From 3af353c4e711c96b9570af01702a53e88d614296 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 17 Mar 2024 07:03:16 +0000 Subject: [PATCH] Auto-Update: 2024-03-17T07:00:30.089415+00:00 --- CVE-2024/CVE-2024-25xx/CVE-2024-2554.json | 88 +++++++++++++++++++++++ README.md | 11 ++- _state.csv | 5 +- 3 files changed, 96 insertions(+), 8 deletions(-) create mode 100644 CVE-2024/CVE-2024-25xx/CVE-2024-2554.json diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2554.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2554.json new file mode 100644 index 00000000000..9ad13abc244 --- /dev/null +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2554.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2554", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-17T05:15:06.040", + "lastModified": "2024-03-17T05:15:06.040", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in SourceCodester Employee Task Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file update-employee.php. The manipulation of the argument admin_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257053 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#3sql-injection-vulnerability-in-update-employeephp", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.257053", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.257053", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index bbdd3a4bddd..499a0d053f6 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-17T05:00:38.177428+00:00 +2024-03-17T07:00:30.089415+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-17T04:15:07.073000+00:00 +2024-03-17T05:15:06.040000+00:00 ``` ### Last Data Feed Release @@ -29,15 +29,14 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -241720 +241721 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `1` -* [CVE-2024-2547](CVE-2024/CVE-2024-25xx/CVE-2024-2547.json) (`2024-03-17T04:15:06.750`) -* [CVE-2024-2553](CVE-2024/CVE-2024-25xx/CVE-2024-2553.json) (`2024-03-17T04:15:07.073`) +* [CVE-2024-2554](CVE-2024/CVE-2024-25xx/CVE-2024-2554.json) (`2024-03-17T05:15:06.040`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 7e8d6ec0155..8782d4ce1c2 100644 --- a/_state.csv +++ b/_state.csv @@ -241042,10 +241042,11 @@ CVE-2024-25461,0,0,ff9c7389dbf883803b3d7ff0b96f823d8c83a19a6abab9dd2ebda71c398b5 CVE-2024-25466,0,0,c4ed87974de177e036ba4c046a8b808bfb2e5d37116e1f3dbea09f35fe2aed68,2024-02-16T13:37:51.433000 CVE-2024-25468,0,0,689cbd3de116ed2f097be6892186e0dd30daa2bde9afea2c256b5d624b13afab,2024-02-20T19:50:53.960000 CVE-2024-25469,0,0,96be9bcc7fde8f9b63f103d576b0d22a9c84a3c5935374af13a2466b2f2f5aa2,2024-02-26T13:42:22.567000 -CVE-2024-2547,1,1,58cd4235f6d823891f6aefdc867b41784e44558955c2a5a2fa0c5c4dfb5ba7fc,2024-03-17T04:15:06.750000 +CVE-2024-2547,0,0,58cd4235f6d823891f6aefdc867b41784e44558955c2a5a2fa0c5c4dfb5ba7fc,2024-03-17T04:15:06.750000 CVE-2024-25501,0,0,bac5c3eafbac38d2c6b4da329ce2a075da938dd8ce1ff1c471fff3fb2b0c91ae,2024-03-11T01:32:29.610000 CVE-2024-25502,0,0,50331b6b298e51ff1fb5155b43730c3887534f74eacaa5eabfebdbefa930be85,2024-02-16T13:38:00.047000 -CVE-2024-2553,1,1,6ab7f1d3aad09b7279fb5ef2827f21c216e9975878dfdd5027623c79d6801347,2024-03-17T04:15:07.073000 +CVE-2024-2553,0,0,6ab7f1d3aad09b7279fb5ef2827f21c216e9975878dfdd5027623c79d6801347,2024-03-17T04:15:07.073000 +CVE-2024-2554,1,1,a7aef3f7acc746404874cc22bb1f0b037f18c91941127474c702786d1c5bbaf9,2024-03-17T05:15:06.040000 CVE-2024-25551,0,0,08dea6730d2a3539d15dd516547ab3c25a1bf59710632ae63632a88cbff77b71,2024-03-04T13:58:23.447000 CVE-2024-25552,0,0,d883aeb50248972b9f86293464fb83b3894fa14aa0a35cda83456c82f7157e6f,2024-03-01T14:04:26.010000 CVE-2024-25553,0,0,7897cd9b8668fce1d605300c650e28167f9921d03a4fde26bc34f4ebe45114c9,2024-03-01T08:15:37.950000