Auto-Update: 2024-02-19T23:00:24.128976+00:00

This commit is contained in:
cad-safe-bot 2024-02-19 23:00:27 +00:00
parent 6eb2f31103
commit 437da68592
6 changed files with 300 additions and 10 deletions

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-6259",
"sourceIdentifier": "57dba5dd-1a03-47f6-8b36-e84e47d335d8",
"published": "2024-02-19T22:15:48.253",
"lastModified": "2024-02-19T22:15:48.253",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Insufficiently Protected Credentials, : Improper Access Control vulnerability in Brivo ACS100, ACS300 allows Password Recovery Exploitation, Bypassing Physical Security.This issue affects ACS100, ACS300: from 5.2.4 before 6.2.4.3.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "57dba5dd-1a03-47f6-8b36-e84e47d335d8",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "57dba5dd-1a03-47f6-8b36-e84e47d335d8",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
},
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"references": [
{
"url": "https://sra.io/advisories/",
"source": "57dba5dd-1a03-47f6-8b36-e84e47d335d8"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-6260",
"sourceIdentifier": "57dba5dd-1a03-47f6-8b36-e84e47d335d8",
"published": "2024-02-19T22:15:48.460",
"lastModified": "2024-02-19T22:15:48.460",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Brivo ACS100, ACS300 allows OS Command Injection, Bypassing Physical Security.This issue affects ACS100 (Network Adjacent Access), ACS300 (Physical Access): from 5.2.4 before 6.2.4.3.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "57dba5dd-1a03-47f6-8b36-e84e47d335d8",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "57dba5dd-1a03-47f6-8b36-e84e47d335d8",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://sra.io/advisories/",
"source": "57dba5dd-1a03-47f6-8b36-e84e47d335d8"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-1635",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-02-19T22:15:48.647",
"lastModified": "2024-02-19T22:15:48.647",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available. \r\n\r\nAt HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree leaks via that task, which is added to XNIO WorkerThread. So, the workerThread points to the Undertow conduit, which contains the connections and causes the leak."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1635",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264928",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-1638",
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
"published": "2024-02-19T22:15:48.837",
"lastModified": "2024-02-19T22:15:48.837",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The documentation specifies that the BT_GATT_PERM_READ_LESC and BT_GATT_PERM_WRITE_LESC defines for a Bluetooth characteristic: Attribute read/write permission with LE Secure Connection encryption. If set, requires that LE Secure Connections is used for read/write access, however this is only true when it is combined with other permissions, namely BT_GATT_PERM_READ_ENCRYPT/BT_GATT_PERM_READ_AUTHEN (for read) or BT_GATT_PERM_WRITE_ENCRYPT/BT_GATT_PERM_WRITE_AUTHEN (for write), if these additional permissions are not set (even in secure connections only mode) then the stack does not perform any permission checks on these characteristics and they can be freely written/read."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vulnerabilities@zephyrproject.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "vulnerabilities@zephyrproject.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p6f3-f63q-5mc2",
"source": "vulnerabilities@zephyrproject.org"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-26129",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-19T22:15:49.013",
"lastModified": "2024-02-19T22:15:49.013",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "PrestaShop is an open-source e-commerce platform. Starting in version 8.1.0 and prior to version 8.1.4, PrestaShop is vulnerable to path disclosure in a JavaScript variable. A patch is available in version 8.1.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/PrestaShop/PrestaShop/commit/444bd0dea581659918fe2067541b9863cf099dd5",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-3366-9287-7qpr",
"source": "security-advisories@github.com"
},
{
"url": "https://owasp.org/www-community/attacks/Full_Path_Disclosure",
"source": "security-advisories@github.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-02-19T21:00:24.193777+00:00
2024-02-19T23:00:24.128976+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-02-19T20:15:46.270000+00:00
2024-02-19T22:15:49.013000+00:00
```
### Last Data Feed Release
@ -29,19 +29,18 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
238895
238900
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `5`
* [CVE-2023-50257](CVE-2023/CVE-2023-502xx/CVE-2023-50257.json) (`2024-02-19T20:15:45.310`)
* [CVE-2024-25626](CVE-2024/CVE-2024-256xx/CVE-2024-25626.json) (`2024-02-19T20:15:45.513`)
* [CVE-2024-25634](CVE-2024/CVE-2024-256xx/CVE-2024-25634.json) (`2024-02-19T20:15:45.707`)
* [CVE-2024-25635](CVE-2024/CVE-2024-256xx/CVE-2024-25635.json) (`2024-02-19T20:15:45.890`)
* [CVE-2024-25636](CVE-2024/CVE-2024-256xx/CVE-2024-25636.json) (`2024-02-19T20:15:46.077`)
* [CVE-2024-25640](CVE-2024/CVE-2024-256xx/CVE-2024-25640.json) (`2024-02-19T20:15:46.270`)
* [CVE-2023-6259](CVE-2023/CVE-2023-62xx/CVE-2023-6259.json) (`2024-02-19T22:15:48.253`)
* [CVE-2023-6260](CVE-2023/CVE-2023-62xx/CVE-2023-6260.json) (`2024-02-19T22:15:48.460`)
* [CVE-2024-1635](CVE-2024/CVE-2024-16xx/CVE-2024-1635.json) (`2024-02-19T22:15:48.647`)
* [CVE-2024-1638](CVE-2024/CVE-2024-16xx/CVE-2024-1638.json) (`2024-02-19T22:15:48.837`)
* [CVE-2024-26129](CVE-2024/CVE-2024-261xx/CVE-2024-26129.json) (`2024-02-19T22:15:49.013`)
### CVEs modified in the last Commit