From 3e2f788f066abb576d80c8eaed9dbd5e86a1ec80 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 26 May 2024 10:03:28 +0000 Subject: [PATCH] Auto-Update: 2024-05-26T10:00:37.179764+00:00 --- CVE-2024/CVE-2024-53xx/CVE-2024-5356.json | 96 +++++++++++++++++++++++ CVE-2024/CVE-2024-53xx/CVE-2024-5357.json | 92 ++++++++++++++++++++++ CVE-2024/CVE-2024-53xx/CVE-2024-5358.json | 92 ++++++++++++++++++++++ README.md | 12 +-- _state.csv | 5 +- 5 files changed, 291 insertions(+), 6 deletions(-) create mode 100644 CVE-2024/CVE-2024-53xx/CVE-2024-5356.json create mode 100644 CVE-2024/CVE-2024-53xx/CVE-2024-5357.json create mode 100644 CVE-2024/CVE-2024-53xx/CVE-2024-5358.json diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5356.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5356.json new file mode 100644 index 00000000000..a3c4ba6d808 --- /dev/null +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5356.json @@ -0,0 +1,96 @@ +{ + "id": "CVE-2024-5356", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-26T08:15:08.367", + "lastModified": "2024-05-26T08:15:08.367", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in anji-plus AJ-Report up to 1.4.1. Affected is an unknown function of the file /dataSet/testTransform;swagger-ui. The manipulation of the argument dynSentence leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266268." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/anji-plus/report/files/15363269/aj-report.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/anji-plus/report/issues/34", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.266268", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.266268", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.338486", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5357.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5357.json new file mode 100644 index 00000000000..71c3280baaf --- /dev/null +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5357.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-5357", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-26T08:15:08.797", + "lastModified": "2024-05-26T08:15:08.797", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in PHPGurukul Zoo Management System 2.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/forgot-password.php. The manipulation of the argument email leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266269 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.266269", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.266269", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.343372", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.yuque.com/yuqueyonghunhj6tg/ygf5oy/wzxsew2dfb84l3lo", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5358.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5358.json new file mode 100644 index 00000000000..df99d2368d6 --- /dev/null +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5358.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-5358", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-26T09:15:08.490", + "lastModified": "2024-05-26T09:15:08.490", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PHPGurukul Zoo Management System 2.1 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/normal-search.php. The manipulation of the argument searchdata leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-266270 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.266270", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.266270", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.343374", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.yuque.com/yuqueyonghunhj6tg/ygf5oy/otrp279l6c41kem1", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 67cf5dbc626..a594999dbe4 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-26T08:00:37.665503+00:00 +2024-05-26T10:00:37.179764+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-26T06:15:08.883000+00:00 +2024-05-26T09:15:08.490000+00:00 ``` ### Last Data Feed Release @@ -33,14 +33,16 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -251785 +251788 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `3` -- [CVE-2024-5355](CVE-2024/CVE-2024-53xx/CVE-2024-5355.json) (`2024-05-26T06:15:08.883`) +- [CVE-2024-5356](CVE-2024/CVE-2024-53xx/CVE-2024-5356.json) (`2024-05-26T08:15:08.367`) +- [CVE-2024-5357](CVE-2024/CVE-2024-53xx/CVE-2024-5357.json) (`2024-05-26T08:15:08.797`) +- [CVE-2024-5358](CVE-2024/CVE-2024-53xx/CVE-2024-5358.json) (`2024-05-26T09:15:08.490`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index cc65d9ea1c7..1e0e04763fe 100644 --- a/_state.csv +++ b/_state.csv @@ -251783,4 +251783,7 @@ CVE-2024-5351,0,0,aebf51a65ba25588eae77758e0fe296b408b26f5a4445e748cfec0a55388ed CVE-2024-5352,0,0,b33f097a66fd042a49a320f828305fde8c5c33d790a288de9e9da431e5f99772,2024-05-26T01:15:08.647000 CVE-2024-5353,0,0,25809abc2977c48829c375685b12d71009a9e041894dcdfc3ca61287e30319e8,2024-05-26T04:15:08.350000 CVE-2024-5354,0,0,49d0efcde572d8eda782fbe89d5eff8fe01c27ac52c871b3a205dd313602ce1d,2024-05-26T05:15:08.297000 -CVE-2024-5355,1,1,65ae2b1873eb97b202664f655fcc59894c785d60507962a268bf3d380f7f9095,2024-05-26T06:15:08.883000 +CVE-2024-5355,0,0,65ae2b1873eb97b202664f655fcc59894c785d60507962a268bf3d380f7f9095,2024-05-26T06:15:08.883000 +CVE-2024-5356,1,1,6cd43a45212db20d05272659a2831f93c3cf7f99aea8b643606ea82688463eb0,2024-05-26T08:15:08.367000 +CVE-2024-5357,1,1,f159b385710c4120d6e13538cc460aae996ada96d1b056a28dbfd595fa3df182,2024-05-26T08:15:08.797000 +CVE-2024-5358,1,1,64bdda4acbdc3b635b33efd8e0f097cb707bac96c66a022aceede441965a8d81,2024-05-26T09:15:08.490000