/main/CWE-925.md",
"refsource": "MISC",
"name": "https://github.com/actuator/com.bdrm.superreboot/blob/main/CWE-925.md"
}
]
}

View File

@ -1,17 +1,201 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-6229",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Buffer overflow in CPCA PDL Resource Download process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-787: Out-of-bounds Write",
"cweId": "CWE-787"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Canon Inc.",
"product": {
"product_data": [
{
"product_name": "Satera LBP670C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Satera MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS LBP674C",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS X LBP1333C",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS X MF1333C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "i-SENSYS LBP673Cdw",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "C1333P",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "i-SENSYS MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "C1333i Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://psirt.canon/advisory-information/cp2024-001/",
"refsource": "MISC",
"name": "https://psirt.canon/advisory-information/cp2024-001/"
},
{
"url": "https://canon.jp/support/support-info/240205vulnerability-response",
"refsource": "MISC",
"name": "https://canon.jp/support/support-info/240205vulnerability-response"
},
{
"url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers",
"refsource": "MISC",
"name": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers"
},
{
"url": "https://www.canon-europe.com/support/product-security-latest-news/",
"refsource": "MISC",
"name": "https://www.canon-europe.com/support/product-security-latest-news/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,201 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-6230",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Buffer overflow in the Address Book password process in authentication of Mobile Device Function of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-787: Out-of-bounds Write",
"cweId": "CWE-787"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Canon Inc.",
"product": {
"product_data": [
{
"product_name": "Satera LBP670C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Satera MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS LBP674C",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS X LBP1333C",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS X MF1333C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "i-SENSYS LBP673Cdw",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "C1333P",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "i-SENSYS MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "C1333i Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://psirt.canon/advisory-information/cp2024-001/",
"refsource": "MISC",
"name": "https://psirt.canon/advisory-information/cp2024-001/"
},
{
"url": "https://canon.jp/support/support-info/240205vulnerability-response",
"refsource": "MISC",
"name": "https://canon.jp/support/support-info/240205vulnerability-response"
},
{
"url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers",
"refsource": "MISC",
"name": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers"
},
{
"url": "https://www.canon-europe.com/support/product-security-latest-news/",
"refsource": "MISC",
"name": "https://www.canon-europe.com/support/product-security-latest-news/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,201 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-6231",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Buffer overflow in WSD probe request process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-787: Out-of-bounds Write",
"cweId": "CWE-787"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Canon Inc.",
"product": {
"product_data": [
{
"product_name": "Satera LBP670C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Satera MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS LBP674C",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS X LBP1333C",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS X MF1333C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "i-SENSYS LBP673Cdw",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "C1333P",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "i-SENSYS MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "C1333i Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://psirt.canon/advisory-information/cp2024-001/",
"refsource": "MISC",
"name": "https://psirt.canon/advisory-information/cp2024-001/"
},
{
"url": "https://canon.jp/support/support-info/240205vulnerability-response",
"refsource": "MISC",
"name": "https://canon.jp/support/support-info/240205vulnerability-response"
},
{
"url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers",
"refsource": "MISC",
"name": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers"
},
{
"url": "https://www.canon-europe.com/support/product-security-latest-news/",
"refsource": "MISC",
"name": "https://www.canon-europe.com/support/product-security-latest-news/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,201 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-6232",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Buffer overflow in the Address Book username process in authentication of Mobile Device Function of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-787: Out-of-bounds Write",
"cweId": "CWE-787"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Canon Inc.",
"product": {
"product_data": [
{
"product_name": "Satera LBP670C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Satera MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS LBP674C",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS X LBP1333C",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS X MF1333C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "i-SENSYS LBP673Cdw",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "C1333P",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "i-SENSYS MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "C1333i Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://psirt.canon/advisory-information/cp2024-001/",
"refsource": "MISC",
"name": "https://psirt.canon/advisory-information/cp2024-001/"
},
{
"url": "https://canon.jp/support/support-info/240205vulnerability-response",
"refsource": "MISC",
"name": "https://canon.jp/support/support-info/240205vulnerability-response"
},
{
"url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers",
"refsource": "MISC",
"name": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers"
},
{
"url": "https://www.canon-europe.com/support/product-security-latest-news/",
"refsource": "MISC",
"name": "https://www.canon-europe.com/support/product-security-latest-news/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,201 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-6233",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Buffer overflow in SLP attribute request process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-787: Out-of-bounds Write",
"cweId": "CWE-787"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Canon Inc.",
"product": {
"product_data": [
{
"product_name": "Satera LBP670C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Satera MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS LBP674C",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS X LBP1333C",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS X MF1333C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "i-SENSYS LBP673Cdw",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "C1333P",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "i-SENSYS MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "C1333i Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://psirt.canon/advisory-information/cp2024-001/",
"refsource": "MISC",
"name": "https://psirt.canon/advisory-information/cp2024-001/"
},
{
"url": "https://canon.jp/support/support-info/240205vulnerability-response",
"refsource": "MISC",
"name": "https://canon.jp/support/support-info/240205vulnerability-response"
},
{
"url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers",
"refsource": "MISC",
"name": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers"
},
{
"url": "https://www.canon-europe.com/support/product-security-latest-news/",
"refsource": "MISC",
"name": "https://www.canon-europe.com/support/product-security-latest-news/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,201 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-6234",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Buffer overflow in CPCA Color LUT Resource Download process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-787: Out-of-bounds Write",
"cweId": "CWE-787"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Canon Inc.",
"product": {
"product_data": [
{
"product_name": "Satera LBP670C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Satera MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS LBP674C",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS X LBP1333C",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS X MF1333C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "i-SENSYS LBP673Cdw",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "C1333P",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "i-SENSYS MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "C1333i Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://psirt.canon/advisory-information/cp2024-001/",
"refsource": "MISC",
"name": "https://psirt.canon/advisory-information/cp2024-001/"
},
{
"url": "https://canon.jp/support/support-info/240205vulnerability-response",
"refsource": "MISC",
"name": "https://canon.jp/support/support-info/240205vulnerability-response"
},
{
"url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers",
"refsource": "MISC",
"name": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers"
},
{
"url": "https://www.canon-europe.com/support/product-security-latest-news/",
"refsource": "MISC",
"name": "https://www.canon-europe.com/support/product-security-latest-news/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,146 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-0244",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Buffer overflow in CPCA PCFAX number process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*:Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS MF750C Series/Color imageCLASS X MF1333C firmware v03.07 and earlier sold in US. i-SENSYS MF754Cdw/C1333iF firmware v03.07 and earlier sold in Europe.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-787: Out-of-bounds Write",
"cweId": "CWE-787"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Canon Inc.",
"product": {
"product_data": [
{
"product_name": "Satera MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS MF750C Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "Color imageCLASS X MF1333C",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "i-SENSYS MF754Cdw",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
},
{
"product_name": "C1333iF",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "03.07 and earlier"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://psirt.canon/advisory-information/cp2024-001/",
"refsource": "MISC",
"name": "https://psirt.canon/advisory-information/cp2024-001/"
},
{
"url": "https://canon.jp/support/support-info/240205vulnerability-response",
"refsource": "MISC",
"name": "https://canon.jp/support/support-info/240205vulnerability-response"
},
{
"url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers",
"refsource": "MISC",
"name": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers"
},
{
"url": "https://www.canon-europe.com/support/product-security-latest-news/",
"refsource": "MISC",
"name": "https://www.canon-europe.com/support/product-security-latest-news/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-1243",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-1244",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-1245",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-1246",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-1247",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 could allow a remote attacker to conduct an LDAP injection. By sending a request with a specially crafted request, an attacker could exploit this vulnerability to inject unsanitized content into the LDAP filter. IBM X-Force ID: 279145."
"value": "\nIBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 is susceptible to remote code execution attack via JNDI injection when passing an unchecked argument to a certain API. IBM X-Force ID: 279145.\n\n"
}
]
},
@ -21,8 +21,8 @@
"description": [
{
"lang": "eng",
"value": "CWE-90 Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')",
"cweId": "CWE-90"
"value": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')",
"cweId": "CWE-74"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-22773",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2024-22773",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Intelbras Roteador ACtion RF 1200 1.2.2 esposes the Password in Cookie resulting in Login Bypass."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://medium.com/@wagneralves_87750/poc-cve-2024-22773-febf0d3a5433",
"url": "https://medium.com/@wagneralves_87750/poc-cve-2024-22773-febf0d3a5433"
},
{
"refsource": "MISC",
"name": "https://www.youtube.com/watch?v=-r0TWJq55DU&t=7s",
"url": "https://www.youtube.com/watch?v=-r0TWJq55DU&t=7s"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-24112",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2024-24112",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "xmall v1.1 was discovered to contain a SQL injection vulnerability via the orderDir parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://github.com/Exrick/xmall/issues/78",
"url": "https://github.com/Exrick/xmall/issues/78"
}
]
}

View File

@ -1,17 +1,71 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-24398",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2024-24398",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Directory Traversal vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the fileName parameter of the Save function."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://stimulsoft.com",
"refsource": "MISC",
"name": "http://stimulsoft.com"
},
{
"url": "https://cloud-trustit.spp.at/s/Pi78FFazHamJQ5R",
"refsource": "MISC",
"name": "https://cloud-trustit.spp.at/s/Pi78FFazHamJQ5R"
},
{
"refsource": "MISC",
"name": "https://cves.at/posts/cve-2024-24398/writeup/",
"url": "https://cves.at/posts/cve-2024-24398/writeup/"
}
]
}