From 9fcbe7106fb1c285ed8b41aba9986b7dd8d0b12d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 2 Oct 2024 13:00:37 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/47xxx/CVE-2024-47808.json | 18 ++++++ 2024/8xxx/CVE-2024-8885.json | 107 +++++++++++++++++++++++++++++++-- 2024/9xxx/CVE-2024-9429.json | 105 ++++++++++++++++++++++++++++++-- 3 files changed, 222 insertions(+), 8 deletions(-) create mode 100644 2024/47xxx/CVE-2024-47808.json diff --git a/2024/47xxx/CVE-2024-47808.json b/2024/47xxx/CVE-2024-47808.json new file mode 100644 index 00000000000..3a0fb04cee8 --- /dev/null +++ b/2024/47xxx/CVE-2024-47808.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-47808", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8885.json b/2024/8xxx/CVE-2024-8885.json index 39d6efe4514..51cf6e51232 100644 --- a/2024/8xxx/CVE-2024-8885.json +++ b/2024/8xxx/CVE-2024-8885.json @@ -1,17 +1,116 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-8885", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@sophos.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A local privilege escalation vulnerability in\u00a0\n\nSophos Intercept X for Windows with Central Device Encryption 2024.2.0 and older\n\n allows writing of arbitrary files." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1104 Use of Unmaintained Third Party Components", + "cweId": "CWE-1104" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-502 Deserialization of Untrusted Data", + "cweId": "CWE-502" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Sophos", + "product": { + "product_data": [ + { + "product_name": "Sophos Intercept X", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "2024.2.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20241002-cde-lpe", + "refsource": "MISC", + "name": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20241002-cde-lpe" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Device Encryption must be licensed and enabled for an endpoint to be affected." + } + ], + "value": "Device Encryption must be licensed and enabled for an endpoint to be affected." + } + ], + "credits": [ + { + "lang": "en", + "value": "Sina Kheirkhah (@SinSinology) of watchTowr (https://watchtowr.com)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/9xxx/CVE-2024-9429.json b/2024/9xxx/CVE-2024-9429.json index bcad910ddb5..a386d397320 100644 --- a/2024/9xxx/CVE-2024-9429.json +++ b/2024/9xxx/CVE-2024-9429.json @@ -1,17 +1,114 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-9429", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been found in code-projects Restaurant Reservation System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /filter2.php. The manipulation of the argument from/to leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter \"from\" to be affected. But it must be assumed that parameter \"to\" is affected as well." + }, + { + "lang": "deu", + "value": "In code-projects Restaurant Reservation System 1.0 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Hierbei betrifft es unbekannten Programmcode der Datei /filter2.php. Dank Manipulation des Arguments from/to mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "code-projects", + "product": { + "product_data": [ + { + "product_name": "Restaurant Reservation System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.279049", + "refsource": "MISC", + "name": "https://vuldb.com/?id.279049" + }, + { + "url": "https://vuldb.com/?ctiid.279049", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.279049" + }, + { + "url": "https://vuldb.com/?submit.416904", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.416904" + }, + { + "url": "https://github.com/ppp-src/a/issues/23", + "refsource": "MISC", + "name": "https://github.com/ppp-src/a/issues/23" + }, + { + "url": "https://code-projects.org/", + "refsource": "MISC", + "name": "https://code-projects.org/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "vuldbpass123 (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] }