From 7d9d1e3dcc56ca777689d2de421f934e04e7ff15 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 30 Dec 2024 07:03:43 +0000 Subject: [PATCH] Auto-Update: 2024-12-30T07:00:19.921134+00:00 --- CVE-2024/CVE-2024-130xx/CVE-2024-13039.json | 145 ++++++++++++++++++++ README.md | 13 +- _state.csv | 9 +- 3 files changed, 155 insertions(+), 12 deletions(-) create mode 100644 CVE-2024/CVE-2024-130xx/CVE-2024-13039.json diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13039.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13039.json new file mode 100644 index 00000000000..89965971625 --- /dev/null +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13039.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-13039", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-30T05:15:06.170", + "lastModified": "2024-12-30T05:15:06.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Simple Chat System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /add_user.php. The manipulation of the argument name/email/password/number leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Curious-L/-/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.289772", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.289772", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.471644", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 5d6e0d78ffc..7a88a53e4b2 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-30T05:00:19.126421+00:00 +2024-12-30T07:00:19.921134+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-30T04:15:05.387000+00:00 +2024-12-30T05:15:06.170000+00:00 ``` ### Last Data Feed Release @@ -33,17 +33,14 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -275154 +275155 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `1` -- [CVE-2024-13035](CVE-2024/CVE-2024-130xx/CVE-2024-13035.json) (`2024-12-30T03:15:06.413`) -- [CVE-2024-13036](CVE-2024/CVE-2024-130xx/CVE-2024-13036.json) (`2024-12-30T03:15:06.580`) -- [CVE-2024-13037](CVE-2024/CVE-2024-130xx/CVE-2024-13037.json) (`2024-12-30T04:15:05.200`) -- [CVE-2024-13038](CVE-2024/CVE-2024-130xx/CVE-2024-13038.json) (`2024-12-30T04:15:05.387`) +- [CVE-2024-13039](CVE-2024/CVE-2024-130xx/CVE-2024-13039.json) (`2024-12-30T05:15:06.170`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index e54fdac56ed..617c32600a9 100644 --- a/_state.csv +++ b/_state.csv @@ -245264,10 +245264,11 @@ CVE-2024-13031,0,0,abca33cf9ae56a4d199457bde28e9ada782da11acd454a9b3fb985124585d CVE-2024-13032,0,0,323b543f83c11f8e0c2c560b01f09a06e62a7c81986d35dd2133163bfb8757b5,2024-12-30T02:15:06.260000 CVE-2024-13033,0,0,1c3d59a3c0038935946f42f6123c4f2cd04404c8db0cffed14574859948e0a3f,2024-12-30T02:15:07.270000 CVE-2024-13034,0,0,69cb0d3f29c23b4b7fc920d34536c6278d7de06cd50576381c7ac05e3dd5f468,2024-12-30T02:15:07.433000 -CVE-2024-13035,1,1,e1f689ff483053555ac9885351229a7477a3d6f2684d5e5ad5f1d1e5180870f4,2024-12-30T03:15:06.413000 -CVE-2024-13036,1,1,cc787097d94873a8d64f651dd3d62e36330079400cb1055ccbea025c43303e77,2024-12-30T03:15:06.580000 -CVE-2024-13037,1,1,ad1a2687fd8ca034a4ba7eb450dd7b7cb6ce76af79e47f53a4dcc006981f21de,2024-12-30T04:15:05.200000 -CVE-2024-13038,1,1,cbf9071eca24ba5f5babd558a8179f543c51ae52d32abf3e80b13bda8d856ec3,2024-12-30T04:15:05.387000 +CVE-2024-13035,0,0,e1f689ff483053555ac9885351229a7477a3d6f2684d5e5ad5f1d1e5180870f4,2024-12-30T03:15:06.413000 +CVE-2024-13036,0,0,cc787097d94873a8d64f651dd3d62e36330079400cb1055ccbea025c43303e77,2024-12-30T03:15:06.580000 +CVE-2024-13037,0,0,ad1a2687fd8ca034a4ba7eb450dd7b7cb6ce76af79e47f53a4dcc006981f21de,2024-12-30T04:15:05.200000 +CVE-2024-13038,0,0,cbf9071eca24ba5f5babd558a8179f543c51ae52d32abf3e80b13bda8d856ec3,2024-12-30T04:15:05.387000 +CVE-2024-13039,1,1,b01215443cbf3b546fae19ca4360b2d76399675e646f86704febf42b9d5e60db,2024-12-30T05:15:06.170000 CVE-2024-1304,0,0,7f3d377d10786bd7b29e3437adfa1f791151a43db698785def3901d685804d14,2024-11-21T08:50:16.717000 CVE-2024-1305,0,0,61bd2e20ff0aa394ece1e84d5d848dafdcba1e6f1c6375393ac194bd0f52a153,2024-11-21T08:50:16.840000 CVE-2024-1306,0,0,0542247252f536db3d3f5f372f6b06cf8f9322e7de2b3d2f5040c13d3f80547b,2024-11-21T08:50:17.053000