Auto-Update: 2024-03-18T09:00:39.926637+00:00

This commit is contained in:
cad-safe-bot 2024-03-18 09:03:28 +00:00
parent b9eae881ee
commit 05c0421e0b
9 changed files with 256 additions and 17 deletions

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2024-21824",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-03-18T08:15:06.087",
"lastModified": "2024-03-18T08:15:06.087",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper authentication vulnerability in exists in multiple printers and scanners which implement Web Based Management provided by BROTHER INDUSTRIES, LTD. If this vulnerability is exploited, a network-adjacent user who can access the product may impersonate an administrative user. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN82749078/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://support.brother.com/g/b/link.aspx?prod=group2&faqid=faqp00100601_000",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://support.brother.com/g/b/link.aspx?prod=lmgroup1&faqid=faq00100823_000",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.fujifilm.com/fbglobal/eng/company/news/notice/2024/0306_2_announce.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2024-000002",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.com/information/20240306_01.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2024-22475",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-03-18T08:15:06.173",
"lastModified": "2024-03-18T08:15:06.173",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery vulnerability in multiple printers and scanners which implement Web Based Management provided by BROTHER INDUSTRIES, LTD. allows a remote unauthenticated attacker to perform unintended operations on the affected product. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN82749078/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://support.brother.com/g/b/link.aspx?prod=group2&faqid=faqp00100601_000",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://support.brother.com/g/b/link.aspx?prod=lmgroup1&faqid=faq00100823_000",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.fujifilm.com/fbglobal/eng/company/news/notice/2024/0306_2_announce.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2024-000002",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.com/information/20240306_01.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-23604",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-03-18T08:15:06.233",
"lastModified": "2024-03-18T08:15:06.233",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting vulnerability exists in FitNesse all releases, which may allow a remote unauthenticated attacker to execute an arbitrary script on the web browser of the user who is using the product and accessing a link with specially crafted multiple parameters."
}
],
"metrics": {},
"references": [
{
"url": "http://fitnesse.org/FitNesseDownload",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://github.com/unclebob/fitnesse",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://github.com/unclebob/fitnesse/blob/master/SECURITY.md",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN94521208/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-27974",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-03-18T08:15:06.287",
"lastModified": "2024-03-18T08:15:06.287",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery vulnerability in FUJIFILM printers which implement CentreWare Internet Services or Internet Services allows a remote unauthenticated attacker to alter user information. In the case the user is an administrator, the settings such as the administrator's ID, password, etc. may be altered. As for the details of affected product names, model numbers, and versions, refer to the information provided by the vendor listed under [References]."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN34328023/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.fujifilm.com/fbglobal/eng/company/news/notice/2024/0306_1_announce.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-28125",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-03-18T08:15:06.347",
"lastModified": "2024-03-18T08:15:06.347",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "FitNesse all releases allows a remote authenticated attacker to execute arbitrary OS commands."
}
],
"metrics": {},
"references": [
{
"url": "http://fitnesse.org/FitNesseDownload",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://github.com/unclebob/fitnesse",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://github.com/unclebob/fitnesse/blob/master/SECURITY.md",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN94521208/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-28128",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-03-18T08:15:06.400",
"lastModified": "2024-03-18T08:15:06.400",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting vulnerability exists in FitNesse releases prior to 20220319, which may allow a remote unauthenticated attacker to execute an arbitrary script on the web browser of the user who is using the product and accessing a link with a specially crafted certain parameter."
}
],
"metrics": {},
"references": [
{
"url": "http://fitnesse.org/FitNesseDownload",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://github.com/unclebob/fitnesse",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://github.com/unclebob/fitnesse/blob/master/SECURITY.md",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN94521208/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-29156",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-18T07:15:05.880",
"lastModified": "2024-03-18T07:15:05.880",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In OpenStack Murano through 16.0.0, when YAQL before 3.0.0 is used, the Murano service's MuranoPL extension to the YAQL language fails to sanitize the supplied environment, leading to potential leakage of sensitive service account information."
}
],
"metrics": {},
"references": [
{
"url": "https://launchpad.net/bugs/2048114",
"source": "cve@mitre.org"
},
{
"url": "https://opendev.org/openstack/murano/tags",
"source": "cve@mitre.org"
},
{
"url": "https://opendev.org/openstack/yaql/commit/83e28324e1a0ce3970dd854393d2431123a909d3",
"source": "cve@mitre.org"
},
{
"url": "https://wiki.openstack.org/wiki/OSSN/OSSN-0093",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-18T07:00:38.495956+00:00
2024-03-18T09:00:39.926637+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-18T06:15:06.080000+00:00
2024-03-18T08:15:06.400000+00:00
```
### Last Data Feed Release
@ -29,20 +29,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
241774
241781
```
### CVEs added in the last Commit
Recently added CVEs: `7`
* [CVE-2018-25099](CVE-2018/CVE-2018-250xx/CVE-2018-25099.json) (`2024-03-18T05:15:06.007`)
* [CVE-2021-47154](CVE-2021/CVE-2021-471xx/CVE-2021-47154.json) (`2024-03-18T05:15:06.140`)
* [CVE-2021-47155](CVE-2021/CVE-2021-471xx/CVE-2021-47155.json) (`2024-03-18T05:15:06.203`)
* [CVE-2021-47156](CVE-2021/CVE-2021-471xx/CVE-2021-47156.json) (`2024-03-18T05:15:06.260`)
* [CVE-2021-47157](CVE-2021/CVE-2021-471xx/CVE-2021-47157.json) (`2024-03-18T05:15:06.317`)
* [CVE-2024-29151](CVE-2024/CVE-2024-291xx/CVE-2024-29151.json) (`2024-03-18T06:15:05.913`)
* [CVE-2024-29154](CVE-2024/CVE-2024-291xx/CVE-2024-29154.json) (`2024-03-18T06:15:06.080`)
* [CVE-2024-21824](CVE-2024/CVE-2024-218xx/CVE-2024-21824.json) (`2024-03-18T08:15:06.087`)
* [CVE-2024-22475](CVE-2024/CVE-2024-224xx/CVE-2024-22475.json) (`2024-03-18T08:15:06.173`)
* [CVE-2024-23604](CVE-2024/CVE-2024-236xx/CVE-2024-23604.json) (`2024-03-18T08:15:06.233`)
* [CVE-2024-27974](CVE-2024/CVE-2024-279xx/CVE-2024-27974.json) (`2024-03-18T08:15:06.287`)
* [CVE-2024-28125](CVE-2024/CVE-2024-281xx/CVE-2024-28125.json) (`2024-03-18T08:15:06.347`)
* [CVE-2024-28128](CVE-2024/CVE-2024-281xx/CVE-2024-28128.json) (`2024-03-18T08:15:06.400`)
* [CVE-2024-29156](CVE-2024/CVE-2024-291xx/CVE-2024-29156.json) (`2024-03-18T07:15:05.880`)
### CVEs modified in the last Commit

View File

@ -121368,7 +121368,7 @@ CVE-2018-25095,0,0,fb73a2ca07bc0b1c3648dd352ef5d63d5e38141d3163c348c092eb2180763
CVE-2018-25096,0,0,65946b951ad2c28cc99779b55c9189a3eff50639dbf842e942c8a91e53b437eb,2024-02-29T01:23:15.437000
CVE-2018-25097,0,0,2c5fa32a0d772992a56fb020de703568956d2982c6480d087346ecda7afe11fd,2024-02-29T01:23:15.543000
CVE-2018-25098,0,0,37d4c449b9e769fa372d3a284d5f7c94226d641b16e61e76e9d5cd58b62d1343,2024-02-29T01:23:15.647000
CVE-2018-25099,1,1,ecd7dfac4689d31b78533455ca24a9939b8794d81bc98ef23cf13bf85a2f0f57,2024-03-18T05:15:06.007000
CVE-2018-25099,0,0,ecd7dfac4689d31b78533455ca24a9939b8794d81bc98ef23cf13bf85a2f0f57,2024-03-18T05:15:06.007000
CVE-2018-2515,0,0,158f882e4275a7485a2b9ce17e7e57c4ea22cf74c55a78a9900c73a4caa327c0,2023-11-07T02:57:57.887000
CVE-2018-2560,0,0,0bb1a26d6c05fddeb488697adb0bbe667a3dd77c1a5bc7af495c8721df5b1197,2020-08-24T17:37:01.140000
CVE-2018-2561,0,0,b76feaa260e2f54fc8eeb8d50d578ffdd22b603f486ac4f8f5b3bc42df22fa45,2018-01-25T13:53:15.120000
@ -186840,10 +186840,10 @@ CVE-2021-47132,0,0,1547d2dc3a369b3f7e76a4c03ab3a2a4cba2c1bffe45a54c111488733e6a6
CVE-2021-47133,0,0,7b6345e898b3e10a871129b85c8e095f10e5f051f1b15bf60f334c8709116bdd,2024-03-17T22:38:29.433000
CVE-2021-47134,0,0,8a7c141a2170c4a86e59cf8803a362f8506e9aca7f6918b58c8cce087c1666ed,2024-03-17T22:38:29.433000
CVE-2021-47135,0,0,a29c3bbac0a96b9549a1fb1c3113013df387a88d8966ee7b2759c5051b5c4adf,2024-03-17T22:38:29.433000
CVE-2021-47154,1,1,5e15afa228cb7c4a5090cc44bbb98f6da5085390666542753115a7e8b02a7679,2024-03-18T05:15:06.140000
CVE-2021-47155,1,1,71b3ab778c2ec575952faee8d383c5ecbb1e2626f5a83aefc2641eccdfa77ae2,2024-03-18T05:15:06.203000
CVE-2021-47156,1,1,c96a781c45f67e4a33fa315e21c1e4dbf3e2bf8222c513ca19d93fc27237c58e,2024-03-18T05:15:06.260000
CVE-2021-47157,1,1,212dafd9cdc2c9edf3fb0934adbba9140a4a5dd9a0c761aaceb0aa74dde8aa68,2024-03-18T05:15:06.317000
CVE-2021-47154,0,0,5e15afa228cb7c4a5090cc44bbb98f6da5085390666542753115a7e8b02a7679,2024-03-18T05:15:06.140000
CVE-2021-47155,0,0,71b3ab778c2ec575952faee8d383c5ecbb1e2626f5a83aefc2641eccdfa77ae2,2024-03-18T05:15:06.203000
CVE-2021-47156,0,0,c96a781c45f67e4a33fa315e21c1e4dbf3e2bf8222c513ca19d93fc27237c58e,2024-03-18T05:15:06.260000
CVE-2021-47157,0,0,212dafd9cdc2c9edf3fb0934adbba9140a4a5dd9a0c761aaceb0aa74dde8aa68,2024-03-18T05:15:06.317000
CVE-2022-0001,0,0,eef83f8ee034200b042b5eda26b679b982266672cf1407daf8d9fbe1ba7937b5,2022-08-19T12:28:32.903000
CVE-2022-0002,0,0,4ba989879ca817729e7cddc36d35dc20834fb13fd71d0cce189890fe2defbd53,2022-08-19T12:28:50.667000
CVE-2022-0004,0,0,4891f62a2edc2f307dec62ec3f2089232f3fddba4652b7ef635786ed0f8a2286,2022-06-10T20:52:37.810000
@ -239592,6 +239592,7 @@ CVE-2024-21815,0,0,77643bc01852fedba42660856307ea92e48bb3e3a61f220c8468619481001
CVE-2024-21816,0,0,1c59ad824873b45e692308f55039674fb26186a48eef31c5167e14b30ad2d48e,2024-03-04T13:58:23.447000
CVE-2024-2182,0,0,14bda1bfcdbdf6b080e85345ab2fdae24b0366e1f08f909e690ef4866c4d1dff,2024-03-12T17:46:17.273000
CVE-2024-21821,0,0,4c3f841f13791c81362ea564b3fbf92012289121b1ae208771ab4f8c8efda3a4,2024-01-18T17:08:35.830000
CVE-2024-21824,1,1,c1cdc2d3ea2481a42a8abdd1bb8cc537b301ce8f4369b37ab2671314039376c0,2024-03-18T08:15:06.087000
CVE-2024-21825,0,0,863f3bb0e32138d36771cc5631b2bee7f6404deacea520723a59336b368d85d0,2024-02-26T18:15:07.390000
CVE-2024-21826,0,0,86b5e9b280063a0ae27fb6d21bc17eab887de733b019435029a476d441c4590c,2024-03-04T13:58:23.447000
CVE-2024-21833,0,0,d495db7ecc3e5eea6a844ebf68934df72f88808ddb4472cc88d71eac4c0a6284,2024-01-18T18:26:59.627000
@ -239874,6 +239875,7 @@ CVE-2024-22463,0,0,5b884681f5c1cb31ebf38842df7c3075a8e9d98da101d1e4ec4faa1ef09b6
CVE-2024-22464,0,0,890f63b91e1207e51dc2d0fc686f763deb067d6410c523bfc64d52071d75be15,2024-02-15T05:03:27.617000
CVE-2024-2247,0,0,b52dba6f68142dbeca56f2f1bf8b23a5401066ec4f0585445fe0cb42ba284eff,2024-03-14T10:15:07.027000
CVE-2024-22473,0,0,ba695bcad0bbe2cba422f3053697429916506f0f0ce55f150fe9af4a818e1f6b,2024-02-22T19:07:27.197000
CVE-2024-22475,1,1,33e191f20f26c04b0dc5ed44a066597bc27a3961d127d59ca446b81a73b31962,2024-03-18T08:15:06.173000
CVE-2024-2249,0,0,cf7e9c481ceeab4ebea44cd6aa64f5dbe4abd16900b5ad6fea6a1dcff54afc44,2024-03-15T12:53:06.423000
CVE-2024-22490,0,0,36caaa8caefc70cd3fb65a62a9488b2446e68d14844d0a61d7baf757d2000caa,2024-01-29T22:48:35.493000
CVE-2024-22491,0,0,99c25b0ff8de89fe3ebd04368e499e7fe9b3820707560bd21fed90048934c0ad,2024-01-23T14:28:45.890000
@ -240255,6 +240257,7 @@ CVE-2024-23553,0,0,51ea2d50cc1ff4dbab518de2a29e9ef6a91bd6b91073c23eb1a7f0cb7c8f1
CVE-2024-2357,0,0,313587ca8b6b7919815ba797bea441002843b5151b56a9603272699863c7c655,2024-03-12T12:40:13.500000
CVE-2024-23591,0,0,f4c08614f6a162f49ecc99f020c088036b0b565e06b57796e1304b45ae78e59d,2024-02-20T22:15:08.353000
CVE-2024-23603,0,0,fa877b171423c355baa3228ce2c605e41edbf822a3508567d7754cb447355052,2024-02-14T18:04:45.380000
CVE-2024-23604,1,1,ebf520efdb1291625cebf2afa512ecc89e9f0859d871db5a1cc4908400df4c55,2024-03-18T08:15:06.233000
CVE-2024-23605,0,0,6357ef47a85c4e22049db0926cbddeb8bbc82cdf2a1a81b5a28ca15d9cbb7aa0,2024-02-26T18:15:07.673000
CVE-2024-23606,0,0,598e3aff4ae1bfd2aada0c773944509bbb201f8071a41b1a5b9e3c7372eb5aae,2024-02-20T19:50:53.960000
CVE-2024-23607,0,0,8fbc2564c100ed17fa897212d565c049df0409466e1eb4358411ecb3ce547801,2024-02-14T18:04:45.380000
@ -241634,6 +241637,7 @@ CVE-2024-27958,0,0,2ee086fb447798c561fd1c831c754d734514f619f6ebb04cf96679cb78dfe
CVE-2024-27959,0,0,e2d4c3e5066dc506643038067fab6e9f26070ced2f7f327a18ffcd82b243c593,2024-03-17T22:38:29.433000
CVE-2024-27960,0,0,6ff911c5617586aebae672070284633e223cb5b14cbbc3b1801f17c292900f46,2024-03-17T22:38:29.433000
CVE-2024-27961,0,0,3162bfbc67900a83a9b4114dba265e7189f0bad8c0ddf2d85f6724674d13510a,2024-03-17T22:38:29.433000
CVE-2024-27974,1,1,488bcc5b63f94acd0b1ffdaaa0228d98259feadd04707d2943e178cd4181ca3d,2024-03-18T08:15:06.287000
CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000
CVE-2024-27987,0,0,ce6fd0b1730cd837f285c0aaaa1258cf6aa8505469e7f313401adb363ee7f395,2024-03-15T12:53:06.423000
CVE-2024-28053,0,0,e281ed045d826247c32c0ccef204d2c431b80f755e75c928bfd444d7e8497772,2024-03-15T12:53:06.423000
@ -241656,6 +241660,8 @@ CVE-2024-28115,0,0,3e0e705412ec4ecfb9fabefcb95634cd838a6bf7c9c03087d677ba199986f
CVE-2024-28120,0,0,1945ab744b479cd2a55b16e82913f94d84bcc236918a39e22cfe06aca7010c4c,2024-03-12T12:40:13.500000
CVE-2024-28121,0,0,6ad3b99e4c8dd1459c44e51d2edc62f08f0aa4d5ffd25ea4a2fe7aa5af2916e8,2024-03-13T21:16:00.460000
CVE-2024-28122,0,0,3209f9a611aea4804720e8e5b4eeb3a02772982f302e787ac8040299af464092,2024-03-11T01:32:39.697000
CVE-2024-28125,1,1,65d9c24a5e0c0b4d148512225b96193c0bf73b8894ddd2671583c2b38959e5fa,2024-03-18T08:15:06.347000
CVE-2024-28128,1,1,a17695a240f4f2d82ca81a1ea07dea66dfa16007f2258e0e74076abcd1b5a954,2024-03-18T08:15:06.400000
CVE-2024-28149,0,0,bb1327eb2ceb44ae2cc8e952fde2f54b109f1740591e1ece1b912c644025402b,2024-03-06T21:42:54.697000
CVE-2024-28150,0,0,bd9c785686979f74fc956d3a9d80b65ba208ec849a10e17a7f0c9226761980a2,2024-03-06T21:42:54.697000
CVE-2024-28151,0,0,473d59d35d2166d8f0877541c6be6e5f16e5683e6e89c2ed65e060f312f6c9a8,2024-03-06T21:42:54.697000
@ -241771,5 +241777,6 @@ CVE-2024-28851,0,0,f15187ac52243f1288d6dabed456ab5bd2287b2db60c97a538d0582f4f0ba
CVE-2024-28854,0,0,8cb03aded6b194ffbf5e93b6a999bfbf01ac8f736343c4fc752b0e38a8bc9f90,2024-03-17T22:38:29.433000
CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000
CVE-2024-28862,0,0,b0dc40150b0e5f15633ecb26c2614b37fe6eefbb423911349887989b36d78640,2024-03-17T22:38:29.433000
CVE-2024-29151,1,1,5ec903f1e83fe9ef91dd8fa281d0d9249de67095eb219c2fefc315dc2fd25383,2024-03-18T06:15:05.913000
CVE-2024-29154,1,1,27deb04035bee400856eb7d08b4f1bd8e0f3cd03c5a26708ab341cdb537485b4,2024-03-18T06:15:06.080000
CVE-2024-29151,0,0,5ec903f1e83fe9ef91dd8fa281d0d9249de67095eb219c2fefc315dc2fd25383,2024-03-18T06:15:05.913000
CVE-2024-29154,0,0,27deb04035bee400856eb7d08b4f1bd8e0f3cd03c5a26708ab341cdb537485b4,2024-03-18T06:15:06.080000
CVE-2024-29156,1,1,dc9b9c233c31a730eb56f0d9193b5d656bd692e0fe6247903130d468d58de8ec,2024-03-18T07:15:05.880000

Can't render this file because it is too large.