"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-05-17 21:00:34 +00:00
parent 97c7bc36d5
commit eaae314f8b
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
16 changed files with 257 additions and 23 deletions

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_where() function."
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_where() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
}
]
},
@ -56,6 +56,11 @@
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
"refsource": "MISC",
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
},
{
"refsource": "MISC",
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php where_in() function."
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php where_in() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
}
]
},
@ -56,6 +56,11 @@
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
"refsource": "MISC",
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
},
{
"refsource": "MISC",
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_having() function."
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_having() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
}
]
},
@ -56,6 +56,11 @@
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
"refsource": "MISC",
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
},
{
"refsource": "MISC",
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php where() function."
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php where() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
}
]
},

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_where_not_in() function."
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_where_not_in() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
}
]
},
@ -56,6 +56,11 @@
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
"refsource": "MISC",
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
},
{
"refsource": "MISC",
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_like() function."
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_like() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
}
]
},
@ -56,6 +56,11 @@
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
"refsource": "MISC",
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
},
{
"refsource": "MISC",
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php where_not_in() function."
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php where_not_in() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
}
]
},
@ -56,6 +56,11 @@
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
"refsource": "MISC",
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
},
{
"refsource": "MISC",
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php like() function."
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php like() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
}
]
},
@ -56,6 +56,11 @@
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
"refsource": "MISC",
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
},
{
"refsource": "MISC",
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php having() function."
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php having() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
}
]
},
@ -56,6 +56,11 @@
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
"refsource": "MISC",
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
},
{
"refsource": "MISC",
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_where_in() function."
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_where_in() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
}
]
},
@ -56,6 +56,11 @@
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
"refsource": "MISC",
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
},
{
"refsource": "MISC",
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_not_like() function."
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php or_not_like() function. Note: Multiple third parties have disputed this as not a valid vulnerability."
}
]
},
@ -56,6 +56,11 @@
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
"refsource": "MISC",
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
},
{
"refsource": "MISC",
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php."
"value": "** DISPUTED ** B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\\database\\DB_query_builder.php. Note: Multiple third parties have disputed this as not a valid vulnerability"
}
]
},
@ -56,6 +56,11 @@
"url": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md",
"refsource": "MISC",
"name": "https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md"
},
{
"refsource": "MISC",
"name": "https://github.com/bcit-ci/CodeIgniter/issues/6161",
"url": "https://github.com/bcit-ci/CodeIgniter/issues/6161"
}
]
}

View File

@ -1,17 +1,76 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-52424",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-52424",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The IEEE 802.11 standard sometimes enables an adversary to trick a victim into connecting to an unintended or untrusted network with Home WEP, Home WPA3 SAE-loop. Enterprise 802.1X/EAP, Mesh AMPE, or FILS, aka an \"SSID Confusion\" issue. This occurs because the SSID is not always used to derive the pairwise master key or session keys, and because there is not a protected exchange of an SSID during a 4-way handshake."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.wi-fi.org/news-events/press-releases",
"refsource": "MISC",
"name": "https://www.wi-fi.org/news-events/press-releases"
},
{
"refsource": "MISC",
"name": "https://mentor.ieee.org/802.11/dcn/24/11-24-0938-03-000m-protect-ssid-in-4-way-handshake.docx",
"url": "https://mentor.ieee.org/802.11/dcn/24/11-24-0938-03-000m-protect-ssid-in-4-way-handshake.docx"
},
{
"refsource": "MISC",
"name": "https://www.top10vpn.com/research/wifi-vulnerability-ssid/",
"url": "https://www.top10vpn.com/research/wifi-vulnerability-ssid/"
},
{
"refsource": "MISC",
"name": "https://www.top10vpn.com/assets/2024/05/Top10VPN-x-Vanhoef-SSID-Confusion.pdf",
"url": "https://www.top10vpn.com/assets/2024/05/Top10VPN-x-Vanhoef-SSID-Confusion.pdf"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel through 6.7.2, an untrusted hypervisor can inject virtual interrupts 0 and 14 at any point in time and can trigger the SIGFPE signal handler in userspace applications. This affects AMD SEV-SNP and AMD SEV-ES."
"value": "In the Linux kernel before 6.7, an untrusted hypervisor can inject virtual interrupts 0 and 14 at any point in time and can trigger the SIGFPE signal handler in userspace applications. This affects AMD SEV-SNP and AMD SEV-ES."
}
]
},
@ -56,6 +56,16 @@
"refsource": "CONFIRM",
"name": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html",
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html"
},
{
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/f35e46631b28a63ca3887d7afef1a65a5544da52",
"url": "https://github.com/torvalds/linux/commit/f35e46631b28a63ca3887d7afef1a65a5544da52"
},
{
"refsource": "MISC",
"name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f35e46631b28a63ca3887d7afef1a65a5544da52",
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f35e46631b28a63ca3887d7afef1a65a5544da52"
}
]
}

View File

@ -1,17 +1,109 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-5069",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability, which was classified as critical, has been found in SourceCodester Simple Online Mens Salon Management System 1.0. Affected by this issue is some unknown functionality of the file view_service.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-264926 is the identifier assigned to this vulnerability."
},
{
"lang": "deu",
"value": "Eine kritische Schwachstelle wurde in SourceCodester Simple Online Mens Salon Management System 1.0 entdeckt. Es geht hierbei um eine nicht n\u00e4her spezifizierte Funktion der Datei view_service.php. Mit der Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SourceCodester",
"product": {
"product_data": [
{
"product_name": "Simple Online Mens Salon Management System",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.264926",
"refsource": "MISC",
"name": "https://vuldb.com/?id.264926"
},
{
"url": "https://vuldb.com/?ctiid.264926",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.264926"
},
{
"url": "https://vuldb.com/?submit.336842",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.336842"
},
{
"url": "https://github.com/menxin996/Cvehub/blob/main/Men's%20Salon%20Management%20System%20%20view_service.php%20has%20Sqlinjection.pdf",
"refsource": "MISC",
"name": "https://github.com/menxin996/Cvehub/blob/main/Men's%20Salon%20Management%20System%20%20view_service.php%20has%20Sqlinjection.pdf"
}
]
},
"credits": [
{
"lang": "en",
"value": "Wangwei (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-5084",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}