Auto-Update: 2024-05-27T16:00:30.174150+00:00

This commit is contained in:
cad-safe-bot 2024-05-27 16:03:22 +00:00
parent 9ce3d1afdd
commit 0eb305b25a
7 changed files with 114 additions and 110 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-41320",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-10-15T16:15:07.493",
"lastModified": "2021-10-21T14:13:48.200",
"vulnStatus": "Analyzed",
"lastModified": "2024-05-27T14:15:09.100",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A technical user has hardcoded credentials in Wallstreet Suite TRM 7.4.83 (64-bit edition) with higher privilege than the average authenticated user."
"value": "A technical user has hardcoded credentials in Wallstreet Suite TRM 7.4.83 (64-bit edition) with higher privilege than the average authenticated user. NOTE: the vendor disputes this because the password is not hardcoded (it can be changed during installation or at any later time)."
},
{
"lang": "es",
@ -113,6 +113,10 @@
}
],
"references": [
{
"url": "https://client-connect.iongroup.com/library/content/treasury-management/wallstreet-suite/security/suite-7-4-83/user-passwords/",
"source": "cve@mitre.org"
},
{
"url": "https://excellium-services.com/cert-xlm-advisory/CVE-2021-41320",
"source": "cve@mitre.org",

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-50977",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-27T14:15:09.380",
"lastModified": "2024-05-27T14:15:09.380",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In GNOME Shell through 45.2, unauthenticated remote code execution can be achieved by intercepting two DNS requests (GNOME Network Manager and GNOME Shell Portal Helper connectivity checks), and responding with attacker-specific IP addresses. This DNS hijacking causes GNOME Captive Portal to be launched via a WebKitGTK browser, by default, on the victim system; this can run JavaScript code inside a sandbox. NOTE: the vendor's position is that this is not a vulnerability because running JavaScript code inside a sandbox is the intended behavior."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.gnome.org/GNOME/gnome-shell/-/blob/ceed3e07e44f2cd1bfdbf273523abc0bb4bbd8c1/js/portalHelper/main.js",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/7666",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-0851",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-05-27T15:15:08.780",
"lastModified": "2024-05-27T15:15:08.780",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Grup Arge Energy and Control Systems Smartpower allows SQL Injection.This issue affects Smartpower: through V24.05.27."
}
],
"metrics": {},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-0556",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -2,95 +2,14 @@
"id": "CVE-2024-3205",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-02T23:15:54.627",
"lastModified": "2024-05-17T02:39:46.847",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-27T15:15:08.930",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in yaml libyaml up to 0.2.5 and classified as critical. Affected by this issue is the function yaml_emitter_emit_flow_sequence_item of the file /src/libyaml/src/emitter.c. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259052. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en yaml libyaml hasta 0.2.5 y clasificada como cr\u00edtica. La funci\u00f3n yaml_emitter_emit_flow_sequence_item del archivo /src/libyaml/src/emitter.c es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-259052. NOTA: Se contact\u00f3 primeramente al proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The maintainer identified an error in the libyaml fuzzers. It is not possible to reproduce nor exploit the issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://drive.google.com/drive/folders/1lwNEs8wqwkUV52f3uQNYMPrxRuXPtGQs?usp=sharing",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259052",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259052",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.304561",
"source": "cna@vuldb.com"
}
]
"metrics": {},
"references": []
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-34477",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-27T14:15:09.470",
"lastModified": "2024-05-27T14:15:09.470",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "configureNFS in lib/common/functions.sh in FOG through 1.5.10 allows local users to gain privileges by mounting a crafted NFS share (because of no_root_squash and insecure). In order to exploit the vulnerability, someone needs to mount an NFS share in order to add an executable file as root. In addition, the SUID bit must be added to this file."
}
],
"metrics": {},
"references": [
{
"url": "https://forums.fogproject.org/topic/17486/fog-1-5-10-and-earlier-nfs-privilege-escalation-vulnerability",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/FOGProject/fogproject/blob/a4bb1bf39ac53c3cbe623576915fbc3b5c80a00f/lib/common/functions.sh#L1360",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-27T14:01:09.648917+00:00
2024-05-27T16:00:30.174150+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-27T13:15:09.040000+00:00
2024-05-27T15:15:08.930000+00:00
```
### Last Data Feed Release
@ -33,26 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
251864
251867
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `3`
- [CVE-2023-6349](CVE-2023/CVE-2023-63xx/CVE-2023-6349.json) (`2024-05-27T12:15:08.810`)
- [CVE-2024-3381](CVE-2024/CVE-2024-33xx/CVE-2024-3381.json) (`2024-05-27T13:15:08.490`)
- [CVE-2024-5405](CVE-2024/CVE-2024-54xx/CVE-2024-5405.json) (`2024-05-27T12:15:09.067`)
- [CVE-2024-5406](CVE-2024/CVE-2024-54xx/CVE-2024-5406.json) (`2024-05-27T12:15:09.333`)
- [CVE-2024-5407](CVE-2024/CVE-2024-54xx/CVE-2024-5407.json) (`2024-05-27T13:15:08.573`)
- [CVE-2024-5408](CVE-2024/CVE-2024-54xx/CVE-2024-5408.json) (`2024-05-27T13:15:08.817`)
- [CVE-2024-5409](CVE-2024/CVE-2024-54xx/CVE-2024-5409.json) (`2024-05-27T13:15:09.040`)
- [CVE-2023-50977](CVE-2023/CVE-2023-509xx/CVE-2023-50977.json) (`2024-05-27T14:15:09.380`)
- [CVE-2024-0851](CVE-2024/CVE-2024-08xx/CVE-2024-0851.json) (`2024-05-27T15:15:08.780`)
- [CVE-2024-34477](CVE-2024/CVE-2024-344xx/CVE-2024-34477.json) (`2024-05-27T14:15:09.470`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `2`
- [CVE-2021-41320](CVE-2021/CVE-2021-413xx/CVE-2021-41320.json) (`2024-05-27T14:15:09.100`)
- [CVE-2024-3205](CVE-2024/CVE-2024-32xx/CVE-2024-3205.json) (`2024-05-27T15:15:08.930`)
## Download and Usage

View File

@ -182895,7 +182895,7 @@ CVE-2021-41316,0,0,9451f6e2182248f381d8312075b70cc52b7b28fd6f398b0906a9d6af744cf
CVE-2021-41317,0,0,1e30c3a3cdc2d93da5d5ec7a73c27bdb779d243cf4ebf81d79f9cc20888caecd,2021-09-28T16:01:14.137000
CVE-2021-41318,0,0,3cbda06907c12914b33017e7fd86178d4f26c2bb4744fdb95b60f4d5407af421,2021-10-07T12:45:46.713000
CVE-2021-4132,0,0,05e8a46a6069ed38408d6cc58c95941cc9ad669d41a089a85eac0a259c9e89fb,2021-12-21T15:07:42.040000
CVE-2021-41320,0,0,46f79cb3d0faeb83fa6bdf03a6aaf7f7fadecc2775ce2bf8777b4b6dd0df1cdc,2021-10-21T14:13:48.200000
CVE-2021-41320,0,1,f5ef8c03ed0f3faf0ed201b0b87a38bd86c2a51aeb107ef1559ccfcfe1f2021a,2024-05-27T14:15:09.100000
CVE-2021-41322,0,0,b703288a0976ae25b7f3e242b48042b91c5deb005d49f387e230e92f847be568,2023-08-08T14:22:24.967000
CVE-2021-41323,0,0,d9ad37356690fe59a2f00da0b55e317d864104ab9f4bfaf6cfa10064bdf0afa1,2021-10-07T03:00:37.570000
CVE-2021-41324,0,0,8db7a914b5d2aab764a489b67f58f13404a8e9bbafef8419f38e4aea8e975234,2021-10-07T21:56:24.883000
@ -236979,6 +236979,7 @@ CVE-2023-5097,0,0,0f86cc372d2c26b6541ac3ec5ba289a39a168bf65c355711efa9e745857fe3
CVE-2023-50974,0,0,64121c933f739d8b35ccb2b018adc49dbc3ecd37fb638c0ca9261e8aa268c1c8,2024-01-12T20:25:04.120000
CVE-2023-50975,0,0,a3c387351b5cb3112ae57eb6decd6048c7e5563bc70bcc034afc09ab81c61e0e,2024-02-22T19:07:27.197000
CVE-2023-50976,0,0,b4013c170504d7533d23aee05010a848cbe499012767fb0ca51aae1561e21e35,2023-12-22T21:23:23.067000
CVE-2023-50977,1,1,830fcc975f7a0f322641c0eeec4b2a9affa4b537e1db455e6df64c1a6d75d785,2024-05-27T14:15:09.380000
CVE-2023-50979,0,0,db30250302fec4fba765b6baf7a0d8d9d9cc8fd12a61cfeda28a01f641ae78e8,2023-12-27T18:59:12.027000
CVE-2023-5098,0,0,b1f60952efad14350a7dcf5b932f9846957c48bb7b9f485b0d1c0be187395d0b,2023-11-08T18:33:48.503000
CVE-2023-50980,0,0,51bd43ebed75455dbf4f815998127cca51023596397489e47e4540205169564f,2023-12-27T19:04:11.283000
@ -239364,7 +239365,7 @@ CVE-2023-6345,0,0,a9d7fbb37b5bedc60cc374c5aba487da97d8bafd2dd093fe7949f604d257b7
CVE-2023-6346,0,0,c40bf8c265a92108ff97f9d05c1f66ae31d46069c960237aa0eb79c96f65109d,2024-01-31T17:15:23.213000
CVE-2023-6347,0,0,d95524d2c228513203a102be0e94cb621b285684af6da72197460b84ebeb516d,2024-01-31T17:15:23.647000
CVE-2023-6348,0,0,706b82708bceb6844e727704576bb420554258a8d74eede78820e3034fd2985c,2024-01-31T17:15:23.980000
CVE-2023-6349,1,1,339d13717e8ecfab2196bb13c6a4404b7b127f771b20585d94508cfec3aacc82,2024-05-27T12:15:08.810000
CVE-2023-6349,0,0,339d13717e8ecfab2196bb13c6a4404b7b127f771b20585d94508cfec3aacc82,2024-05-27T12:15:08.810000
CVE-2023-6350,0,0,9d7ad504737b94d45fc95132d0bdf31e98f4b10c438be5a55687a8cc1730d327,2024-01-31T17:15:24.350000
CVE-2023-6351,0,0,b642b9477c499dc985ed242dcc1430092dc5faffae820429036d91341cf9907b,2024-01-31T17:15:24.673000
CVE-2023-6352,0,0,a7c9f6deee309d44509b6c9208a201145230316f41723e551e729328a3c70e36,2023-12-11T14:40:41.233000
@ -240823,6 +240824,7 @@ CVE-2024-0844,0,0,9b0ede7ee0379ed34aa516e6f2cba464e96d05ae45278d47c03f7b0b4baaf7
CVE-2024-0847,0,0,2423a45a83c68ee77ea1657795a6b4f742f1b905ef7ab47fbb7c37fbc6c3b67d,2024-05-02T18:00:37.360000
CVE-2024-0848,0,0,31e58640f306446653f67bc78198fcff39c93c6b22a4398146342d7991ad8c6a,2024-05-02T18:00:37.360000
CVE-2024-0849,0,0,ab143b9a0b5d37d266faac9cd54f50fee666b57f962e8e1bec5db73357a455f9,2024-02-13T19:16:30.810000
CVE-2024-0851,1,1,e64047998fdc7127744d767cf997e0a60484a135cf88b67269b94715d365c945,2024-05-27T15:15:08.780000
CVE-2024-0853,0,0,48741ff766ade9b023961bbceceaafd7a1985d06925636a8fc9f27ee5d25b1a6,2024-05-03T13:15:21.320000
CVE-2024-0854,0,0,b2a19a635a88b4ff68549abb31f11c392c07f9e329d9704350bbb3ee75810c41,2024-01-30T17:01:37.127000
CVE-2024-0855,0,0,fee06b61accc977f963cdb2b2ef743d4f7ee62d05033c371692bc8e3d7ebf823,2024-02-27T14:20:06.637000
@ -248899,7 +248901,7 @@ CVE-2024-32045,0,0,3757a773847b5ed6c32fb24905f0b5c02d842b84e0e51fc3b349b201665bf
CVE-2024-32046,0,0,3771b70436f95435fc521db21da6fd859bb3ed607b3e6e7edd188445267746f3,2024-04-26T12:58:17.720000
CVE-2024-32047,0,0,f009d59be96ce9fa193a4aa9724cc4cc41ffb33bc61e4f05b98fbbfa91a9068b,2024-05-16T13:03:05.353000
CVE-2024-32049,0,0,d9cad06fbf5a30eecb78b22409f73f445b96767def965004d9fc51455fda8ca6,2024-05-08T17:05:24.083000
CVE-2024-3205,0,0,c3a9ce84fafed58ce2fc8a240f386de0c3cae4edd5893ee1ae56b7013f99ec1a,2024-05-17T02:39:46.847000
CVE-2024-3205,0,1,94de9427276f5133bdfe91db56cbfc9958b517e8a2bb181bf6c470a918feb832,2024-05-27T15:15:08.930000
CVE-2024-32051,0,0,6b68078466255ceca82525e73c2bf321431fb4aeacd1939a9b40ac3cfa9637f8,2024-04-24T13:39:42.883000
CVE-2024-32053,0,0,c49f1ec019a03a55c7a246c2938dce6b00883e32de7837d58b7e2304f1b45b97,2024-05-16T13:03:05.353000
CVE-2024-32055,0,0,6f2d1e2b794c469fc60e21d2252e9f5df7bf8f202c22d166d778068242a50bff,2024-05-14T19:17:55.627000
@ -249842,7 +249844,7 @@ CVE-2024-33791,0,0,2786e7a8195c6ad972434c0d7a30a33f957fdd2fdd91aaac75f6ce3fbef54
CVE-2024-33792,0,0,7e8694e2bb2a659e8d08c902362d29026ff1c04595111f0bccc0fd7b0663e1e1,2024-05-07T05:15:51.893000
CVE-2024-33793,0,0,1bdbd66edb6a4ee81475ab628b3dbabe390dd8c440854dad95c22ae762967d37,2024-05-07T06:15:08.720000
CVE-2024-33809,0,0,a9244b7bac7a01a848ecf7adc4839dcc7ecaf56436a02182e43d1bf648cb6641,2024-05-24T18:09:20.027000
CVE-2024-3381,1,1,2675878f918c9740671fc065cc6afea6b859e07b3f755ce74555424e09b49f5d,2024-05-27T13:15:08.490000
CVE-2024-3381,0,0,2675878f918c9740671fc065cc6afea6b859e07b3f755ce74555424e09b49f5d,2024-05-27T13:15:08.490000
CVE-2024-33818,0,0,fcf08ee825495c7c9196412d6a7ac485908da9a914b001b572e82e64bc2af5f7,2024-05-14T16:12:23.490000
CVE-2024-33819,0,0,27ebf543bf09f96d296185f9994673eb8c5aa230fac1ef1d22da8e6b7ccd2158,2024-05-14T16:12:23.490000
CVE-2024-3382,0,0,359ee56c09e0a2a64315ebc823efc4b55ab60390ccbf48a0550f896cf550e0d4,2024-04-10T19:49:51.183000
@ -250188,6 +250190,7 @@ CVE-2024-34473,0,0,a0e81d4e65e4f59fc6788a67ab9abe6ae8169dfe1411246b36c4680fde1af
CVE-2024-34474,0,0,3df656c76dccd5c0b812eaec7b5241dc606cf859dfb7b55dfdb0e2ac6d92fbbf,2024-05-06T12:44:56.377000
CVE-2024-34475,0,0,bc3b000674e2f5e5d8987a5a03c7029744124543abeafbfeb540e90342057172,2024-05-06T12:44:56.377000
CVE-2024-34476,0,0,f460d7b07cd8e1102230047a90895024b7118c0a722ec4264bd02b84a90ba448,2024-05-06T12:44:56.377000
CVE-2024-34477,1,1,1c3916da72fe70175c33b76d785b0a9c82c863ba75e4d8ef95c22a1137f829de,2024-05-27T14:15:09.470000
CVE-2024-34478,0,0,e041b25b36e3062d0ab338fb8a5bf2a23de65e7f383d14a7d54f9bd405368aa0,2024-05-06T12:44:56.377000
CVE-2024-3448,0,0,38511310080ef6cbfb33c1721e41ad41c6df0877e6ffcdbf14f478fa1ea7a673,2024-04-10T19:49:51.183000
CVE-2024-34483,0,0,df92e60b2a063249d7c7eb5d2fcb2d7b0c92f9a83d882b5d628cf9e21e289c65,2024-05-06T12:44:56.377000
@ -251858,8 +251861,8 @@ CVE-2024-5397,0,0,127f0e4aebb20af982b9f8f3c5e3c610f094604b0e4dbcdf747a9ca9a9d17d
CVE-2024-5399,0,0,11939ed21acc3c5ec586746ddde14b797a390e121836283682232169079970b5,2024-05-27T04:15:09.300000
CVE-2024-5400,0,0,3934e126a75210a22708febe3829ce6c46f46cc7e12a3a7182ec01f8e6ac35ad,2024-05-27T06:15:10.620000
CVE-2024-5403,0,0,ed1d166ca6bf87c091bd718e3e0b00502f1d612d8d3d042e4dc422513dd0bdef,2024-05-27T07:15:09.530000
CVE-2024-5405,1,1,49942e4a68a09244f074abab0118a3e725704e492551d35caf34af31201462e6,2024-05-27T12:15:09.067000
CVE-2024-5406,1,1,8388cdb5206a2260ff3ef4be55e5195b9526275a7722f69924ed74fee613c514,2024-05-27T12:15:09.333000
CVE-2024-5407,1,1,f6f018cb73591d5951317cf6cb9418428e5bc3ae925c84689b3ce2d5c483f30a,2024-05-27T13:15:08.573000
CVE-2024-5408,1,1,219da37207b714ce9e3524b5c58f50d48db58bc623cbb609140a8131f93b7a65,2024-05-27T13:15:08.817000
CVE-2024-5409,1,1,dc5f7da4fafab5ffa6fcbfdf146c0d675a15daf5a8580fc3a389221d5de44817,2024-05-27T13:15:09.040000
CVE-2024-5405,0,0,49942e4a68a09244f074abab0118a3e725704e492551d35caf34af31201462e6,2024-05-27T12:15:09.067000
CVE-2024-5406,0,0,8388cdb5206a2260ff3ef4be55e5195b9526275a7722f69924ed74fee613c514,2024-05-27T12:15:09.333000
CVE-2024-5407,0,0,f6f018cb73591d5951317cf6cb9418428e5bc3ae925c84689b3ce2d5c483f30a,2024-05-27T13:15:08.573000
CVE-2024-5408,0,0,219da37207b714ce9e3524b5c58f50d48db58bc623cbb609140a8131f93b7a65,2024-05-27T13:15:08.817000
CVE-2024-5409,0,0,dc5f7da4fafab5ffa6fcbfdf146c0d675a15daf5a8580fc3a389221d5de44817,2024-05-27T13:15:09.040000

Can't render this file because it is too large.