From 511dcdbea79e2a9fe33efc98e54099209c916454 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 23 Jun 2024 14:03:10 +0000 Subject: [PATCH] Auto-Update: 2024-06-23T14:00:18.234225+00:00 --- CVE-2024/CVE-2024-62xx/CVE-2024-6269.json | 92 +++++++++++++++++++++++ README.md | 8 +- _state.csv | 3 +- 3 files changed, 98 insertions(+), 5 deletions(-) create mode 100644 CVE-2024/CVE-2024-62xx/CVE-2024-6269.json diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6269.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6269.json new file mode 100644 index 00000000000..21f9dab73fa --- /dev/null +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6269.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-6269", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-06-23T12:15:09.710", + "lastModified": "2024-06-23T12:15:09.710", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in Ruijie RG-UAC 1.0 and classified as critical. This vulnerability affects the function get_ip.addr_details of the file /view/vpn/autovpn/sxh_vpnlic.php of the component HTTP POST Request Handler. The manipulation of the argument indevice leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-269482 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.8 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/charliecatsec/cve1/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.269482", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.269482", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.358202", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index c2bbc3e988b..1eef3f53f4a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-23T12:00:18.342015+00:00 +2024-06-23T14:00:18.234225+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-23T10:15:09.753000+00:00 +2024-06-23T12:15:09.710000+00:00 ``` ### Last Data Feed Release @@ -33,14 +33,14 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -254956 +254957 ``` ### CVEs added in the last Commit Recently added CVEs: `1` -- [CVE-2024-6268](CVE-2024/CVE-2024-62xx/CVE-2024-6268.json) (`2024-06-23T10:15:09.753`) +- [CVE-2024-6269](CVE-2024/CVE-2024-62xx/CVE-2024-6269.json) (`2024-06-23T12:15:09.710`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 7e2de192be4..747c246b668 100644 --- a/_state.csv +++ b/_state.csv @@ -254954,4 +254954,5 @@ CVE-2024-6252,0,0,485d6c5c491b3be10abc5f2d0abc7d3bad8fc6fe294bde724fb841b1115419 CVE-2024-6253,0,0,36afe0470776b2066530d7f83b649e84a5bf248040996b76e07345297ebaaf31,2024-06-22T14:15:09.673000 CVE-2024-6266,0,0,70666cb36be680ae24e3b529873b2f76b9772ce56140af79219b2227eed230ed,2024-06-23T03:15:51.817000 CVE-2024-6267,0,0,9ee9d3ae56be6680575548576947e037de2c4b890a9205e4f9e207294729b9e2,2024-06-23T09:15:11.320000 -CVE-2024-6268,1,1,d5f22f854a068a47453548a1178f4ed15437dffc736d923ed553c44b59a8eea7,2024-06-23T10:15:09.753000 +CVE-2024-6268,0,0,d5f22f854a068a47453548a1178f4ed15437dffc736d923ed553c44b59a8eea7,2024-06-23T10:15:09.753000 +CVE-2024-6269,1,1,1e8f9e9c3bfd0a35fc5f3a43852838aac6176b60453f405532505e06c6623810,2024-06-23T12:15:09.710000