From b78267db7cfefa36da4da3a55ae89844708c7d4d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Apr 2024 02:00:33 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/47xxx/CVE-2023-47715.json | 4 +- 2024/22xxx/CVE-2024-22318.json | 4 +- 2024/22xxx/CVE-2024-22332.json | 4 +- 2024/3xxx/CVE-2024-3224.json | 100 +++++++++++++++++++++++++++++++-- 2024/3xxx/CVE-2024-3225.json | 100 +++++++++++++++++++++++++++++++-- 2024/3xxx/CVE-2024-3226.json | 100 +++++++++++++++++++++++++++++++-- 6 files changed, 294 insertions(+), 18 deletions(-) diff --git a/2023/47xxx/CVE-2023-47715.json b/2023/47xxx/CVE-2023-47715.json index 61c9f6a2758..d3af5b90c52 100644 --- a/2023/47xxx/CVE-2023-47715.json +++ b/2023/47xxx/CVE-2023-47715.json @@ -21,8 +21,8 @@ "description": [ { "lang": "eng", - "value": "CWE-264 Permissions, Privileges, Access Controls", - "cweId": "CWE-264" + "value": "CWE-269 Improper Privilege Management", + "cweId": "CWE-269" } ] } diff --git a/2024/22xxx/CVE-2024-22318.json b/2024/22xxx/CVE-2024-22318.json index 297db29d409..91bc0ef2a92 100644 --- a/2024/22xxx/CVE-2024-22318.json +++ b/2024/22xxx/CVE-2024-22318.json @@ -21,8 +21,8 @@ "description": [ { "lang": "eng", - "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", - "cweId": "CWE-200" + "value": "CWE-384 Session Fixation", + "cweId": "CWE-384" } ] } diff --git a/2024/22xxx/CVE-2024-22332.json b/2024/22xxx/CVE-2024-22332.json index f4f4b43112c..bcd495f0b88 100644 --- a/2024/22xxx/CVE-2024-22332.json +++ b/2024/22xxx/CVE-2024-22332.json @@ -21,8 +21,8 @@ "description": [ { "lang": "eng", - "value": "CWE-434 Unrestricted Upload of File with Dangerous Type", - "cweId": "CWE-434" + "value": "CWE-400 Uncontrolled Resource Consumption", + "cweId": "CWE-400" } ] } diff --git a/2024/3xxx/CVE-2024-3224.json b/2024/3xxx/CVE-2024-3224.json index d8bf11c4384..0e8de526e8e 100644 --- a/2024/3xxx/CVE-2024-3224.json +++ b/2024/3xxx/CVE-2024-3224.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-3224", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been found in SourceCodester PHP Task Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file task-details.php. The manipulation of the argument task_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259069 was assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "In SourceCodester PHP Task Management System 1.0 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Hierbei betrifft es unbekannten Programmcode der Datei task-details.php. Durch Manipulieren des Arguments task_id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SourceCodester", + "product": { + "product_data": [ + { + "product_name": "PHP Task Management System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.259069", + "refsource": "MISC", + "name": "https://vuldb.com/?id.259069" + }, + { + "url": "https://vuldb.com/?ctiid.259069", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.259069" + }, + { + "url": "https://vuldb.com/?submit.308631", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.308631" + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/php%20task%20management%20system/php%20task%20management%20system%20-%20vuln%203.pdf", + "refsource": "MISC", + "name": "https://github.com/E1CHO/cve_hub/blob/main/php%20task%20management%20system/php%20task%20management%20system%20-%20vuln%203.pdf" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2024/3xxx/CVE-2024-3225.json b/2024/3xxx/CVE-2024-3225.json index 496adad3bd3..37380967aab 100644 --- a/2024/3xxx/CVE-2024-3225.json +++ b/2024/3xxx/CVE-2024-3225.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-3225", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in SourceCodester PHP Task Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file edit-task.php. The manipulation of the argument task_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-259070 is the identifier assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "Eine Schwachstelle wurde in SourceCodester PHP Task Management System 1.0 gefunden. Sie wurde als kritisch eingestuft. Davon betroffen ist unbekannter Code der Datei edit-task.php. Durch das Beeinflussen des Arguments task_id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SourceCodester", + "product": { + "product_data": [ + { + "product_name": "PHP Task Management System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.259070", + "refsource": "MISC", + "name": "https://vuldb.com/?id.259070" + }, + { + "url": "https://vuldb.com/?ctiid.259070", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.259070" + }, + { + "url": "https://vuldb.com/?submit.308642", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.308642" + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/php%20task%20management%20system/php%20task%20management%20system%20-%20vuln%204.pdf", + "refsource": "MISC", + "name": "https://github.com/E1CHO/cve_hub/blob/main/php%20task%20management%20system/php%20task%20management%20system%20-%20vuln%204.pdf" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2024/3xxx/CVE-2024-3226.json b/2024/3xxx/CVE-2024-3226.json index 3e8dfd1089f..2a202cf7288 100644 --- a/2024/3xxx/CVE-2024-3226.json +++ b/2024/3xxx/CVE-2024-3226.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-3226", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Campcodes Online Patient Record Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/login.php. The manipulation of the argument password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259071." + }, + { + "lang": "deu", + "value": "Es wurde eine Schwachstelle in Campcodes Online Patient Record Management System 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Datei /admin/login.php. Durch Beeinflussen des Arguments password mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Campcodes", + "product": { + "product_data": [ + { + "product_name": "Online Patient Record Management System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.259071", + "refsource": "MISC", + "name": "https://vuldb.com/?id.259071" + }, + { + "url": "https://vuldb.com/?ctiid.259071", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.259071" + }, + { + "url": "https://vuldb.com/?submit.308644", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.308644" + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Patient%20Record%20Management%20System%20-%20vuln%201.pdf", + "refsource": "MISC", + "name": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Patient%20Record%20Management%20System%20-%20vuln%201.pdf" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 7.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 7.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 7.5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ] }