mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
feb58012dc
commit
e8cbe25051
@ -1,17 +1,114 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2024-10747",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability classified as problematic was found in PHPGurukul Online Shopping Portal 2.0. This vulnerability affects unknown code of the file /admin/assets/plugins/DataTables/media/unit_testing/templates/dom_data_th.php. The manipulation of the argument scripts leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
"value": "In PHPGurukul Online Shopping Portal 2.0 wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Das betrifft eine unbekannte Funktionalit\u00e4t der Datei /admin/assets/plugins/DataTables/media/unit_testing/templates/dom_data_th.php. Durch das Manipulieren des Arguments scripts mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Cross Site Scripting",
|
||||
"cweId": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "PHPGurukul",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Online Shopping Portal",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "2.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.282916",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.282916"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.282916",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?ctiid.282916"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.436115",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?submit.436115"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/secuserx/CVE/blob/main/%5BXSS%20vulnerability%5D%20found%20in%20Online%20Shopping%20Portal%202.0%20-%20(dom_data_th.php).md",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/secuserx/CVE/blob/main/%5BXSS%20vulnerability%5D%20found%20in%20Online%20Shopping%20Portal%202.0%20-%20(dom_data_th.php).md"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://phpgurukul.com/"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "secuserx (VulDB User)"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseScore": 3.5,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
{
|
||||
"version": "3.0",
|
||||
"baseScore": 3.5,
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
{
|
||||
"version": "2.0",
|
||||
"baseScore": 4,
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,109 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2024-10748",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in Cosmote Greece What's Up App 4.47.3 on Android. This issue affects some unknown processing of the file gr/desquared/kmmsharedmodule/db/RealmDB.java of the component Realm Database Handler. The manipulation of the argument defaultRealmKey leads to use of default cryptographic key. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
"value": "Eine Schwachstelle wurde in Cosmote Greece What's Up App 4.47.3 f\u00fcr Android entdeckt. Sie wurde als problematisch eingestuft. Dies betrifft einen unbekannten Teil der Datei gr/desquared/kmmsharedmodule/db/RealmDB.java der Komponente Realm Database Handler. Durch Manipulieren des Arguments defaultRealmKey mit unbekannten Daten kann eine use of default cryptographic key-Schwachstelle ausgenutzt werden. Umgesetzt werden muss der Angriff lokal. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Die Ausnutzbarkeit gilt als schwierig."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Use of Default Cryptographic Key",
|
||||
"cweId": "CWE-1394"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Cosmote Greece",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "What's Up App",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "4.47.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.282917",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.282917"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.282917",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?ctiid.282917"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.432429",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?submit.432429"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/secuserx/CVE/blob/main/%5BHardcoded%20Realm%20Database%20Encryption%20Key%5D%20found%20in%20What's%20UP%20Android%20App%204.47.3%20-%20(RealmDB.java).md",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/secuserx/CVE/blob/main/%5BHardcoded%20Realm%20Database%20Encryption%20Key%5D%20found%20in%20What's%20UP%20Android%20App%204.47.3%20-%20(RealmDB.java).md"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "secuserx (VulDB User)"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseScore": 2.5,
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
{
|
||||
"version": "3.0",
|
||||
"baseScore": 2.5,
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
{
|
||||
"version": "2.0",
|
||||
"baseScore": 1,
|
||||
"vectorString": "AV:L/AC:H/Au:S/C:P/I:N/A:N"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,377 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2024-10749",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability, which was classified as critical, was found in ThinkAdmin up to 6.1.67. Affected is the function script of the file /app/admin/controller/api/Plugs.php. The manipulation of the argument uptoken leads to deserialization. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
"value": "Es wurde eine Schwachstelle in ThinkAdmin bis 6.1.67 gefunden. Sie wurde als kritisch eingestuft. Dabei betrifft es die Funktion script der Datei /app/admin/controller/api/Plugs.php. Durch das Beeinflussen des Arguments uptoken mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie gilt als schwierig auszunutzen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Deserialization",
|
||||
"cweId": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "ThinkAdmin",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.0"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.1"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.2"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.3"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.4"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.5"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.6"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.7"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.8"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.9"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.10"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.11"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.12"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.13"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.14"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.15"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.16"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.17"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.18"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.19"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.20"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.21"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.22"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.23"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.24"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.25"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.26"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.27"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.28"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.29"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.30"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.31"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.32"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.33"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.34"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.35"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.36"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.37"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.38"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.39"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.40"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.41"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.42"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.43"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.44"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.45"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.46"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.47"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.48"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.49"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.50"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.51"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.52"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.53"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.54"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.55"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.56"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.57"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.58"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.59"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.60"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.61"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.62"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.63"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.64"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.65"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.66"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "6.1.67"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.282918",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.282918"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.282918",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?ctiid.282918"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.432436",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?submit.432436"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pwysec/Xmwcq/blob/main/1.md",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/pwysec/Xmwcq/blob/main/1.md"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "p1wy (VulDB User)"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseScore": 5,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "3.0",
|
||||
"baseScore": 5,
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "2.0",
|
||||
"baseScore": 4.6,
|
||||
"vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,114 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2024-10750",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability has been found in Tenda i22 1.0.0.3(4687) and classified as problematic. Affected by this vulnerability is the function websReadEvent of the file /goform/GetIPTV?fgHPOST/goform/SysToo. The manipulation of the argument Content-Length leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
"value": "In Tenda i22 1.0.0.3(4687) wurde eine Schwachstelle gefunden. Sie wurde als problematisch eingestuft. Hierbei betrifft es die Funktion websReadEvent der Datei /goform/GetIPTV?fgHPOST/goform/SysToo. Durch Beeinflussen des Arguments Content-Length mit unbekannten Daten kann eine null pointer dereference-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "NULL Pointer Dereference",
|
||||
"cweId": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Tenda",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "i22",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0.0.3(4687)"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.282919",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.282919"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.282919",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?ctiid.282919"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.435407",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?submit.435407"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xiaobor123/tenda-vul-i22",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/xiaobor123/tenda-vul-i22"
|
||||
},
|
||||
{
|
||||
"url": "https://www.tenda.com.cn/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.tenda.com.cn/"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "xiaobor123 (VulDB User)"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseScore": 6.5,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "3.0",
|
||||
"baseScore": 6.5,
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "2.0",
|
||||
"baseScore": 6.8,
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,109 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2024-10751",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability was found in Codezips ISP Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file pay.php. The manipulation of the argument customer leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
"value": "Eine Schwachstelle wurde in Codezips ISP Management System 1.0 gefunden. Sie wurde als kritisch eingestuft. Davon betroffen ist unbekannter Code der Datei pay.php. Dank der Manipulation des Arguments customer mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "SQL Injection",
|
||||
"cweId": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Codezips",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "ISP Management System",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.282920",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.282920"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.282920",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?ctiid.282920"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.436296",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?submit.436296"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/JiangJiangCC/CVE/issues/1",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/JiangJiangCC/CVE/issues/1"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cuit_jiang (VulDB User)"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseScore": 6.3,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "3.0",
|
||||
"baseScore": 6.3,
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "2.0",
|
||||
"baseScore": 6.5,
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user