From 6365de89e8fb2f7afdd7079fae9e2afea0a01089 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 8 Sep 2024 06:03:18 +0000 Subject: [PATCH] Auto-Update: 2024-09-08T06:00:17.664623+00:00 --- CVE-2024/CVE-2024-85xx/CVE-2024-8569.json | 141 ++++++++++++++++++++++ README.md | 11 +- _state.csv | 5 +- 3 files changed, 149 insertions(+), 8 deletions(-) create mode 100644 CVE-2024/CVE-2024-85xx/CVE-2024-8569.json diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8569.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8569.json new file mode 100644 index 00000000000..7e3bc6c0f18 --- /dev/null +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8569.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-8569", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-09-08T05:15:10.763", + "lastModified": "2024-09-08T05:15:10.763", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in code-projects Hospital Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file user-login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/teachersongsec/cve/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.276799", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.276799", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.403125", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index cc77b82b3b6..893f33219aa 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-08T04:00:16.788861+00:00 +2024-09-08T06:00:17.664623+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-08T03:15:01.833000+00:00 +2024-09-08T05:15:10.763000+00:00 ``` ### Last Data Feed Release @@ -33,15 +33,14 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -262165 +262166 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `1` -- [CVE-2024-8567](CVE-2024/CVE-2024-85xx/CVE-2024-8567.json) (`2024-09-08T02:15:10.643`) -- [CVE-2024-8568](CVE-2024/CVE-2024-85xx/CVE-2024-8568.json) (`2024-09-08T03:15:01.833`) +- [CVE-2024-8569](CVE-2024/CVE-2024-85xx/CVE-2024-8569.json) (`2024-09-08T05:15:10.763`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 91b2c1e6f1a..e94a4e92c2e 100644 --- a/_state.csv +++ b/_state.csv @@ -262162,5 +262162,6 @@ CVE-2024-8563,0,0,c3517fce7ba99b39d3faae3dd805f0feca7f6a3c61f7d19251a3f7aee7f893 CVE-2024-8564,0,0,614dfaf3c8a8fccdb81effcc414020655c45f2f0deb2f271106f47aae0d7017a,2024-09-07T21:15:10.160000 CVE-2024-8565,0,0,6cb4a30a25a1065de5f88cfca7cfe6d62437f9d4de222f9741b6956aadeba3f2,2024-09-07T23:15:10.233000 CVE-2024-8566,0,0,9a96173e33b9e2f152eb0ef99d89c66ac1ffc3a87540584d06ac71a484065544,2024-09-08T00:15:02.037000 -CVE-2024-8567,1,1,128c1c03702479e16aeb74ac1d5ff777775df76bef6861dc5a90bc996a0ed9fd,2024-09-08T02:15:10.643000 -CVE-2024-8568,1,1,4f947db17327204061a3cbd87b0e0e34fcde742e3d6be8f12c557585eebdd903,2024-09-08T03:15:01.833000 +CVE-2024-8567,0,0,128c1c03702479e16aeb74ac1d5ff777775df76bef6861dc5a90bc996a0ed9fd,2024-09-08T02:15:10.643000 +CVE-2024-8568,0,0,4f947db17327204061a3cbd87b0e0e34fcde742e3d6be8f12c557585eebdd903,2024-09-08T03:15:01.833000 +CVE-2024-8569,1,1,cddbad41d115b0e24f21900215e9a8424d8cd4b102bb78b99cdec197572a5219,2024-09-08T05:15:10.763000