Auto-Update: 2024-06-23T14:00:18.234225+00:00

This commit is contained in:
cad-safe-bot 2024-06-23 14:03:10 +00:00
parent 5fc295a802
commit 511dcdbea7
3 changed files with 98 additions and 5 deletions

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-6269",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-23T12:15:09.710",
"lastModified": "2024-06-23T12:15:09.710",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Ruijie RG-UAC 1.0 and classified as critical. This vulnerability affects the function get_ip.addr_details of the file /view/vpn/autovpn/sxh_vpnlic.php of the component HTTP POST Request Handler. The manipulation of the argument indevice leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-269482 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/charliecatsec/cve1/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.269482",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.269482",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.358202",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-23T12:00:18.342015+00:00
2024-06-23T14:00:18.234225+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-23T10:15:09.753000+00:00
2024-06-23T12:15:09.710000+00:00
```
### Last Data Feed Release
@ -33,14 +33,14 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
254956
254957
```
### CVEs added in the last Commit
Recently added CVEs: `1`
- [CVE-2024-6268](CVE-2024/CVE-2024-62xx/CVE-2024-6268.json) (`2024-06-23T10:15:09.753`)
- [CVE-2024-6269](CVE-2024/CVE-2024-62xx/CVE-2024-6269.json) (`2024-06-23T12:15:09.710`)
### CVEs modified in the last Commit

View File

@ -254954,4 +254954,5 @@ CVE-2024-6252,0,0,485d6c5c491b3be10abc5f2d0abc7d3bad8fc6fe294bde724fb841b1115419
CVE-2024-6253,0,0,36afe0470776b2066530d7f83b649e84a5bf248040996b76e07345297ebaaf31,2024-06-22T14:15:09.673000
CVE-2024-6266,0,0,70666cb36be680ae24e3b529873b2f76b9772ce56140af79219b2227eed230ed,2024-06-23T03:15:51.817000
CVE-2024-6267,0,0,9ee9d3ae56be6680575548576947e037de2c4b890a9205e4f9e207294729b9e2,2024-06-23T09:15:11.320000
CVE-2024-6268,1,1,d5f22f854a068a47453548a1178f4ed15437dffc736d923ed553c44b59a8eea7,2024-06-23T10:15:09.753000
CVE-2024-6268,0,0,d5f22f854a068a47453548a1178f4ed15437dffc736d923ed553c44b59a8eea7,2024-06-23T10:15:09.753000
CVE-2024-6269,1,1,1e8f9e9c3bfd0a35fc5f3a43852838aac6176b60453f405532505e06c6623810,2024-06-23T12:15:09.710000

Can't render this file because it is too large.