diff --git a/2022/4xxx/CVE-2022-4259.json b/2022/4xxx/CVE-2022-4259.json index 0b3f93340dc..6099c6760a9 100644 --- a/2022/4xxx/CVE-2022-4259.json +++ b/2022/4xxx/CVE-2022-4259.json @@ -90,7 +90,7 @@ "value": "Use internal firewall features to limit access to the web management interface.
" } ], - "value": "Use internal firewall features to limit access to the web management interface.\n" + "value": "Use internal firewall features to limit access to the web management interface." } ], "solution": [ @@ -103,7 +103,7 @@ "value": "Upgrade to version >= 22.5.2
" } ], - "value": "Upgrade to version >= 22.5.2\n" + "value": "Upgrade to version >= 22.5.2" } ], "credits": [ diff --git a/2023/22xxx/CVE-2023-22378.json b/2023/22xxx/CVE-2023-22378.json index 68e64312e2d..8712e4daabc 100644 --- a/2023/22xxx/CVE-2023-22378.json +++ b/2023/22xxx/CVE-2023-22378.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A blind SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in the sorting parameter, allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application.\n\nAuthenticated users can extract arbitrary information from the DBMS in an uncontrolled way.\n\n" + "value": "A blind SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in the sorting parameter, allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application.\n\nAuthenticated users can extract arbitrary information from the DBMS in an uncontrolled way." } ] }, @@ -90,7 +90,7 @@ "value": "

Use internal firewall features to limit access to the web management interface.

" } ], - "value": "Use internal firewall features to limit access to the web management interface.\n\n" + "value": "Use internal firewall features to limit access to the web management interface." } ], "solution": [ @@ -103,7 +103,7 @@ "value": "

Upgrade to v22.6.2 or later.

" } ], - "value": "Upgrade to v22.6.2 or later.\n\n" + "value": "Upgrade to v22.6.2 or later." } ], "credits": [ diff --git a/2023/22xxx/CVE-2023-22843.json b/2023/22xxx/CVE-2023-22843.json index 4795a370aba..acba526293e 100644 --- a/2023/22xxx/CVE-2023-22843.json +++ b/2023/22xxx/CVE-2023-22843.json @@ -90,7 +90,7 @@ "value": "

Use internal firewall features to limit access to the web management interface.

" } ], - "value": "Use internal firewall features to limit access to the web management interface.\n\n" + "value": "Use internal firewall features to limit access to the web management interface." } ], "solution": [ @@ -103,7 +103,7 @@ "value": "

Upgrade to v22.6.2 or later.

" } ], - "value": "Upgrade to v22.6.2 or later.\n\n" + "value": "Upgrade to v22.6.2 or later." } ], "credits": [ diff --git a/2023/23xxx/CVE-2023-23574.json b/2023/23xxx/CVE-2023-23574.json index 3a11a021b70..ecc8de92b82 100644 --- a/2023/23xxx/CVE-2023-23574.json +++ b/2023/23xxx/CVE-2023-23574.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A blind SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in the alerts_count component, allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application.\n\nAuthenticated users can extract arbitrary information from the DBMS in an uncontrolled way.\n\n" + "value": "A blind SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in the alerts_count component, allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application.\n\nAuthenticated users can extract arbitrary information from the DBMS in an uncontrolled way." } ] }, @@ -90,7 +90,7 @@ "value": "

Use internal firewall features to limit access to the web management interface.

" } ], - "value": "Use internal firewall features to limit access to the web management interface.\n\n" + "value": "Use internal firewall features to limit access to the web management interface." } ], "solution": [ @@ -103,7 +103,7 @@ "value": "

Upgrade to v22.6.2 or later.

" } ], - "value": "Upgrade to v22.6.2 or later.\n\n" + "value": "Upgrade to v22.6.2 or later." } ], "credits": [ diff --git a/2023/23xxx/CVE-2023-23903.json b/2023/23xxx/CVE-2023-23903.json index a1448ac3909..06e23133433 100644 --- a/2023/23xxx/CVE-2023-23903.json +++ b/2023/23xxx/CVE-2023-23903.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "An authenticated administrator can upload a SAML configuration file with the wrong format, with the application not checking the correct file format. Every subsequent application request will return an error.\n\nThe whole application in rendered unusable until a console intervention.\n\n" + "value": "An authenticated administrator can upload a SAML configuration file with the wrong format, with the application not checking the correct file format. Every subsequent application request will return an error.\n\nThe whole application in rendered unusable until a console intervention." } ] }, @@ -90,7 +90,7 @@ "value": "

Use internal firewall features to limit access to the web management interface.

" } ], - "value": "Use internal firewall features to limit access to the web management interface.\n\n" + "value": "Use internal firewall features to limit access to the web management interface." } ], "solution": [ @@ -103,7 +103,7 @@ "value": "

Upgrade to v22.6.2 or later.

" } ], - "value": "Upgrade to v22.6.2 or later.\n\n" + "value": "Upgrade to v22.6.2 or later." } ], "credits": [ diff --git a/2023/24xxx/CVE-2023-24015.json b/2023/24xxx/CVE-2023-24015.json index 7e35f41a85a..92243244f73 100644 --- a/2023/24xxx/CVE-2023-24015.json +++ b/2023/24xxx/CVE-2023-24015.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A partial DoS vulnerability has been detected in the Reports section, exploitable by a malicious authenticated user forcing a report to be saved with its name set as null.\n\nThe reports section will be partially unavailable for all later attempts to use it, with the report list seemingly stuck on loading.\n\n" + "value": "A partial DoS vulnerability has been detected in the Reports section, exploitable by a malicious authenticated user forcing a report to be saved with its name set as null.\n\nThe reports section will be partially unavailable for all later attempts to use it, with the report list seemingly stuck on loading." } ] }, @@ -90,7 +90,7 @@ "value": "

Use internal firewall features to limit access to the web management interface.

" } ], - "value": "Use internal firewall features to limit access to the web management interface.\n\n" + "value": "Use internal firewall features to limit access to the web management interface." } ], "solution": [ @@ -103,7 +103,7 @@ "value": "

Upgrade to v22.6.2 or later.

" } ], - "value": "Upgrade to v22.6.2 or later.\n\n" + "value": "Upgrade to v22.6.2 or later." } ], "credits": [ diff --git a/2023/24xxx/CVE-2023-24471.json b/2023/24xxx/CVE-2023-24471.json index 2a68d6dbae9..1b46f024d38 100644 --- a/2023/24xxx/CVE-2023-24471.json +++ b/2023/24xxx/CVE-2023-24471.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "An access control vulnerability was found, due to the restrictions that are applied on actual assertions not being enforced in their debug functionality.\n\nAn authenticated user with reduced visibility can obtain unauthorized information via the debug functionality, obtaining data that would normally be not accessible in the Query and Assertions functions.\n\n" + "value": "An access control vulnerability was found, due to the restrictions that are applied on actual assertions not being enforced in their debug functionality.\n\nAn authenticated user with reduced visibility can obtain unauthorized information via the debug functionality, obtaining data that would normally be not accessible in the Query and Assertions functions." } ] }, @@ -90,7 +90,7 @@ "value": "

Use internal firewall features to limit access to the web management interface.

" } ], - "value": "Use internal firewall features to limit access to the web management interface.\n\n" + "value": "Use internal firewall features to limit access to the web management interface." } ], "solution": [ @@ -103,7 +103,7 @@ "value": "

Upgrade to v22.6.2 or later.

" } ], - "value": "Upgrade to v22.6.2 or later.\n\n" + "value": "Upgrade to v22.6.2 or later." } ], "credits": [ diff --git a/2023/24xxx/CVE-2023-24477.json b/2023/24xxx/CVE-2023-24477.json index 1536419ae6a..23bce621d6e 100644 --- a/2023/24xxx/CVE-2023-24477.json +++ b/2023/24xxx/CVE-2023-24477.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "In certain conditions, depending on timing and the usage of the Chrome web browser, Guardian/CMC versions before 22.6.2 do not always completely invalidate the user session upon logout. Thus an authenticated local attacker may gain acces to the original user's session.\n\n" + "value": "In certain conditions, depending on timing and the usage of the Chrome web browser, Guardian/CMC versions before 22.6.2 do not always completely invalidate the user session upon logout. Thus an authenticated local attacker may gain acces to the original user's session." } ] }, @@ -90,7 +90,7 @@ "value": "

Adopt best practices that include closing the browser after a logout.

" } ], - "value": "Adopt best practices that include closing the browser after a logout.\n\n" + "value": "Adopt best practices that include closing the browser after a logout." } ], "solution": [ @@ -103,7 +103,7 @@ "value": "

Upgrade to v22.6.2 or later.

" } ], - "value": "Upgrade to v22.6.2 or later.\n\n" + "value": "Upgrade to v22.6.2 or later." } ], "credits": [ diff --git a/2023/29xxx/CVE-2023-29245.json b/2023/29xxx/CVE-2023-29245.json index dc043eb52cd..76da8cb2418 100644 --- a/2023/29xxx/CVE-2023-29245.json +++ b/2023/29xxx/CVE-2023-29245.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, may allow an unauthenticated attacker to execute arbitrary SQL statements on the DBMS used by the web application by sending specially crafted malicious network packets.\n\nMalicious users with extensive knowledge on the underlying system may be able to extract arbitrary information from the DBMS in an uncontrolled way, or to alter its structure and data.\n\n\n\n" + "value": "A SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, may allow an unauthenticated attacker to execute arbitrary SQL statements on the DBMS used by the web application by sending specially crafted malicious network packets.\n\nMalicious users with extensive knowledge on the underlying system may be able to extract arbitrary information from the DBMS in an uncontrolled way, or to alter its structure and data." } ] }, @@ -100,7 +100,7 @@ "value": "
Upgrade to v22.6.3, v23.1.0 or later.
" } ], - "value": "Upgrade to v22.6.3, v23.1.0 or later.\n\n\n\n" + "value": "Upgrade to v22.6.3, v23.1.0 or later." } ], "credits": [ diff --git a/2023/2xxx/CVE-2023-2567.json b/2023/2xxx/CVE-2023-2567.json index 14ddb157796..10daa4fdecf 100644 --- a/2023/2xxx/CVE-2023-2567.json +++ b/2023/2xxx/CVE-2023-2567.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain parameters used in the Query functionality, allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application.\nAuthenticated users can extract arbitrary information from the DBMS in an uncontrolled way.\n\n\n\n" + "value": "A SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain parameters used in the Query functionality, allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application.\nAuthenticated users can extract arbitrary information from the DBMS in an uncontrolled way." } ] }, @@ -100,7 +100,7 @@ "value": "
Use internal firewall features to limit access to the web management interface.
" } ], - "value": "Use internal firewall features to limit access to the web management interface.\n\n\n\n" + "value": "Use internal firewall features to limit access to the web management interface." } ], "solution": [ @@ -113,7 +113,7 @@ "value": "
Upgrade to v22.6.3, v23.1.0 or later.
" } ], - "value": "Upgrade to v22.6.3, v23.1.0 or later.\n\n\n\n" + "value": "Upgrade to v22.6.3, v23.1.0 or later." } ], "credits": [ diff --git a/2023/32xxx/CVE-2023-32649.json b/2023/32xxx/CVE-2023-32649.json index b73019c3df7..a4732a938aa 100644 --- a/2023/32xxx/CVE-2023-32649.json +++ b/2023/32xxx/CVE-2023-32649.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to crash the IDS module by sending specially crafted malformed network packets.\n\nDuring the (limited) time window before the IDS module is automatically restarted, network traffic may not be analyzed.\n\n\n\n" + "value": "A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to crash the IDS module by sending specially crafted malformed network packets.\n\nDuring the (limited) time window before the IDS module is automatically restarted, network traffic may not be analyzed." } ] }, @@ -100,7 +100,7 @@ "value": "
N/A. It is recommended to monitor the IDS log to check for abnormal stops and restarts.
" } ], - "value": "N/A. It is recommended to monitor the IDS log to check for abnormal stops and restarts.\n\n\n\n" + "value": "N/A. It is recommended to monitor the IDS log to check for abnormal stops and restarts." } ], "solution": [ @@ -113,7 +113,7 @@ "value": "
Upgrade to v22.6.3, v23.1.0 or later.
" } ], - "value": "Upgrade to v22.6.3, v23.1.0 or later.\n\n\n\n" + "value": "Upgrade to v22.6.3, v23.1.0 or later." } ], "credits": [ diff --git a/2023/37xxx/CVE-2023-37411.json b/2023/37xxx/CVE-2023-37411.json index 49cab6d5552..ceeb97de282 100644 --- a/2023/37xxx/CVE-2023-37411.json +++ b/2023/37xxx/CVE-2023-37411.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-37411", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Aspera Faspex 5.0.0 through 5.0.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 260139." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Aspera Faspex", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "5.0.0", + "version_value": "5.0.6" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/7154977", + "refsource": "MISC", + "name": "https://www.ibm.com/support/pages/node/7154977" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260139", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260139" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2023/5xxx/CVE-2023-5253.json b/2023/5xxx/CVE-2023-5253.json index 0e70f0b9744..2aba0b0840c 100644 --- a/2023/5xxx/CVE-2023-5253.json +++ b/2023/5xxx/CVE-2023-5253.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A missing authentication check in the WebSocket channel used for the Check Point IoT integration in Nozomi Networks Guardian and CMC, may allow an unauthenticated attacker to obtain assets data without authentication.\n\n\n\nMalicious unauthenticated users with knowledge on the underlying system may be able to extract asset information.\n\n\n\n" + "value": "A missing authentication check in the WebSocket channel used for the Check Point IoT integration in Nozomi Networks Guardian and CMC, may allow an unauthenticated attacker to obtain assets data without authentication.\n\n\n\nMalicious unauthenticated users with knowledge on the underlying system may be able to extract asset information." } ] }, @@ -90,7 +90,7 @@ "value": "
Use internal firewall features to limit access to the web management interface.
" } ], - "value": "Use internal firewall features to limit access to the web management interface.\n\n\n\n" + "value": "Use internal firewall features to limit access to the web management interface." } ], "solution": [ @@ -103,7 +103,7 @@ "value": "
Upgrade to v23.3.0 or later.
" } ], - "value": "Upgrade to v23.3.0 or later.\n\n\n\n" + "value": "Upgrade to v23.3.0 or later." } ], "credits": [ diff --git a/2023/6xxx/CVE-2023-6916.json b/2023/6xxx/CVE-2023-6916.json index 332efe3302f..bb589debe45 100644 --- a/2023/6xxx/CVE-2023-6916.json +++ b/2023/6xxx/CVE-2023-6916.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Audit records for OpenAPI requests may include sensitive information.\n\nThis could lead to unauthorized accesses and privilege escalation." + "value": "Audit records for OpenAPI requests may include sensitive information.\n\n\n\nThis could lead to unauthorized accesses and privilege escalation." } ] }, @@ -90,7 +90,7 @@ "value": "
Nozomi Networks recommends creating specific users for OpenAPI usage, with only the necessary permissions to access the required data sources.
Additionally, it is advised to limit API keys to allowed IP addresses whenever possible.
Finally, it is also suggested to regenerate existing API keys periodically and to review sign-ins via API keys in the audit records.
" } ], - "value": "Nozomi Networks recommends creating specific users for OpenAPI usage, with only the necessary permissions to access the required data sources.\nAdditionally, it is advised to limit API keys to allowed IP addresses whenever possible.\nFinally, it is also suggested to regenerate existing API keys periodically and to review sign-ins via API keys in the audit records.\n\n" + "value": "Nozomi Networks recommends creating specific users for OpenAPI usage, with only the necessary permissions to access the required data sources.\nAdditionally, it is advised to limit API keys to allowed IP addresses whenever possible.\nFinally, it is also suggested to regenerate existing API keys periodically and to review sign-ins via API keys in the audit records." } ], "solution": [ @@ -103,7 +103,7 @@ "value": "
Upgrade to v23.4.1 or later.
" } ], - "value": "Upgrade to v23.4.1 or later.\n\n" + "value": "Upgrade to v23.4.1 or later." } ], "credits": [ diff --git a/2024/0xxx/CVE-2024-0218.json b/2024/0xxx/CVE-2024-0218.json index 3264b04627b..f0579ef2b63 100644 --- a/2024/0xxx/CVE-2024-0218.json +++ b/2024/0xxx/CVE-2024-0218.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian, caused by improper input validation in certain fields used in the Radius parsing functionality of our IDS, allows an unauthenticated attacker sending specially crafted malformed network packets to cause the IDS module to stop updating nodes, links, and assets.\n\nNetwork traffic may not be analyzed until the IDS module is restarted.\n\n" + "value": "A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian, caused by improper input validation in certain fields used in the Radius parsing functionality of our IDS, allows an unauthenticated attacker sending specially crafted malformed network packets to cause the IDS module to stop updating nodes, links, and assets.\n\n\n\nNetwork traffic may not be analyzed until the IDS module is restarted." } ] }, @@ -78,7 +78,7 @@ "value": "
Upgrade to v23.4.1 or later.
" } ], - "value": "Upgrade to v23.4.1 or later.\n\n" + "value": "Upgrade to v23.4.1 or later." } ], "credits": [ diff --git a/2024/28xxx/CVE-2024-28793.json b/2024/28xxx/CVE-2024-28793.json index c49a4d719b9..167466d1d34 100644 --- a/2024/28xxx/CVE-2024-28793.json +++ b/2024/28xxx/CVE-2024-28793.json @@ -1,17 +1,92 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-28793", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Engineering Workflow Management 7.0.2 and 7.0.3 is vulnerable to stored cross-site scripting. Under certain configurations, this vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 286830." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Engineering Workflow Management", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.0.2, 7.0.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/7154955", + "refsource": "MISC", + "name": "https://www.ibm.com/support/pages/node/7154955" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/286830", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/286830" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/2xxx/CVE-2024-2199.json b/2024/2xxx/CVE-2024-2199.json index a68d9980afe..747f1017555 100644 --- a/2024/2xxx/CVE-2024-2199.json +++ b/2024/2xxx/CVE-2024-2199.json @@ -1,17 +1,159 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-2199", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A denial of service vulnerability was found in 389-ds-base ldap server. This issue may allow an authenticated user to cause a server crash while modifying `userPassword` using malformed input." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Red Hat", + "product": { + "product_data": [ + { + "product_name": "Red Hat Directory Server 11", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "Red Hat Directory Server 12", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "Red Hat Enterprise Linux 6", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "Red Hat Enterprise Linux 7", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "Red Hat Enterprise Linux 8", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "Red Hat Enterprise Linux 9", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-2199", + "refsource": "MISC", + "name": "https://access.redhat.com/security/cve/CVE-2024-2199" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267976", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2267976" + } + ] + }, + "work_around": [ + { + "lang": "en", + "value": "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/36xxx/CVE-2024-36470.json b/2024/36xxx/CVE-2024-36470.json new file mode 100644 index 00000000000..9e59729f556 --- /dev/null +++ b/2024/36xxx/CVE-2024-36470.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-36470", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3657.json b/2024/3xxx/CVE-2024-3657.json index e27d36f0b6f..fbe9e94c0e0 100644 --- a/2024/3xxx/CVE-2024-3657.json +++ b/2024/3xxx/CVE-2024-3657.json @@ -1,17 +1,159 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-3657", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in 389-ds-base. A specially-crafted LDAP query can potentially cause a failure on the directory server, leading to a denial of service" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Red Hat", + "product": { + "product_data": [ + { + "product_name": "Red Hat Directory Server 11", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "Red Hat Directory Server 12", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "Red Hat Enterprise Linux 6", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "Red Hat Enterprise Linux 7", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "Red Hat Enterprise Linux 8", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "Red Hat Enterprise Linux 9", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-3657", + "refsource": "MISC", + "name": "https://access.redhat.com/security/cve/CVE-2024-3657" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274401", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2274401" + } + ] + }, + "work_around": [ + { + "lang": "en", + "value": "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/5xxx/CVE-2024-5413.json b/2024/5xxx/CVE-2024-5413.json index 9b01980c91a..745fda58a4d 100644 --- a/2024/5xxx/CVE-2024-5413.json +++ b/2024/5xxx/CVE-2024-5413.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-5413", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-coordination@incibe.es", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability have been discovered in PhpMyBackupPro affecting version 2.3 that could allow an attacker to execute XSS through /phpmybackuppro/scheduled.php, all parameters. This vulnerabilities could allow an attacker to create a specially crafted URL and send it to a victim to retrieve their session details." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "PhpMyBackupPro", + "product": { + "product_data": [ + { + "product_name": "PhpMyBackupPro", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-vulnerability-phpmybackuppro", + "refsource": "MISC", + "name": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-vulnerability-phpmybackuppro" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Rafael Pedrero" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/5xxx/CVE-2024-5414.json b/2024/5xxx/CVE-2024-5414.json index 77f6dfc0afa..4206f66d331 100644 --- a/2024/5xxx/CVE-2024-5414.json +++ b/2024/5xxx/CVE-2024-5414.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-5414", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-coordination@incibe.es", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability have been discovered in PhpMyBackupPro affecting version 2.3 that could allow an attacker to execute XSS through /phpmybackuppro/get_file.php, 'view' parameter. This vulnerabilities could allow an attacker to create a specially crafted URL and send it to a victim to retrieve their session details." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "PhpMyBackupPro", + "product": { + "product_data": [ + { + "product_name": "PhpMyBackupPro", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-vulnerability-phpmybackuppro", + "refsource": "MISC", + "name": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-vulnerability-phpmybackuppro" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Rafael Pedrero" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/5xxx/CVE-2024-5415.json b/2024/5xxx/CVE-2024-5415.json index 31b88b9997e..77459ccf32d 100644 --- a/2024/5xxx/CVE-2024-5415.json +++ b/2024/5xxx/CVE-2024-5415.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-5415", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-coordination@incibe.es", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability have been discovered in PhpMyBackupPro affecting version 2.3 that could allow an attacker to execute XSS through /phpmybackuppro/backup.php, 'comments' and 'db' parameters. This vulnerabilities could allow an attacker to create a specially crafted URL and send it to a victim to retrieve their session details." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "PhpMyBackupPro", + "product": { + "product_data": [ + { + "product_name": "PhpMyBackupPro", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-vulnerability-phpmybackuppro", + "refsource": "MISC", + "name": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-vulnerability-phpmybackuppro" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Rafael Pedrero" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/5xxx/CVE-2024-5430.json b/2024/5xxx/CVE-2024-5430.json new file mode 100644 index 00000000000..2f780ce36f5 --- /dev/null +++ b/2024/5xxx/CVE-2024-5430.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-5430", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file