diff --git a/2023/37xxx/CVE-2023-37057.json b/2023/37xxx/CVE-2023-37057.json index 6c5ce81f8f8..3effcd0d5f0 100644 --- a/2023/37xxx/CVE-2023-37057.json +++ b/2023/37xxx/CVE-2023-37057.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-37057", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-37057", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in JLINK Unionman Technology Co. Ltd Jlink AX1800 v.1.0 allows a remote attacker to execute arbitrary code via the router's authentication mechanism." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://jlink.com", + "refsource": "MISC", + "name": "http://jlink.com" + }, + { + "url": "http://www.unionman.com.cn/en/contact.html", + "refsource": "MISC", + "name": "http://www.unionman.com.cn/en/contact.html" + }, + { + "url": "https://jlink-global.com/", + "refsource": "MISC", + "name": "https://jlink-global.com/" + }, + { + "refsource": "MISC", + "name": "https://github.com/ri5c/Jlink-Router-RCE", + "url": "https://github.com/ri5c/Jlink-Router-RCE" } ] } diff --git a/2023/37xxx/CVE-2023-37058.json b/2023/37xxx/CVE-2023-37058.json index e4e42091230..5755414f363 100644 --- a/2023/37xxx/CVE-2023-37058.json +++ b/2023/37xxx/CVE-2023-37058.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-37058", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-37058", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insecure Permissions vulnerability in JLINK Unionman Technology Co. Ltd Jlink AX1800 v.1.0 allows a remote attacker to escalate privileges via a crafted command." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://jlink.com", + "refsource": "MISC", + "name": "http://jlink.com" + }, + { + "refsource": "MISC", + "name": "https://github.com/ri5c/Jlink-Router-RCE", + "url": "https://github.com/ri5c/Jlink-Router-RCE" } ] } diff --git a/2024/25xxx/CVE-2024-25400.json b/2024/25xxx/CVE-2024-25400.json index d13f277e698..18f77a8e618 100644 --- a/2024/25xxx/CVE-2024-25400.json +++ b/2024/25xxx/CVE-2024-25400.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Subrion CMS 4.2.1 is vulnerable to SQL Injection via ia.core.mysqli.php." + "value": "** DISPUTED ** Subrion CMS 4.2.1 is vulnerable to SQL Injection via ia.core.mysqli.php. NOTE: this is disputed by multiple third parties because it refers to an HTTP request to a PHP file that only contains a class, without any mechanism for accepting external input, and the reportedly vulnerable method is not present in the file." } ] }, @@ -52,16 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://subrion.org/", - "refsource": "MISC", - "name": "https://subrion.org/" - }, - { - "url": "https://cwe.mitre.org/data/definitions/89.html", - "refsource": "MISC", - "name": "https://cwe.mitre.org/data/definitions/89.html" - }, { "refsource": "MISC", "name": "https://github.com/intelliants/subrion/issues/910", diff --git a/2024/34xxx/CVE-2024-34833.json b/2024/34xxx/CVE-2024-34833.json index b1c1e699562..6ac4c500043 100644 --- a/2024/34xxx/CVE-2024-34833.json +++ b/2024/34xxx/CVE-2024-34833.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-34833", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-34833", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sourcecodester Payroll Management System v1.0 is vulnerable to File Upload. Users can upload images via the \"save_settings\" page. An unauthenticated attacker can leverage this functionality to upload a malicious PHP file instead. Successful exploitation of this vulnerability results in the ability to execute arbitrary code as the user running the web server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ShellUnease/payroll-management-system-rce", + "refsource": "MISC", + "name": "https://github.com/ShellUnease/payroll-management-system-rce" + }, + { + "refsource": "MISC", + "name": "https://packetstormsecurity.com/files/179106/Payroll-Management-System-1.0-Remote-Code-Execution.html", + "url": "https://packetstormsecurity.com/files/179106/Payroll-Management-System-1.0-Remote-Code-Execution.html" } ] } diff --git a/2024/36xxx/CVE-2024-36821.json b/2024/36xxx/CVE-2024-36821.json index 7febd131428..5a1de531d0e 100644 --- a/2024/36xxx/CVE-2024-36821.json +++ b/2024/36xxx/CVE-2024-36821.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Insecure permissions in Linksys Velop WiFi 5 (WHW01v1) 1.1.13.202617 allows attackers to escalate privileges from Guest to root via a directory traversal." + "value": "Insecure permissions in Linksys Velop WiFi 5 (WHW01v1) 1.1.13.202617 allows attackers to escalate privileges from Guest to root." } ] }, diff --git a/2024/36xxx/CVE-2024-36837.json b/2024/36xxx/CVE-2024-36837.json index 778ff4868aa..487965bcd0a 100644 --- a/2024/36xxx/CVE-2024-36837.json +++ b/2024/36xxx/CVE-2024-36837.json @@ -53,9 +53,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "name": "https://7nkdkj-my.sharepoint.com/:w:/g/personal/krypt0n_7nkdkj_onmicrosoft_com/Ea8dW8YuldRMqgCy7KHjnxABTJCVPLShHIJfqQk684mD3A?e=0qmN7t", - "url": "https://7nkdkj-my.sharepoint.com/:w:/g/personal/krypt0n_7nkdkj_onmicrosoft_com/Ea8dW8YuldRMqgCy7KHjnxABTJCVPLShHIJfqQk684mD3A?e=0qmN7t" + "refsource": "MISC", + "name": "https://github.com/phtcloud-dev/CVE-2024-36837", + "url": "https://github.com/phtcloud-dev/CVE-2024-36837" } ] } diff --git a/2024/37xxx/CVE-2024-37798.json b/2024/37xxx/CVE-2024-37798.json index b0186852d34..9189530d81e 100644 --- a/2024/37xxx/CVE-2024-37798.json +++ b/2024/37xxx/CVE-2024-37798.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-37798", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-37798", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in search-appointment.php in the Admin Panel in Phpgurukul Beauty Parlour Management System 1.0 allows remote attackers to inject arbitrary web script or HTML via the search input field." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://owasp.org/www-community/attacks/xss/", + "refsource": "MISC", + "name": "https://owasp.org/www-community/attacks/xss/" + }, + { + "refsource": "MISC", + "name": "https://cyberxtron.com/blog/cve-2024-37798---cross-site-scripting-xss-in-beauty-parlour-management-system--5187", + "url": "https://cyberxtron.com/blog/cve-2024-37798---cross-site-scripting-xss-in-beauty-parlour-management-system--5187" } ] } diff --git a/2024/37xxx/CVE-2024-37828.json b/2024/37xxx/CVE-2024-37828.json index 2b1a6e6b6bc..0510377b504 100644 --- a/2024/37xxx/CVE-2024-37828.json +++ b/2024/37xxx/CVE-2024-37828.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-37828", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-37828", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A stored cross-site scripting (XSS) in Vermeg Agile Reporter v23.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Message field under the Set Broadcast Message module." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.vermeg.com/agile-reporter/", + "refsource": "MISC", + "name": "https://www.vermeg.com/agile-reporter/" + }, + { + "url": "https://crashpark.weebly.com/blog/2-stored-xss-in-agilereporter-213-by-vermeg", + "refsource": "MISC", + "name": "https://crashpark.weebly.com/blog/2-stored-xss-in-agilereporter-213-by-vermeg" } ] } diff --git a/2024/6xxx/CVE-2024-6063.json b/2024/6xxx/CVE-2024-6063.json index 56dfb3573f4..edf066d08a0 100644 --- a/2024/6xxx/CVE-2024-6063.json +++ b/2024/6xxx/CVE-2024-6063.json @@ -1,17 +1,119 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-6063", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been classified as problematic. This affects the function m2tsdmx_on_event of the file src/filters/dmx_m2ts.c of the component MP4Box. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named 8767ed0a77c4b02287db3723e92c2169f67c85d5. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-268791." + }, + { + "lang": "deu", + "value": "Es wurde eine Schwachstelle in GPAC 2.5-DEV-rev228-g11067ea92-master ausgemacht. Sie wurde als problematisch eingestuft. Hiervon betroffen ist die Funktion m2tsdmx_on_event der Datei src/filters/dmx_m2ts.c der Komponente MP4Box. Mittels Manipulieren mit unbekannten Daten kann eine null pointer dereference-Schwachstelle ausgenutzt werden. Der Angriff muss lokal erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Der Patch wird als 8767ed0a77c4b02287db3723e92c2169f67c85d5 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-476 NULL Pointer Dereference", + "cweId": "CWE-476" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "GPAC", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.5-DEV-rev228-g11067ea92-master" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.268791", + "refsource": "MISC", + "name": "https://vuldb.com/?id.268791" + }, + { + "url": "https://vuldb.com/?ctiid.268791", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.268791" + }, + { + "url": "https://vuldb.com/?submit.356315", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.356315" + }, + { + "url": "https://github.com/gpac/gpac/issues/2873", + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/issues/2873" + }, + { + "url": "https://github.com/user-attachments/files/15801157/poc.zip", + "refsource": "MISC", + "name": "https://github.com/user-attachments/files/15801157/poc.zip" + }, + { + "url": "https://github.com/gpac/gpac/commit/8767ed0a77c4b02287db3723e92c2169f67c85d5", + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/commit/8767ed0a77c4b02287db3723e92c2169f67c85d5" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Fantasy (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 3.3, + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 3.3, + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 1.7, + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P" } ] } diff --git a/2024/6xxx/CVE-2024-6064.json b/2024/6xxx/CVE-2024-6064.json index 8f0b968bf96..bb6a3519ed2 100644 --- a/2024/6xxx/CVE-2024-6064.json +++ b/2024/6xxx/CVE-2024-6064.json @@ -1,17 +1,119 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-6064", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been declared as problematic. This vulnerability affects the function xmt_node_end of the file src/scene_manager/loader_xmt.c of the component MP4Box. The manipulation leads to use after free. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The name of the patch is f4b3e4d2f91bc1749e7a924a8ab171af03a355a8/c1b9c794bad8f262c56f3cf690567980d96662f5. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-268792." + }, + { + "lang": "deu", + "value": "In GPAC 2.5-DEV-rev228-g11067ea92-master wurde eine Schwachstelle ausgemacht. Sie wurde als problematisch eingestuft. Betroffen ist die Funktion xmt_node_end der Datei src/scene_manager/loader_xmt.c der Komponente MP4Box. Durch das Manipulieren mit unbekannten Daten kann eine use after free-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs hat dabei lokal zu erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Der Patch wird als f4b3e4d2f91bc1749e7a924a8ab171af03a355a8/c1b9c794bad8f262c56f3cf690567980d96662f5 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-416 Use After Free", + "cweId": "CWE-416" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "GPAC", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.5-DEV-rev228-g11067ea92-master" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.268792", + "refsource": "MISC", + "name": "https://vuldb.com/?id.268792" + }, + { + "url": "https://vuldb.com/?ctiid.268792", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.268792" + }, + { + "url": "https://vuldb.com/?submit.356316", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.356316" + }, + { + "url": "https://github.com/gpac/gpac/issues/2874", + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/issues/2874" + }, + { + "url": "https://github.com/user-attachments/files/15801189/poc.zip", + "refsource": "MISC", + "name": "https://github.com/user-attachments/files/15801189/poc.zip" + }, + { + "url": "https://github.com/gpac/gpac/commit/c1b9c794bad8f262c56f3cf690567980d96662f5", + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/commit/c1b9c794bad8f262c56f3cf690567980d96662f5" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Fantasy (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 5.3, + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 5.3, + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 4.3, + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P" } ] }