Auto-Update: 2024-09-18T22:00:17.510960+00:00

This commit is contained in:
cad-safe-bot 2024-09-18 22:03:17 +00:00
parent 1a171f1f03
commit 1d41995b26
38 changed files with 1801 additions and 409 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-38131",
"sourceIdentifier": "security@opentext.com",
"published": "2024-09-12T13:15:09.700",
"lastModified": "2024-09-12T18:14:03.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T21:00:30.420",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security@opentext.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security@opentext.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:edirectory:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.2.5.0000",
"matchCriteriaId": "622BA2A7-2931-4FCD-938D-EE573BC2AEBA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.netiq.com/documentation/edirectory-92/edirectory926_releasenotes/data/edirectory926_releasenotes.html",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-38132",
"sourceIdentifier": "security@opentext.com",
"published": "2024-09-12T13:15:10.050",
"lastModified": "2024-09-12T18:14:03.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T21:04:11.840",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security@opentext.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
},
{
"source": "security@opentext.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:edirectory:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.2.6.0000",
"matchCriteriaId": "F14727F8-891A-4798-8A8B-F19EFE574D91"
}
]
}
]
}
],
"references": [
{
"url": "https://www.netiq.com/documentation/edirectory-92/edirectory926_releasenotes/data/edirectory926_releasenotes.html",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-38133",
"sourceIdentifier": "security@opentext.com",
"published": "2024-09-12T13:15:10.327",
"lastModified": "2024-09-12T18:14:03.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T21:05:17.027",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "security@opentext.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-521"
}
]
},
{
"source": "security@opentext.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:edirectory:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.2.6.0000",
"matchCriteriaId": "F14727F8-891A-4798-8A8B-F19EFE574D91"
}
]
}
]
}
],
"references": [
{
"url": "https://www.netiq.com/documentation/edirectory-92/edirectory926_releasenotes/data/edirectory926_releasenotes.html",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2022-25768",
"sourceIdentifier": "security@mautic.org",
"published": "2024-09-18T21:15:12.860",
"lastModified": "2024-09-18T21:15:12.860",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The logic in place to facilitate the update process via the user interface lacks access control to verify if permission exists to perform the tasks. Prior to this patch being applied it might be possible for an attacker to access the Mautic version number or to execute parts of the upgrade process without permission. As upgrading in the user interface is deprecated, this functionality is no longer required."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@mautic.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security@mautic.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://github.com/mautic/mautic/security/advisories/GHSA-x3jx-5w6m-q2fc",
"source": "security@mautic.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2023-30464",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T21:15:13.080",
"lastModified": "2024-09-18T21:15:13.080",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CoreDNS through 1.10.1 enables attackers to achieve DNS cache poisoning and inject fake responses via a birthday attack."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/idealeer/e41c7fb3b661d4262d0b6f21e12168ba",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44959",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-10T03:15:09.923",
"lastModified": "2023-10-11T19:17:07.777",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-18T20:35:03.950",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-77"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-45312",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-10T21:15:09.680",
"lastModified": "2023-11-07T04:21:44.090",
"lastModified": "2024-09-18T20:35:04.773",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-1188"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1188"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27115",
"sourceIdentifier": "csirt@divd.nl",
"published": "2024-09-11T14:15:13.147",
"lastModified": "2024-09-11T16:26:11.920",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T20:32:26.717",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "CRITICAL"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
},
{
"source": "csirt@divd.nl",
"type": "Secondary",
@ -73,10 +105,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:soplanning:soplanning:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.52.02",
"matchCriteriaId": "37301719-C761-4C67-9214-CA5AC8747913"
}
]
}
]
}
],
"references": [
{
"url": "https://csirt.divd.nl/CVE-2024-27115",
"source": "csirt@divd.nl"
"source": "csirt@divd.nl",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34334",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-12T19:15:03.377",
"lastModified": "2024-09-12T21:35:11.443",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T20:32:47.213",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,18 +81,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ordat:ordat.erp:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.24.01",
"matchCriteriaId": "3B2D302F-1B47-4CD9-B471-EF982C74E095"
}
]
}
]
}
],
"references": [
{
"url": "http://foss-online.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://ordat.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://mind-bytes.de/sql-injection-in-foss-online-cve-2024-34334/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34335",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-12T19:15:03.447",
"lastModified": "2024-09-12T21:35:12.280",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T20:32:26.813",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,18 +81,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ordat:ordat.erp:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.24.01",
"matchCriteriaId": "3B2D302F-1B47-4CD9-B471-EF982C74E095"
}
]
}
]
}
],
"references": [
{
"url": "http://foss-online.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://ordat.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://mind-bytes.de/cross-site-scripting-in-foss-online-cve-2024-34335/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34336",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-12T19:15:03.510",
"lastModified": "2024-09-12T21:34:55.633",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T20:32:05.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,18 +81,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ordat:ordat.erp:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.24.01",
"matchCriteriaId": "3B2D302F-1B47-4CD9-B471-EF982C74E095"
}
]
}
]
}
],
"references": [
{
"url": "http://foss-online.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://ordat.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://mind-bytes.de/offenlegung-existierender-benutzerkonten-in-foss-online-cve-2024-34336/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36066",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-12T19:15:03.567",
"lastModified": "2024-09-12T21:34:55.633",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T20:28:50.313",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,75 @@
"value": "El cliente CMP CLI en KeyFactor EJBCA anterior a la versi\u00f3n 8.3.1 tiene solo 6 octetos de sal y, por lo tanto, no cumple con los requisitos de seguridad de RFC 4211 y podr\u00eda facilitar los ataques de intermediario. CMP incluye la MAC basada en contrase\u00f1a como una de las opciones para la integridad y autenticaci\u00f3n de mensajes (la otra opci\u00f3n est\u00e1 basada en certificados). La secci\u00f3n 4.4 de RFC 4211 requiere que los par\u00e1metros MAC basados en contrase\u00f1a utilicen una sal con un valor aleatorio de al menos 8 octetos. Esto ayuda a inhibir los ataques de diccionario. Debido a que el cliente CMP independiente originalmente se desarroll\u00f3 como c\u00f3digo de prueba, la sal se codific\u00f3 de forma r\u00edgida y solo ten\u00eda 6 octetos de longitud."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:keyfactor:ejbca:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.3.1",
"matchCriteriaId": "068EC0CF-4D2B-41A9-945C-11A9BFA5E2DC"
}
]
}
]
}
],
"references": [
{
"url": "https://datatracker.ietf.org/doc/html/rfc4211#section-4.4",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Technical Description"
]
},
{
"url": "https://support.keyfactor.com/hc/en-us/articles/26965687021595-EJBCA-Security-Advisory-EJBCA-standalone-CMP-CLI-client",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-39339",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T20:15:03.197",
"lastModified": "2024-09-18T20:15:03.197",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been discovered in all versions of Smartplay headunits, which are widely used in Suzuki and Toyota cars. This misconfiguration can lead to information disclosure, leaking sensitive details such as diagnostic log traces, system logs, headunit passwords, and personally identifiable information (PII). The exposure of such information may have serious implications for user privacy and system integrity."
}
],
"metrics": {},
"references": [
{
"url": "https://docs.google.com/document/d/1S-d8zyZreYYGSIr4zGww6F2iBfD63v10Z3YVbGnp2es/edit?usp=sharing",
"source": "cve@mitre.org"
},
{
"url": "https://mohammedshine.github.io/CVE-2024-39339.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-40568",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T21:15:13.390",
"lastModified": "2024-09-18T21:15:13.390",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in btstack mesh commit before v.864e2f2b6b7878c8fab3cf5ee84ae566e3380c58 allows a remote attacker to execute arbitrary code via the pb_adv_handle_tranaction_cont function in the src/mesh/pb_adv.c component"
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/xiaobye-ctf/My-CVE/tree/main/BTstack/CVE-2024-40568",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-43024",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T20:15:03.270",
"lastModified": "2024-09-18T20:15:03.270",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple stored cross-site scripting (XSS) vulnerabilities in RWS MultiTrans v7.0.23324.2 and earlier allow attackers to execute arbitrary web scripts or HTML via a crafted payload."
}
],
"metrics": {},
"references": [
{
"url": "https://community.rws.com/product-groups/translation_management/multitrans/w/releases/5112/multitrans-7-releases",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2024-43024",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/tomdantuma/CVE/tree/main/2024-43024",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-43025",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T20:15:03.343",
"lastModified": "2024-09-18T20:15:03.343",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An HTML injection vulnerability in RWS MultiTrans v7.0.23324.2 and earlier allows attackers to alter the HTML-layout and possibly execute a phishing attack via a crafted payload injected into a sent e-mail."
}
],
"metrics": {},
"references": [
{
"url": "https://community.rws.com/product-groups/translation_management/multitrans/w/releases/5112/multitrans-7-releases",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2024-43025",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/tomdantuma/CVE/tree/main/2024-43025",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-44589",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T20:15:03.410",
"lastModified": "2024-09-18T20:15:03.410",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack overflow vulnerability in the Login function in the HNAP service in D-Link DCS-960L with firmware 1.09 allows attackers to execute of arbitrary code."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Xshacry/iot-vuln/blob/main/d-link/dcs-935l/readme.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4465",
"sourceIdentifier": "prodsec@nozominetworks.com",
"published": "2024-09-11T15:15:18.490",
"lastModified": "2024-09-11T16:26:11.920",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T20:35:56.917",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.4
},
{
"source": "prodsec@nozominetworks.com",
"type": "Secondary",
@ -84,6 +104,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "prodsec@nozominetworks.com",
"type": "Secondary",
@ -95,10 +125,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nozominetworks:cmc:*:*:*:*:*:*:*:*",
"versionEndExcluding": "24.2.0",
"matchCriteriaId": "44370B46-4103-4810-9714-ABBC8DF0AE52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:*",
"versionEndExcluding": "24.2.0",
"matchCriteriaId": "7E243154-7659-425F-BB1A-56428E09FF0F"
}
]
}
]
}
],
"references": [
{
"url": "https://security.nozominetworks.com/NN-2024:2-01",
"source": "prodsec@nozominetworks.com"
"source": "prodsec@nozominetworks.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45181",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-12T19:15:03.657",
"lastModified": "2024-09-12T21:34:55.633",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T20:26:26.873",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,51 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wibu:wibukey:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.70",
"matchCriteriaId": "F01EEE6A-A2D1-476D-9F6C-7F9B9C26DEF5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/AdvisoryWIBU-94453.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://wibu.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45182",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-12T19:15:03.720",
"lastModified": "2024-09-12T21:34:55.633",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T20:26:11.023",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,87 @@
"value": "Se descubri\u00f3 un problema en WibuKey64.sys en WIBU-SYSTEMS WibuKey anterior a v6.70 y se solucion\u00f3 en v.6.70. Una verificaci\u00f3n de los l\u00edmites incorrecta permite que paquetes especialmente manipulados provoquen una lectura de direcci\u00f3n arbitraria, lo que resulta en una denegaci\u00f3n de servicio."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wibu:wibukey:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.70",
"matchCriteriaId": "F01EEE6A-A2D1-476D-9F6C-7F9B9C26DEF5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/AdvisoryWIBU-94453.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://wibu.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45303",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-12T19:15:03.793",
"lastModified": "2024-09-12T21:34:55.633",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T20:25:05.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:discourse:calendar:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.5",
"matchCriteriaId": "741740CC-9AFC-433C-A946-5163BCAA970F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/discourse/discourse-calendar/commit/81e1c8e3c4c02276fb890da7e3f684259aeb685c",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-rq37-8pf3-4xc8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45383",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-09-12T19:15:04.010",
"lastModified": "2024-09-12T21:34:55.633",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T20:24:29.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.3,
"impactScore": 3.6
},
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 3.6
}
]
},
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:high_definition_audio_bus_driver:10.0.19041.3636:*:*:*:*:*:*:*",
"matchCriteriaId": "4B004C4C-CD2A-4CF3-8283-EDA291237B24"
}
]
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2008",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-45592",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-10T16:15:21.550",
"lastModified": "2024-09-10T17:43:14.410",
"lastModified": "2024-09-18T20:15:03.483",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "auditor-bundle, formerly known as DoctrineAuditBundle, integrates auditor library into any Symfony 3.4+ application. Prior to 6.0.0, there is an unescaped entity property enabling Javascript injection. This is possible because %source_label% in twig macro is not escaped. Therefore script tags can be inserted and are executed. The vulnerability is fixed in 6.0.0."
"value": "auditor-bundle, formerly known as DoctrineAuditBundle, integrates auditor library into any Symfony 3.4+ application. Prior to version 5.2.6, there is an unescaped entity property enabling Javascript injection. This is possible because `%source_label%` in twig macro is not escaped. Therefore script tags can be inserted and are executed. The vulnerability is fixed in versions 6.0.0 and 5.2.6."
},
{
"lang": "es",
@ -56,6 +56,10 @@
"url": "https://github.com/DamienHarper/auditor-bundle/commit/42ba2940d8b99467de0c806ea5655cc1c6882cd1",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/DamienHarper/auditor-bundle/commit/e7deb377fa89677d44973b486d26d6a7374233ae",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/DamienHarper/auditor-bundle/security/advisories/GHSA-78vg-7v27-hj67",
"source": "security-advisories@github.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45786",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-09-11T12:15:01.943",
"lastModified": "2024-09-11T16:26:11.920",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T20:12:47.337",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
@ -73,10 +95,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:reedos:aim-star:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B863974A-47F2-4A3A-9614-26F30737B0FD"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0291",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46372",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T21:15:13.443",
"lastModified": "2024-09-18T21:15:13.443",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DedeCMS 5.7.115 is vulnerable to Cross Site Scripting (XSS) via the advertisement code box in the advertisement management module."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gaorenyusi/gaorenyusi/blob/main/CVE-2024-46372.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46373",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T21:15:13.497",
"lastModified": "2024-09-18T21:15:13.497",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dedecms V5.7.115 contains an arbitrary code execution via file upload vulnerability in the backend."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gaorenyusi/gaorenyusi/blob/main/CVE-2024-46373.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46374",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T21:15:13.543",
"lastModified": "2024-09-18T21:15:13.543",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Best House Rental Management System 1.0 contains a SQL injection vulnerability in the delete_category() function of the file rental/admin_class.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gaorenyusi/gaorenyusi/blob/main/CVE-2024-46374.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46375",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T21:15:13.587",
"lastModified": "2024-09-18T21:15:13.587",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Best House Rental Management System 1.0 contains an arbitrary file upload vulnerability in the signup() function of the file rental/admin_class.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gaorenyusi/gaorenyusi/blob/main/CVE-2024-46375.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46376",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T21:15:13.633",
"lastModified": "2024-09-18T21:15:13.633",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Best House Rental Management System 1.0 contains an arbitrary file upload vulnerability in the update_account() function of the file rental/admin_class.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gaorenyusi/gaorenyusi/blob/main/CVE-2024-46376.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46377",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T21:15:13.687",
"lastModified": "2024-09-18T21:15:13.687",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Best House Rental Management System 1.0 contains an arbitrary file upload vulnerability in the save_settings() function of the file rental/admin_class.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gaorenyusi/gaorenyusi/blob/main/CVE-2024-46377.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-47050",
"sourceIdentifier": "security@mautic.org",
"published": "2024-09-18T21:15:13.743",
"lastModified": "2024-09-18T21:15:13.743",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Prior to this patch being applied, Mautic's tracking was vulnerable to Cross-Site Scripting through the Page URL variable."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@mautic.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security@mautic.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/mautic/mautic/security/advisories/GHSA-73gr-32wg-qhh7",
"source": "security@mautic.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-47058",
"sourceIdentifier": "security@mautic.org",
"published": "2024-09-18T21:15:13.923",
"lastModified": "2024-09-18T21:15:13.923",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "With access to edit a Mautic form, the attacker can add Cross-Site Scripting stored in the html filed. This could be used to steal sensitive information from the user's current session."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@mautic.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 2.9,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.3,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security@mautic.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/mautic/mautic/security/advisories/GHSA-xv68-rrmw-9xwf",
"source": "security@mautic.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7143",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-08-07T17:15:52.337",
"lastModified": "2024-09-17T12:38:14.420",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-18T20:15:03.600",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -118,6 +118,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:6765",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-7143",
"source": "secalert@redhat.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7383",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-08-05T14:15:35.130",
"lastModified": "2024-08-06T16:31:05.780",
"lastModified": "2024-09-18T20:15:03.760",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:6757",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-7383",
"source": "secalert@redhat.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8646",
"sourceIdentifier": "emo@eclipse.org",
"published": "2024-09-11T14:15:14.307",
"lastModified": "2024-09-11T16:26:11.920",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T20:20:51.643",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "emo@eclipse.org",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
},
{
"source": "emo@eclipse.org",
"type": "Secondary",
@ -51,22 +81,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:eclipse:glassfish:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1.0",
"versionEndExcluding": "7.0.10",
"matchCriteriaId": "067AC494-E4EE-415F-AC47-DE9B11F8E9E3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/eclipse-ee4j/glassfish/pull/24655",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Patch"
]
},
{
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/34",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/163",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://glassfish.org/download",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8750",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-09-12T12:15:54.007",
"lastModified": "2024-09-12T12:35:54.013",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T20:38:42.123",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
@ -51,10 +71,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:i-doit:i-doit:28:*:*:*:pro:*:*:*",
"matchCriteriaId": "85C33B1A-464B-4A24-8100-6FB8D2128D41"
}
]
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-synetics-idoit-pro",
"source": "cve-coordination@incibe.es"
"source": "cve-coordination@incibe.es",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-18T20:00:19.699246+00:00
2024-09-18T22:00:17.510960+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-18T19:57:10.203000+00:00
2024-09-18T21:15:13.923000+00:00
```
### Last Data Feed Release
@ -33,58 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
263401
263416
```
### CVEs added in the last Commit
Recently added CVEs: `14`
Recently added CVEs: `15`
- [CVE-2023-41610](CVE-2023/CVE-2023-416xx/CVE-2023-41610.json) (`2024-09-18T18:15:05.680`)
- [CVE-2023-41611](CVE-2023/CVE-2023-416xx/CVE-2023-41611.json) (`2024-09-18T18:15:05.750`)
- [CVE-2023-41612](CVE-2023/CVE-2023-416xx/CVE-2023-41612.json) (`2024-09-18T18:15:05.803`)
- [CVE-2024-34057](CVE-2024/CVE-2024-340xx/CVE-2024-34057.json) (`2024-09-18T19:15:40.777`)
- [CVE-2024-34399](CVE-2024/CVE-2024-343xx/CVE-2024-34399.json) (`2024-09-18T18:15:06.163`)
- [CVE-2024-45523](CVE-2024/CVE-2024-455xx/CVE-2024-45523.json) (`2024-09-18T18:15:06.420`)
- [CVE-2024-45601](CVE-2024/CVE-2024-456xx/CVE-2024-45601.json) (`2024-09-18T18:15:06.473`)
- [CVE-2024-46959](CVE-2024/CVE-2024-469xx/CVE-2024-46959.json) (`2024-09-18T18:15:06.730`)
- [CVE-2024-46978](CVE-2024/CVE-2024-469xx/CVE-2024-46978.json) (`2024-09-18T18:15:06.800`)
- [CVE-2024-46979](CVE-2024/CVE-2024-469xx/CVE-2024-46979.json) (`2024-09-18T18:15:07.020`)
- [CVE-2024-46986](CVE-2024/CVE-2024-469xx/CVE-2024-46986.json) (`2024-09-18T18:15:07.223`)
- [CVE-2024-46987](CVE-2024/CVE-2024-469xx/CVE-2024-46987.json) (`2024-09-18T18:15:07.440`)
- [CVE-2024-46989](CVE-2024/CVE-2024-469xx/CVE-2024-46989.json) (`2024-09-18T18:15:07.650`)
- [CVE-2024-8287](CVE-2024/CVE-2024-82xx/CVE-2024-8287.json) (`2024-09-18T19:15:41.073`)
- [CVE-2022-25768](CVE-2022/CVE-2022-257xx/CVE-2022-25768.json) (`2024-09-18T21:15:12.860`)
- [CVE-2023-30464](CVE-2023/CVE-2023-304xx/CVE-2023-30464.json) (`2024-09-18T21:15:13.080`)
- [CVE-2024-39339](CVE-2024/CVE-2024-393xx/CVE-2024-39339.json) (`2024-09-18T20:15:03.197`)
- [CVE-2024-40568](CVE-2024/CVE-2024-405xx/CVE-2024-40568.json) (`2024-09-18T21:15:13.390`)
- [CVE-2024-43024](CVE-2024/CVE-2024-430xx/CVE-2024-43024.json) (`2024-09-18T20:15:03.270`)
- [CVE-2024-43025](CVE-2024/CVE-2024-430xx/CVE-2024-43025.json) (`2024-09-18T20:15:03.343`)
- [CVE-2024-44589](CVE-2024/CVE-2024-445xx/CVE-2024-44589.json) (`2024-09-18T20:15:03.410`)
- [CVE-2024-46372](CVE-2024/CVE-2024-463xx/CVE-2024-46372.json) (`2024-09-18T21:15:13.443`)
- [CVE-2024-46373](CVE-2024/CVE-2024-463xx/CVE-2024-46373.json) (`2024-09-18T21:15:13.497`)
- [CVE-2024-46374](CVE-2024/CVE-2024-463xx/CVE-2024-46374.json) (`2024-09-18T21:15:13.543`)
- [CVE-2024-46375](CVE-2024/CVE-2024-463xx/CVE-2024-46375.json) (`2024-09-18T21:15:13.587`)
- [CVE-2024-46376](CVE-2024/CVE-2024-463xx/CVE-2024-46376.json) (`2024-09-18T21:15:13.633`)
- [CVE-2024-46377](CVE-2024/CVE-2024-463xx/CVE-2024-46377.json) (`2024-09-18T21:15:13.687`)
- [CVE-2024-47050](CVE-2024/CVE-2024-470xx/CVE-2024-47050.json) (`2024-09-18T21:15:13.743`)
- [CVE-2024-47058](CVE-2024/CVE-2024-470xx/CVE-2024-47058.json) (`2024-09-18T21:15:13.923`)
### CVEs modified in the last Commit
Recently modified CVEs: `258`
Recently modified CVEs: `21`
- [CVE-2024-42794](CVE-2024/CVE-2024-427xx/CVE-2024-42794.json) (`2024-09-18T19:35:12.550`)
- [CVE-2024-44127](CVE-2024/CVE-2024-441xx/CVE-2024-44127.json) (`2024-09-18T18:35:10.113`)
- [CVE-2024-44202](CVE-2024/CVE-2024-442xx/CVE-2024-44202.json) (`2024-09-18T18:35:11.417`)
- [CVE-2024-44459](CVE-2024/CVE-2024-444xx/CVE-2024-44459.json) (`2024-09-18T18:53:58.983`)
- [CVE-2024-44460](CVE-2024/CVE-2024-444xx/CVE-2024-44460.json) (`2024-09-18T18:53:01.570`)
- [CVE-2024-44542](CVE-2024/CVE-2024-445xx/CVE-2024-44542.json) (`2024-09-18T19:35:13.340`)
- [CVE-2024-4472](CVE-2024/CVE-2024-44xx/CVE-2024-4472.json) (`2024-09-18T19:16:35.900`)
- [CVE-2024-45787](CVE-2024/CVE-2024-457xx/CVE-2024-45787.json) (`2024-09-18T18:15:07.650`)
- [CVE-2024-45788](CVE-2024/CVE-2024-457xx/CVE-2024-45788.json) (`2024-09-18T19:57:10.203`)
- [CVE-2024-45789](CVE-2024/CVE-2024-457xx/CVE-2024-45789.json) (`2024-09-18T19:55:58.287`)
- [CVE-2024-45790](CVE-2024/CVE-2024-457xx/CVE-2024-45790.json) (`2024-09-18T18:38:04.393`)
- [CVE-2024-46086](CVE-2024/CVE-2024-460xx/CVE-2024-46086.json) (`2024-09-18T18:35:13.440`)
- [CVE-2024-6091](CVE-2024/CVE-2024-60xx/CVE-2024-6091.json) (`2024-09-18T18:41:31.247`)
- [CVE-2024-6678](CVE-2024/CVE-2024-66xx/CVE-2024-6678.json) (`2024-09-18T19:14:14.837`)
- [CVE-2024-6878](CVE-2024/CVE-2024-68xx/CVE-2024-6878.json) (`2024-09-18T18:35:14.400`)
- [CVE-2024-7609](CVE-2024/CVE-2024-76xx/CVE-2024-7609.json) (`2024-09-18T18:33:09.633`)
- [CVE-2024-7721](CVE-2024/CVE-2024-77xx/CVE-2024-7721.json) (`2024-09-18T18:01:01.893`)
- [CVE-2024-7727](CVE-2024/CVE-2024-77xx/CVE-2024-7727.json) (`2024-09-18T18:07:55.450`)
- [CVE-2024-8144](CVE-2024/CVE-2024-81xx/CVE-2024-8144.json) (`2024-09-18T18:24:46.730`)
- [CVE-2024-8306](CVE-2024/CVE-2024-83xx/CVE-2024-8306.json) (`2024-09-18T19:51:14.850`)
- [CVE-2024-8311](CVE-2024/CVE-2024-83xx/CVE-2024-8311.json) (`2024-09-18T19:12:52.810`)
- [CVE-2024-8517](CVE-2024/CVE-2024-85xx/CVE-2024-8517.json) (`2024-09-18T18:05:03.553`)
- [CVE-2024-8641](CVE-2024/CVE-2024-86xx/CVE-2024-8641.json) (`2024-09-18T19:12:18.930`)
- [CVE-2024-8708](CVE-2024/CVE-2024-87xx/CVE-2024-8708.json) (`2024-09-18T19:11:28.080`)
- [CVE-2024-8749](CVE-2024/CVE-2024-87xx/CVE-2024-8749.json) (`2024-09-18T18:53:54.860`)
- [CVE-2021-38131](CVE-2021/CVE-2021-381xx/CVE-2021-38131.json) (`2024-09-18T21:00:30.420`)
- [CVE-2021-38132](CVE-2021/CVE-2021-381xx/CVE-2021-38132.json) (`2024-09-18T21:04:11.840`)
- [CVE-2021-38133](CVE-2021/CVE-2021-381xx/CVE-2021-38133.json) (`2024-09-18T21:05:17.027`)
- [CVE-2023-44959](CVE-2023/CVE-2023-449xx/CVE-2023-44959.json) (`2024-09-18T20:35:03.950`)
- [CVE-2023-45312](CVE-2023/CVE-2023-453xx/CVE-2023-45312.json) (`2024-09-18T20:35:04.773`)
- [CVE-2024-27115](CVE-2024/CVE-2024-271xx/CVE-2024-27115.json) (`2024-09-18T20:32:26.717`)
- [CVE-2024-34334](CVE-2024/CVE-2024-343xx/CVE-2024-34334.json) (`2024-09-18T20:32:47.213`)
- [CVE-2024-34335](CVE-2024/CVE-2024-343xx/CVE-2024-34335.json) (`2024-09-18T20:32:26.813`)
- [CVE-2024-34336](CVE-2024/CVE-2024-343xx/CVE-2024-34336.json) (`2024-09-18T20:32:05.510`)
- [CVE-2024-36066](CVE-2024/CVE-2024-360xx/CVE-2024-36066.json) (`2024-09-18T20:28:50.313`)
- [CVE-2024-4465](CVE-2024/CVE-2024-44xx/CVE-2024-4465.json) (`2024-09-18T20:35:56.917`)
- [CVE-2024-45181](CVE-2024/CVE-2024-451xx/CVE-2024-45181.json) (`2024-09-18T20:26:26.873`)
- [CVE-2024-45182](CVE-2024/CVE-2024-451xx/CVE-2024-45182.json) (`2024-09-18T20:26:11.023`)
- [CVE-2024-45303](CVE-2024/CVE-2024-453xx/CVE-2024-45303.json) (`2024-09-18T20:25:05.807`)
- [CVE-2024-45383](CVE-2024/CVE-2024-453xx/CVE-2024-45383.json) (`2024-09-18T20:24:29.247`)
- [CVE-2024-45592](CVE-2024/CVE-2024-455xx/CVE-2024-45592.json) (`2024-09-18T20:15:03.483`)
- [CVE-2024-45786](CVE-2024/CVE-2024-457xx/CVE-2024-45786.json) (`2024-09-18T20:12:47.337`)
- [CVE-2024-7143](CVE-2024/CVE-2024-71xx/CVE-2024-7143.json) (`2024-09-18T20:15:03.600`)
- [CVE-2024-7383](CVE-2024/CVE-2024-73xx/CVE-2024-7383.json) (`2024-09-18T20:15:03.760`)
- [CVE-2024-8646](CVE-2024/CVE-2024-86xx/CVE-2024-8646.json) (`2024-09-18T20:20:51.643`)
- [CVE-2024-8750](CVE-2024/CVE-2024-87xx/CVE-2024-8750.json) (`2024-09-18T20:38:42.123`)
## Download and Usage

File diff suppressed because it is too large Load Diff