"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-04-14 23:00:32 +00:00
parent f679c27dc5
commit 7cf7510ba4
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
3 changed files with 555 additions and 12 deletions

View File

@ -1,17 +1,109 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-3763",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in Emlog Pro 2.2.10. It has been rated as problematic. This issue affects some unknown processing of the file /admin/tag.php of the component Post Tag Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-260603. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "Eine Schwachstelle wurde in Emlog Pro 2.2.10 ausgemacht. Sie wurde als problematisch eingestuft. Betroffen davon ist ein unbekannter Prozess der Datei /admin/tag.php der Komponente Post Tag Handler. Mit der Manipulation mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross Site Scripting",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Emlog Pro",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "2.2.10"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.260603",
"refsource": "MISC",
"name": "https://vuldb.com/?id.260603"
},
{
"url": "https://vuldb.com/?ctiid.260603",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.260603"
},
{
"url": "https://vuldb.com/?submit.311808",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.311808"
},
{
"url": "https://github.com/fubxx/CVE/blob/main/Emlog-XSS2.md",
"refsource": "MISC",
"name": "https://github.com/fubxx/CVE/blob/main/Emlog-XSS2.md"
}
]
},
"credits": [
{
"lang": "en",
"value": "LIYU (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 2.4,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 2.4,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 3.3,
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N"
}
]
}

View File

@ -1,17 +1,109 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-3764",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability classified as problematic has been found in Tuya Camera 3.2.9. Affected is an unknown function of the component MQTT Packet Handler. The manipulation leads to denial of service. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-260604. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "Es wurde eine problematische Schwachstelle in Tuya Camera 3.2.9 entdeckt. Betroffen hiervon ist ein unbekannter Ablauf der Komponente MQTT Packet Handler. Durch die Manipulation mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-404 Denial of Service",
"cweId": "CWE-404"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Tuya",
"product": {
"product_data": [
{
"product_name": "Camera",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "3.2.9"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.260604",
"refsource": "MISC",
"name": "https://vuldb.com/?id.260604"
},
{
"url": "https://vuldb.com/?ctiid.260604",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.260604"
},
{
"url": "https://vuldb.com/?submit.311860",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.311860"
},
{
"url": "https://github.com/kzLiu2017/Tuya_Cam_CVE_Doc/blob/main/CVE%20Doc.pdf",
"refsource": "MISC",
"name": "https://github.com/kzLiu2017/Tuya_Cam_CVE_Doc/blob/main/CVE%20Doc.pdf"
}
]
},
"credits": [
{
"lang": "en",
"value": "kaizheng (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 5.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 5,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
}
]
}

View File

@ -1,17 +1,376 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-3765",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability classified as critical was found in Xiongmai AHB7804R-MH-V2, AHB8004T-GL, AHB8008T-GL, AHB7004T-GS-V3, AHB7004T-MHV2, AHB8032F-LME and XM530_R80X30-PQ_8M. Affected by this vulnerability is an unknown functionality of the component Sofia Service. The manipulation with the input ff00000000000000000000000000f103250000007b202252657422203a203130302c202253657373696f6e494422203a202230783022207d0a leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260605 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "In Xiongmai AHB7804R-MH-V2, AHB8004T-GL, AHB8008T-GL, AHB7004T-GS-V3, AHB7004T-MHV2, AHB8032F-LME and XM530_R80X30-PQ_8M wurde eine kritische Schwachstelle entdeckt. Es geht um eine nicht n\u00e4her bekannte Funktion der Komponente Sofia Service. Durch Manipulation mit der Eingabe ff00000000000000000000000000f103250000007b202252657422203a203130302c202253657373696f6e494422203a202230783022207d0a mit unbekannten Daten kann eine improper access controls-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284 Improper Access Controls",
"cweId": "CWE-284"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Xiongmai",
"product": {
"product_data": [
{
"product_name": "AHB7804R-MH-V2",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "4.02.R11.24340142.10001.131900.00000"
},
{
"version_affected": "=",
"version_value": "4.02.R11.A8531149.10001.131900.00000"
},
{
"version_affected": "=",
"version_value": "4.02.R11.C6380171.11201.141900.00000"
},
{
"version_affected": "=",
"version_value": "4.03.R11.0000020X.11201.042300.0000005"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4912720B.11201.142300.0000004"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4912720D.11201.142300.0000004"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4915714A.12201.142300.0000000"
},
{
"version_affected": "=",
"version_value": "5.00.R02.00030751.10010.348717.0000000"
}
]
}
},
{
"product_name": "AHB8004T-GL",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "4.02.R11.24340142.10001.131900.00000"
},
{
"version_affected": "=",
"version_value": "4.02.R11.A8531149.10001.131900.00000"
},
{
"version_affected": "=",
"version_value": "4.02.R11.C6380171.11201.141900.00000"
},
{
"version_affected": "=",
"version_value": "4.03.R11.0000020X.11201.042300.0000005"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4912720B.11201.142300.0000004"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4912720D.11201.142300.0000004"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4915714A.12201.142300.0000000"
},
{
"version_affected": "=",
"version_value": "5.00.R02.00030751.10010.348717.0000000"
}
]
}
},
{
"product_name": "AHB8008T-GL",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "4.02.R11.24340142.10001.131900.00000"
},
{
"version_affected": "=",
"version_value": "4.02.R11.A8531149.10001.131900.00000"
},
{
"version_affected": "=",
"version_value": "4.02.R11.C6380171.11201.141900.00000"
},
{
"version_affected": "=",
"version_value": "4.03.R11.0000020X.11201.042300.0000005"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4912720B.11201.142300.0000004"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4912720D.11201.142300.0000004"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4915714A.12201.142300.0000000"
},
{
"version_affected": "=",
"version_value": "5.00.R02.00030751.10010.348717.0000000"
}
]
}
},
{
"product_name": "AHB7004T-GS-V3",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "4.02.R11.24340142.10001.131900.00000"
},
{
"version_affected": "=",
"version_value": "4.02.R11.A8531149.10001.131900.00000"
},
{
"version_affected": "=",
"version_value": "4.02.R11.C6380171.11201.141900.00000"
},
{
"version_affected": "=",
"version_value": "4.03.R11.0000020X.11201.042300.0000005"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4912720B.11201.142300.0000004"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4912720D.11201.142300.0000004"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4915714A.12201.142300.0000000"
},
{
"version_affected": "=",
"version_value": "5.00.R02.00030751.10010.348717.0000000"
}
]
}
},
{
"product_name": "AHB7004T-MHV2",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "4.02.R11.24340142.10001.131900.00000"
},
{
"version_affected": "=",
"version_value": "4.02.R11.A8531149.10001.131900.00000"
},
{
"version_affected": "=",
"version_value": "4.02.R11.C6380171.11201.141900.00000"
},
{
"version_affected": "=",
"version_value": "4.03.R11.0000020X.11201.042300.0000005"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4912720B.11201.142300.0000004"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4912720D.11201.142300.0000004"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4915714A.12201.142300.0000000"
},
{
"version_affected": "=",
"version_value": "5.00.R02.00030751.10010.348717.0000000"
}
]
}
},
{
"product_name": "AHB8032F-LME",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "4.02.R11.24340142.10001.131900.00000"
},
{
"version_affected": "=",
"version_value": "4.02.R11.A8531149.10001.131900.00000"
},
{
"version_affected": "=",
"version_value": "4.02.R11.C6380171.11201.141900.00000"
},
{
"version_affected": "=",
"version_value": "4.03.R11.0000020X.11201.042300.0000005"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4912720B.11201.142300.0000004"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4912720D.11201.142300.0000004"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4915714A.12201.142300.0000000"
},
{
"version_affected": "=",
"version_value": "5.00.R02.00030751.10010.348717.0000000"
}
]
}
},
{
"product_name": "XM530_R80X30-PQ_8M",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "4.02.R11.24340142.10001.131900.00000"
},
{
"version_affected": "=",
"version_value": "4.02.R11.A8531149.10001.131900.00000"
},
{
"version_affected": "=",
"version_value": "4.02.R11.C6380171.11201.141900.00000"
},
{
"version_affected": "=",
"version_value": "4.03.R11.0000020X.11201.042300.0000005"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4912720B.11201.142300.0000004"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4912720D.11201.142300.0000004"
},
{
"version_affected": "=",
"version_value": "4.03.R11.4915714A.12201.142300.0000000"
},
{
"version_affected": "=",
"version_value": "5.00.R02.00030751.10010.348717.0000000"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.260605",
"refsource": "MISC",
"name": "https://vuldb.com/?id.260605"
},
{
"url": "https://vuldb.com/?ctiid.260605",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.260605"
},
{
"url": "https://vuldb.com/?submit.311903",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.311903"
},
{
"url": "https://github.com/netsecfish/xiongmai_incorrect_access_control",
"refsource": "MISC",
"name": "https://github.com/netsecfish/xiongmai_incorrect_access_control"
},
{
"url": "https://github.com/netsecfish/xiongmai_incorrect_access_control/blob/main/pocCheck3-en.py",
"refsource": "MISC",
"name": "https://github.com/netsecfish/xiongmai_incorrect_access_control/blob/main/pocCheck3-en.py"
}
]
},
"credits": [
{
"lang": "en",
"value": "netsecfish (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 9.8,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseSeverity": "CRITICAL"
},
{
"version": "3.0",
"baseScore": 9.8,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseSeverity": "CRITICAL"
},
{
"version": "2.0",
"baseScore": 10,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
}
]
}