diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12902.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12902.json new file mode 100644 index 00000000000..8931838fb6a --- /dev/null +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12902.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-12902", + "sourceIdentifier": "twcert@cert.org.tw", + "published": "2024-12-23T11:15:06.153", + "lastModified": "2024-12-23T11:15:06.153", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ANCHOR from Global Wisdom Software is an integrated product running on a Windows virtual machine. The underlying Windows OS of the product contains high-privilege service accounts. If these accounts use default passwords, attackers could remotely log in to the virtual machine using the default credentials." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1392" + } + ] + } + ], + "references": [ + { + "url": "https://www.twcert.org.tw/en/cp-139-8315-e6069-2.html", + "source": "twcert@cert.org.tw" + }, + { + "url": "https://www.twcert.org.tw/tw/cp-132-8314-983c9-1.html", + "source": "twcert@cert.org.tw" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index c6bb323c678..ff10a7388e1 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-23T07:00:21.886599+00:00 +2024-12-23T13:00:20.359502+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-23T06:15:06.357000+00:00 +2024-12-23T11:15:06.153000+00:00 ``` ### Last Data Feed Release @@ -33,21 +33,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -274567 +274568 ``` ### CVEs added in the last Commit Recently added CVEs: `1` -- [CVE-2024-11230](CVE-2024/CVE-2024-112xx/CVE-2024-11230.json) (`2024-12-23T05:15:05.800`) +- [CVE-2024-12902](CVE-2024/CVE-2024-129xx/CVE-2024-12902.json) (`2024-12-23T11:15:06.153`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -- [CVE-2024-50623](CVE-2024/CVE-2024-506xx/CVE-2024-50623.json) (`2024-12-23T06:15:06.357`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 118eb42f4ec..0350d1b4209 100644 --- a/_state.csv +++ b/_state.csv @@ -244057,7 +244057,7 @@ CVE-2024-11227,0,0,4429f46befcca636641488313efda0ce9e85d610d1a8222594e7b609e2557 CVE-2024-11228,0,0,ea3ea506f494760971365e8cc08e4c50cc9e1b3e56f38ea31b32e4e82646f717,2024-11-23T12:15:18.577000 CVE-2024-11229,0,0,f216e4e055884628872bc9827bd59bcb71e0c27eff667134ca7f40729f0e7955,2024-11-23T12:15:18.983000 CVE-2024-1123,0,0,8b17d130c61ae38981c31032a4e85450c1b0fc32b8189b46d005a999a3b68420,2024-11-21T08:49:51.077000 -CVE-2024-11230,1,1,f575b944f513597b2d7c102a684d7520e6de50ddd1d937643a4b3d348b3f1a97,2024-12-23T05:15:05.800000 +CVE-2024-11230,0,0,f575b944f513597b2d7c102a684d7520e6de50ddd1d937643a4b3d348b3f1a97,2024-12-23T05:15:05.800000 CVE-2024-11231,0,0,1babaa8434f0dabb897e61577b0db39dc3dbee760a24a16a5980940fb44c99a3,2024-11-23T12:15:19.387000 CVE-2024-11233,0,0,f693569babb39b28690250bf399e234d5652aa087fc09c6fa53135c369c0e730,2024-11-26T18:26:37.783000 CVE-2024-11234,0,0,76a20d0b5df369c7dd2c3a2819b7721a96e80c779172c74c627d64ef7ab10b79,2024-11-26T19:06:10.243000 @@ -245076,6 +245076,7 @@ CVE-2024-12899,0,0,a8156719562171ad632b82cbae15ec7c223a7a48bfe33b1a670936619c6c2 CVE-2024-1290,0,0,7c95f47c5c3e77faa57d4558ce65f60c9fa0ea7551f118126af89c59b8448f97,2024-11-21T08:50:14.680000 CVE-2024-12900,0,0,1012b3733f239b410a68b2041572702d5a7f787259c3b8be862ffc1a0d536863,2024-12-23T02:15:05.630000 CVE-2024-12901,0,0,7438bb24c69768569f04db263b25be4e855460433a924b6dad82e02e6b0c486b,2024-12-23T02:15:06.613000 +CVE-2024-12902,1,1,ee08e378772e1f46c93b8372ede0a0264641211c3e244f7e1f9345504b34fe8c,2024-12-23T11:15:06.153000 CVE-2024-1291,0,0,52c4840726a3cf584db63abe3d1006ff575604ba403c25fca89470816948ce5e,2024-11-21T08:50:14.863000 CVE-2024-1292,0,0,38d9bc6a557167174bf37c6662c68d5de6a783380fb5a30941c923054e3f2f16,2024-11-21T08:50:14.983000 CVE-2024-1293,0,0,a122e9ddbaac35fa4b5b33d2b10cf37b4d4e3a3677cea83da66723805eec222b,2024-11-21T08:50:15.167000 @@ -268192,7 +268193,7 @@ CVE-2024-50614,0,0,29f22ac93163ff1303a42a1fec38fde0552d285d63129bbab00c726fede4a CVE-2024-50615,0,0,4d2a2e353be570a02fcdfff0b42fb37b106e2c1e8ab4e77f1c580e4daa183aa0,2024-10-30T20:35:37.310000 CVE-2024-50616,0,0,f16f40ce12577bc20e6d17ff8fa15bd5a1f69a543581dc34546ce7e8ac77217c,2024-10-30T20:35:38.380000 CVE-2024-5062,0,0,cdc86dcd84c87200c0328afbc0b136b026f9aaa280f8620d87cfe6bc9e21b227,2024-11-21T09:46:53.077000 -CVE-2024-50623,0,1,a42b8474b720b20703db546b945276a382320df10b0eef38229afd3da2f40c09,2024-12-23T06:15:06.357000 +CVE-2024-50623,0,0,a42b8474b720b20703db546b945276a382320df10b0eef38229afd3da2f40c09,2024-12-23T06:15:06.357000 CVE-2024-50624,0,0,425b4912ca74d0f19519cece63451f565c900b6a769644536a74ca4edcfab020,2024-10-30T21:35:12.223000 CVE-2024-50625,0,0,600a63b94c23d23207c426e1e43b071296b787357ca99d17c5661761f04e2a95,2024-12-12T02:06:32.647000 CVE-2024-50626,0,0,ee346cb1a02e9d6ceaf318c396c6bbfc04e63993edcd6528fb39c33b5fb34c43,2024-12-12T02:06:32.817000