From 6ed54d8f749e417020dbaf46ce8f8da5dfde66ce Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 1 Feb 2024 05:01:01 +0000 Subject: [PATCH] Auto-Update: 2024-02-01T05:00:57.475661+00:00 --- CVE-2022/CVE-2022-470xx/CVE-2022-47072.json | 4 +- CVE-2023/CVE-2023-288xx/CVE-2023-28807.json | 4 +- CVE-2023/CVE-2023-482xx/CVE-2023-48201.json | 64 +++++++++++++++- CVE-2023/CVE-2023-482xx/CVE-2023-48202.json | 64 +++++++++++++++- CVE-2023/CVE-2023-521xx/CVE-2023-52187.json | 61 ++++++++++++++- CVE-2023/CVE-2023-64xx/CVE-2023-6482.json | 58 +++++++++++++- CVE-2023/CVE-2023-64xx/CVE-2023-6497.json | 65 +++++++++++++++- CVE-2023/CVE-2023-70xx/CVE-2023-7069.json | 47 ++++++++++++ CVE-2024/CVE-2024-06xx/CVE-2024-0618.json | 72 ++++++++++++++++-- CVE-2024/CVE-2024-06xx/CVE-2024-0664.json | 65 +++++++++++++++- CVE-2024/CVE-2024-06xx/CVE-2024-0667.json | 70 +++++++++++++++-- CVE-2024/CVE-2024-06xx/CVE-2024-0697.json | 65 +++++++++++++++- CVE-2024/CVE-2024-08xx/CVE-2024-0824.json | 65 +++++++++++++++- CVE-2024/CVE-2024-08xx/CVE-2024-0831.json | 4 +- CVE-2024/CVE-2024-09xx/CVE-2024-0939.json | 74 ++++++++++++++++-- CVE-2024/CVE-2024-09xx/CVE-2024-0997.json | 69 +++++++++++++++-- CVE-2024/CVE-2024-09xx/CVE-2024-0998.json | 69 +++++++++++++++-- CVE-2024/CVE-2024-09xx/CVE-2024-0999.json | 69 +++++++++++++++-- CVE-2024/CVE-2024-10xx/CVE-2024-1000.json | 83 +++++++++++++++++++-- CVE-2024/CVE-2024-10xx/CVE-2024-1001.json | 73 ++++++++++++++++-- CVE-2024/CVE-2024-10xx/CVE-2024-1002.json | 73 ++++++++++++++++-- CVE-2024/CVE-2024-10xx/CVE-2024-1003.json | 73 ++++++++++++++++-- CVE-2024/CVE-2024-10xx/CVE-2024-1004.json | 73 ++++++++++++++++-- CVE-2024/CVE-2024-10xx/CVE-2024-1007.json | 60 +++++++++++++-- CVE-2024/CVE-2024-10xx/CVE-2024-1008.json | 60 +++++++++++++-- CVE-2024/CVE-2024-11xx/CVE-2024-1113.json | 4 +- CVE-2024/CVE-2024-11xx/CVE-2024-1114.json | 4 +- CVE-2024/CVE-2024-11xx/CVE-2024-1115.json | 4 +- CVE-2024/CVE-2024-11xx/CVE-2024-1116.json | 4 +- CVE-2024/CVE-2024-11xx/CVE-2024-1117.json | 4 +- CVE-2024/CVE-2024-216xx/CVE-2024-21626.json | 4 +- CVE-2024/CVE-2024-221xx/CVE-2024-22147.json | 51 ++++++++++++- CVE-2024/CVE-2024-222xx/CVE-2024-22283.json | 51 ++++++++++++- CVE-2024/CVE-2024-235xx/CVE-2024-23506.json | 63 +++++++++++++++- CVE-2024/CVE-2024-236xx/CVE-2024-23650.json | 4 +- CVE-2024/CVE-2024-236xx/CVE-2024-23651.json | 4 +- CVE-2024/CVE-2024-236xx/CVE-2024-23652.json | 4 +- CVE-2024/CVE-2024-236xx/CVE-2024-23653.json | 4 +- CVE-2024/CVE-2024-239xx/CVE-2024-23941.json | 28 +++++++ CVE-2024/CVE-2024-243xx/CVE-2024-24324.json | 80 +++++++++++++++++++- CVE-2024/CVE-2024-243xx/CVE-2024-24325.json | 80 +++++++++++++++++++- CVE-2024/CVE-2024-243xx/CVE-2024-24326.json | 80 +++++++++++++++++++- CVE-2024/CVE-2024-243xx/CVE-2024-24327.json | 80 +++++++++++++++++++- CVE-2024/CVE-2024-243xx/CVE-2024-24328.json | 80 +++++++++++++++++++- CVE-2024/CVE-2024-243xx/CVE-2024-24329.json | 80 +++++++++++++++++++- CVE-2024/CVE-2024-243xx/CVE-2024-24330.json | 80 +++++++++++++++++++- CVE-2024/CVE-2024-243xx/CVE-2024-24331.json | 80 +++++++++++++++++++- CVE-2024/CVE-2024-243xx/CVE-2024-24332.json | 80 +++++++++++++++++++- CVE-2024/CVE-2024-243xx/CVE-2024-24333.json | 80 +++++++++++++++++++- CVE-2024/CVE-2024-245xx/CVE-2024-24571.json | 4 +- CVE-2024/CVE-2024-245xx/CVE-2024-24572.json | 4 +- CVE-2024/CVE-2024-245xx/CVE-2024-24573.json | 4 +- CVE-2024/CVE-2024-247xx/CVE-2024-24747.json | 4 +- README.md | 63 ++++++++-------- 54 files changed, 2386 insertions(+), 210 deletions(-) create mode 100644 CVE-2023/CVE-2023-70xx/CVE-2023-7069.json create mode 100644 CVE-2024/CVE-2024-239xx/CVE-2024-23941.json diff --git a/CVE-2022/CVE-2022-470xx/CVE-2022-47072.json b/CVE-2022/CVE-2022-470xx/CVE-2022-47072.json index 89dd6f72188..5714280ed13 100644 --- a/CVE-2022/CVE-2022-470xx/CVE-2022-47072.json +++ b/CVE-2022/CVE-2022-470xx/CVE-2022-47072.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47072", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-31T21:15:08.440", - "lastModified": "2024-01-31T21:15:08.440", - "vulnStatus": "Received", + "lastModified": "2024-02-01T03:18:21.737", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-288xx/CVE-2023-28807.json b/CVE-2023/CVE-2023-288xx/CVE-2023-28807.json index 290e9c7ed70..a7f054ab2b0 100644 --- a/CVE-2023/CVE-2023-288xx/CVE-2023-28807.json +++ b/CVE-2023/CVE-2023-288xx/CVE-2023-28807.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28807", "sourceIdentifier": "cve@zscaler.com", "published": "2024-01-31T20:15:44.903", - "lastModified": "2024-01-31T20:15:44.903", - "vulnStatus": "Received", + "lastModified": "2024-02-01T03:18:21.737", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48201.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48201.json index 696608d3fba..7645e8e6a06 100644 --- a/CVE-2023/CVE-2023-482xx/CVE-2023-48201.json +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48201.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48201", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-27T06:15:47.880", - "lastModified": "2024-01-29T14:25:30.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:49:36.670", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,67 @@ "value": "La vulnerabilidad de cross site scripting (XSS) en Sunlight CMS v.8.0.1 permite a atacantes remotos autenticados ejecutar c\u00f3digo arbitrario y escalar privilegios a trav\u00e9s de una secuencia de comandos manipulada al componente del editor de texto de contenido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sunlight-cms:sunlight_cms:8.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "00193228-C0C6-43F7-9FB3-FC7F79AC8AC3" + } + ] + } + ] + } + ], "references": [ { "url": "https://mechaneus.github.io/CVE-2023-48201.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48202.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48202.json index 1766e7e5258..51211c4341b 100644 --- a/CVE-2023/CVE-2023-482xx/CVE-2023-48202.json +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48202.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48202", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-27T06:15:47.967", - "lastModified": "2024-01-29T14:25:30.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:49:50.897", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,67 @@ "value": "La vulnerabilidad de cross site scripting (XSS) en Sunlight CMS 8.0.1 permite a un usuario autenticado con pocos privilegios escalar privilegios a trav\u00e9s de un archivo SVG manipulado en el componente File Manager." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sunlight-cms:sunlight_cms:8.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "00193228-C0C6-43F7-9FB3-FC7F79AC8AC3" + } + ] + } + ] + } + ], "references": [ { "url": "https://mechaneus.github.io/CVE-2023-48202.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52187.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52187.json index 4ab24f628a1..a015d052c50 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52187.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52187.json @@ -2,16 +2,40 @@ "id": "CVE-2023-52187", "sourceIdentifier": "audit@patchstack.com", "published": "2024-01-27T00:15:24.293", - "lastModified": "2024-01-27T00:42:46.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:13:18.680", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Thomas Maier Image Source Control Lite \u2013 Show Image Credits and Captions.This issue affects Image Source Control Lite \u2013 Show Image Credits and Captions: from n/a through 2.17.0.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en Thomas Maier Image Source Control Lite \u2013 Show Image Credits and Captions. Este problema afecta a Image Source Control Lite \u2013 Show Image Credits and Captions: desde n/a hasta 2.17.0." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:imagesourcecontrol:image_source_control:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.17.0", + "matchCriteriaId": "8AD9F907-B50F-42C9-8943-A65DD08E81F4" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/image-source-control-isc/wordpress-image-source-control-lite-plugin-2-17-0-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6482.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6482.json index ce4d4c4f75c..e90d182559f 100644 --- a/CVE-2023/CVE-2023-64xx/CVE-2023-6482.json +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6482.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6482", "sourceIdentifier": "PSIRT@synaptics.com", "published": "2024-01-27T01:15:08.033", - "lastModified": "2024-01-29T17:15:09.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:14:20.480", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 4.2 + }, { "source": "PSIRT@synaptics.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + }, { "source": "PSIRT@synaptics.com", "type": "Secondary", @@ -50,10 +80,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synaptics:fingerprint_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.00.1103", + "versionEndExcluding": "6.0.17.1103", + "matchCriteriaId": "8D536C26-1861-49A5-B233-9C3FD0070B99" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.synaptics.com/sites/default/files/2024-01/fingerprint-driver-encryption-key-security-brief-2024-01-26.pdf", - "source": "PSIRT@synaptics.com" + "source": "PSIRT@synaptics.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6497.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6497.json index 1afb2d21ac8..2609b2d06bd 100644 --- a/CVE-2023/CVE-2023-64xx/CVE-2023-6497.json +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6497.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6497", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-27T04:15:08.047", - "lastModified": "2024-01-29T14:25:30.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:14:30.527", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -38,14 +58,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tipsandtricks-hq:wordpress_simple_paypal_shopping_cart:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.7.1", + "matchCriteriaId": "2D16B4D4-A34C-4B26-A470-49A49CAFA117" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3007737%40wordpress-simple-paypal-shopping-cart&new=3007737%40wordpress-simple-paypal-shopping-cart&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac6201a1-7ca9-461b-b9ad-16407120dfae?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7069.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7069.json new file mode 100644 index 00000000000..3e6727442c4 --- /dev/null +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7069.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2023-7069", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-02-01T04:15:49.780", + "lastModified": "2024-02-01T04:15:49.780", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Advanced iFrame plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'advanced_iframe' shortcode in all versions up to, and including, 2023.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3027702%40advanced-iframe&new=3027702%40advanced-iframe&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e32c51d-2d96-4545-956f-64f65c54b33b?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0618.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0618.json index 48609a78730..aa53c6131de 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0618.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0618.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0618", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-27T06:15:48.010", - "lastModified": "2024-01-29T14:25:30.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:15:46.393", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -38,18 +58,60 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fluentforms:contact_form:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "5.1.5", + "matchCriteriaId": "9AFCC946-C977-4433-A39D-BA2EC18A7C4E" + } + ] + } + ] + } + ], "references": [ { "url": "https://advisory.abay.sh/cve-2024-0618/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3022938/fluentform/tags/5.1.7/app/Helpers/Helper.php?old=3000676&old_path=fluentform%2Ftags%2F5.1.5%2Fapp%2FHelpers%2FHelper.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0348d465-f351-4c52-b293-8b3b058292b9?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0664.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0664.json index ec5d91e68d5..ee1275cc02b 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0664.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0664.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0664", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-27T04:15:08.237", - "lastModified": "2024-01-29T14:25:30.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:15:02.763", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -38,14 +58,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mekshq:meks_smart_social_widget:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.6.3", + "matchCriteriaId": "D97E4A4B-2A78-4644-B378-9394C591A9D1" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3027347%40meks-smart-social-widget&new=3027347%40meks-smart-social-widget&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/722aae99-fcfb-4234-9245-5db57aaa03c5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0667.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0667.json index 8f66be3fbbe..006777a6193 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0667.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0667.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0667", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-27T04:15:08.453", - "lastModified": "2024-01-29T14:25:30.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:15:17.817", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -38,18 +58,58 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:form_maker:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.15.21", + "matchCriteriaId": "DA339584-CD39-4721-B1B3-439CCFED59A2" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/form-maker/tags/1.15.21/booster/controller.php#L34", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3027368%40form-maker&new=3027368%40form-maker&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d55c832b-f558-4e8a-8301-33dd38d39ef1?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0697.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0697.json index 91aaef7e104..38e936c6e51 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0697.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0697.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0697", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-27T05:15:08.470", - "lastModified": "2024-01-29T14:25:30.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:15:27.597", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -38,14 +58,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:softaculous:backuply:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2.3", + "matchCriteriaId": "04879D8D-64D6-4CE6-A6B3-45828B7C069E" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3026806%40backuply&new=3026806%40backuply&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/70effa22-fbf6-44cb-9d1b-8625969c10ac?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0824.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0824.json index 7c39ec14794..b5b6f07a688 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0824.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0824.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0824", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-27T05:15:08.767", - "lastModified": "2024-01-29T14:25:30.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:15:36.430", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -38,14 +58,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devscred:exclusive_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.6.8", + "matchCriteriaId": "23D91800-DEBB-408F-89E6-9109C834A308" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3026499/exclusive-addons-for-elementor/trunk/extensions/link-anything.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/925b0a86-ed23-471c-84e2-ae78a01b1876?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0831.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0831.json index 6488b75ca9b..a6162d41c4b 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0831.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0831.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0831", "sourceIdentifier": "security@hashicorp.com", "published": "2024-02-01T02:15:46.330", - "lastModified": "2024-02-01T02:15:46.330", - "vulnStatus": "Received", + "lastModified": "2024-02-01T03:18:21.737", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0939.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0939.json index 8323461056c..047b3ea90e9 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0939.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0939.json @@ -2,16 +2,40 @@ "id": "CVE-2024-0939", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-26T19:15:08.103", - "lastModified": "2024-01-27T00:42:46.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:16:01.597", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Beijing Baichuo Smart S210 Management Platform up to 20240117 and classified as critical. This vulnerability affects unknown code of the file /Tool/uploadfile.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252184. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en Beijing Baichuo Smart S210 Management Platform hasta 20240117 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo /Tool/uploadfile.php. La manipulaci\u00f3n del argumento file_upload conduce a una carga sin restricciones. El ataque se puede iniciar de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-252184. NOTA: Se contact\u00f3 primeramente con proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -71,18 +95,58 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:byzoro:smart_s210_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2024-01-17", + "matchCriteriaId": "4C56C8FE-0DC7-4197-B75C-879AEB1CA99D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:byzoro:smart_s210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DEFD8CA-AA67-4F4F-BF94-96ADEDF2AE44" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Yu1e/vuls/blob/main/an%20arbitrary%20file%20upload%20vulnerability%20in%20BaiZhuo%20Networks%20Smart%20S210%20multi-service%20security%20gateway%20intelligent%20management%20platform.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.252184", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.252184", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0997.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0997.json index c563ee01b3c..7c116e069c1 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0997.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0997.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0997", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-29T13:15:08.127", - "lastModified": "2024-01-29T14:25:21.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:18:10.013", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -75,18 +95,57 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:n200re_firmware:9.3.5u.6139_b20201216:*:*:*:*:*:*:*", + "matchCriteriaId": "053F2B0B-9AD2-404B-9135-080AF3D3FC20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:n200re:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FF7FF59-DB13-4FEA-A81C-124048BF1676" + } + ] + } + ] + } + ], "references": [ { "url": "https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-setOpModeCfg-9faac02b13d84bd3b7fe84aab68c7add?pvs=4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.252266", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.252266", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0998.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0998.json index 200ca4752d9..72cb57010d3 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0998.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0998.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0998", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-29T13:15:08.470", - "lastModified": "2024-01-29T14:25:21.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:18:08.437", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -75,18 +95,57 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:n200re_firmware:9.3.5u.6139_b20201216:*:*:*:*:*:*:*", + "matchCriteriaId": "053F2B0B-9AD2-404B-9135-080AF3D3FC20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:n200re:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FF7FF59-DB13-4FEA-A81C-124048BF1676" + } + ] + } + ] + } + ], "references": [ { "url": "https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-setDiagnosisCfg-b2d36451543e4c6da063646721a24604?pvs=4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.252267", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.252267", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0999.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0999.json index 66aa691475f..34d18ccfbaf 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0999.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0999.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0999", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-29T13:15:08.753", - "lastModified": "2024-01-29T14:25:21.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:18:05.900", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -75,18 +95,57 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:n200re_firmware:9.3.5u.6139_b20201216:*:*:*:*:*:*:*", + "matchCriteriaId": "053F2B0B-9AD2-404B-9135-080AF3D3FC20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:n200re:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FF7FF59-DB13-4FEA-A81C-124048BF1676" + } + ] + } + ] + } + ], "references": [ { "url": "https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-setParentalRules-f891c062b86349a596ee173cb456b4f6?pvs=4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.252268", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.252268", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1000.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1000.json index dc57db9d303..77b10872660 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1000.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1000.json @@ -2,16 +2,40 @@ "id": "CVE-2024-1000", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-29T14:15:08.717", - "lastModified": "2024-01-29T14:25:21.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:18:00.683", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216. It has been rated as critical. This issue affects the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument command leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252269 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Totolink N200RE 9.3.5u.6139_B20201216. Ha sido calificada como cr\u00edtica. Este problema afecta la funci\u00f3n setTracerouteCfg del archivo /cgi-bin/cstecgi.cgi. La manipulaci\u00f3n del argumento command conduce a un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. El ataque puede iniciarse de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-252269. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -60,6 +84,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -71,18 +105,57 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:n200re_firmware:9.3.5u.6139_b20201216:*:*:*:*:*:*:*", + "matchCriteriaId": "053F2B0B-9AD2-404B-9135-080AF3D3FC20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:n200re:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FF7FF59-DB13-4FEA-A81C-124048BF1676" + } + ] + } + ] + } + ], "references": [ { "url": "https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-setTracerouteCfg-b6b3fe05b4a945a3bc460dbcb61dfc75?pvs=4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.252269", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.252269", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1001.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1001.json index db9e88b1117..3f1daa40c49 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1001.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1001.json @@ -2,16 +2,40 @@ "id": "CVE-2024-1001", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-29T14:15:08.970", - "lastModified": "2024-01-29T14:25:21.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:17:46.200", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in Totolink N200RE 9.3.5u.6139_B20201216. Affected is the function main of the file /cgi-bin/cstecgi.cgi. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-252270 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en Totolink N200RE 9.3.5u.6139_B20201216 y clasificada como cr\u00edtica. La funci\u00f3n principal del archivo /cgi-bin/cstecgi.cgi es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. Es posible lanzar el ataque de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. VDB-252270 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -71,18 +95,57 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:n200re_firmware:9.3.5u.6139_b20201216:*:*:*:*:*:*:*", + "matchCriteriaId": "053F2B0B-9AD2-404B-9135-080AF3D3FC20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:n200re:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FF7FF59-DB13-4FEA-A81C-124048BF1676" + } + ] + } + ] + } + ], "references": [ { "url": "https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-main-942df77e9c70495390e4aed2a29f3d13?pvs=4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.252270", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.252270", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1002.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1002.json index 9b67d888625..1788cd66490 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1002.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1002.json @@ -2,16 +2,40 @@ "id": "CVE-2024-1002", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-29T14:15:09.200", - "lastModified": "2024-01-29T14:25:21.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:17:37.890", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Totolink N200RE 9.3.5u.6139_B20201216. Affected by this vulnerability is the function setIpPortFilterRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ePort leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252271. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Totolink N200RE 9.3.5u.6139_B20201216 y clasificada como cr\u00edtica. La funci\u00f3n setIpPortFilterRules del archivo /cgi-bin/cstecgi.cgi es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento ePort provoca un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. El ataque se puede lanzar de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-252271. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -71,18 +95,57 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:n200re_firmware:9.3.5u.6139_b20201216:*:*:*:*:*:*:*", + "matchCriteriaId": "053F2B0B-9AD2-404B-9135-080AF3D3FC20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:n200re:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FF7FF59-DB13-4FEA-A81C-124048BF1676" + } + ] + } + ] + } + ], "references": [ { "url": "https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-setIpPortFilterRules-71c3f0a947e14b7f95fa19b7d6676994?pvs=4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.252271", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.252271", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1003.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1003.json index 3095b87bce4..1776c265d0b 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1003.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1003.json @@ -2,16 +2,40 @@ "id": "CVE-2024-1003", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-29T15:15:10.050", - "lastModified": "2024-01-29T16:19:11.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:16:23.063", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Totolink N200RE 9.3.5u.6139_B20201216. Affected by this issue is the function setLanguageCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument lang leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252272. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Totolink N200RE 9.3.5u.6139_B20201216 y clasificada como cr\u00edtica. La funci\u00f3n setLanguageCfg del archivo /cgi-bin/cstecgi.cgi es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento lang provoca un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. El ataque puede lanzarse de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-252272. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -71,18 +95,57 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:n200re_firmware:9.3.5u.6139_b20201216:*:*:*:*:*:*:*", + "matchCriteriaId": "053F2B0B-9AD2-404B-9135-080AF3D3FC20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:n200re:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FF7FF59-DB13-4FEA-A81C-124048BF1676" + } + ] + } + ] + } + ], "references": [ { "url": "https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-setLanguageCfg-72357294db1e4f8096b29d3f2592d1fc?pvs=4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.252272", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.252272", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1004.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1004.json index 57c8b28df58..fc5becb4974 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1004.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1004.json @@ -2,16 +2,40 @@ "id": "CVE-2024-1004", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-29T15:15:10.280", - "lastModified": "2024-01-29T16:19:11.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:16:14.513", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Totolink N200RE 9.3.5u.6139_B20201216. This affects the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument http_host leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252273 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Totolink N200RE 9.3.5u.6139_B20201216 y clasificada como cr\u00edtica. Esto afecta a la funci\u00f3n loginAuth del archivo /cgi-bin/cstecgi.cgi. La manipulaci\u00f3n del argumento http_host provoca un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. Es posible iniciar el ataque de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-252273. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -71,18 +95,57 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:n200re_firmware:9.3.5u.6139_b20201216:*:*:*:*:*:*:*", + "matchCriteriaId": "053F2B0B-9AD2-404B-9135-080AF3D3FC20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:n200re:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FF7FF59-DB13-4FEA-A81C-124048BF1676" + } + ] + } + ] + } + ], "references": [ { "url": "https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-loginAuth-cbde48da404049328cb698394b6c0641?pvs=4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.252273", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.252273", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1007.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1007.json index 5b81b908e79..147571f7d01 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1007.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1007.json @@ -2,16 +2,40 @@ "id": "CVE-2024-1007", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-29T16:15:08.567", - "lastModified": "2024-01-29T16:19:11.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:18:33.743", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Employee Management System 1.0. It has been classified as critical. Affected is an unknown function of the file edit_profile.php. The manipulation of the argument txtfullname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252276." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Employee Management System 1.0. Ha sido clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo edit_profile.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento txtfullname conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-252276." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -71,18 +95,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:razormist:employee_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C7C87F89-B8F6-412D-8E3F-3C35A1EBAD6F" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.252276", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.252276", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.youtube.com/watch?v=1yesMwvWcL4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1008.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1008.json index c8085699911..200e5adeadb 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1008.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1008.json @@ -2,16 +2,40 @@ "id": "CVE-2024-1008", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-29T16:15:08.810", - "lastModified": "2024-01-29T16:19:11.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:18:38.740", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Employee Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file edit-photo.php of the component Profile Page. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252277 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Employee Management System 1.0. Ha sido declarada cr\u00edtica. Una funci\u00f3n desconocida del archivo edit-photo.php del componente Profile Page es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a una carga sin restricciones. El ataque se puede lanzar de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-252277." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -71,18 +95,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:razormist:employee_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C7C87F89-B8F6-412D-8E3F-3C35A1EBAD6F" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.252277", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.252277", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.youtube.com/watch?v=z4gcLZCOcnc", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1113.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1113.json index bc291feb561..11406f24d0a 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1113.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1113.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1113", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-31T20:15:45.140", - "lastModified": "2024-01-31T20:15:45.140", - "vulnStatus": "Received", + "lastModified": "2024-02-01T03:18:21.737", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1114.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1114.json index 50858e673a3..17ff07d1910 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1114.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1114.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1114", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-31T20:15:45.367", - "lastModified": "2024-01-31T20:15:45.367", - "vulnStatus": "Received", + "lastModified": "2024-02-01T03:18:21.737", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1115.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1115.json index a8176884be6..3b72256aca6 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1115.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1115.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1115", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-31T20:15:45.590", - "lastModified": "2024-01-31T20:15:45.590", - "vulnStatus": "Received", + "lastModified": "2024-02-01T03:18:21.737", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1116.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1116.json index 448aaadbe37..8c5792e0b52 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1116.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1116.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1116", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-31T20:15:45.807", - "lastModified": "2024-01-31T20:15:45.807", - "vulnStatus": "Received", + "lastModified": "2024-02-01T03:18:21.737", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1117.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1117.json index d8370abed91..f81194b1dd6 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1117.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1117.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1117", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-31T21:15:08.500", - "lastModified": "2024-01-31T21:15:08.500", - "vulnStatus": "Received", + "lastModified": "2024-02-01T03:18:21.737", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21626.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21626.json index acb758f1f36..3e53f805e26 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21626.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21626.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21626", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-31T22:15:53.780", - "lastModified": "2024-01-31T22:15:53.780", - "vulnStatus": "Received", + "lastModified": "2024-02-01T03:18:21.737", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22147.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22147.json index 987f18f4d24..983afdc8124 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22147.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22147.json @@ -2,16 +2,40 @@ "id": "CVE-2024-22147", "sourceIdentifier": "audit@patchstack.com", "published": "2024-01-27T00:15:24.567", - "lastModified": "2024-01-27T00:42:46.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:13:36.740", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP Overnight PDF Invoices & Packing Slips for WooCommerce.This issue affects PDF Invoices & Packing Slips for WooCommerce: from n/a through 3.7.5.\n\n" + }, + { + "lang": "es", + "value": "Neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyecci\u00f3n SQL') en . Este problema afecta a PDF Invoices & Packing Slips for WooCommerce: desde n/a hasta 3.7.5." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpovernight:woocommerce_pdf_invoices\\&_packing_slips:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.7.5", + "matchCriteriaId": "337C23A8-23D4-4BCF-BC3E-65F665AF946D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/woocommerce-pdf-invoices-packing-slips/wordpress-pdf-invoices-packing-slips-for-woocommerce-plugin-3-7-5-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22283.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22283.json index e0c371607d1..a1fe62c7021 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22283.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22283.json @@ -2,16 +2,40 @@ "id": "CVE-2024-22283", "sourceIdentifier": "audit@patchstack.com", "published": "2024-01-27T00:15:24.770", - "lastModified": "2024-01-27T00:42:46.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:13:41.033", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Delhivery Delhivery Logistics Courier.This issue affects Delhivery Logistics Courier: from n/a through 1.0.107.\n\n" + }, + { + "lang": "es", + "value": "Neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyecci\u00f3n SQL') en Delhivery Delhivery Logistics Courier. Este problema afecta a Delhivery Logistics Courier: desde n/a hasta 1.0.107." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:delhivery:logistics_courier:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.107", + "matchCriteriaId": "CB7DB539-E9C6-46EE-A5F5-D64BFAA5C8DB" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/delhivery-logistics-courier/wordpress-delhivery-logistics-courier-plugin-1-0-107-subscriber-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23506.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23506.json index f7047b719f3..5e1d94d01dd 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23506.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23506.json @@ -2,16 +2,40 @@ "id": "CVE-2024-23506", "sourceIdentifier": "audit@patchstack.com", "published": "2024-01-27T00:15:24.977", - "lastModified": "2024-01-27T00:42:46.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-01T04:14:07.073", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in InstaWP Team InstaWP Connect \u2013 1-click WP Staging & Migration.This issue affects InstaWP Connect \u2013 1-click WP Staging & Migration: from n/a through 0.1.0.9.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en InstaWP Team InstaWP Connect \u2013 1-click WP Staging & Migration. Este problema afecta a InstaWP Connect \u2013 1-click WP Staging & Migration: desde n/a hasta 0.1.0.9." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -36,8 +60,18 @@ }, "weaknesses": [ { - "source": "audit@patchstack.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "audit@patchstack.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:instawp:instawp_connect:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.1.0.9", + "matchCriteriaId": "8F64534D-B2EB-42F8-9D98-35D7C4967FF1" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/instawp-connect/wordpress-instawp-connect-plugin-0-1-0-9-sensitive-data-exposure-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23650.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23650.json index 0f89faaa654..b14970f1ba9 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23650.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23650.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23650", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-31T22:15:53.990", - "lastModified": "2024-01-31T22:15:53.990", - "vulnStatus": "Received", + "lastModified": "2024-02-01T03:18:21.737", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23651.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23651.json index 7006c1a6f9a..55b2a9b7921 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23651.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23651.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23651", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-31T22:15:54.183", - "lastModified": "2024-01-31T22:15:54.183", - "vulnStatus": "Received", + "lastModified": "2024-02-01T03:18:21.737", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23652.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23652.json index 2b80b0d9737..f4fd9a7256b 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23652.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23652.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23652", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-31T22:15:54.377", - "lastModified": "2024-01-31T22:15:54.377", - "vulnStatus": "Received", + "lastModified": "2024-02-01T03:18:21.737", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23653.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23653.json index 13903bf3448..d640bc29cb3 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23653.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23653.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23653", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-31T22:15:54.600", - "lastModified": "2024-01-31T22:15:54.600", - "vulnStatus": "Received", + "lastModified": "2024-02-01T03:18:21.737", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23941.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23941.json new file mode 100644 index 00000000000..e2e4f59f5c0 --- /dev/null +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23941.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-23941", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-02-01T04:15:49.967", + "lastModified": "2024-02-01T04:15:49.967", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-site scripting vulnerability exists in Group Office prior to v6.6.182, prior to v6.7.64 and prior to v6.8.31, which may allow a remote authenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Intermesh/groupoffice/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jvn.jp/en/jp/JVN63567545/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.group-office.com/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24324.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24324.json index 89b04dbc7ba..d08b999e913 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24324.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24324.json @@ -2,19 +2,91 @@ "id": "CVE-2024-24324", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-30T15:15:09.277", - "lastModified": "2024-01-30T15:21:43.493", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T04:49:29.220", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "TOTOLINK A8000RU v7.1cu.643_B20200521 was discovered to contain a hardcoded password for root stored in /etc/shadow." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que TOTOLINK A8000RU v7.1cu.643_B20200521 conten\u00eda una contrase\u00f1a codificada para root almacenada en /etc/shadow." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:a8000ru_firmware:7.1cu.643_b20200521:*:*:*:*:*:*:*", + "matchCriteriaId": "87C53C12-572D-440A-AA3D-340DC43605A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:a8000ru:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85118A3E-742A-4B1E-A7CF-F8F8E8A86462" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A8000RU/TOTOlink%20A8000RU%20hard%20code.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24325.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24325.json index c34cccdd7d1..813a9eba0c3 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24325.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24325.json @@ -2,19 +2,91 @@ "id": "CVE-2024-24325", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-30T15:15:09.333", - "lastModified": "2024-01-30T15:21:43.493", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T04:49:27.410", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the enable parameter in the setParentalRules function." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que TOTOLINK A3300R V17.0.0cu.557_B20221024 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro enable en la funci\u00f3n setParentalRules." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:*", + "matchCriteriaId": "DD39B647-3419-4C6D-A6A2-30F40822A27D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F723A73-4B32-4F9E-B5DA-80134D4711C1" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/11/TOTOlink%20A3300R%20setParentalRules.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24326.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24326.json index 3e4fa6687ed..8f0c80eeee7 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24326.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24326.json @@ -2,19 +2,91 @@ "id": "CVE-2024-24326", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-30T15:15:09.380", - "lastModified": "2024-01-30T15:21:43.493", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T04:49:24.940", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the arpEnable parameter in the setStaticDhcpRules function." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que TOTOLINK A3300R V17.0.0cu.557_B20221024 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro arpEnable en la funci\u00f3n setStaticDhcpRules." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:*", + "matchCriteriaId": "DD39B647-3419-4C6D-A6A2-30F40822A27D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F723A73-4B32-4F9E-B5DA-80134D4711C1" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/8/TOTOlink%20A3300R%20setStaticDhcpRules.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24327.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24327.json index 3adbadcc510..92dc0d00cf4 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24327.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24327.json @@ -2,19 +2,91 @@ "id": "CVE-2024-24327", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-30T15:15:09.430", - "lastModified": "2024-01-30T15:21:43.493", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T04:49:22.830", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the pppoePass parameter in the setIpv6Cfg function." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que TOTOLINK A3300R V17.0.0cu.557_B20221024 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro pppoePass en la funci\u00f3n setIpv6Cfg." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:*", + "matchCriteriaId": "DD39B647-3419-4C6D-A6A2-30F40822A27D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F723A73-4B32-4F9E-B5DA-80134D4711C1" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/7/TOTOlink%20A3300R%20setIpv6Cfg.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24328.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24328.json index 0fecef7ad0f..ed5ddd8fdc9 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24328.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24328.json @@ -2,19 +2,91 @@ "id": "CVE-2024-24328", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-30T15:15:09.487", - "lastModified": "2024-01-30T15:21:43.493", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T04:49:21.037", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the enable parameter in the setMacFilterRules function." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que TOTOLINK A3300R V17.0.0cu.557_B20221024 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro enable en la funci\u00f3n setMacFilterRules." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:*", + "matchCriteriaId": "DD39B647-3419-4C6D-A6A2-30F40822A27D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F723A73-4B32-4F9E-B5DA-80134D4711C1" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/12/TOTOlink%20A3300R%20setMacFilterRules.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24329.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24329.json index 4643f0de696..3da0d903647 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24329.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24329.json @@ -2,19 +2,91 @@ "id": "CVE-2024-24329", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-30T15:15:09.540", - "lastModified": "2024-01-30T15:21:43.493", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T04:49:18.867", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the enable parameter in the setPortForwardRules function." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que TOTOLINK A3300R V17.0.0cu.557_B20221024 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro enable en la funci\u00f3n setPortForwardRules." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:*", + "matchCriteriaId": "DD39B647-3419-4C6D-A6A2-30F40822A27D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F723A73-4B32-4F9E-B5DA-80134D4711C1" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/10/TOTOlink%20A3300R%20setPortForwardRules.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24330.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24330.json index 448e788c04b..fc0fd7ec6e8 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24330.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24330.json @@ -2,19 +2,91 @@ "id": "CVE-2024-24330", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-30T15:15:09.597", - "lastModified": "2024-01-30T15:21:43.493", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T04:18:43.927", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the port or enable parameter in the setRemoteCfg function." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que TOTOLINK A3300R V17.0.0cu.557_B20221024 contiene una vulnerabilidad de inyecci\u00f3n de comando a trav\u00e9s de los par\u00e1metros port o enable en la funci\u00f3n setRemoteCfg." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:*", + "matchCriteriaId": "DD39B647-3419-4C6D-A6A2-30F40822A27D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F723A73-4B32-4F9E-B5DA-80134D4711C1" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/14/TOTOlink%20A3300R%20setRemoteCfg.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24331.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24331.json index 83e7b387ec9..71571670a71 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24331.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24331.json @@ -2,19 +2,91 @@ "id": "CVE-2024-24331", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-30T15:15:09.643", - "lastModified": "2024-01-30T15:21:43.493", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T04:18:45.817", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the enable parameter in the setWiFiScheduleCfg function." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que TOTOLINK A3300R V17.0.0cu.557_B20221024 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro enable en la funci\u00f3n setWiFiScheduleCfg." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:*", + "matchCriteriaId": "DD39B647-3419-4C6D-A6A2-30F40822A27D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F723A73-4B32-4F9E-B5DA-80134D4711C1" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/13/TOTOlink%20A3300R%20setWiFiScheduleCfg.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24332.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24332.json index de7b3a03b2b..d2e9c5ebed9 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24332.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24332.json @@ -2,19 +2,91 @@ "id": "CVE-2024-24332", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-30T15:15:09.693", - "lastModified": "2024-01-30T15:21:43.493", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T04:49:16.350", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the url parameter in the setUrlFilterRules function." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que TOTOLINK A3300R V17.0.0cu.557_B20221024 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro url en la funci\u00f3n setUrlFilterRules." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:*", + "matchCriteriaId": "DD39B647-3419-4C6D-A6A2-30F40822A27D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F723A73-4B32-4F9E-B5DA-80134D4711C1" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/9/TOTOlink%20A3300R%20setUrlFilterRules.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24333.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24333.json index 8d4200c1389..e3d3ceb8c62 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24333.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24333.json @@ -2,19 +2,91 @@ "id": "CVE-2024-24333", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-30T15:15:09.740", - "lastModified": "2024-01-30T15:21:43.493", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T04:50:09.707", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the desc parameter in the setWiFiAclRules function." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que TOTOLINK A3300R V17.0.0cu.557_B20221024 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro desc en la funci\u00f3n setWiFiAclRules." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:*", + "matchCriteriaId": "DD39B647-3419-4C6D-A6A2-30F40822A27D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F723A73-4B32-4F9E-B5DA-80134D4711C1" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/15/TOTOlink%20A3300R%20setWiFiAclRules.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24571.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24571.json index 84e5e48e3c1..34a54a2af83 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24571.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24571.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24571", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-31T23:15:08.110", - "lastModified": "2024-01-31T23:15:08.110", - "vulnStatus": "Received", + "lastModified": "2024-02-01T03:18:21.737", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24572.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24572.json index e1977812270..36a5321d6cc 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24572.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24572.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24572", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-31T23:15:08.337", - "lastModified": "2024-01-31T23:15:08.337", - "vulnStatus": "Received", + "lastModified": "2024-02-01T03:18:21.737", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24573.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24573.json index 6472a330efc..f4ef58b66ef 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24573.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24573.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24573", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-31T23:15:08.560", - "lastModified": "2024-01-31T23:15:08.560", - "vulnStatus": "Received", + "lastModified": "2024-02-01T03:18:21.737", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24747.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24747.json index 17013cf9f02..cabb06f0c36 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24747.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24747.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24747", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-31T22:15:54.813", - "lastModified": "2024-01-31T22:15:54.813", - "vulnStatus": "Received", + "lastModified": "2024-02-01T03:18:21.737", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 160954a2e8c..6ce1ea22224 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-01T03:00:27.227157+00:00 +2024-02-01T05:00:57.475661+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-01T02:32:09.317000+00:00 +2024-02-01T04:50:09.707000+00:00 ``` ### Last Data Feed Release @@ -29,45 +29,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -237257 +237259 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `2` -* [CVE-2024-0831](CVE-2024/CVE-2024-08xx/CVE-2024-0831.json) (`2024-02-01T02:15:46.330`) +* [CVE-2023-7069](CVE-2023/CVE-2023-70xx/CVE-2023-7069.json) (`2024-02-01T04:15:49.780`) +* [CVE-2024-23941](CVE-2024/CVE-2024-239xx/CVE-2024-23941.json) (`2024-02-01T04:15:49.967`) ### CVEs modified in the last Commit -Recently modified CVEs: `42` +Recently modified CVEs: `51` -* [CVE-2023-5084](CVE-2023/CVE-2023-50xx/CVE-2023-5084.json) (`2024-02-01T01:06:21.223`) -* [CVE-2023-44109](CVE-2023/CVE-2023-441xx/CVE-2023-44109.json) (`2024-02-01T01:09:11.587`) -* [CVE-2023-39854](CVE-2023/CVE-2023-398xx/CVE-2023-39854.json) (`2024-02-01T01:10:05.043`) -* [CVE-2023-5467](CVE-2023/CVE-2023-54xx/CVE-2023-5467.json) (`2024-02-01T01:17:21.890`) -* [CVE-2023-3431](CVE-2023/CVE-2023-34xx/CVE-2023-3431.json) (`2024-02-01T01:21:58.477`) -* [CVE-2023-3432](CVE-2023/CVE-2023-34xx/CVE-2023-3432.json) (`2024-02-01T01:23:00.190`) -* [CVE-2023-2898](CVE-2023/CVE-2023-28xx/CVE-2023-2898.json) (`2024-02-01T01:27:24.977`) -* [CVE-2023-2269](CVE-2023/CVE-2023-22xx/CVE-2023-2269.json) (`2024-02-01T01:33:49.730`) -* [CVE-2023-2124](CVE-2023/CVE-2023-21xx/CVE-2023-2124.json) (`2024-02-01T01:35:35.037`) -* [CVE-2023-2007](CVE-2023/CVE-2023-20xx/CVE-2023-2007.json) (`2024-02-01T01:39:22.507`) -* [CVE-2023-1503](CVE-2023/CVE-2023-15xx/CVE-2023-1503.json) (`2024-02-01T01:44:58.693`) -* [CVE-2023-1504](CVE-2023/CVE-2023-15xx/CVE-2023-1504.json) (`2024-02-01T02:00:08.550`) -* [CVE-2023-22067](CVE-2023/CVE-2023-220xx/CVE-2023-22067.json) (`2024-02-01T02:09:52.477`) -* [CVE-2023-22025](CVE-2023/CVE-2023-220xx/CVE-2023-22025.json) (`2024-02-01T02:11:33.680`) -* [CVE-2023-22074](CVE-2023/CVE-2023-220xx/CVE-2023-22074.json) (`2024-02-01T02:13:06.323`) -* [CVE-2023-46748](CVE-2023/CVE-2023-467xx/CVE-2023-46748.json) (`2024-02-01T02:14:46.903`) -* [CVE-2023-46747](CVE-2023/CVE-2023-467xx/CVE-2023-46747.json) (`2024-02-01T02:15:55.817`) -* [CVE-2023-31419](CVE-2023/CVE-2023-314xx/CVE-2023-31419.json) (`2024-02-01T02:16:30.827`) -* [CVE-2023-46595](CVE-2023/CVE-2023-465xx/CVE-2023-46595.json) (`2024-02-01T02:18:54.220`) -* [CVE-2023-38524](CVE-2023/CVE-2023-385xx/CVE-2023-38524.json) (`2024-02-01T02:23:20.833`) -* [CVE-2023-5048](CVE-2023/CVE-2023-50xx/CVE-2023-5048.json) (`2024-02-01T02:26:27.517`) -* [CVE-2023-34058](CVE-2023/CVE-2023-340xx/CVE-2023-34058.json) (`2024-02-01T02:29:46.450`) -* [CVE-2023-31100](CVE-2023/CVE-2023-311xx/CVE-2023-31100.json) (`2024-02-01T02:30:22.687`) -* [CVE-2023-27500](CVE-2023/CVE-2023-275xx/CVE-2023-27500.json) (`2024-02-01T02:32:09.317`) -* [CVE-2024-21893](CVE-2024/CVE-2024-218xx/CVE-2024-21893.json) (`2024-02-01T02:00:01.187`) +* [CVE-2024-0667](CVE-2024/CVE-2024-06xx/CVE-2024-0667.json) (`2024-02-01T04:15:17.817`) +* [CVE-2024-0697](CVE-2024/CVE-2024-06xx/CVE-2024-0697.json) (`2024-02-01T04:15:27.597`) +* [CVE-2024-0824](CVE-2024/CVE-2024-08xx/CVE-2024-0824.json) (`2024-02-01T04:15:36.430`) +* [CVE-2024-0618](CVE-2024/CVE-2024-06xx/CVE-2024-0618.json) (`2024-02-01T04:15:46.393`) +* [CVE-2024-0939](CVE-2024/CVE-2024-09xx/CVE-2024-0939.json) (`2024-02-01T04:16:01.597`) +* [CVE-2024-1004](CVE-2024/CVE-2024-10xx/CVE-2024-1004.json) (`2024-02-01T04:16:14.513`) +* [CVE-2024-1003](CVE-2024/CVE-2024-10xx/CVE-2024-1003.json) (`2024-02-01T04:16:23.063`) +* [CVE-2024-1002](CVE-2024/CVE-2024-10xx/CVE-2024-1002.json) (`2024-02-01T04:17:37.890`) +* [CVE-2024-1001](CVE-2024/CVE-2024-10xx/CVE-2024-1001.json) (`2024-02-01T04:17:46.200`) +* [CVE-2024-1000](CVE-2024/CVE-2024-10xx/CVE-2024-1000.json) (`2024-02-01T04:18:00.683`) +* [CVE-2024-0999](CVE-2024/CVE-2024-09xx/CVE-2024-0999.json) (`2024-02-01T04:18:05.900`) +* [CVE-2024-0998](CVE-2024/CVE-2024-09xx/CVE-2024-0998.json) (`2024-02-01T04:18:08.437`) +* [CVE-2024-0997](CVE-2024/CVE-2024-09xx/CVE-2024-0997.json) (`2024-02-01T04:18:10.013`) +* [CVE-2024-1007](CVE-2024/CVE-2024-10xx/CVE-2024-1007.json) (`2024-02-01T04:18:33.743`) +* [CVE-2024-1008](CVE-2024/CVE-2024-10xx/CVE-2024-1008.json) (`2024-02-01T04:18:38.740`) +* [CVE-2024-24330](CVE-2024/CVE-2024-243xx/CVE-2024-24330.json) (`2024-02-01T04:18:43.927`) +* [CVE-2024-24331](CVE-2024/CVE-2024-243xx/CVE-2024-24331.json) (`2024-02-01T04:18:45.817`) +* [CVE-2024-24332](CVE-2024/CVE-2024-243xx/CVE-2024-24332.json) (`2024-02-01T04:49:16.350`) +* [CVE-2024-24329](CVE-2024/CVE-2024-243xx/CVE-2024-24329.json) (`2024-02-01T04:49:18.867`) +* [CVE-2024-24328](CVE-2024/CVE-2024-243xx/CVE-2024-24328.json) (`2024-02-01T04:49:21.037`) +* [CVE-2024-24327](CVE-2024/CVE-2024-243xx/CVE-2024-24327.json) (`2024-02-01T04:49:22.830`) +* [CVE-2024-24326](CVE-2024/CVE-2024-243xx/CVE-2024-24326.json) (`2024-02-01T04:49:24.940`) +* [CVE-2024-24325](CVE-2024/CVE-2024-243xx/CVE-2024-24325.json) (`2024-02-01T04:49:27.410`) +* [CVE-2024-24324](CVE-2024/CVE-2024-243xx/CVE-2024-24324.json) (`2024-02-01T04:49:29.220`) +* [CVE-2024-24333](CVE-2024/CVE-2024-243xx/CVE-2024-24333.json) (`2024-02-01T04:50:09.707`) ## Download and Usage