Auto-Update: 2024-03-17T09:00:37.806261+00:00

This commit is contained in:
cad-safe-bot 2024-03-17 09:03:25 +00:00
parent 3af353c4e7
commit 121556ff5c
4 changed files with 185 additions and 6 deletions

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2555",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-17T07:15:05.803",
"lastModified": "2024-03-17T07:15:05.803",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Employee Task Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file update-admin.php. The manipulation of the argument admin_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257054 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-update-adminphp",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257054",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257054",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2556",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-17T08:15:05.997",
"lastModified": "2024-03-17T08:15:05.997",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Employee Task Management System 1.0. It has been classified as critical. This affects an unknown part of the file attendance-info.php. The manipulation of the argument user_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257055."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/tht1997/WhiteBox/blob/main/sourcecodesters/employee-management-system-php-attendance-info.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257055",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257055",
"source": "cna@vuldb.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-17T07:00:30.089415+00:00
2024-03-17T09:00:37.806261+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-17T05:15:06.040000+00:00
2024-03-17T08:15:05.997000+00:00
```
### Last Data Feed Release
@ -29,14 +29,15 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
241721
241723
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `2`
* [CVE-2024-2554](CVE-2024/CVE-2024-25xx/CVE-2024-2554.json) (`2024-03-17T05:15:06.040`)
* [CVE-2024-2555](CVE-2024/CVE-2024-25xx/CVE-2024-2555.json) (`2024-03-17T07:15:05.803`)
* [CVE-2024-2556](CVE-2024/CVE-2024-25xx/CVE-2024-2556.json) (`2024-03-17T08:15:05.997`)
### CVEs modified in the last Commit

View File

@ -241046,12 +241046,14 @@ CVE-2024-2547,0,0,58cd4235f6d823891f6aefdc867b41784e44558955c2a5a2fa0c5c4dfb5ba7
CVE-2024-25501,0,0,bac5c3eafbac38d2c6b4da329ce2a075da938dd8ce1ff1c471fff3fb2b0c91ae,2024-03-11T01:32:29.610000
CVE-2024-25502,0,0,50331b6b298e51ff1fb5155b43730c3887534f74eacaa5eabfebdbefa930be85,2024-02-16T13:38:00.047000
CVE-2024-2553,0,0,6ab7f1d3aad09b7279fb5ef2827f21c216e9975878dfdd5027623c79d6801347,2024-03-17T04:15:07.073000
CVE-2024-2554,1,1,a7aef3f7acc746404874cc22bb1f0b037f18c91941127474c702786d1c5bbaf9,2024-03-17T05:15:06.040000
CVE-2024-2554,0,0,a7aef3f7acc746404874cc22bb1f0b037f18c91941127474c702786d1c5bbaf9,2024-03-17T05:15:06.040000
CVE-2024-2555,1,1,3d0303af7dafd0cbdbd9786cc67fc18059d2521ec53abb03e1c71d20ad0af5f9,2024-03-17T07:15:05.803000
CVE-2024-25551,0,0,08dea6730d2a3539d15dd516547ab3c25a1bf59710632ae63632a88cbff77b71,2024-03-04T13:58:23.447000
CVE-2024-25552,0,0,d883aeb50248972b9f86293464fb83b3894fa14aa0a35cda83456c82f7157e6f,2024-03-01T14:04:26.010000
CVE-2024-25553,0,0,7897cd9b8668fce1d605300c650e28167f9921d03a4fde26bc34f4ebe45114c9,2024-03-01T08:15:37.950000
CVE-2024-25554,0,0,a87c08d7479e0670c1de7ac680e974b7c966b7f12d7b309312798a5acd199088,2024-03-01T08:15:38.107000
CVE-2024-25559,0,0,621d2089e4066088e4f2e7151d4c52b797349073e2e5f4d074059dc172fb61d6,2024-02-15T06:23:39.303000
CVE-2024-2556,1,1,f6e73ecbdd62c86e33863379d33d4829c115d0be00b9b5391e10c6c81ce51f15,2024-03-17T08:15:05.997000
CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c610,2024-03-01T14:04:26.010000
CVE-2024-25579,0,0,91953a88eab65ef3b6eb3b0fbea08ce09211ffa83ae8783d4b439f2092b924fc,2024-02-29T13:49:47.277000
CVE-2024-25592,0,0,0412b365f90f8498f043e36695d62af9e4613ca29af17a99e02dba80f6454731,2024-03-15T16:26:49.320000

Can't render this file because it is too large.