From 6f74cf4bcb8435943bf1390e410dd460374f8374 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 14 Aug 2024 08:03:12 +0000 Subject: [PATCH] Auto-Update: 2024-08-14T08:00:16.889144+00:00 --- CVE-2024/CVE-2024-77xx/CVE-2024-7731.json | 60 +++++++++++++++++++++++ CVE-2024/CVE-2024-77xx/CVE-2024-7732.json | 60 +++++++++++++++++++++++ README.md | 16 +++--- _state.csv | 10 ++-- 4 files changed, 133 insertions(+), 13 deletions(-) create mode 100644 CVE-2024/CVE-2024-77xx/CVE-2024-7731.json create mode 100644 CVE-2024/CVE-2024-77xx/CVE-2024-7732.json diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7731.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7731.json new file mode 100644 index 00000000000..aff3167d247 --- /dev/null +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7731.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7731", + "sourceIdentifier": "twcert@cert.org.tw", + "published": "2024-08-14T07:15:13.920", + "lastModified": "2024-08-14T07:15:13.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dr.ID Access Control System from SECOM does not properly validate a specific page parameter, allowing unauthenticated remote attackers to inject SQL commands to read, modify, and delete database contents." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "twcert@cert.org.tw", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.twcert.org.tw/en/cp-139-8006-036f5-2.html", + "source": "twcert@cert.org.tw" + }, + { + "url": "https://www.twcert.org.tw/tw/cp-132-8005-c3c94-1.html", + "source": "twcert@cert.org.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7732.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7732.json new file mode 100644 index 00000000000..ea3719a612d --- /dev/null +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7732.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7732", + "sourceIdentifier": "twcert@cert.org.tw", + "published": "2024-08-14T07:15:16.477", + "lastModified": "2024-08-14T07:15:16.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dr.ID Access Control System from SECOM does not properly validate a specific page parameter, allowing unauthenticated remote attackers to inject SQL commands to read, modify, and delete database contents." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.twcert.org.tw/en/cp-139-8008-32677-2.html", + "source": "twcert@cert.org.tw" + }, + { + "url": "https://www.twcert.org.tw/tw/cp-132-8007-803d6-1.html", + "source": "twcert@cert.org.tw" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index e65f1917342..40a339b6068 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-14T06:00:17.151615+00:00 +2024-08-14T08:00:16.889144+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-14T05:15:13.063000+00:00 +2024-08-14T07:15:16.477000+00:00 ``` ### Last Data Feed Release @@ -33,23 +33,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -259879 +259881 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `2` -- [CVE-2024-7588](CVE-2024/CVE-2024-75xx/CVE-2024-7588.json) (`2024-08-14T05:15:13.063`) -- [CVE-2024-7728](CVE-2024/CVE-2024-77xx/CVE-2024-7728.json) (`2024-08-14T04:15:06.757`) -- [CVE-2024-7729](CVE-2024/CVE-2024-77xx/CVE-2024-7729.json) (`2024-08-14T04:15:07.150`) +- [CVE-2024-7731](CVE-2024/CVE-2024-77xx/CVE-2024-7731.json) (`2024-08-14T07:15:13.920`) +- [CVE-2024-7732](CVE-2024/CVE-2024-77xx/CVE-2024-7732.json) (`2024-08-14T07:15:16.477`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -- [CVE-2024-21302](CVE-2024/CVE-2024-213xx/CVE-2024-21302.json) (`2024-08-14T05:15:12.820`) ## Download and Usage diff --git a/_state.csv b/_state.csv index d6820385387..1fa74ffd3c7 100644 --- a/_state.csv +++ b/_state.csv @@ -243546,7 +243546,7 @@ CVE-2024-2127,0,0,fee555ba22c69f33931ace66815b77d0a5796e2ad55c5d25b843a412734e73 CVE-2024-2128,0,0,ad241575873847a0cb8491370112d4603dbee504ed1e31d448d346ee3b31a6d6,2024-03-08T14:02:57.420000 CVE-2024-2129,0,0,4e7afd99b608981f119f3e5da184ba51484f21aa33b32d2a6446850d6a9f1652,2024-03-20T13:00:16.367000 CVE-2024-2130,0,0,949f4490e30f20ac86b94271cd74ebfff8857dc5306a19f843591857ffe5e5d6,2024-03-13T12:33:51.697000 -CVE-2024-21302,0,1,a518fe1d9cd41393a6627122cfb813ee38d87458b8806dd865a2a42bbf757410,2024-08-14T05:15:12.820000 +CVE-2024-21302,0,0,a518fe1d9cd41393a6627122cfb813ee38d87458b8806dd865a2a42bbf757410,2024-08-14T05:15:12.820000 CVE-2024-21303,0,0,d58ef53ce2250cc88ff41c4958354d161d0e089fca6702a30570cf750b5a8215,2024-07-09T18:18:38.713000 CVE-2024-21304,0,0,aee35375e056bcda8357796076fddae312bf87811aac2cea1256e28fc4176e51,2024-06-11T15:15:58.253000 CVE-2024-21305,0,0,53ae725a4db9001e5894d4654d0d4d95d10acc8936d902ba245a4100e59e1d3e,2024-06-11T15:15:58.433000 @@ -259804,7 +259804,7 @@ CVE-2024-7582,0,0,b5d30de3379d4f1314d865a318bcbb3d58683288c246ed462b107435220335 CVE-2024-7583,0,0,b2c70b6258cd9101ea44bd72a9a7bee40fdef17b5833e45029641b6b1054cda6,2024-08-08T20:54:35.117000 CVE-2024-7584,0,0,88e393ed083253249958807c1b676f862629edacea69fa08e833cacac796d57a,2024-08-07T19:09:46.290000 CVE-2024-7585,0,0,5e2ff565ca20d01ef68f8422fbeb35a8929478e27cc3f0f142481fee7317e65c,2024-08-07T19:09:46.290000 -CVE-2024-7588,1,1,d3ef5b569e7366e3ae43cf651880b60c5e17772de13d1a75c9d15e53b5ad4dd4,2024-08-14T05:15:13.063000 +CVE-2024-7588,0,0,d3ef5b569e7366e3ae43cf651880b60c5e17772de13d1a75c9d15e53b5ad4dd4,2024-08-14T05:15:13.063000 CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e49665270,2024-08-13T16:58:08.793000 CVE-2024-7590,0,0,c52a6d4cf8dfd970a8fe3a13dd0d7de54ec6ad3618ea0cc5513929656d029f44,2024-08-13T12:58:25.437000 CVE-2024-7593,0,0,957f1f1abb8043dce74bb98f0c89ec94718d03f7f079361879b9b8ac92070cf1,2024-08-14T02:07:05.410000 @@ -259861,8 +259861,10 @@ CVE-2024-7706,0,0,1056fcaa3affff4b3f9a6b703c011337d2adc8c6bdf71227e8310823081947 CVE-2024-7707,0,0,08017af054a9aea4cbec493bee72603fd26524b137f48eec425b10e1c9a2c5ce,2024-08-13T12:58:25.437000 CVE-2024-7709,0,0,9890807a1991d90435fddd18848992ba127ee8603dc9d09cd6e46bfbc80702ff,2024-08-13T12:58:25.437000 CVE-2024-7715,0,0,643ae05734832b0ffcf6472f2acff2b54708732000601789527e246cea7413e5,2024-08-13T12:58:25.437000 -CVE-2024-7728,1,1,acd91398bc720dd7a5a7de34b4eb600c884d4f60d31ada67e3400fb293ebbf11,2024-08-14T04:15:06.757000 -CVE-2024-7729,1,1,d87b98df46246481b0bff7e99c86ff198a5d3767062a90cfe5c84c87d848a213,2024-08-14T04:15:07.150000 +CVE-2024-7728,0,0,acd91398bc720dd7a5a7de34b4eb600c884d4f60d31ada67e3400fb293ebbf11,2024-08-14T04:15:06.757000 +CVE-2024-7729,0,0,d87b98df46246481b0bff7e99c86ff198a5d3767062a90cfe5c84c87d848a213,2024-08-14T04:15:07.150000 +CVE-2024-7731,1,1,bfa4067ebffe005655021441f55e7ca971441a7904525c15616bbceb14a1ee32,2024-08-14T07:15:13.920000 +CVE-2024-7732,1,1,fa0d9c9d1627fc18078b0f65eb433f09324a06b99e9005b8737157c388bc2568,2024-08-14T07:15:16.477000 CVE-2024-7733,0,0,e578a82e7a9ab04c2357599745dc3f12dc0540caf60a9a65f25cb958804090ac,2024-08-14T02:07:05.410000 CVE-2024-7738,0,0,731258ae6f17909ffa785bac8fd19b9e8a09422be2e34dc14bf00c692ff3cd2d,2024-08-14T02:07:05.410000 CVE-2024-7739,0,0,8041b718b3b9fbc6ed6cc2a09398ab01d61f0cdb530bddb8f47e58de44f92652,2024-08-14T02:07:05.410000