From 2f9f59a9a5dca0aa52a2a864ad615203e050fb0d Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 2 Jan 2024 00:55:30 +0000 Subject: [PATCH] Auto-Update: 2024-01-02T00:55:26.719830+00:00 --- CVE-2023/CVE-2023-43xx/CVE-2023-4380.json | 8 +-- CVE-2024/CVE-2024-01xx/CVE-2024-0183.json | 88 +++++++++++++++++++++++ CVE-2024/CVE-2024-01xx/CVE-2024-0184.json | 88 +++++++++++++++++++++++ README.md | 16 ++--- 4 files changed, 188 insertions(+), 12 deletions(-) create mode 100644 CVE-2024/CVE-2024-01xx/CVE-2024-0183.json create mode 100644 CVE-2024/CVE-2024-01xx/CVE-2024-0184.json diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4380.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4380.json index aa26fb5aaab..2f515dd7145 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4380.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4380.json @@ -2,12 +2,12 @@ "id": "CVE-2023-4380", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-04T15:15:12.703", - "lastModified": "2023-11-07T04:22:28.907", + "lastModified": "2024-01-01T23:15:08.460", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A logic flaw exists in Ansible. Whenever a private project is created with incorrect credentials, they are logged in plaintext. This flaw allows an attacker to retrieve the credentials from the log, resulting in the loss of confidentiality, integrity, and availability." + "value": "A logic flaw exists in Ansible Automation platform. Whenever a private project is created with incorrect credentials, they are logged in plaintext. This flaw allows an attacker to retrieve the credentials from the log, resulting in the loss of confidentiality, integrity, and availability." }, { "lang": "es", @@ -37,7 +37,7 @@ "impactScore": 3.4 }, { - "source": "53f830b8-0a3f-465b-8143-3b8a9948e749", + "source": "secalert@redhat.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -70,7 +70,7 @@ ] }, { - "source": "53f830b8-0a3f-465b-8143-3b8a9948e749", + "source": "secalert@redhat.com", "type": "Secondary", "description": [ { diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0183.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0183.json new file mode 100644 index 00000000000..6a105d5adbb --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0183.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-0183", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-01T23:15:08.930", + "lastModified": "2024-01-01T23:15:08.930", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/students.php of the component NIA Office. The manipulation leads to basic cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249441 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 3.3 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://mega.nz/file/SB8ylCxQ#vSaXJwbNjeG-KXatgkxE8XI6Cmnv-A_Sg2IjvoJZs0E", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.249441", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.249441", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0184.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0184.json new file mode 100644 index 00000000000..ff313509e8a --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0184.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-0184", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-02T00:15:08.243", + "lastModified": "2024-01-02T00:15:08.243", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/edit_teacher.php of the component Add Enginer. The manipulation of the argument Firstname/Lastname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249442 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 3.3 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://mega.nz/file/eN8yEKSA#YCJNH1v4BKOG2xyxOZYPIuO3Oz7biv2ugfarAI5n_3k", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.249442", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.249442", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 47c27277712..eb39615f420 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-01-01T23:00:24.001481+00:00 +2024-01-02T00:55:26.719830+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-01-01T21:15:24.777000+00:00 +2024-01-02T00:15:08.243000+00:00 ``` ### Last Data Feed Release @@ -29,22 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -234622 +234624 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `2` -* [CVE-2024-0182](CVE-2024/CVE-2024-01xx/CVE-2024-0182.json) (`2024-01-01T21:15:24.777`) +* [CVE-2024-0183](CVE-2024/CVE-2024-01xx/CVE-2024-0183.json) (`2024-01-01T23:15:08.930`) +* [CVE-2024-0184](CVE-2024/CVE-2024-01xx/CVE-2024-0184.json) (`2024-01-02T00:15:08.243`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `1` -* [CVE-2023-51766](CVE-2023/CVE-2023-517xx/CVE-2023-51766.json) (`2024-01-01T21:15:24.403`) -* [CVE-2023-5764](CVE-2023/CVE-2023-57xx/CVE-2023-5764.json) (`2024-01-01T21:15:24.487`) +* [CVE-2023-4380](CVE-2023/CVE-2023-43xx/CVE-2023-4380.json) (`2024-01-01T23:15:08.460`) ## Download and Usage