diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8563.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8563.json new file mode 100644 index 00000000000..0231e381d41 --- /dev/null +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8563.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-8563", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-09-07T20:15:01.977", + "lastModified": "2024-09-07T20:15:01.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester PHP CRUD 1.0. It has been classified as problematic. This affects an unknown part of the file /endpoint/update.php. The manipulation of the argument first_name/middle_name/last_name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.276783", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.276783", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.403661", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8564.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8564.json new file mode 100644 index 00000000000..b7ca91ff993 --- /dev/null +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8564.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-8564", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-09-07T21:15:10.160", + "lastModified": "2024-09-07T21:15:10.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester PHP CRUD 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /endpoint/update.php. The manipulation of the argument tbl_person_id/first_name/middle_name/last_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.276784", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.276784", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.403662", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 30299a72758..50a0add014f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-07T20:00:17.491242+00:00 +2024-09-07T22:00:17.408521+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-07T19:15:11.890000+00:00 +2024-09-07T21:15:10.160000+00:00 ``` ### Last Data Feed Release @@ -33,17 +33,15 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -262159 +262161 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `2` -- [CVE-2024-8559](CVE-2024/CVE-2024-85xx/CVE-2024-8559.json) (`2024-09-07T18:15:02.000`) -- [CVE-2024-8560](CVE-2024/CVE-2024-85xx/CVE-2024-8560.json) (`2024-09-07T18:15:02.263`) -- [CVE-2024-8561](CVE-2024/CVE-2024-85xx/CVE-2024-8561.json) (`2024-09-07T19:15:11.627`) -- [CVE-2024-8562](CVE-2024/CVE-2024-85xx/CVE-2024-8562.json) (`2024-09-07T19:15:11.890`) +- [CVE-2024-8563](CVE-2024/CVE-2024-85xx/CVE-2024-8563.json) (`2024-09-07T20:15:01.977`) +- [CVE-2024-8564](CVE-2024/CVE-2024-85xx/CVE-2024-8564.json) (`2024-09-07T21:15:10.160`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 656e0c3a4d2..cee3b8c686b 100644 --- a/_state.csv +++ b/_state.csv @@ -262154,7 +262154,9 @@ CVE-2024-8554,0,0,c22c1f89e401e0782597ca2f3477c9a05db53b2a7144565af9357a2130544a CVE-2024-8555,0,0,94f678fe7b29dec5c18a811e0e4fafd4ad3f0f2fb28c246e9cb63f9be29155cc,2024-09-07T15:15:10.420000 CVE-2024-8557,0,0,0e06bf273bb497e48fd0f987df13d5f7c5124aeec63b6be2467d1e45fcfbdecb,2024-09-07T15:15:10.670000 CVE-2024-8558,0,0,8a63b73bd2684c56e30472a55cc44c169dee7d4b7ba1ece62b8fe7701757fddc,2024-09-07T16:15:02.780000 -CVE-2024-8559,1,1,3520b6dc39c21df08e23c127aab51921bf9ab325f0256f75b6217180d67f6a48,2024-09-07T18:15:02 -CVE-2024-8560,1,1,6a6a8fc96c1bff00d6aa8df0ec3427ea5b99718fc24180ba52262534513656bb,2024-09-07T18:15:02.263000 -CVE-2024-8561,1,1,b34773571785cda8dcd8f6c027698936f7394d876c10b3c241dbd377bb07e50d,2024-09-07T19:15:11.627000 -CVE-2024-8562,1,1,1f05e2bea22db9ecf6df21c87886767dae52bf4ee92551501ef34c9f81149ee0,2024-09-07T19:15:11.890000 +CVE-2024-8559,0,0,3520b6dc39c21df08e23c127aab51921bf9ab325f0256f75b6217180d67f6a48,2024-09-07T18:15:02 +CVE-2024-8560,0,0,6a6a8fc96c1bff00d6aa8df0ec3427ea5b99718fc24180ba52262534513656bb,2024-09-07T18:15:02.263000 +CVE-2024-8561,0,0,b34773571785cda8dcd8f6c027698936f7394d876c10b3c241dbd377bb07e50d,2024-09-07T19:15:11.627000 +CVE-2024-8562,0,0,1f05e2bea22db9ecf6df21c87886767dae52bf4ee92551501ef34c9f81149ee0,2024-09-07T19:15:11.890000 +CVE-2024-8563,1,1,c3517fce7ba99b39d3faae3dd805f0feca7f6a3c61f7d19251a3f7aee7f893b4,2024-09-07T20:15:01.977000 +CVE-2024-8564,1,1,614dfaf3c8a8fccdb81effcc414020655c45f2f0deb2f271106f47aae0d7017a,2024-09-07T21:15:10.160000