"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-07-31 09:00:36 +00:00
parent 003c81bf30
commit af7ebdc96c
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
8 changed files with 1117 additions and 33 deletions

View File

@ -1,17 +1,85 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-2508",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@wordfence.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The WP Mobile Menu plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_menu_item_icon function in all versions up to, and including, 2.8.4.4. This makes it possible for unauthenticated attackers to add the '_mobmenu_icon' post meta to arbitrary posts with an arbitrary (but sanitized) value. NOTE: Version 2.8.4.4 contains a partial fix for this vulnerability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862 Missing Authorization",
"cweId": "CWE-862"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "takanakui",
"product": {
"product_data": [
{
"product_name": "WP Mobile Menu \u2013 The Mobile-Friendly Responsive Menu",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "*",
"version_value": "2.8.4.4"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3cd9569f-3cda-4482-8ccd-c3f362b4e651?source=cve",
"refsource": "MISC",
"name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3cd9569f-3cda-4482-8ccd-c3f362b4e651?source=cve"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?old_path=%2Fmobile-menu%2Ftrunk%2Fincludes%2Fclass-wp-mobile-menu-core.php&old=3125561&new_path=%2Fmobile-menu%2Ftrunk%2Fincludes%2Fclass-wp-mobile-menu-core.php&new=3125561&sfp_email=&sfph_mail=",
"refsource": "MISC",
"name": "https://plugins.trac.wordpress.org/changeset?old_path=%2Fmobile-menu%2Ftrunk%2Fincludes%2Fclass-wp-mobile-menu-core.php&old=3125561&new_path=%2Fmobile-menu%2Ftrunk%2Fincludes%2Fclass-wp-mobile-menu-core.php&new=3125561&sfp_email=&sfph_mail="
}
]
},
"credits": [
{
"lang": "en",
"value": "1337_Wannabe"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
]
}

View File

@ -1,17 +1,94 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-32857",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@dell.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Dell Peripheral Manager, versions prior to 1.7.6, contain an uncontrolled search path element vulnerability. An attacker could potentially exploit this vulnerability through preloading malicious DLL or symbolic link exploitation, leading to arbitrary code execution and escalation of privilege"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-427: Uncontrolled Search Path Element",
"cweId": "CWE-427"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Dell",
"product": {
"product_data": [
{
"product_name": "Dell Peripheral Manager",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "N/A",
"version_value": "1.7.6"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000225474/dsa-2024-242",
"refsource": "MISC",
"name": "https://www.dell.com/support/kbdoc/en-us/000225474/dsa-2024-242"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
},
"credits": [
{
"lang": "en",
"value": "Dell Technologies would like to thank Ouallaout Noureddine for reporting these issues"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,94 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-37127",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@dell.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Dell Peripheral Manager, versions prior to 1.7.6, contain an uncontrolled search path element vulnerability. An attacker could potentially exploit this vulnerability through preloading malicious DLL or symbolic link exploitation, leading to arbitrary code execution and escalation of privilege"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-427: Uncontrolled Search Path Element",
"cweId": "CWE-427"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Dell",
"product": {
"product_data": [
{
"product_name": "Dell Peripheral Manager",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "N/A",
"version_value": "1.7.6"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000225474/dsa-2024-242",
"refsource": "MISC",
"name": "https://www.dell.com/support/kbdoc/en-us/000225474/dsa-2024-242"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
},
"credits": [
{
"lang": "en",
"value": "Dell Technologies would like to thank Ouallaout Noureddine for reporting these issues"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,94 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-37129",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@dell.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Dell Inventory Collector, versions prior to 12.3.0.6 contains a Path Traversal vulnerability. A local authenticated malicious user could potentially exploit this vulnerability, leading to arbitrary code execution on the system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
"cweId": "CWE-22"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Dell",
"product": {
"product_data": [
{
"product_name": "Dell Inventory Collector",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "N/A",
"version_value": "12.3.0.6"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000225779/dsa-2024-263",
"refsource": "MISC",
"name": "https://www.dell.com/support/kbdoc/en-us/000225779/dsa-2024-263"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
},
"credits": [
{
"lang": "en",
"value": "Dell Technologies would like to thank Jony_Juice for reporting this issue"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,94 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-37142",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@dell.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Dell Peripheral Manager, versions prior to 1.7.6, contain an uncontrolled search path element vulnerability. An attacker could potentially exploit this vulnerability through preloading malicious DLL or symbolic link exploitation, leading to arbitrary code execution and escalation of privilege"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-427: Uncontrolled Search Path Element",
"cweId": "CWE-427"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Dell",
"product": {
"product_data": [
{
"product_name": "Dell Peripheral Manager",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "N/A",
"version_value": "1.7.6"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000225474/dsa-2024-242",
"refsource": "MISC",
"name": "https://www.dell.com/support/kbdoc/en-us/000225474/dsa-2024-242"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
},
"credits": [
{
"lang": "en",
"value": "Dell Technologies would like to thank Ouallaout Noureddine for reporting these issues"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -1,18 +1,554 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-7264",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@curl.se",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an\nASN.1 Generalized Time field. If given an syntactically incorrect field, the\nparser might end up using -1 for the length of the *time fraction*, leading to\na `strlen()` getting performed on a pointer to a heap buffer area that is not\n(purposely) null terminated.\n\nThis flaw most likely leads to a crash, but can also lead to heap contents\ngetting returned to the application when\n[CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used."
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-125 Out-of-bounds Read"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "curl",
"product": {
"product_data": [
{
"product_name": "curl",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "8.9.0",
"version_value": "8.9.0"
},
{
"version_affected": "<=",
"version_name": "8.8.0",
"version_value": "8.8.0"
},
{
"version_affected": "<=",
"version_name": "8.7.1",
"version_value": "8.7.1"
},
{
"version_affected": "<=",
"version_name": "8.7.0",
"version_value": "8.7.0"
},
{
"version_affected": "<=",
"version_name": "8.6.0",
"version_value": "8.6.0"
},
{
"version_affected": "<=",
"version_name": "8.5.0",
"version_value": "8.5.0"
},
{
"version_affected": "<=",
"version_name": "8.4.0",
"version_value": "8.4.0"
},
{
"version_affected": "<=",
"version_name": "8.3.0",
"version_value": "8.3.0"
},
{
"version_affected": "<=",
"version_name": "8.2.1",
"version_value": "8.2.1"
},
{
"version_affected": "<=",
"version_name": "8.2.0",
"version_value": "8.2.0"
},
{
"version_affected": "<=",
"version_name": "8.1.2",
"version_value": "8.1.2"
},
{
"version_affected": "<=",
"version_name": "8.1.1",
"version_value": "8.1.1"
},
{
"version_affected": "<=",
"version_name": "8.1.0",
"version_value": "8.1.0"
},
{
"version_affected": "<=",
"version_name": "8.0.1",
"version_value": "8.0.1"
},
{
"version_affected": "<=",
"version_name": "8.0.0",
"version_value": "8.0.0"
},
{
"version_affected": "<=",
"version_name": "7.88.1",
"version_value": "7.88.1"
},
{
"version_affected": "<=",
"version_name": "7.88.0",
"version_value": "7.88.0"
},
{
"version_affected": "<=",
"version_name": "7.87.0",
"version_value": "7.87.0"
},
{
"version_affected": "<=",
"version_name": "7.86.0",
"version_value": "7.86.0"
},
{
"version_affected": "<=",
"version_name": "7.85.0",
"version_value": "7.85.0"
},
{
"version_affected": "<=",
"version_name": "7.84.0",
"version_value": "7.84.0"
},
{
"version_affected": "<=",
"version_name": "7.83.1",
"version_value": "7.83.1"
},
{
"version_affected": "<=",
"version_name": "7.83.0",
"version_value": "7.83.0"
},
{
"version_affected": "<=",
"version_name": "7.82.0",
"version_value": "7.82.0"
},
{
"version_affected": "<=",
"version_name": "7.81.0",
"version_value": "7.81.0"
},
{
"version_affected": "<=",
"version_name": "7.80.0",
"version_value": "7.80.0"
},
{
"version_affected": "<=",
"version_name": "7.79.1",
"version_value": "7.79.1"
},
{
"version_affected": "<=",
"version_name": "7.79.0",
"version_value": "7.79.0"
},
{
"version_affected": "<=",
"version_name": "7.78.0",
"version_value": "7.78.0"
},
{
"version_affected": "<=",
"version_name": "7.77.0",
"version_value": "7.77.0"
},
{
"version_affected": "<=",
"version_name": "7.76.1",
"version_value": "7.76.1"
},
{
"version_affected": "<=",
"version_name": "7.76.0",
"version_value": "7.76.0"
},
{
"version_affected": "<=",
"version_name": "7.75.0",
"version_value": "7.75.0"
},
{
"version_affected": "<=",
"version_name": "7.74.0",
"version_value": "7.74.0"
},
{
"version_affected": "<=",
"version_name": "7.73.0",
"version_value": "7.73.0"
},
{
"version_affected": "<=",
"version_name": "7.72.0",
"version_value": "7.72.0"
},
{
"version_affected": "<=",
"version_name": "7.71.1",
"version_value": "7.71.1"
},
{
"version_affected": "<=",
"version_name": "7.71.0",
"version_value": "7.71.0"
},
{
"version_affected": "<=",
"version_name": "7.70.0",
"version_value": "7.70.0"
},
{
"version_affected": "<=",
"version_name": "7.69.1",
"version_value": "7.69.1"
},
{
"version_affected": "<=",
"version_name": "7.69.0",
"version_value": "7.69.0"
},
{
"version_affected": "<=",
"version_name": "7.68.0",
"version_value": "7.68.0"
},
{
"version_affected": "<=",
"version_name": "7.67.0",
"version_value": "7.67.0"
},
{
"version_affected": "<=",
"version_name": "7.66.0",
"version_value": "7.66.0"
},
{
"version_affected": "<=",
"version_name": "7.65.3",
"version_value": "7.65.3"
},
{
"version_affected": "<=",
"version_name": "7.65.2",
"version_value": "7.65.2"
},
{
"version_affected": "<=",
"version_name": "7.65.1",
"version_value": "7.65.1"
},
{
"version_affected": "<=",
"version_name": "7.65.0",
"version_value": "7.65.0"
},
{
"version_affected": "<=",
"version_name": "7.64.1",
"version_value": "7.64.1"
},
{
"version_affected": "<=",
"version_name": "7.64.0",
"version_value": "7.64.0"
},
{
"version_affected": "<=",
"version_name": "7.63.0",
"version_value": "7.63.0"
},
{
"version_affected": "<=",
"version_name": "7.62.0",
"version_value": "7.62.0"
},
{
"version_affected": "<=",
"version_name": "7.61.1",
"version_value": "7.61.1"
},
{
"version_affected": "<=",
"version_name": "7.61.0",
"version_value": "7.61.0"
},
{
"version_affected": "<=",
"version_name": "7.60.0",
"version_value": "7.60.0"
},
{
"version_affected": "<=",
"version_name": "7.59.0",
"version_value": "7.59.0"
},
{
"version_affected": "<=",
"version_name": "7.58.0",
"version_value": "7.58.0"
},
{
"version_affected": "<=",
"version_name": "7.57.0",
"version_value": "7.57.0"
},
{
"version_affected": "<=",
"version_name": "7.56.1",
"version_value": "7.56.1"
},
{
"version_affected": "<=",
"version_name": "7.56.0",
"version_value": "7.56.0"
},
{
"version_affected": "<=",
"version_name": "7.55.1",
"version_value": "7.55.1"
},
{
"version_affected": "<=",
"version_name": "7.55.0",
"version_value": "7.55.0"
},
{
"version_affected": "<=",
"version_name": "7.54.1",
"version_value": "7.54.1"
},
{
"version_affected": "<=",
"version_name": "7.54.0",
"version_value": "7.54.0"
},
{
"version_affected": "<=",
"version_name": "7.53.1",
"version_value": "7.53.1"
},
{
"version_affected": "<=",
"version_name": "7.53.0",
"version_value": "7.53.0"
},
{
"version_affected": "<=",
"version_name": "7.52.1",
"version_value": "7.52.1"
},
{
"version_affected": "<=",
"version_name": "7.52.0",
"version_value": "7.52.0"
},
{
"version_affected": "<=",
"version_name": "7.51.0",
"version_value": "7.51.0"
},
{
"version_affected": "<=",
"version_name": "7.50.3",
"version_value": "7.50.3"
},
{
"version_affected": "<=",
"version_name": "7.50.2",
"version_value": "7.50.2"
},
{
"version_affected": "<=",
"version_name": "7.50.1",
"version_value": "7.50.1"
},
{
"version_affected": "<=",
"version_name": "7.50.0",
"version_value": "7.50.0"
},
{
"version_affected": "<=",
"version_name": "7.49.1",
"version_value": "7.49.1"
},
{
"version_affected": "<=",
"version_name": "7.49.0",
"version_value": "7.49.0"
},
{
"version_affected": "<=",
"version_name": "7.48.0",
"version_value": "7.48.0"
},
{
"version_affected": "<=",
"version_name": "7.47.1",
"version_value": "7.47.1"
},
{
"version_affected": "<=",
"version_name": "7.47.0",
"version_value": "7.47.0"
},
{
"version_affected": "<=",
"version_name": "7.46.0",
"version_value": "7.46.0"
},
{
"version_affected": "<=",
"version_name": "7.45.0",
"version_value": "7.45.0"
},
{
"version_affected": "<=",
"version_name": "7.44.0",
"version_value": "7.44.0"
},
{
"version_affected": "<=",
"version_name": "7.43.0",
"version_value": "7.43.0"
},
{
"version_affected": "<=",
"version_name": "7.42.1",
"version_value": "7.42.1"
},
{
"version_affected": "<=",
"version_name": "7.42.0",
"version_value": "7.42.0"
},
{
"version_affected": "<=",
"version_name": "7.41.0",
"version_value": "7.41.0"
},
{
"version_affected": "<=",
"version_name": "7.40.0",
"version_value": "7.40.0"
},
{
"version_affected": "<=",
"version_name": "7.39.0",
"version_value": "7.39.0"
},
{
"version_affected": "<=",
"version_name": "7.38.0",
"version_value": "7.38.0"
},
{
"version_affected": "<=",
"version_name": "7.37.1",
"version_value": "7.37.1"
},
{
"version_affected": "<=",
"version_name": "7.37.0",
"version_value": "7.37.0"
},
{
"version_affected": "<=",
"version_name": "7.36.0",
"version_value": "7.36.0"
},
{
"version_affected": "<=",
"version_name": "7.35.0",
"version_value": "7.35.0"
},
{
"version_affected": "<=",
"version_name": "7.34.0",
"version_value": "7.34.0"
},
{
"version_affected": "<=",
"version_name": "7.33.0",
"version_value": "7.33.0"
},
{
"version_affected": "<=",
"version_name": "7.32.0",
"version_value": "7.32.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://curl.se/docs/CVE-2024-7264.json",
"refsource": "MISC",
"name": "https://curl.se/docs/CVE-2024-7264.json"
},
{
"url": "https://curl.se/docs/CVE-2024-7264.html",
"refsource": "MISC",
"name": "https://curl.se/docs/CVE-2024-7264.html"
},
{
"url": "https://hackerone.com/reports/2629968",
"refsource": "MISC",
"name": "https://hackerone.com/reports/2629968"
}
]
},
"credits": [
{
"lang": "en",
"value": "Dov Murik (Transmit Security)"
},
{
"lang": "en",
"value": "Stefan Eissing"
}
]
}

View File

@ -1,17 +1,103 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-7306",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Establishment Billing Management System 1.0. Affected is an unknown function of the file /manage_block.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-273198 is the identifier assigned to this vulnerability."
},
{
"lang": "deu",
"value": "Es wurde eine Schwachstelle in SourceCodester Establishment Billing Management System 1.0 gefunden. Sie wurde als kritisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Datei /manage_block.php. Mit der Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SourceCodester",
"product": {
"product_data": [
{
"product_name": "Establishment Billing Management System",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.273198",
"refsource": "MISC",
"name": "https://vuldb.com/?id.273198"
},
{
"url": "https://vuldb.com/?ctiid.273198",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.273198"
},
{
"url": "https://vuldb.com/?submit.382327",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.382327"
},
{
"url": "https://gist.github.com/topsky979/0d5ec3fac4f1fc895478344be5521575",
"refsource": "MISC",
"name": "https://gist.github.com/topsky979/0d5ec3fac4f1fc895478344be5521575"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
}
]
}

View File

@ -1,17 +1,103 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-7307",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been found in SourceCodester Establishment Billing Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /manage_billing.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273199."
},
{
"lang": "deu",
"value": "In SourceCodester Establishment Billing Management System 1.0 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Hierbei betrifft es unbekannten Programmcode der Datei /manage_billing.php. Durch die Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SourceCodester",
"product": {
"product_data": [
{
"product_name": "Establishment Billing Management System",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.273199",
"refsource": "MISC",
"name": "https://vuldb.com/?id.273199"
},
{
"url": "https://vuldb.com/?ctiid.273199",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.273199"
},
{
"url": "https://vuldb.com/?submit.382328",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.382328"
},
{
"url": "https://gist.github.com/topsky979/df642bf14cce32c58d4805b6f6cf44e0",
"refsource": "MISC",
"name": "https://gist.github.com/topsky979/df642bf14cce32c58d4805b6f6cf44e0"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
}
]
}