diff --git a/CVE-2020/CVE-2020-367xx/CVE-2020-36771.json b/CVE-2020/CVE-2020-367xx/CVE-2020-36771.json index f9abc3ac54b..3d93d6da61b 100644 --- a/CVE-2020/CVE-2020-367xx/CVE-2020-36771.json +++ b/CVE-2020/CVE-2020-367xx/CVE-2020-36771.json @@ -2,8 +2,8 @@ "id": "CVE-2020-36771", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-22T14:15:07.530", - "lastModified": "2024-01-26T17:15:08.997", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:26:39.483", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,8 +14,41 @@ "value": "CloudLinux CageFS 7.1.1-1 o inferior pasa el token de autenticaci\u00f3n como argumento de l\u00ednea de comando. En algunas configuraciones, esto permite a los usuarios locales verlo a trav\u00e9s de la lista de procesos y obtener la ejecuci\u00f3n del c\u00f3digo como otro usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -27,18 +60,49 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cloudlinux:cagefs:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.1.2-2", + "matchCriteriaId": "5A970581-1C5F-4406-BC05-10D09852BC5B" + } + ] + } + ] + } + ], "references": [ { "url": "http://packetstormsecurity.com/files/176790/CloudLinux-CageFS-7.1.1-1-Token-Disclosure.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jan/24", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://blog.cloudlinux.com/cagefs-lve-wrappers-and-bsock-have-been-rolled-out-to-100", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-367xx/CVE-2020-36772.json b/CVE-2020/CVE-2020-367xx/CVE-2020-36772.json index 79a7a163d42..67bb80bad41 100644 --- a/CVE-2020/CVE-2020-367xx/CVE-2020-36772.json +++ b/CVE-2020/CVE-2020-367xx/CVE-2020-36772.json @@ -2,8 +2,8 @@ "id": "CVE-2020-36772", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-22T15:15:07.883", - "lastModified": "2024-01-26T17:15:09.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:32:41.797", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,8 +14,41 @@ "value": "CloudLinux CageFS 7.0.8-2 o inferior restringe insuficientemente las rutas de archivo proporcionadas al comando proxy sendmail. Esto permite a los usuarios locales leer y escribir archivos arbitrarios fuera del entorno CageFS de forma limitada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.5 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-610" + } + ] + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -27,18 +60,49 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cloudlinux:cagefs:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.1.1-1", + "matchCriteriaId": "28069322-F13C-4ED5-9E98-37F69335CFEA" + } + ] + } + ] + } + ], "references": [ { "url": "http://packetstormsecurity.com/files/176791/CloudLinux-CageFS-7.0.8-2-Insufficiently-Restricted-Proxy-Command.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jan/25", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://blog.cloudlinux.com/lve-manager-lve-stats-lve-utils-and-alt-python27-cllib-have-been-rolled-out-to-100", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1705.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1705.json new file mode 100644 index 00000000000..377616853ab --- /dev/null +++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1705.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-1705", + "sourceIdentifier": "psirt@forcepoint.com", + "published": "2024-01-29T17:15:08.123", + "lastModified": "2024-01-29T17:39:52.393", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Forcepoint F|One SmartEdge Agent on Windows (bgAutoinstaller service modules) allows Privilege Escalation, Functionality Bypass.This issue affects F|One SmartEdge Agent: before 1.7.0.230330-554.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@forcepoint.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@forcepoint.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://support.forcepoint.com/s/article/000042333", + "source": "psirt@forcepoint.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24135.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24135.json index bed2b8bde97..8ad200ec25d 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24135.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24135.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24135", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-22T21:15:08.793", - "lastModified": "2024-01-23T13:44:14.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T18:26:55.150", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,23 +14,100 @@ "value": "Se descubri\u00f3 que Jensen de Scandinavia Eagle 1200AC V15.03.06.33_en contiene una vulnerabilidad de inyecci\u00f3n de comandos en la funci\u00f3n formWriteFacMac. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios mediante la manipulaci\u00f3n del par\u00e1metro mac." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:jensenofscandinavia:eagle_1200ac_firmware:15.03.06.33_en:*:*:*:*:*:*:*", + "matchCriteriaId": "24E5249E-4E12-4A78-9CE7-BF0581FDE8FA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:jensenofscandinavia:eagle_1200ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC63EA0E-B80E-4CD3-B1D5-2B345950DF0C" + } + ] + } + ] + } + ], "references": [ { "url": "http://eagle.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "http://jensen.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://oxnan.com/img/Pasted%20image%2020230112110814.png", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oxnan.com/posts/WriteFacMac-Command-Injection", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38624.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38624.json index 61de42c8b4b..a000a26439f 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38624.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38624.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38624", "sourceIdentifier": "security@trendmicro.com", "published": "2024-01-23T21:15:08.143", - "lastModified": "2024-01-24T13:49:03.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:38:08.507", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,74 @@ "value": "Una vulnerabilidad de server-side request forgery (SSRF) posterior a la autenticaci\u00f3n en Trend Micro Apex Central 2019 (inferior a la compilaci\u00f3n 6481) podr\u00eda permitir a un atacante interactuar directamente con servicios internos o locales. Tenga en cuenta: un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad. Esta es una vulnerabilidad similar, pero no id\u00e9ntica, a CVE-2023-38625 hasta CVE-2023-38627." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:apex_central:2019:-:*:*:*:windows:*:*", + "matchCriteriaId": "7F2620DA-8727-43FF-8A4D-72145CDDE4CD" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000294176?language=en_US", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-998/", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38625.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38625.json index fef9fbeb2ee..7c988cc961e 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38625.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38625.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38625", "sourceIdentifier": "security@trendmicro.com", "published": "2024-01-23T21:15:08.210", - "lastModified": "2024-01-24T13:49:03.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:38:01.783", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,74 @@ "value": "Una vulnerabilidad de server-side request forgery (SSRF) posterior a la autenticaci\u00f3n en Trend Micro Apex Central 2019 (inferior a la compilaci\u00f3n 6481) podr\u00eda permitir a un atacante interactuar directamente con servicios internos o locales. Tenga en cuenta: un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad. Esta es una vulnerabilidad similar, pero no id\u00e9ntica, a CVE-2023-38624." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:apex_central:2019:-:*:*:*:windows:*:*", + "matchCriteriaId": "7F2620DA-8727-43FF-8A4D-72145CDDE4CD" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000294176?language=en_US", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-999/", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38626.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38626.json index 7fd5506bbe4..5f3efae75cf 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38626.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38626.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38626", "sourceIdentifier": "security@trendmicro.com", "published": "2024-01-23T21:15:08.253", - "lastModified": "2024-01-24T13:49:03.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:37:47.613", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,74 @@ "value": "Una vulnerabilidad de server-side request forgery (SSRF) posterior a la autenticaci\u00f3n en Trend Micro Apex Central 2019 (inferior a la compilaci\u00f3n 6481) podr\u00eda permitir a un atacante interactuar directamente con servicios internos o locales. Tenga en cuenta: un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad. Esta es una vulnerabilidad similar, pero no id\u00e9ntica, a CVE-2023-38625." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:apex_central:2019:-:*:*:*:windows:*:*", + "matchCriteriaId": "7F2620DA-8727-43FF-8A4D-72145CDDE4CD" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000294176?language=en_US", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1000/", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38627.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38627.json index 3b326501ae1..f549c169351 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38627.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38627.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38627", "sourceIdentifier": "security@trendmicro.com", "published": "2024-01-23T21:15:08.297", - "lastModified": "2024-01-24T13:49:03.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:37:16.250", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,74 @@ "value": "Una vulnerabilidad de server-side request forgery (SSRF) posterior a la autenticaci\u00f3n en Trend Micro Apex Central 2019 (inferior a la compilaci\u00f3n 6481) podr\u00eda permitir a un atacante interactuar directamente con servicios internos o locales. Tenga en cuenta: un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad. Esta es una vulnerabilidad similar, pero no id\u00e9ntica, a CVE-2023-38626." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:apex_central:2019:-:*:*:*:windows:*:*", + "matchCriteriaId": "7F2620DA-8727-43FF-8A4D-72145CDDE4CD" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000294176?language=en_US", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1001/", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40546.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40546.json new file mode 100644 index 00000000000..2b87647e93f --- /dev/null +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40546.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-40546", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-01-29T17:15:08.347", + "lastModified": "2024-01-29T17:39:52.393", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn't match the format string used by it, leading to a crash under certain circumstances." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2023-40546", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40549.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40549.json new file mode 100644 index 00000000000..b803a253c97 --- /dev/null +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40549.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-40549", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-01-29T17:15:08.580", + "lastModified": "2024-01-29T17:39:52.393", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2023-40549", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40550.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40550.json new file mode 100644 index 00000000000..b846d3adf37 --- /dev/null +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40550.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-40550", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-01-29T17:15:08.773", + "lastModified": "2024-01-29T17:39:52.393", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system's boot phase." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2023-40550", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40551.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40551.json new file mode 100644 index 00000000000..a1864c8cec1 --- /dev/null +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40551.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-40551", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-01-29T17:15:08.970", + "lastModified": "2024-01-29T17:39:52.393", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system's boot phase." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2023-40551", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-411xx/CVE-2023-41176.json b/CVE-2023/CVE-2023-411xx/CVE-2023-41176.json index 8064a555684..51cd07eeeaa 100644 --- a/CVE-2023/CVE-2023-411xx/CVE-2023-41176.json +++ b/CVE-2023/CVE-2023-411xx/CVE-2023-41176.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41176", "sourceIdentifier": "security@trendmicro.com", "published": "2024-01-23T21:15:08.343", - "lastModified": "2024-01-24T13:49:03.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:36:19.543", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,74 @@ "value": "Las vulnerabilidades de cross-site scripting (XSS) reflejado en Trend Micro Mobile Security (Enterprise) podr\u00edan permitir una explotaci\u00f3n contra una v\u00edctima autenticada que visita un enlace malicioso proporcionado por un atacante. Tenga en cuenta que esta vulnerabilidad es similar, pero no id\u00e9ntica, a CVE-2023-41177." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:mobile_security:9.8:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "2F570A01-23A1-4257-8A52-2BA3A14BC47C" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000294695?language=en_US", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-078/", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-411xx/CVE-2023-41177.json b/CVE-2023/CVE-2023-411xx/CVE-2023-41177.json index c0970305b94..dae50413dde 100644 --- a/CVE-2023/CVE-2023-411xx/CVE-2023-41177.json +++ b/CVE-2023/CVE-2023-411xx/CVE-2023-41177.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41177", "sourceIdentifier": "security@trendmicro.com", "published": "2024-01-23T21:15:08.387", - "lastModified": "2024-01-24T13:49:03.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:36:01.880", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,74 @@ "value": "Las vulnerabilidades de cross-site scripting (XSS) reflejado en Trend Micro Mobile Security (Enterprise) podr\u00edan permitir una explotaci\u00f3n contra una v\u00edctima autenticada que visita un enlace malicioso proporcionado por un atacante. Tenga en cuenta que esta vulnerabilidad es similar, pero no id\u00e9ntica, a CVE-2023-41178." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:mobile_security:9.8:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "2F570A01-23A1-4257-8A52-2BA3A14BC47C" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000294695?language=en_US", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-079/", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-411xx/CVE-2023-41178.json b/CVE-2023/CVE-2023-411xx/CVE-2023-41178.json index 8e27d76bcc3..bbf22468a2e 100644 --- a/CVE-2023/CVE-2023-411xx/CVE-2023-41178.json +++ b/CVE-2023/CVE-2023-411xx/CVE-2023-41178.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41178", "sourceIdentifier": "security@trendmicro.com", "published": "2024-01-23T21:15:08.430", - "lastModified": "2024-01-24T13:49:03.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:35:46.797", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,74 @@ "value": "Las vulnerabilidades de cross-site scripting (XSS) reflejado en Trend Micro Mobile Security (Enterprise) podr\u00edan permitir una explotaci\u00f3n contra una v\u00edctima autenticada que visita un enlace malicioso proporcionado por un atacante. Tenga en cuenta que esta vulnerabilidad es similar, pero no id\u00e9ntica, a CVE-2023-41176." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:mobile_security:9.8:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "2F570A01-23A1-4257-8A52-2BA3A14BC47C" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000294695?language=en_US", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-080/", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42935.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42935.json index 89c0e9cb0a8..ab02c6e6626 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42935.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42935.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42935", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-23T01:15:10.170", - "lastModified": "2024-01-26T17:15:10.197", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-01-29T18:38:29.587", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,19 +14,92 @@ "value": "Se solucion\u00f3 un problema de autenticaci\u00f3n con una gesti\u00f3n de estado mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.6.4. Un atacante local puede ver el escritorio del usuario que inici\u00f3 sesi\u00f3n anteriormente desde la pantalla de cambio r\u00e1pido de usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.4", + "matchCriteriaId": "A3916CD8-E6D5-4786-903E-B86026859CE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.1", + "matchCriteriaId": "F9F52915-10F1-4514-B839-F6DC74B53555" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jan/37", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214058", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT213984", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42937.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42937.json index aad74a8dd37..7d354506ccc 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42937.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42937.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42937", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-23T01:15:10.217", - "lastModified": "2024-01-26T17:15:10.307", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-01-29T18:33:19.387", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,55 +14,205 @@ "value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en iOS 16.7.5 y iPadOS 16.7.5, watchOS 10.2, macOS Ventura 13.6.4, macOS Sonoma 14.2, macOS Monterey 12.7.3, iOS 17.2 y iPadOS 17.2. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartExcluding": "16.0", + "versionEndExcluding": "16.7.5", + "matchCriteriaId": "8C2307FA-1412-4727-AD29-541A337A9B97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartExcluding": "17.0", + "versionEndExcluding": "17.2", + "matchCriteriaId": "BF97C4D2-4449-4290-A381-BCFB7C78FC99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartExcluding": "16.0", + "versionEndExcluding": "16.7.5", + "matchCriteriaId": "78404384-8393-4F57-8076-C84BCFD58B1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartExcluding": "17.0", + "versionEndExcluding": "17.2", + "matchCriteriaId": "4F224E57-6480-44EE-B718-9C09F3B51810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "12.7.3", + "matchCriteriaId": "ECD0F581-7DA4-428A-A1F5-C9A86DDD99D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.4", + "matchCriteriaId": "A3916CD8-E6D5-4786-903E-B86026859CE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.2", + "matchCriteriaId": "6892DEBD-024E-414B-9282-DCCCF23A3BDD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.2", + "matchCriteriaId": "1183933F-F52A-45A7-B118-FC8B8BDD5509" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jan/34", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jan/37", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jan/38", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214035", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214036", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214041", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214057", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214058", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214063", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214035", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214036", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214041", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44395.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44395.json index c35228c839c..c5197a505da 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44395.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44395.json @@ -2,16 +2,40 @@ "id": "CVE-2023-44395", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-22T15:15:08.037", - "lastModified": "2024-01-22T19:10:26.333", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:33:31.320", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Autolab is a course management service that enables instructors to offer autograded programming assignments to their students over the Web. Path traversal vulnerabilities were discovered in Autolab's assessment functionality in versions of Autolab prior to 2.12.0, whereby instructors can perform arbitrary file reads. Version 2.12.0 contains a patch. There are no feasible workarounds for this issue." + }, + { + "lang": "es", + "value": "Autolab es un servicio de gesti\u00f3n de cursos que permite a los profesores ofrecer tareas de programaci\u00f3n con calificaci\u00f3n autom\u00e1tica a sus estudiantes a trav\u00e9s de la Web. Se descubrieron vulnerabilidades de path traversal en la funcionalidad de evaluaci\u00f3n de Autolab en versiones de Autolab anteriores a la 2.12.0, mediante las cuales los instructores pueden realizar lecturas de archivos arbitrarias. La versi\u00f3n 2.12.0 contiene un parche. No existen workarounds viables para este problema." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,18 +70,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:autolabproject:autolab:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.12.0", + "matchCriteriaId": "E1C7D024-2BC5-4EB3-8FF6-006C25BBAFFD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/autolab/Autolab/releases/tag/v2.12.0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/autolab/Autolab/security/advisories/GHSA-h8wq-ghfq-5hfx", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.stackhawk.com/blog/rails-path-traversal-guide-examples-and-prevention/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Technical Description" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6340.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6340.json index 98403128957..a20b3896111 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6340.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6340.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6340", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2024-01-18T00:15:38.080", - "lastModified": "2024-01-18T13:42:01.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:17:41.147", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,8 +14,41 @@ "value": "SonicWall Capture Client versi\u00f3n 3.7.10, NetExtender client versi\u00f3n 10.2.337 y versiones anteriores se instalan con el controlador sfpmonitor.sys. Se ha descubierto que el controlador es vulnerable a la denegaci\u00f3n de servicio (DoS) causada por una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "PSIRT@sonicwall.com", "type": "Secondary", @@ -27,10 +60,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sonicwall:capture_client:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.7.10", + "matchCriteriaId": "9EA62B9D-9A7C-447A-BA0C-5ECFF6C74515" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sonicwall:netextender:*:*:*:*:*:windows:*:*", + "versionEndIncluding": "10.2.337", + "matchCriteriaId": "BB83F5B1-CD28-4AC4-913C-48C0A7EE32FB" + } + ] + } + ] + } + ], "references": [ { "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0019", - "source": "PSIRT@sonicwall.com" + "source": "PSIRT@sonicwall.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6482.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6482.json index 58ee371921e..ce4d4c4f75c 100644 --- a/CVE-2023/CVE-2023-64xx/CVE-2023-6482.json +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6482.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6482", "sourceIdentifier": "PSIRT@synaptics.com", "published": "2024-01-27T01:15:08.033", - "lastModified": "2024-01-29T14:25:30.223", + "lastModified": "2024-01-29T17:15:09.173", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "PSIRT@synaptics.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-321" + } + ] + } + ], "references": [ { "url": "https://www.synaptics.com/sites/default/files/2024-01/fingerprint-driver-encryption-key-security-brief-2024-01-26.pdf", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json index 629971976b2..20a1475b238 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json @@ -2,12 +2,12 @@ "id": "CVE-2024-0553", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-16T12:15:45.557", - "lastModified": "2024-01-29T07:15:09.050", + "lastModified": "2024-01-29T17:15:09.360", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981." + "value": "A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981." }, { "lang": "es", @@ -142,6 +142,10 @@ "Third Party Advisory" ] }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:0533", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-0553", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0782.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0782.json index 27d6535a1ef..cccc27e795f 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0782.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0782.json @@ -2,16 +2,40 @@ "id": "CVE-2024-0782", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-22T17:15:09.290", - "lastModified": "2024-01-22T19:10:26.333", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:35:21.890", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in CodeAstro Online Railway Reservation System 1.0 and classified as problematic. This vulnerability affects unknown code of the file pass-profile.php. The manipulation of the argument First Name/Last Name/User Name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-251698 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en CodeAstro Online Railway Reservation System 1.0 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo pass-profile.php. La manipulaci\u00f3n del argumento Nombre/Apellido/Nombre de usuario conduce a cross site scripting. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-251698 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -71,18 +95,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:online_railway_reservation_system_project:online_railway_reservation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F76209DB-A9BF-4276-B5CE-87CF762BA28D" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/drive/folders/1ecVTReqCS_G8svyq3MG79E2y59psMcPn?usp=sharing", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.251698", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.251698", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0788.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0788.json new file mode 100644 index 00000000000..54eb344a9dc --- /dev/null +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0788.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-0788", + "sourceIdentifier": "help@fluidattacks.com", + "published": "2024-01-29T17:15:09.520", + "lastModified": "2024-01-29T17:39:52.393", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "SUPERAntiSpyware Pro X v10.0.1260 is vulnerable to kernel-level API parameters manipulation and Denial of Service vulnerabilities by triggering the 0x9C402140 IOCTL code of the saskutil64.sys driver." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "help@fluidattacks.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "help@fluidattacks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://fluidattacks.com/advisories/brubeck/", + "source": "help@fluidattacks.com" + }, + { + "url": "https://www.superantispyware.com/professional-x-edition.html", + "source": "help@fluidattacks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1009.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1009.json new file mode 100644 index 00000000000..e9435aec4a8 --- /dev/null +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1009.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-1009", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-29T17:15:09.727", + "lastModified": "2024-01-29T17:39:52.393", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Employee Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /Admin/login.php. The manipulation of the argument txtusername leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252278 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.252278", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.252278", + "source": "cna@vuldb.com" + }, + { + "url": "https://youtu.be/oL98TSjy89Q?si=_T6YkJZlbn7SJ4Gn", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1010.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1010.json new file mode 100644 index 00000000000..9e4e83ccf06 --- /dev/null +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1010.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-1010", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-29T17:15:09.967", + "lastModified": "2024-01-29T17:39:52.393", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in SourceCodester Employee Management System 1.0. This affects an unknown part of the file edit-profile.php. The manipulation of the argument fullname/phone/date of birth/address/date of appointment leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-252279." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jomskiller/Employee-Management-System---Stored-XSS", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/jomskiller/Employee-Management-System---Stored-XSS/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.252279", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.252279", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1011.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1011.json new file mode 100644 index 00000000000..d8a6a11f4be --- /dev/null +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1011.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-1011", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-29T17:15:10.213", + "lastModified": "2024-01-29T17:39:52.393", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in SourceCodester Employee Management System 1.0. This vulnerability affects unknown code of the file delete-leave.php of the component Leave Handler. The manipulation of the argument id leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252280." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jomskiller/Employee-Managemet-System---Broken-Access-Control", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.252280", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.252280", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1016.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1016.json new file mode 100644 index 00000000000..88e317e6910 --- /dev/null +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1016.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-1016", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-29T18:15:07.800", + "lastModified": "2024-01-29T18:15:07.800", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Solar FTP Server 2.1.1/2.1.2. It has been declared as problematic. This vulnerability affects unknown code of the component PASV Command Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-252286 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] + } + ], + "references": [ + { + "url": "https://packetstormsecurity.com/files/176675/Solar-FTP-Server-2.1.2-Denial-Of-Service.html", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.252286", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.252286", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20277.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20277.json index f8be4b4022a..2615fd3663d 100644 --- a/CVE-2024/CVE-2024-202xx/CVE-2024-20277.json +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20277.json @@ -2,16 +2,40 @@ "id": "CVE-2024-20277", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-01-17T17:15:12.300", - "lastModified": "2024-01-17T17:35:02.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:32:14.123", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands and elevate privileges to root." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco ThousandEyes Enterprise Agent, tipo de instalaci\u00f3n de dispositivo virtual, podr\u00eda permitir que un atacante remoto autenticado realice una inyecci\u00f3n de comando y eleve los privilegios a root. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario para la interfaz web. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un paquete HTTP manipulado al dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar comandos arbitrarios y elevar privilegios a root." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -34,10 +58,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:thousandeyes_enterprise_agent:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.233.2", + "matchCriteriaId": "03AFF222-FBB3-4480-9D29-939897343A8D" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-thouseyes-privesc-DmzHG3Qv", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21319.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21319.json index 5ed8207dfce..3b456029a55 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21319.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21319.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21319", "sourceIdentifier": "secure@microsoft.com", "published": "2024-01-09T19:15:12.070", - "lastModified": "2024-01-16T20:48:19.723", + "lastModified": "2024-01-29T18:47:58.443", "vulnStatus": "Analyzed", "descriptions": [ { @@ -68,8 +68,8 @@ "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*", "versionStartIncluding": "7.0.0", - "versionEndIncluding": "7.0.15", - "matchCriteriaId": "77C53F4F-8B33-4FF6-9AFE-155FEF1F972A" + "versionEndExcluding": "7.0.15", + "matchCriteriaId": "3CE00AC7-D405-4567-8CB1-C3ED7E2925C6" }, { "vulnerable": true, diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22233.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22233.json index 76fd47827d9..061c5e4cf7d 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22233.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22233.json @@ -2,16 +2,40 @@ "id": "CVE-2024-22233", "sourceIdentifier": "security@vmware.com", "published": "2024-01-22T13:15:25.453", - "lastModified": "2024-01-22T14:01:09.553", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:24:16.230", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition.\n\nSpecifically, an application is vulnerable when all of the following are true:\n\n * the application uses Spring MVC\n * Spring Security 6.1.6+ or 6.2.1+ is on the classpath\n\n\nTypically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web\u00a0and org.springframework.boot:spring-boot-starter-security\u00a0dependencies to meet all conditions.\n\n\n" + }, + { + "lang": "es", + "value": "En las versiones 6.0.15 y 6.1.2 de Spring Framework, es posible que un usuario proporcione solicitudes HTTP especialmente manipuladas que pueden causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Espec\u00edficamente, una aplicaci\u00f3n es vulnerable cuando se cumple todo lo siguiente: * la aplicaci\u00f3n usa Spring MVC * Spring Security 6.1.6+ o 6.2.1+ est\u00e1 en el classpath Normalmente, las aplicaciones Spring Boot necesitan org.springframework.boot:spring-boot-starter-web y org.springframework.boot:spring-boot-starter-security para cumplir con todas las condiciones." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security@vmware.com", "type": "Secondary", @@ -34,10 +58,47 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:spring_framework:6.0.15:*:*:*:*:*:*:*", + "matchCriteriaId": "A04B2C42-3F98-4CAF-862B-2F81C425446B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:spring_framework:6.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "AAE69C54-42A0-4C9D-AE75-305E98C208CB" + } + ] + } + ] + } + ], "references": [ { "url": "https://spring.io/security/cve-2024-22233/", - "source": "security@vmware.com" + "source": "security@vmware.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22416.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22416.json index 525dc5712de..39602da03be 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22416.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22416.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22416", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-18T00:15:38.397", - "lastModified": "2024-01-18T13:42:01.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:02:04.487", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,7 +60,7 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -48,20 +68,58 @@ "value": "CWE-352" } ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pyload-ng_project:pyload-ng:*:*:*:*:*:python:*:*", + "versionEndExcluding": "0.5.0b3.dev78", + "matchCriteriaId": "DD4F56D8-B2D0-4DDE-B8FD-51F372957087" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/pyload/pyload/commit/1374c824271cb7e927740664d06d2e577624ca3e", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/pyload/pyload/commit/c7cdc18ad9134a75222974b39e8b427c4af845fc", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/pyload/pyload/security/advisories/GHSA-pgpj-v85q-h5fm", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22496.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22496.json index de369265c15..66a3a3e301f 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22496.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22496.json @@ -2,19 +2,79 @@ "id": "CVE-2024-22496", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-23T17:15:10.543", - "lastModified": "2024-01-23T19:40:11.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:38:30.827", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross Site Scripting (XSS) vulnerability in JFinalcms 5.0.0 allows attackers to run arbitrary code via the /admin/login username parameter." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross Site Scripting (XSS) en JFinalcms 5.0.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de nombre de usuario /admin/login." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jfinalcms_project:jfinalcms:5.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0813B8F4-66B1-42C6-83A7-831B13233428" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/cui2shark/security/blob/main/%28JFinalcms%20admin-login-username%29%20.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22497.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22497.json index 8f4b38678d1..9059c923451 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22497.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22497.json @@ -2,19 +2,79 @@ "id": "CVE-2024-22497", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-23T19:15:08.480", - "lastModified": "2024-01-23T19:40:11.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:38:24.050", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross Site Scripting (XSS) vulnerability in /admin/login password parameter in JFinalcms 5.0.0 allows attackers to run arbitrary code via crafted URL." + }, + { + "lang": "es", + "value": "Vulnerabilidad de cross-site scripting (XSS) en el par\u00e1metro de contrase\u00f1a /admin/login en JFinalcms 5.0.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de una URL manipulada." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jfinalcms_project:jfinalcms:5.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0813B8F4-66B1-42C6-83A7-831B13233428" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/cui2shark/security/blob/main/%28JFinalcms%20admin-login-password%29%20.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-226xx/CVE-2024-22662.json b/CVE-2024/CVE-2024-226xx/CVE-2024-22662.json index a7e676e4b81..43dc596d29a 100644 --- a/CVE-2024/CVE-2024-226xx/CVE-2024-22662.json +++ b/CVE-2024/CVE-2024-226xx/CVE-2024-22662.json @@ -2,19 +2,91 @@ "id": "CVE-2024-22662", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-23T15:15:11.913", - "lastModified": "2024-01-23T15:47:28.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:39:08.667", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "TOTOLINK A3700R_V9.1.2u.6165_20211012 has a stack overflow vulnerability via setParentalRules" + }, + { + "lang": "es", + "value": "TOTOLINK A3700R_V9.1.2u.6165_20211012 tiene una vulnerabilidad de desbordamiento en la regi\u00f3n stack de la memoria a trav\u00e9s de setParentalRules" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:a3700r_firmware:9.1.2u.6165_20211012:*:*:*:*:*:*:*", + "matchCriteriaId": "31E7D154-802D-4419-A506-B945525BC33E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:a3700r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05777EB4-0963-4317-AB0B-287A2140915D" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Covteam/iot_vuln/tree/main/setParentalRules", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-226xx/CVE-2024-22663.json b/CVE-2024/CVE-2024-226xx/CVE-2024-22663.json index 464f9c90b50..c6db33c2498 100644 --- a/CVE-2024/CVE-2024-226xx/CVE-2024-22663.json +++ b/CVE-2024/CVE-2024-226xx/CVE-2024-22663.json @@ -2,19 +2,91 @@ "id": "CVE-2024-22663", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-23T15:15:11.950", - "lastModified": "2024-01-23T15:47:28.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:39:00.067", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "TOTOLINK_A3700R_V9.1.2u.6165_20211012has a command Injection vulnerability via setOpModeCfg" + }, + { + "lang": "es", + "value": "TOTOLINK_A3700R_V9.1.2u.6165_20211012 tiene una vulnerabilidad de inyecci\u00f3n de comando a trav\u00e9s de setOpModeCfg" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:a3700r_firmware:9.1.2u.6165_20211012:*:*:*:*:*:*:*", + "matchCriteriaId": "31E7D154-802D-4419-A506-B945525BC33E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:a3700r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05777EB4-0963-4317-AB0B-287A2140915D" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Covteam/iot_vuln/tree/main/setOpModeCfg2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-227xx/CVE-2024-22705.json b/CVE-2024/CVE-2024-227xx/CVE-2024-22705.json index c2862ce3e76..41e889b3773 100644 --- a/CVE-2024/CVE-2024-227xx/CVE-2024-22705.json +++ b/CVE-2024/CVE-2024-227xx/CVE-2024-22705.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22705", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-23T11:15:09.327", - "lastModified": "2024-01-23T13:43:53.100", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:39:39.253", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,109 @@ "value": "Se descubri\u00f3 un problema en ksmbd en el kernel de Linux anterior a 6.6.10. smb2_get_data_area_len en fs/smb/server/smb2misc.c puede causar un acceso fuera de los l\u00edmites smb_strndup_from_utf16 porque la relaci\u00f3n entre los datos de Nombre y los datos de CreateContexts est\u00e1 mal manejada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.10", + "matchCriteriaId": "FFBB79F7-240D-4B12-BF12-BC9CD1F494CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:*", + "matchCriteriaId": "3A0038DE-E183-4958-A6E3-CE3821FEAFBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:*", + "matchCriteriaId": "E31AD4FC-436C-44AB-BCAB-3A0B37F69EE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc3:*:*:*:*:*:*", + "matchCriteriaId": "C56C6E04-4F04-44A3-8DB8-93899903CFCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc4:*:*:*:*:*:*", + "matchCriteriaId": "5C78EDA4-8BE6-42FC-9512-49032D525A55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc5:*:*:*:*:*:*", + "matchCriteriaId": "32F2E5CA-13C6-4601-B530-D465CBF73D1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc6:*:*:*:*:*:*", + "matchCriteriaId": "5ED5AF93-F831-48BC-9545-CCB344E814FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc7:*:*:*:*:*:*", + "matchCriteriaId": "81A7ABCB-0807-4AA2-8F4E-75E38D2E3FD4" + } + ] + } + ] + } + ], "references": [ { "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.10", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d10c77873ba1e9e6b91905018e29e196fd5f863d", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23345.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23345.json index 2c12b387e70..5cced9abb19 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23345.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23345.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23345", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-23T00:15:26.690", - "lastModified": "2024-01-23T13:44:14.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:34:14.987", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -50,26 +70,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:networktocode:nautobot:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.10", + "matchCriteriaId": "9B240ABD-D9C3-4C3F-969A-8D75BC9C0C13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:networktocode:nautobot:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.1.2", + "matchCriteriaId": "814D6EE3-ED3C-46D1-A5E9-6FF192CDE8B7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nautobot/nautobot/commit/17effcbe84a72150c82b138565c311bbee357e80", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/nautobot/nautobot/commit/64312a4297b5ca49b6cdedf477e41e8e4fd61cce", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/nautobot/nautobot/pull/5133", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/nautobot/nautobot/pull/5134", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-v4xv-795h-rv4h", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23675.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23675.json index 17f124c75cf..0c34e3b22c7 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23675.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23675.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23675", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-01-22T21:15:10.263", - "lastModified": "2024-01-24T19:15:09.007", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T18:04:13.527", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "prodsec@splunk.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + }, { "source": "prodsec@splunk.com", "type": "Secondary", @@ -50,14 +80,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:cloud:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.1.2312.100", + "matchCriteriaId": "AD58A503-42FB-4CCA-9ABE-2DBC42440867" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.0.8", + "matchCriteriaId": "51D25D9F-2F3B-4A9A-B468-1DF8EB682692" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.1.0", + "versionEndExcluding": "9.1.3", + "matchCriteriaId": "125F126C-4B0F-4B3D-891F-498E6DE761D7" + } + ] + } + ] + } + ], "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0105", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://research.splunk.com/application/8f0e8380-a835-4f2b-b749-9ce119364df0/", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23676.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23676.json index a2592f51a51..751cae61b86 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23676.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23676.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23676", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-01-22T21:15:10.530", - "lastModified": "2024-01-24T19:15:09.097", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:57:24.363", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + }, { "source": "prodsec@splunk.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "prodsec@splunk.com", "type": "Secondary", @@ -50,14 +80,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:cloud:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.1.2308.200", + "matchCriteriaId": "9F37499F-F597-4CE3-8E14-E53AE6B46202" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.0.8", + "matchCriteriaId": "51D25D9F-2F3B-4A9A-B468-1DF8EB682692" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.1.0", + "versionEndExcluding": "9.1.3", + "matchCriteriaId": "125F126C-4B0F-4B3D-891F-498E6DE761D7" + } + ] + } + ] + } + ], "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0106", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd/", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23677.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23677.json index 1eb90b6d2a6..c544cd84aad 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23677.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23677.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23677", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-01-22T21:15:10.710", - "lastModified": "2024-01-23T13:44:14.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:52:50.727", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "prodsec@splunk.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + }, { "source": "prodsec@splunk.com", "type": "Secondary", @@ -50,10 +80,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:cloud:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.0.2208", + "matchCriteriaId": "A5CD1BF1-0F35-4509-8CC7-BC9DFC8C7166" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.0.8", + "matchCriteriaId": "51D25D9F-2F3B-4A9A-B468-1DF8EB682692" + } + ] + } + ] + } + ], "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0107", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23678.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23678.json index adc17b29452..824fb33db17 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23678.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23678.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23678", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-01-22T21:15:10.920", - "lastModified": "2024-01-24T19:15:09.180", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T17:44:47.153", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + }, { "source": "prodsec@splunk.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "prodsec@splunk.com", "type": "Secondary", @@ -50,14 +80,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.0.8", + "matchCriteriaId": "51D25D9F-2F3B-4A9A-B468-1DF8EB682692" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.1.0", + "versionEndExcluding": "9.1.3", + "matchCriteriaId": "125F126C-4B0F-4B3D-891F-498E6DE761D7" + } + ] + } + ] + } + ], "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0108", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://research.splunk.com/application/947d4d2e-1b64-41fc-b32a-736ddb88ce97/", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23828.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23828.json new file mode 100644 index 00000000000..b9f32bcc640 --- /dev/null +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23828.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23828", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-01-29T17:15:10.457", + "lastModified": "2024-01-29T17:39:52.393", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Nginx-UI is a web interface to manage Nginx configurations. It is vulnerable to an authenticated arbitrary command execution via CRLF attack when changing the value of test_config_cmd or start_cmd. This vulnerability exists due to an incomplete fix for CVE-2024-22197 and CVE-2024-22198. This vulnerability has been patched in version 2.0.0.beta.12." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-qcjq-7f7v-pvc8", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23897.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23897.json index ca1c2922a30..b496a1195d3 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23897.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23897.json @@ -2,16 +2,28 @@ "id": "CVE-2024-23897", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-01-24T18:15:09.370", - "lastModified": "2024-01-25T10:15:08.073", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-29T18:15:08.037", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", "value": "Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system." + }, + { + "lang": "es", + "value": "Jenkins 2.441 y anteriores, LTS 2.426.2 y anteriores no desactivan una funci\u00f3n de su analizador de comandos CLI que reemplaza un car\u00e1cter '@' seguido de una ruta de archivo en un argumento con el contenido del archivo, lo que permite a atacantes no autenticados leer archivos arbitrarios en el sistema de archivos del controlador Jenkins." } ], "metrics": {}, "references": [ + { + "url": "http://packetstormsecurity.com/files/176839/Jenkins-2.441-LTS-2.426.3-CVE-2024-23897-Scanner.html", + "source": "jenkinsci-cert@googlegroups.com" + }, + { + "url": "http://packetstormsecurity.com/files/176840/Jenkins-2.441-LTS-2.426.3-Arbitrary-File-Read.html", + "source": "jenkinsci-cert@googlegroups.com" + }, { "url": "https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314", "source": "jenkinsci-cert@googlegroups.com" diff --git a/README.md b/README.md index bc8651795fe..8d688f61c29 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-01-29T17:00:25.457001+00:00 +2024-01-29T19:00:24.155820+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-01-29T16:56:40.830000+00:00 +2024-01-29T18:47:58.443000+00:00 ``` ### Last Data Feed Release @@ -29,69 +29,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -237041 +237052 ``` ### CVEs added in the last Commit -Recently added CVEs: `29` +Recently added CVEs: `11` -* [CVE-2023-6946](CVE-2023/CVE-2023-69xx/CVE-2023-6946.json) (`2024-01-29T15:15:09.740`) -* [CVE-2023-7074](CVE-2023/CVE-2023-70xx/CVE-2023-7074.json) (`2024-01-29T15:15:09.793`) -* [CVE-2023-7089](CVE-2023/CVE-2023-70xx/CVE-2023-7089.json) (`2024-01-29T15:15:09.840`) -* [CVE-2023-7199](CVE-2023/CVE-2023-71xx/CVE-2023-7199.json) (`2024-01-29T15:15:09.897`) -* [CVE-2023-7200](CVE-2023/CVE-2023-72xx/CVE-2023-7200.json) (`2024-01-29T15:15:09.943`) -* [CVE-2023-7204](CVE-2023/CVE-2023-72xx/CVE-2023-7204.json) (`2024-01-29T15:15:09.997`) -* [CVE-2023-40548](CVE-2023/CVE-2023-405xx/CVE-2023-40548.json) (`2024-01-29T15:15:08.893`) -* [CVE-2023-5124](CVE-2023/CVE-2023-51xx/CVE-2023-5124.json) (`2024-01-29T15:15:09.100`) -* [CVE-2023-5943](CVE-2023/CVE-2023-59xx/CVE-2023-5943.json) (`2024-01-29T15:15:09.153`) -* [CVE-2023-5956](CVE-2023/CVE-2023-59xx/CVE-2023-5956.json) (`2024-01-29T15:15:09.203`) -* [CVE-2023-6165](CVE-2023/CVE-2023-61xx/CVE-2023-6165.json) (`2024-01-29T15:15:09.250`) -* [CVE-2023-6278](CVE-2023/CVE-2023-62xx/CVE-2023-6278.json) (`2024-01-29T15:15:09.300`) -* [CVE-2023-6279](CVE-2023/CVE-2023-62xx/CVE-2023-6279.json) (`2024-01-29T15:15:09.343`) -* [CVE-2023-6389](CVE-2023/CVE-2023-63xx/CVE-2023-6389.json) (`2024-01-29T15:15:09.410`) -* [CVE-2023-6390](CVE-2023/CVE-2023-63xx/CVE-2023-6390.json) (`2024-01-29T15:15:09.467`) -* [CVE-2024-1003](CVE-2024/CVE-2024-10xx/CVE-2024-1003.json) (`2024-01-29T15:15:10.050`) -* [CVE-2024-1004](CVE-2024/CVE-2024-10xx/CVE-2024-1004.json) (`2024-01-29T15:15:10.280`) -* [CVE-2024-1005](CVE-2024/CVE-2024-10xx/CVE-2024-1005.json) (`2024-01-29T15:15:10.510`) -* [CVE-2024-1006](CVE-2024/CVE-2024-10xx/CVE-2024-1006.json) (`2024-01-29T16:15:08.307`) -* [CVE-2024-1007](CVE-2024/CVE-2024-10xx/CVE-2024-1007.json) (`2024-01-29T16:15:08.567`) -* [CVE-2024-1008](CVE-2024/CVE-2024-10xx/CVE-2024-1008.json) (`2024-01-29T16:15:08.810`) -* [CVE-2024-23441](CVE-2024/CVE-2024-234xx/CVE-2024-23441.json) (`2024-01-29T16:15:09.203`) -* [CVE-2024-23822](CVE-2024/CVE-2024-238xx/CVE-2024-23822.json) (`2024-01-29T16:15:09.437`) -* [CVE-2024-23826](CVE-2024/CVE-2024-238xx/CVE-2024-23826.json) (`2024-01-29T16:15:09.640`) -* [CVE-2024-23827](CVE-2024/CVE-2024-238xx/CVE-2024-23827.json) (`2024-01-29T16:15:09.867`) +* [CVE-2023-1705](CVE-2023/CVE-2023-17xx/CVE-2023-1705.json) (`2024-01-29T17:15:08.123`) +* [CVE-2023-40546](CVE-2023/CVE-2023-405xx/CVE-2023-40546.json) (`2024-01-29T17:15:08.347`) +* [CVE-2023-40549](CVE-2023/CVE-2023-405xx/CVE-2023-40549.json) (`2024-01-29T17:15:08.580`) +* [CVE-2023-40550](CVE-2023/CVE-2023-405xx/CVE-2023-40550.json) (`2024-01-29T17:15:08.773`) +* [CVE-2023-40551](CVE-2023/CVE-2023-405xx/CVE-2023-40551.json) (`2024-01-29T17:15:08.970`) +* [CVE-2024-0788](CVE-2024/CVE-2024-07xx/CVE-2024-0788.json) (`2024-01-29T17:15:09.520`) +* [CVE-2024-1009](CVE-2024/CVE-2024-10xx/CVE-2024-1009.json) (`2024-01-29T17:15:09.727`) +* [CVE-2024-1010](CVE-2024/CVE-2024-10xx/CVE-2024-1010.json) (`2024-01-29T17:15:09.967`) +* [CVE-2024-1011](CVE-2024/CVE-2024-10xx/CVE-2024-1011.json) (`2024-01-29T17:15:10.213`) +* [CVE-2024-23828](CVE-2024/CVE-2024-238xx/CVE-2024-23828.json) (`2024-01-29T17:15:10.457`) +* [CVE-2024-1016](CVE-2024/CVE-2024-10xx/CVE-2024-1016.json) (`2024-01-29T18:15:07.800`) ### CVEs modified in the last Commit -Recently modified CVEs: `46` +Recently modified CVEs: `32` -* [CVE-2024-0521](CVE-2024/CVE-2024-05xx/CVE-2024-0521.json) (`2024-01-29T15:26:35.300`) -* [CVE-2024-23332](CVE-2024/CVE-2024-233xx/CVE-2024-23332.json) (`2024-01-29T15:28:47.230`) -* [CVE-2024-23331](CVE-2024/CVE-2024-233xx/CVE-2024-23331.json) (`2024-01-29T15:31:57.737`) -* [CVE-2024-22424](CVE-2024/CVE-2024-224xx/CVE-2024-22424.json) (`2024-01-29T15:35:13.463`) -* [CVE-2024-22768](CVE-2024/CVE-2024-227xx/CVE-2024-22768.json) (`2024-01-29T15:50:06.730`) -* [CVE-2024-23842](CVE-2024/CVE-2024-238xx/CVE-2024-23842.json) (`2024-01-29T15:51:53.207`) -* [CVE-2024-22772](CVE-2024/CVE-2024-227xx/CVE-2024-22772.json) (`2024-01-29T15:52:25.997`) -* [CVE-2024-22771](CVE-2024/CVE-2024-227xx/CVE-2024-22771.json) (`2024-01-29T15:53:04.917`) -* [CVE-2024-22770](CVE-2024/CVE-2024-227xx/CVE-2024-22770.json) (`2024-01-29T15:53:41.323`) -* [CVE-2024-22769](CVE-2024/CVE-2024-227xx/CVE-2024-22769.json) (`2024-01-29T15:54:12.760`) -* [CVE-2024-0884](CVE-2024/CVE-2024-08xx/CVE-2024-0884.json) (`2024-01-29T15:57:08.023`) -* [CVE-2024-0885](CVE-2024/CVE-2024-08xx/CVE-2024-0885.json) (`2024-01-29T15:57:16.977`) -* [CVE-2024-22635](CVE-2024/CVE-2024-226xx/CVE-2024-22635.json) (`2024-01-29T15:57:23.770`) -* [CVE-2024-22636](CVE-2024/CVE-2024-226xx/CVE-2024-22636.json) (`2024-01-29T15:57:32.540`) -* [CVE-2024-22637](CVE-2024/CVE-2024-226xx/CVE-2024-22637.json) (`2024-01-29T15:57:38.163`) -* [CVE-2024-22638](CVE-2024/CVE-2024-226xx/CVE-2024-22638.json) (`2024-01-29T15:57:43.763`) -* [CVE-2024-22639](CVE-2024/CVE-2024-226xx/CVE-2024-22639.json) (`2024-01-29T15:57:50.477`) -* [CVE-2024-24399](CVE-2024/CVE-2024-243xx/CVE-2024-24399.json) (`2024-01-29T15:57:59.413`) -* [CVE-2024-22922](CVE-2024/CVE-2024-229xx/CVE-2024-22922.json) (`2024-01-29T15:58:07.447`) -* [CVE-2024-23744](CVE-2024/CVE-2024-237xx/CVE-2024-23744.json) (`2024-01-29T16:00:24.713`) -* [CVE-2024-0742](CVE-2024/CVE-2024-07xx/CVE-2024-0742.json) (`2024-01-29T16:11:20.047`) -* [CVE-2024-0665](CVE-2024/CVE-2024-06xx/CVE-2024-0665.json) (`2024-01-29T16:11:47.440`) -* [CVE-2024-0567](CVE-2024/CVE-2024-05xx/CVE-2024-0567.json) (`2024-01-29T16:15:08.180`) -* [CVE-2024-21612](CVE-2024/CVE-2024-216xx/CVE-2024-21612.json) (`2024-01-29T16:15:09.040`) -* [CVE-2024-23750](CVE-2024/CVE-2024-237xx/CVE-2024-23750.json) (`2024-01-29T16:51:14.573`) +* [CVE-2023-41176](CVE-2023/CVE-2023-411xx/CVE-2023-41176.json) (`2024-01-29T17:36:19.543`) +* [CVE-2023-38627](CVE-2023/CVE-2023-386xx/CVE-2023-38627.json) (`2024-01-29T17:37:16.250`) +* [CVE-2023-38626](CVE-2023/CVE-2023-386xx/CVE-2023-38626.json) (`2024-01-29T17:37:47.613`) +* [CVE-2023-38625](CVE-2023/CVE-2023-386xx/CVE-2023-38625.json) (`2024-01-29T17:38:01.783`) +* [CVE-2023-38624](CVE-2023/CVE-2023-386xx/CVE-2023-38624.json) (`2024-01-29T17:38:08.507`) +* [CVE-2023-24135](CVE-2023/CVE-2023-241xx/CVE-2023-24135.json) (`2024-01-29T18:26:55.150`) +* [CVE-2023-42937](CVE-2023/CVE-2023-429xx/CVE-2023-42937.json) (`2024-01-29T18:33:19.387`) +* [CVE-2023-42935](CVE-2023/CVE-2023-429xx/CVE-2023-42935.json) (`2024-01-29T18:38:29.587`) +* [CVE-2024-22416](CVE-2024/CVE-2024-224xx/CVE-2024-22416.json) (`2024-01-29T17:02:04.487`) +* [CVE-2024-0553](CVE-2024/CVE-2024-05xx/CVE-2024-0553.json) (`2024-01-29T17:15:09.360`) +* [CVE-2024-22233](CVE-2024/CVE-2024-222xx/CVE-2024-22233.json) (`2024-01-29T17:24:16.230`) +* [CVE-2024-20277](CVE-2024/CVE-2024-202xx/CVE-2024-20277.json) (`2024-01-29T17:32:14.123`) +* [CVE-2024-23345](CVE-2024/CVE-2024-233xx/CVE-2024-23345.json) (`2024-01-29T17:34:14.987`) +* [CVE-2024-0782](CVE-2024/CVE-2024-07xx/CVE-2024-0782.json) (`2024-01-29T17:35:21.890`) +* [CVE-2024-22497](CVE-2024/CVE-2024-224xx/CVE-2024-22497.json) (`2024-01-29T17:38:24.050`) +* [CVE-2024-22496](CVE-2024/CVE-2024-224xx/CVE-2024-22496.json) (`2024-01-29T17:38:30.827`) +* [CVE-2024-22663](CVE-2024/CVE-2024-226xx/CVE-2024-22663.json) (`2024-01-29T17:39:00.067`) +* [CVE-2024-22662](CVE-2024/CVE-2024-226xx/CVE-2024-22662.json) (`2024-01-29T17:39:08.667`) +* [CVE-2024-22705](CVE-2024/CVE-2024-227xx/CVE-2024-22705.json) (`2024-01-29T17:39:39.253`) +* [CVE-2024-23678](CVE-2024/CVE-2024-236xx/CVE-2024-23678.json) (`2024-01-29T17:44:47.153`) +* [CVE-2024-23677](CVE-2024/CVE-2024-236xx/CVE-2024-23677.json) (`2024-01-29T17:52:50.727`) +* [CVE-2024-23676](CVE-2024/CVE-2024-236xx/CVE-2024-23676.json) (`2024-01-29T17:57:24.363`) +* [CVE-2024-23675](CVE-2024/CVE-2024-236xx/CVE-2024-23675.json) (`2024-01-29T18:04:13.527`) +* [CVE-2024-23897](CVE-2024/CVE-2024-238xx/CVE-2024-23897.json) (`2024-01-29T18:15:08.037`) +* [CVE-2024-21319](CVE-2024/CVE-2024-213xx/CVE-2024-21319.json) (`2024-01-29T18:47:58.443`) ## Download and Usage