diff --git a/2024/11xxx/CVE-2024-11964.json b/2024/11xxx/CVE-2024-11964.json index 171dea9a127..b6a4048c0e3 100644 --- a/2024/11xxx/CVE-2024-11964.json +++ b/2024/11xxx/CVE-2024-11964.json @@ -1,17 +1,123 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-11964", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Complaint Management system 1.0. This affects an unknown part of the file /user/index.php. The manipulation of the argument emailid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "deu", + "value": "Es wurde eine kritische Schwachstelle in PHPGurukul Complaint Management system 1.0 gefunden. Es geht dabei um eine nicht klar definierte Funktion der Datei /user/index.php. Mittels Manipulieren des Arguments emailid mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "SQL Injection", + "cweId": "CWE-89" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Injection", + "cweId": "CWE-74" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "PHPGurukul", + "product": { + "product_data": [ + { + "product_name": "Complaint Management system", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.286347", + "refsource": "MISC", + "name": "https://vuldb.com/?id.286347" + }, + { + "url": "https://vuldb.com/?ctiid.286347", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.286347" + }, + { + "url": "https://vuldb.com/?submit.452471", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.452471" + }, + { + "url": "https://github.com/Aurora0x1/CVE/issues/1", + "refsource": "MISC", + "name": "https://github.com/Aurora0x1/CVE/issues/1" + }, + { + "url": "https://phpgurukul.com/", + "refsource": "MISC", + "name": "https://phpgurukul.com/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Aurora0x1 (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 7.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 7.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 7.5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ] } diff --git a/2024/11xxx/CVE-2024-11965.json b/2024/11xxx/CVE-2024-11965.json index 181a0d931f7..6f2db83a839 100644 --- a/2024/11xxx/CVE-2024-11965.json +++ b/2024/11xxx/CVE-2024-11965.json @@ -1,17 +1,123 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-11965", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been found in PHPGurukul Complaint Management system 1.0 and classified as critical. This vulnerability affects unknown code of the file /user/reset-password.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "deu", + "value": "In PHPGurukul Complaint Management system 1.0 wurde eine kritische Schwachstelle gefunden. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /user/reset-password.php. Durch das Manipulieren des Arguments email mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "SQL Injection", + "cweId": "CWE-89" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Injection", + "cweId": "CWE-74" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "PHPGurukul", + "product": { + "product_data": [ + { + "product_name": "Complaint Management system", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.286348", + "refsource": "MISC", + "name": "https://vuldb.com/?id.286348" + }, + { + "url": "https://vuldb.com/?ctiid.286348", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.286348" + }, + { + "url": "https://vuldb.com/?submit.452472", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.452472" + }, + { + "url": "https://github.com/Aurora0x1/CVE/issues/2", + "refsource": "MISC", + "name": "https://github.com/Aurora0x1/CVE/issues/2" + }, + { + "url": "https://phpgurukul.com/", + "refsource": "MISC", + "name": "https://phpgurukul.com/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Aurora0x1 (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 7.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 7.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 7.5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ] } diff --git a/2024/11xxx/CVE-2024-11966.json b/2024/11xxx/CVE-2024-11966.json index 090253f8e39..4d79217f99d 100644 --- a/2024/11xxx/CVE-2024-11966.json +++ b/2024/11xxx/CVE-2024-11966.json @@ -1,17 +1,123 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-11966", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in PHPGurukul Complaint Management system 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/index.php. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "deu", + "value": "Eine kritische Schwachstelle wurde in PHPGurukul Complaint Management system 1.0 gefunden. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei /admin/index.php. Durch Manipulieren des Arguments username mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "SQL Injection", + "cweId": "CWE-89" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Injection", + "cweId": "CWE-74" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "PHPGurukul", + "product": { + "product_data": [ + { + "product_name": "Complaint Management system", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.286349", + "refsource": "MISC", + "name": "https://vuldb.com/?id.286349" + }, + { + "url": "https://vuldb.com/?ctiid.286349", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.286349" + }, + { + "url": "https://vuldb.com/?submit.452476", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.452476" + }, + { + "url": "https://github.com/Aurora0x1/CVE/issues/3", + "refsource": "MISC", + "name": "https://github.com/Aurora0x1/CVE/issues/3" + }, + { + "url": "https://phpgurukul.com/", + "refsource": "MISC", + "name": "https://phpgurukul.com/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Aurora0x1 (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 7.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 7.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 7.5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ] } diff --git a/2024/11xxx/CVE-2024-11971.json b/2024/11xxx/CVE-2024-11971.json new file mode 100644 index 00000000000..49a890fc415 --- /dev/null +++ b/2024/11xxx/CVE-2024-11971.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-11971", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53060.json b/2024/53xxx/CVE-2024-53060.json index 54f0e9555ae..9cbdc8b9284 100644 --- a/2024/53xxx/CVE-2024-53060.json +++ b/2024/53xxx/CVE-2024-53060.json @@ -1,18 +1,162 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-53060", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: prevent NULL pointer dereference if ATIF is not supported\n\nacpi_evaluate_object() may return AE_NOT_FOUND (failure), which\nwould result in dereferencing buffer.pointer (obj) while being NULL.\n\nAlthough this case may be unrealistic for the current code, it is\nstill better to protect against possible bugs.\n\nBail out also when status is AE_NOT_FOUND.\n\nThis fixes 1 FORWARD_NULL issue reported by Coverity\nReport: CID 1600951: Null pointer dereferences (FORWARD_NULL)\n\n(cherry picked from commit 91c9e221fe2553edf2db71627d8453f083de87a1)" } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "58556dcbd560", + "version_value": "ce8a00a00e36" + }, + { + "version_affected": "<", + "version_name": "43b4fa6e0e23", + "version_value": "8d7a28eca755" + }, + { + "version_affected": "<", + "version_name": "234682910971", + "version_value": "2ac7f253dead" + }, + { + "version_affected": "<", + "version_name": "6032287747f8", + "version_value": "27fc29b53769" + }, + { + "version_affected": "<", + "version_name": "cd67af3c1762", + "version_value": "1a9f55ed5b51" + }, + { + "version_affected": "<", + "version_name": "975ede2a7bec", + "version_value": "a613a3924175" + }, + { + "version_affected": "<", + "version_name": "1d7175f9c57b", + "version_value": "b9d9881237af" + }, + { + "version_affected": "<", + "version_name": "4.19.323", + "version_value": "4.19.324" + }, + { + "version_affected": "<", + "version_name": "5.4.285", + "version_value": "5.4.286" + }, + { + "version_affected": "<", + "version_name": "5.10.229", + "version_value": "5.10.230" + }, + { + "version_affected": "<", + "version_name": "5.15.170", + "version_value": "5.15.172" + }, + { + "version_affected": "<", + "version_name": "6.1.115", + "version_value": "6.1.117" + }, + { + "version_affected": "<", + "version_name": "6.6.59", + "version_value": "6.6.61" + }, + { + "version_affected": "<", + "version_name": "6.11.6", + "version_value": "6.11.8" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/ce8a00a00e36f61f5a1e47734332420b68784c43", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/ce8a00a00e36f61f5a1e47734332420b68784c43" + }, + { + "url": "https://git.kernel.org/stable/c/8d7a28eca7553d35d4ce192fa1f390f2357df41b", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/8d7a28eca7553d35d4ce192fa1f390f2357df41b" + }, + { + "url": "https://git.kernel.org/stable/c/2ac7f253deada4d449559b65a1c1cd0a6f6f19b7", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/2ac7f253deada4d449559b65a1c1cd0a6f6f19b7" + }, + { + "url": "https://git.kernel.org/stable/c/27fc29b5376998c126c85cf9b15d9dfc2afc9cbe", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/27fc29b5376998c126c85cf9b15d9dfc2afc9cbe" + }, + { + "url": "https://git.kernel.org/stable/c/1a9f55ed5b512f510ccd21ad527d532e60550e80", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/1a9f55ed5b512f510ccd21ad527d532e60550e80" + }, + { + "url": "https://git.kernel.org/stable/c/a613a392417532ca5aaf3deac6e3277aa7aaef2b", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/a613a392417532ca5aaf3deac6e3277aa7aaef2b" + }, + { + "url": "https://git.kernel.org/stable/c/b9d9881237afeb52eddd70077b7174bf17e2fa30", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/b9d9881237afeb52eddd70077b7174bf17e2fa30" + } + ] + }, + "generator": { + "engine": "bippy-8e903de6a542" } } \ No newline at end of file