From f4e0f57d752548c1f2583d9d5ddcc44ea1d34f35 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 28 Aug 2024 16:00:38 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/19xxx/CVE-2019-19824.json | 7 +++- 2024/35xxx/CVE-2024-35325.json | 63 ++++------------------------ 2024/35xxx/CVE-2024-35326.json | 73 ++++----------------------------- 2024/35xxx/CVE-2024-35328.json | 17 +++++--- 2024/35xxx/CVE-2024-35329.json | 63 ++++------------------------ 2024/39xxx/CVE-2024-39930.json | 5 +++ 2024/42xxx/CVE-2024-42698.json | 75 +++++++++++++++++++++++++++++++--- 2024/42xxx/CVE-2024-42900.json | 61 ++++++++++++++++++++++++--- 2024/44xxx/CVE-2024-44083.json | 5 +++ 2024/45xxx/CVE-2024-45386.json | 18 ++++++++ 2024/8xxx/CVE-2024-8264.json | 18 ++++++++ 2024/8xxx/CVE-2024-8265.json | 18 ++++++++ 12 files changed, 226 insertions(+), 197 deletions(-) create mode 100644 2024/45xxx/CVE-2024-45386.json create mode 100644 2024/8xxx/CVE-2024-8264.json create mode 100644 2024/8xxx/CVE-2024-8265.json diff --git a/2019/19xxx/CVE-2019-19824.json b/2019/19xxx/CVE-2019-19824.json index c63a81628ae..ec1d701ff2e 100644 --- a/2019/19xxx/CVE-2019-19824.json +++ b/2019/19xxx/CVE-2019-19824.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0." + "value": "On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, N100RE through 3.4.0, and N302RE 2.0.2." } ] }, @@ -71,6 +71,11 @@ "refsource": "FULLDISC", "name": "20200131 Re: Multiple vulnerabilities in TOTOLINK and other Realtek SDK based routers", "url": "http://seclists.org/fulldisclosure/2020/Jan/38" + }, + { + "refsource": "MISC", + "name": "https://github.com/yckuo-sdc/totolink-boa-api-vulnerabilities", + "url": "https://github.com/yckuo-sdc/totolink-boa-api-vulnerabilities" } ] } diff --git a/2024/35xxx/CVE-2024-35325.json b/2024/35xxx/CVE-2024-35325.json index d427f6ec201..2d218b206bd 100644 --- a/2024/35xxx/CVE-2024-35325.json +++ b/2024/35xxx/CVE-2024-35325.json @@ -1,66 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2024-35325", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-35325", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in libyaml up to 0.2.5. Affected by this issue is the function yaml_event_delete of the file /src/libyaml/src/api.c. The manipulation leads to a double-free." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "refsource": "CONFIRM", - "name": "https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35325.c", - "url": "https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35325.c" - }, - { - "refsource": "MISC", - "name": "https://github.com/idhyt/pocs/tree/main/libyaml", - "url": "https://github.com/idhyt/pocs/tree/main/libyaml" + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] } diff --git a/2024/35xxx/CVE-2024-35326.json b/2024/35xxx/CVE-2024-35326.json index bc42e476a1f..f6302214a1a 100644 --- a/2024/35xxx/CVE-2024-35326.json +++ b/2024/35xxx/CVE-2024-35326.json @@ -1,76 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2024-35326", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-35326", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** DISPUTED ** libyaml v0.2.5 is vulnerable to Buffer Overflow. Affected by this issue is the function yaml_emitter_emit of the file /src/libyaml/src/emitter.c. The manipulation leads to a double-free. NOTE: this is disputed by the supplier because the discoverer's sample C code is incorrect: it does not call all of the required _initialize functions that are described in the LibYAML documentation." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "refsource": "CONFIRM", - "name": "https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35326.c", - "url": "https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35326.c" - }, - { - "refsource": "MISC", - "name": "https://github.com/idhyt/pocs/tree/main/libyaml", - "url": "https://github.com/idhyt/pocs/tree/main/libyaml" - }, - { - "refsource": "MISC", - "name": "https://github.com/yaml/libyaml/issues/298", - "url": "https://github.com/yaml/libyaml/issues/298" - }, - { - "refsource": "MISC", - "name": "https://github.com/yaml/libyaml/issues/302", - "url": "https://github.com/yaml/libyaml/issues/302" + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] } diff --git a/2024/35xxx/CVE-2024-35328.json b/2024/35xxx/CVE-2024-35328.json index 26db9e34fb4..5aaf0412af7 100644 --- a/2024/35xxx/CVE-2024-35328.json +++ b/2024/35xxx/CVE-2024-35328.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "** DISPUTED ** libyaml v0.2.5 is vulnerable to a denial of service. Affected by this issue is the function yaml_parser_parse of the file /src/libyaml/src/parser.c. NOTE: this is disputed by the supplier because the discoverer's sample C code is incorrect: it does not call required _initialize functions that are described in the LibYAML documentation." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] }, @@ -53,14 +53,19 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "name": "https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35328.c", - "url": "https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35328.c" + "url": "https://drive.google.com/file/d/1zW-n58nRoLwQbDt31keH6QcgmZ57SZLE/view?usp=sharing", + "refsource": "MISC", + "name": "https://drive.google.com/file/d/1zW-n58nRoLwQbDt31keH6QcgmZ57SZLE/view?usp=sharing" }, { + "url": "https://github.com/yaml/libyaml", "refsource": "MISC", - "name": "https://github.com/idhyt/pocs/tree/main/libyaml", - "url": "https://github.com/idhyt/pocs/tree/main/libyaml" + "name": "https://github.com/yaml/libyaml" + }, + { + "url": "https://pyyaml.org/wiki/LibYAML", + "refsource": "MISC", + "name": "https://pyyaml.org/wiki/LibYAML" } ] } diff --git a/2024/35xxx/CVE-2024-35329.json b/2024/35xxx/CVE-2024-35329.json index 03986d08638..4276f23c752 100644 --- a/2024/35xxx/CVE-2024-35329.json +++ b/2024/35xxx/CVE-2024-35329.json @@ -1,66 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2024-35329", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-35329", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** DISPUTED ** libyaml 0.2.5 is vulnerable to a heap-based Buffer Overflow in yaml_document_add_sequence in api.c. NOTE: the supplier disputes this because the finding represents a user error. The problem is that the application, which was making use of the libyaml library, omitted the required calls to the yaml_document_initialize and yaml_document_delete functions." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://drive.google.com/file/d/1xgQ9hJ7Sn5RVEsdMGvIy0s3b_bg3Wyk-/view?usp=sharing", - "refsource": "MISC", - "name": "https://drive.google.com/file/d/1xgQ9hJ7Sn5RVEsdMGvIy0s3b_bg3Wyk-/view?usp=sharing" - }, - { - "refsource": "MISC", - "name": "https://github.com/yaml/libyaml/releases/tag/0.2.5", - "url": "https://github.com/yaml/libyaml/releases/tag/0.2.5" + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] } diff --git a/2024/39xxx/CVE-2024-39930.json b/2024/39xxx/CVE-2024-39930.json index 7e827c21dea..cafa3bd0cfa 100644 --- a/2024/39xxx/CVE-2024-39930.json +++ b/2024/39xxx/CVE-2024-39930.json @@ -61,6 +61,11 @@ "url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/", "refsource": "MISC", "name": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/" + }, + { + "refsource": "MISC", + "name": "https://www.vicarius.io/vsociety/posts/argument-injection-in-gogs-ssh-server-cve-2024-39930", + "url": "https://www.vicarius.io/vsociety/posts/argument-injection-in-gogs-ssh-server-cve-2024-39930" } ] }, diff --git a/2024/42xxx/CVE-2024-42698.json b/2024/42xxx/CVE-2024-42698.json index 2ad3958c9eb..5765c1ecd3a 100644 --- a/2024/42xxx/CVE-2024-42698.json +++ b/2024/42xxx/CVE-2024-42698.json @@ -1,18 +1,81 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-42698", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-42698", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Roughly Enough Items (REI) v.16.0.729 and before contains an Improper Validation of Specified Index, Position, or Offset in Input vulnerability. The specific issue is a failure to validate slot index and decrement stack count in the Roughly Enough Items (REI) mod for Minecraft, which allows in-game item duplication." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/apple502j/7b1af0082449c9bfbf910e9a25ef3595", + "refsource": "MISC", + "name": "https://gist.github.com/apple502j/7b1af0082449c9bfbf910e9a25ef3595" + }, + { + "url": "https://github.com/shedaniel/RoughlyEnoughItems/commit/e80ca84f1affb91d2388ddb298bfc6b141828cad", + "refsource": "MISC", + "name": "https://github.com/shedaniel/RoughlyEnoughItems/commit/e80ca84f1affb91d2388ddb298bfc6b141828cad" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:N/C:N/I:L/PR:L/S:U/UI:N", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2024/42xxx/CVE-2024-42900.json b/2024/42xxx/CVE-2024-42900.json index 007357599a8..43b7518f8f3 100644 --- a/2024/42xxx/CVE-2024-42900.json +++ b/2024/42xxx/CVE-2024-42900.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-42900", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-42900", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Ruoyi v4.7.9 and before was discovered to contain a cross-site scripting (XSS) vulnerability via the sql parameter of the createTable() function at /tool/gen/create." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gitee.com/y_project/RuoYi", + "refsource": "MISC", + "name": "https://gitee.com/y_project/RuoYi" + }, + { + "refsource": "MISC", + "name": "https://g03m0n.github.io/posts/cve-2024-42900/", + "url": "https://g03m0n.github.io/posts/cve-2024-42900/" } ] } diff --git a/2024/44xxx/CVE-2024-44083.json b/2024/44xxx/CVE-2024-44083.json index e24bed337b2..ac05e37ce7c 100644 --- a/2024/44xxx/CVE-2024-44083.json +++ b/2024/44xxx/CVE-2024-44083.json @@ -56,6 +56,11 @@ "url": "https://github.com/Azvanzed/IdaMeme", "refsource": "MISC", "name": "https://github.com/Azvanzed/IdaMeme" + }, + { + "refsource": "MISC", + "name": "https://github.com/Azvanzed/CVE-2024-44083/", + "url": "https://github.com/Azvanzed/CVE-2024-44083/" } ] } diff --git a/2024/45xxx/CVE-2024-45386.json b/2024/45xxx/CVE-2024-45386.json new file mode 100644 index 00000000000..6ba0f396666 --- /dev/null +++ b/2024/45xxx/CVE-2024-45386.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-45386", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8264.json b/2024/8xxx/CVE-2024-8264.json new file mode 100644 index 00000000000..d90d1c21d14 --- /dev/null +++ b/2024/8xxx/CVE-2024-8264.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8264", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/8xxx/CVE-2024-8265.json b/2024/8xxx/CVE-2024-8265.json new file mode 100644 index 00000000000..d96f170eee8 --- /dev/null +++ b/2024/8xxx/CVE-2024-8265.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-8265", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file