From a0e4479d03f126b8314460f3eae19b76baeb839a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 13 Jan 2024 07:00:37 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/0xxx/CVE-2024-0478.json | 95 +++++++++++++++++++++++++++-- 2024/0xxx/CVE-2024-0479.json | 115 +++++++++++++++++++++++++++++++++-- 2 files changed, 202 insertions(+), 8 deletions(-) diff --git a/2024/0xxx/CVE-2024-0478.json b/2024/0xxx/CVE-2024-0478.json index 99b08bf7bb4..176fe279815 100644 --- a/2024/0xxx/CVE-2024-0478.json +++ b/2024/0xxx/CVE-2024-0478.json @@ -1,17 +1,104 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-0478", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in code-projects Fighting Cock Information System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/pages/edit_chicken.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250583." + }, + { + "lang": "deu", + "value": "Eine kritische Schwachstelle wurde in code-projects Fighting Cock Information System 1.0 gefunden. Betroffen davon ist ein unbekannter Prozess der Datei /admin/pages/edit_chicken.php. Durch die Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "code-projects", + "product": { + "product_data": [ + { + "product_name": "Fighting Cock Information System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.250583", + "refsource": "MISC", + "name": "https://vuldb.com/?id.250583" + }, + { + "url": "https://vuldb.com/?ctiid.250583", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.250583" + }, + { + "url": "https://github.com/yingqian1984/FirePunch/blob/main/Fighting%20Cock%20Information%20System/FIGHTING_COCK_INFORMATION_SYSTEM_SQL8.pdf", + "refsource": "MISC", + "name": "https://github.com/yingqian1984/FirePunch/blob/main/Fighting%20Cock%20Information%20System/FIGHTING_COCK_INFORMATION_SYSTEM_SQL8.pdf" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "FirePunch (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2024/0xxx/CVE-2024-0479.json b/2024/0xxx/CVE-2024-0479.json index 661795bad5c..17a4a544dbb 100644 --- a/2024/0xxx/CVE-2024-0479.json +++ b/2024/0xxx/CVE-2024-0479.json @@ -1,17 +1,124 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-0479", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Taokeyun up to 1.0.5. It has been classified as critical. Affected is the function login of the file application/index/controller/m/User.php of the component HTTP POST Request Handler. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250584." + }, + { + "lang": "deu", + "value": "Es wurde eine kritische Schwachstelle in Taokeyun bis 1.0.5 ausgemacht. Betroffen hiervon ist die Funktion login der Datei application/index/controller/m/User.php der Komponente HTTP POST Request Handler. Durch Manipulation des Arguments username mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Taokeyun", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0.0" + }, + { + "version_affected": "=", + "version_value": "1.0.1" + }, + { + "version_affected": "=", + "version_value": "1.0.2" + }, + { + "version_affected": "=", + "version_value": "1.0.3" + }, + { + "version_affected": "=", + "version_value": "1.0.4" + }, + { + "version_affected": "=", + "version_value": "1.0.5" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.250584", + "refsource": "MISC", + "name": "https://vuldb.com/?id.250584" + }, + { + "url": "https://vuldb.com/?ctiid.250584", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.250584" + }, + { + "url": "https://note.zhaoj.in/share/Np0ZdyKEnVOV", + "refsource": "MISC", + "name": "https://note.zhaoj.in/share/Np0ZdyKEnVOV" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "glzjin (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 7.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 7.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 7.5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ] }