diff --git a/2021/42xxx/CVE-2021-42260.json b/2021/42xxx/CVE-2021-42260.json index 238ac50a485..a18062e44e5 100644 --- a/2021/42xxx/CVE-2021-42260.json +++ b/2021/42xxx/CVE-2021-42260.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20220930 [SECURITY] [DLA 3130-1] tinyxml security update", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00041.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2024-80e6578a01", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QCR5PIOBGDIDS6SYRESTMDJSEDFSCOE/" } ] } diff --git a/2023/34xxx/CVE-2023-34194.json b/2023/34xxx/CVE-2023-34194.json index 9a018133346..b1d0fb3db77 100644 --- a/2023/34xxx/CVE-2023-34194.json +++ b/2023/34xxx/CVE-2023-34194.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20231230 [SECURITY] [DLA 3701-1] tinyxml security update", "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00024.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2024-80e6578a01", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QCR5PIOBGDIDS6SYRESTMDJSEDFSCOE/" } ] } diff --git a/2023/47xxx/CVE-2023-47140.json b/2023/47xxx/CVE-2023-47140.json index 26b7999e702..d9a85a8f1a3 100644 --- a/2023/47xxx/CVE-2023-47140.json +++ b/2023/47xxx/CVE-2023-47140.json @@ -1,17 +1,91 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-47140", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM CICS Transaction Gateway 9.3 could allow a user to transfer or view files due to improper access controls. IBM X-Force ID: 270259." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "284 Improper Access Control" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "CICS Transaction Gateway Containers", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "9.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://https://www.ibm.com/support/pages/node/7105094", + "refsource": "MISC", + "name": "https://https://www.ibm.com/support/pages/node/7105094" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270259", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270259" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2023/49xxx/CVE-2023-49081.json b/2023/49xxx/CVE-2023-49081.json index 84606ca1b9c..df94731a1ca 100644 --- a/2023/49xxx/CVE-2023-49081.json +++ b/2023/49xxx/CVE-2023-49081.json @@ -63,6 +63,16 @@ "url": "https://gist.github.com/jnovikov/184afb593d9c2114d77f508e0ccd508e", "refsource": "MISC", "name": "https://gist.github.com/jnovikov/184afb593d9c2114d77f508e0ccd508e" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSYWMP64ZFCTC3VO6RY6EC6VSSMV6I3A/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSYWMP64ZFCTC3VO6RY6EC6VSSMV6I3A/" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY5SI6NK5243DEEDQUFKQKW5GQNKQUMA/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY5SI6NK5243DEEDQUFKQKW5GQNKQUMA/" } ] }, diff --git a/2023/49xxx/CVE-2023-49082.json b/2023/49xxx/CVE-2023-49082.json index 3899821a3d6..8395db4b85f 100644 --- a/2023/49xxx/CVE-2023-49082.json +++ b/2023/49xxx/CVE-2023-49082.json @@ -72,6 +72,16 @@ "url": "https://gist.github.com/jnovikov/7f411ae9fe6a9a7804cf162a3bdbb44b", "refsource": "MISC", "name": "https://gist.github.com/jnovikov/7f411ae9fe6a9a7804cf162a3bdbb44b" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSYWMP64ZFCTC3VO6RY6EC6VSSMV6I3A/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSYWMP64ZFCTC3VO6RY6EC6VSSMV6I3A/" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY5SI6NK5243DEEDQUFKQKW5GQNKQUMA/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY5SI6NK5243DEEDQUFKQKW5GQNKQUMA/" } ] }, diff --git a/2023/7xxx/CVE-2023-7101.json b/2023/7xxx/CVE-2023-7101.json index f95b7d4a082..a2fc7d0966c 100644 --- a/2023/7xxx/CVE-2023-7101.json +++ b/2023/7xxx/CVE-2023-7101.json @@ -101,6 +101,16 @@ "url": "https://https://github.com/jmcnamara/spreadsheet-parseexcel/commit/bd3159277e745468e2c553417b35d5d7dc7405bc", "refsource": "MISC", "name": "https://https://github.com/jmcnamara/spreadsheet-parseexcel/commit/bd3159277e745468e2c553417b35d5d7dc7405bc" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFEHKULQRVXHIV7XXK2RGD4VQN6Y4CV5/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFEHKULQRVXHIV7XXK2RGD4VQN6Y4CV5/" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2FIWDHRYTAAQLGM6AFOZVM7AFZ4H2ZR/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2FIWDHRYTAAQLGM6AFOZVM7AFZ4H2ZR/" } ] }, diff --git a/2024/0xxx/CVE-2024-0293.json b/2024/0xxx/CVE-2024-0293.json index ba018c9b013..bc0818010b9 100644 --- a/2024/0xxx/CVE-2024-0293.json +++ b/2024/0xxx/CVE-2024-0293.json @@ -1,17 +1,104 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-0293", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as critical was found in Totolink LR1200GB 9.1.0u.6619_B20230130. Affected by this vulnerability is the function setUploadSetting of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument FileName leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249859. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "In Totolink LR1200GB 9.1.0u.6619_B20230130 wurde eine kritische Schwachstelle entdeckt. Hierbei betrifft es die Funktion setUploadSetting der Datei /cgi-bin/cstecgi.cgi. Mittels dem Manipulieren des Arguments FileName mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78 OS Command Injection", + "cweId": "CWE-78" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Totolink", + "product": { + "product_data": [ + { + "product_name": "LR1200GB", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "9.1.0u.6619_B20230130" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.249859", + "refsource": "MISC", + "name": "https://vuldb.com/?id.249859" + }, + { + "url": "https://vuldb.com/?ctiid.249859", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.249859" + }, + { + "url": "https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/setUploadSetting/README.md", + "refsource": "MISC", + "name": "https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/setUploadSetting/README.md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "jylsec (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2024/0xxx/CVE-2024-0294.json b/2024/0xxx/CVE-2024-0294.json index 2207fec15e6..bc721747c21 100644 --- a/2024/0xxx/CVE-2024-0294.json +++ b/2024/0xxx/CVE-2024-0294.json @@ -1,17 +1,104 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-0294", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability, which was classified as critical, has been found in Totolink LR1200GB 9.1.0u.6619_B20230130. Affected by this issue is the function setUssd of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ussd leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249860. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Eine kritische Schwachstelle wurde in Totolink LR1200GB 9.1.0u.6619_B20230130 entdeckt. Davon betroffen ist die Funktion setUssd der Datei /cgi-bin/cstecgi.cgi. Mittels Manipulieren des Arguments ussd mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78 OS Command Injection", + "cweId": "CWE-78" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Totolink", + "product": { + "product_data": [ + { + "product_name": "LR1200GB", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "9.1.0u.6619_B20230130" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.249860", + "refsource": "MISC", + "name": "https://vuldb.com/?id.249860" + }, + { + "url": "https://vuldb.com/?ctiid.249860", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.249860" + }, + { + "url": "https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/setUssd/README.md", + "refsource": "MISC", + "name": "https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/setUssd/README.md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "jylsec (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 7.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 7.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 7.5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ] }