Auto-Update: 2024-08-21T12:00:17.118739+00:00

This commit is contained in:
cad-safe-bot 2024-08-21 12:03:14 +00:00
parent 62f94ab341
commit 19ed851445
7 changed files with 171 additions and 23 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2023-22576",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-08-21T10:15:04.173",
"lastModified": "2024-08-21T10:15:04.173",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Repository Manager version 3.4.2 and earlier, contain a Local Privilege Escalation Vulnerability in Installation module. A local low privileged attacker may potentially exploit this vulnerability leading to the execution of arbitrary executable on the operating system with high privileges using the existing vulnerability in operating system. Exploitation may lead to unavailability of the service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000207513/dsa-2023-017-dell-emc-repository-manager-drm-security-update-for-an-improper-privilege-management-vulnerability",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2023-49198",
"sourceIdentifier": "security@apache.org",
"published": "2024-08-21T10:15:04.903",
"lastModified": "2024-08-21T10:15:04.903",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mysql security vulnerability in Apache SeaTunnel.\n\nAttackers can read files on the MySQL server by modifying the information in the MySQL URL\n\n allowLoadLocalInfile=true&allowUrlInLocalInfile=true&allowLoadLocalInfileInPath=/&maxAllowedPacket=655360\nThis issue affects Apache SeaTunnel: 1.0.0.\n\nUsers are recommended to upgrade to version [1.0.1], which fixes the issue."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-552"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/48j9f1nsn037mgzc4j9o51nwglb1s08h",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37008",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-08-21T10:15:05.037",
"lastModified": "2024-08-21T10:15:05.037",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted DWG file, when parsed in Revit, can force a stack-based buffer overflow. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0013",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42679",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T14:15:11.003",
"lastModified": "2024-08-20T19:11:30.170",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-21T11:06:24.627",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,8 +61,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cysoft168:super_easy_enterprise_management_system:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.0",
"matchCriteriaId": "CBFCD140-3CD8-4D15-9771-033C393FC3AE"
"versionEndIncluding": "1.0.0",
"matchCriteriaId": "D28A83C1-38F8-4944-90AC-47DFA013E82B"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42680",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T14:15:11.107",
"lastModified": "2024-08-20T19:15:43.747",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-21T11:06:00.887",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -60,9 +60,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:super_easy_enterprise_management_system_project:super_easy_enterprise_management_system:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:cysoft168:super_easy_enterprise_management_system:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.0.0",
"matchCriteriaId": "8C417977-4219-432A-A6BF-DF10C8F068CB"
"matchCriteriaId": "D28A83C1-38F8-4944-90AC-47DFA013E82B"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-21T10:00:17.080322+00:00
2024-08-21T12:00:17.118739+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-21T09:15:04.973000+00:00
2024-08-21T11:06:24.627000+00:00
```
### Last Data Feed Release
@ -33,24 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
260774
260777
```
### CVEs added in the last Commit
Recently added CVEs: `3`
- [CVE-2024-5335](CVE-2024/CVE-2024-53xx/CVE-2024-5335.json) (`2024-08-21T09:15:04.563`)
- [CVE-2024-6339](CVE-2024/CVE-2024-63xx/CVE-2024-6339.json) (`2024-08-21T08:15:04.333`)
- [CVE-2024-7757](CVE-2024/CVE-2024-77xx/CVE-2024-7757.json) (`2024-08-21T09:15:04.973`)
- [CVE-2023-22576](CVE-2023/CVE-2023-225xx/CVE-2023-22576.json) (`2024-08-21T10:15:04.173`)
- [CVE-2023-49198](CVE-2023/CVE-2023-491xx/CVE-2023-49198.json) (`2024-08-21T10:15:04.903`)
- [CVE-2024-37008](CVE-2024/CVE-2024-370xx/CVE-2024-37008.json) (`2024-08-21T10:15:05.037`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
- [CVE-2024-1459](CVE-2024/CVE-2024-14xx/CVE-2024-1459.json) (`2024-08-21T08:15:04.047`)
- [CVE-2024-39480](CVE-2024/CVE-2024-394xx/CVE-2024-39480.json) (`2024-08-21T08:35:05.157`)
- [CVE-2024-42679](CVE-2024/CVE-2024-426xx/CVE-2024-42679.json) (`2024-08-21T11:06:24.627`)
- [CVE-2024-42680](CVE-2024/CVE-2024-426xx/CVE-2024-42680.json) (`2024-08-21T11:06:00.887`)
## Download and Usage

View File

@ -216644,6 +216644,7 @@ CVE-2023-22572,0,0,778132e3b3f1c6111ec36dfa71316889039f517589afb27544bf256807f05
CVE-2023-22573,0,0,695940d0a93594287fdbd9acbc9b34e26235c4d79dab66e64e7b07d3ab3ac00f,2023-11-07T04:07:03.490000
CVE-2023-22574,0,0,aabdaef9b03b49d2d5c4e805d45fdd5dedd66691d702929398a4937fd5b7eac8,2023-11-07T04:07:03.700000
CVE-2023-22575,0,0,0fa7814eb835b1136895274bd2531f1a8e8cbfed45eb164215437ecf3caa9fba,2023-11-07T04:07:03.910000
CVE-2023-22576,1,1,f34c873317b85e1cc8a94c6e89652edd8bcceda8efb18db311343ae15a5c58bd,2024-08-21T10:15:04.173000
CVE-2023-22577,0,0,e60adbac0fa6d3fedb1bcdd27e7e5af2dd2842bde5e722c2b627410b2be78279,2023-05-02T19:13:08.980000
CVE-2023-22578,0,0,aa99ee9b2e1474cc51633927001ee761e43c7fc8e969c212365f2e94662f2910,2023-03-03T19:23:56.890000
CVE-2023-22579,0,0,b50f51817f5ab55f90ca17e0a70b50b2a7f894e20f1a8ab175a13831f05dfd7f,2023-04-28T18:50:21
@ -236628,6 +236629,7 @@ CVE-2023-49190,0,0,86cb6859aa19958c166ca64e47676d44af4b98597ca7dd177a61fac83182b
CVE-2023-49191,0,0,34969ee3df3717ecd0fd0437e5d4d4fc0bd1f9b89d2160d0adca8969e1a92937,2023-12-21T17:20:50.323000
CVE-2023-49195,0,0,239193d980cfd4324773344b0a932e91919adfb3eac7f01f4cac2dbd41501171,2023-12-18T19:48:51.397000
CVE-2023-49197,0,0,87fee8cafa9bc5eebe7f1b14f5bce64e09cfb3c60a34a1183c07dca6faf91be6,2023-12-21T17:26:04.913000
CVE-2023-49198,1,1,396f914d30a46917822b7244e0ebed77f8413fe2f0d5d066a5087cbf0c9fecdf,2024-08-21T10:15:04.903000
CVE-2023-4920,0,0,750757ff4ce213882eeb3b1cbdf16aac49f85b0688b4847bcc0bc2036d6471f3,2023-11-07T04:23:10.193000
CVE-2023-49208,0,0,2a9e047f121c5391d797b355b9800029d03397ffa5606d306303c89458886565,2023-11-30T20:47:45.190000
CVE-2023-4921,0,0,d59093adbc168eaf1f1dcabc1b2c8846c3b0575f8dbf1988414be85426e1ed5d,2024-01-11T19:15:12.373000
@ -242338,7 +242340,7 @@ CVE-2024-1454,0,0,de26dc8df40f576066c6c923b2efe16ed0450024c75c0ff05447756d8a8a19
CVE-2024-1455,0,0,150cf04553026c6d927055f564987fc57df0c743f9421c15918b44f92d1a260f,2024-04-16T12:15:09.230000
CVE-2024-1456,0,0,5b0bf210be135d03b9e0f0aa4d44e1d74b665ecf3cd8074dce271769fca228b4,2024-04-16T13:24:07.103000
CVE-2024-1458,0,0,3592b3461bffe67c8c4bc63c3d6ff327fca1737b7c0b5caa3c39b57cb625a124,2024-04-10T13:24:00.070000
CVE-2024-1459,0,1,51cbf7dd2304c9ddcd703721fb9f8aa12d2740b7e35e5f074291174ee3632e5b,2024-08-21T08:15:04.047000
CVE-2024-1459,0,0,51cbf7dd2304c9ddcd703721fb9f8aa12d2740b7e35e5f074291174ee3632e5b,2024-08-21T08:15:04.047000
CVE-2024-1460,0,0,ec3eff8320a7047ab22a3f4f19e8a683e9813b41a93039f228f1a8a5f8a8cf7a,2024-03-07T13:52:27.110000
CVE-2024-1461,0,0,26c4adb2b82e40af589d16e03a3c66cf8502da0df0ecd03c04ff2c63ab4db84d,2024-04-10T13:24:00.070000
CVE-2024-1462,0,0,6b7af8b648383ff153c14e78c5c62b9a8ac40f1719c2bd6e10b75d7361782b36,2024-03-13T18:15:58.530000
@ -254533,6 +254535,7 @@ CVE-2024-37004,0,0,eb821b24aec40cee5d3a4d83d3182056a26abdd06091705aaacecddd90b33
CVE-2024-37005,0,0,6346c3768c56adc2bd0ec197af628ad214cd9981413f2d5df7e8d7f1bc79c5d6,2024-07-03T02:04:00.877000
CVE-2024-37006,0,0,ce197589ee3e9b9abc62e5ee278117c11ae961db1cdfe5fd87c2da96a0f55f85,2024-07-03T02:04:01.090000
CVE-2024-37007,0,0,0fc601714096f5d925a9dbadf52718e2d07645aad03229b4044d058f28f4c32f,2024-07-03T02:04:01.303000
CVE-2024-37008,1,1,85936969a50ff59ca67989589a6b2eb44f362d8416df47e4d9d579786430837d,2024-08-21T10:15:05.037000
CVE-2024-3701,0,0,d0eb5159a877411bc688498f011f247ba2357363b8455c201bea5174efe527d7,2024-08-21T03:15:05.297000
CVE-2024-37014,0,0,4d8eebb55f92fd637819ddb88e1adc8dcc510ce2876a7f33ecffd1498dc89404,2024-07-03T02:04:01.523000
CVE-2024-37015,0,0,06f63d10776f12944092a5aeb799730f5be21ccdf02c7eed139cbe7f55ddde9d,2024-08-14T02:07:05.410000
@ -256076,7 +256079,7 @@ CVE-2024-39477,0,0,fa2961e1df43c2ad9a597485359813e1caa1c3df12b3f99f63d20b746ef13
CVE-2024-39478,0,0,db5004c8723658ae0e4f973c4d186ceee912acd4280f4ead75dd617705f0db2a,2024-07-08T18:01:50.890000
CVE-2024-39479,0,0,bc1edde74592b7edcc9609840a7bf1812668235b0d4cb2d6d45b97e02415c8b7,2024-07-08T18:01:41.523000
CVE-2024-3948,0,0,30bbf4121d163b9683e040780e7f656af12a28c4942bf649df9e4ab11ee6b22b,2024-05-17T02:40:12.107000
CVE-2024-39480,0,1,39cebd7ee4e2bd179c794137dbafcd0474f90d3c9b78a7618c6489ab9d07ca61,2024-08-21T08:35:05.157000
CVE-2024-39480,0,0,39cebd7ee4e2bd179c794137dbafcd0474f90d3c9b78a7618c6489ab9d07ca61,2024-08-21T08:35:05.157000
CVE-2024-39481,0,0,5841ead06e9f2b1a042c8ff661c861ad1c393f673c9f42578be9372484fc2036,2024-07-08T18:01:22.447000
CVE-2024-39482,0,0,2e53f7f56d22a34ce6ad819626880e479ce6053c61a068f9f1a515a60263c9c7,2024-07-08T18:00:28.200000
CVE-2024-39483,0,0,d36581a3f952605fa4deddb55b42f749ee06fd7a8fd95b57c25fb72ba28ba332,2024-07-08T18:00:08.430000
@ -257751,9 +257754,9 @@ CVE-2024-42675,0,0,92c6b6457955ed616d1577d62ebea7dcf172d2ecdd66922f34ded7a7ee2d3
CVE-2024-42676,0,0,ee04f7bab8ee13bdc864d5bc2a4a11bd3644007d71c7b1c26d6531bc1196494f,2024-08-19T16:11:33.843000
CVE-2024-42677,0,0,85c08a22e8a37131c90308072afe209c51004b01a70c30ff33acbdf877c43e4a,2024-08-19T16:08:17.727000
CVE-2024-42678,0,0,ce8a3f135d4f809369d6b75de9ff99127513c0db10a407cdd20ba786f1f3cdc9,2024-08-19T16:06:36.343000
CVE-2024-42679,0,0,6a02308e3545fcdfb2afc5a157e1d80d89726c2d2fb50d27eba41ddfeb407814,2024-08-20T19:11:30.170000
CVE-2024-42679,0,1,2ffe2a4be5c215d810f5b898b95b8290538512d66dc44037835c595a5e530f63,2024-08-21T11:06:24.627000
CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca71d,2024-07-02T18:08:17.817000
CVE-2024-42680,0,0,dac62d72e6eacedc1cd7e0b65a9c2238b8ef923d90031ac072a1ef2e7d57ab80,2024-08-20T19:15:43.747000
CVE-2024-42680,0,1,b168ab4cd2e2150be7aaf36c84a318add99cf48e6e7026b9bd7262bb9f167200,2024-08-21T11:06:00.887000
CVE-2024-42681,0,0,38014007bcc5735791461b793967c4dfbe475531f64d8682f14c63500277a9d8,2024-08-19T19:35:08.437000
CVE-2024-4269,0,0,3a0e07c5dbf72b66f7c37e018ba2f8991c2e2b5c26c8f2d595b33767cdbe4e7e,2024-08-01T13:59:29.737000
CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b195,2024-07-29T16:31:09.117000
@ -258993,7 +258996,7 @@ CVE-2024-5330,0,0,d052f676e850b1a7538b470735e7fe5f7dfb3046b39fa2778831cd7f8fdd99
CVE-2024-5331,0,0,f05fb229c386046dcd65cdaa4c35f1d7d27dbf88e27984042e1518b076a10077,2024-08-01T12:42:36.933000
CVE-2024-5332,0,0,440877c08f2207e575e98ca75a231683ae97178fa156f1a4d40f84efe3c80f11,2024-08-02T15:03:49.773000
CVE-2024-5334,0,0,24408ed0ac6ef1e7a34f70a35a6cc670103055f984541012ab7ae541f1637158,2024-07-12T08:15:11.130000
CVE-2024-5335,1,1,af4b6ddab2c64dee47c068383fc8039e8f6c161833bd8240683c69765185ea69,2024-08-21T09:15:04.563000
CVE-2024-5335,0,0,af4b6ddab2c64dee47c068383fc8039e8f6c161833bd8240683c69765185ea69,2024-08-21T09:15:04.563000
CVE-2024-5336,0,0,2f884d9a8acdce925dfd5f3bbb7e4d857b44070abc5058c1ed58328cd4186515,2024-06-04T19:21:04.947000
CVE-2024-5337,0,0,2b5f97595978a274de9cc82ffbb4e0a657c957408faf59676ddd95606d164a93,2024-06-04T19:21:05.063000
CVE-2024-5338,0,0,a30664650e5151e5bf507d4d1b27e8e105537061b8462474ea4f7add61cf4b05,2024-06-04T19:21:05.170000
@ -259793,7 +259796,7 @@ CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac67050452
CVE-2024-6336,0,0,1df5fc72f07b093cfd11ea9b65ef147e8130715026fca7ff47fd924988f45532,2024-07-17T13:34:20.520000
CVE-2024-6337,0,0,4bbaace135a65e16bd97b2f84fc2780e829de9473b830dbe86c073fce6003d74,2024-08-20T20:15:09.033000
CVE-2024-6338,0,0,8956384d5cc966970e625ecbde4127bb4f84d940fa059b7aaed0155a833fd98c,2024-07-19T20:24:40.397000
CVE-2024-6339,1,1,0908dc10a04daa9a65725fca0f1e84e79bced582f5db1322b56ee6175cfa8944,2024-08-21T08:15:04.333000
CVE-2024-6339,0,0,0908dc10a04daa9a65725fca0f1e84e79bced582f5db1322b56ee6175cfa8944,2024-08-21T08:15:04.333000
CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000
CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000
CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193de2,2024-06-27T00:15:13.360000
@ -260675,7 +260678,7 @@ CVE-2024-7751,0,0,3d4779511baf725a6e5d9f65d6769396fd6275e830b17a69e8bf93efeb313e
CVE-2024-7752,0,0,a2329e23410b1feec53d6ea38469016e280edd824b17c574fc21bf18179470a9,2024-08-19T17:48:25.793000
CVE-2024-7753,0,0,8d87f0b2095698ec5201c016f27ad170e6b85d6a83cdb1acca64ef97e59384ac,2024-08-19T17:47:49.083000
CVE-2024-7754,0,0,aa642088260d14c06ef027c5ebe72633a842f86ac8e6448a2c0c42d526be8fa5,2024-08-19T17:48:15.203000
CVE-2024-7757,1,1,ca7d079474a8e4f4b2f55e1721105da3a15a9e1d63f2bd4356eaaa03e8d55f39,2024-08-21T09:15:04.973000
CVE-2024-7757,0,0,ca7d079474a8e4f4b2f55e1721105da3a15a9e1d63f2bd4356eaaa03e8d55f39,2024-08-21T09:15:04.973000
CVE-2024-7775,0,0,e3301a5d8f77ad443eb31f53865c4d76f2f8fe202d331dbc3155c9382724cc8e,2024-08-20T15:44:20.567000
CVE-2024-7777,0,0,71bd18c058a843cc648eaac1d1574a0ec472525bb01fac803805d8a41dba271b,2024-08-20T15:44:20.567000
CVE-2024-7780,0,0,d93ffb279aea8f39f6fd963d66033ac1d11eb19c0e769bfec592ca965c19db92,2024-08-20T15:44:20.567000

Can't render this file because it is too large.