diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5098.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5098.json new file mode 100644 index 00000000000..473925537c7 --- /dev/null +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5098.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-5098", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-19T06:15:06.320", + "lastModified": "2024-05-19T06:15:06.320", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in SourceCodester Simple Inventory System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument username leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-265081 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.2 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 5.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.265081", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.265081", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.337056", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index eedf473d40f..caf0679306d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-19T06:00:38.155050+00:00 +2024-05-19T08:00:38.524588+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-19T05:15:06.337000+00:00 +2024-05-19T06:15:06.320000+00:00 ``` ### Last Data Feed Release @@ -33,20 +33,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -250651 +250652 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `1` +- [CVE-2024-5098](CVE-2024/CVE-2024-50xx/CVE-2024-5098.json) (`2024-05-19T06:15:06.320`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -- [CVE-2024-22774](CVE-2024/CVE-2024-227xx/CVE-2024-22774.json) (`2024-05-19T05:15:06.337`) ## Download and Usage diff --git a/_state.csv b/_state.csv index aa18726a29f..abcc20b0d90 100644 --- a/_state.csv +++ b/_state.csv @@ -242783,7 +242783,7 @@ CVE-2024-22770,0,0,f2a2a69cf9ce7d556b6b228c10722f7f9528f890b579414a4469048f6692b CVE-2024-22771,0,0,0dd34dafcdaa309c8637826e95d97aeb9822548d77b388b6c8b8378fb56f1e0c,2024-01-29T15:53:04.917000 CVE-2024-22772,0,0,7b07baabcd2a25eaa93c8a3a6e55d6143f69fb79e8629b89561882c2cb32d998,2024-01-29T15:52:25.997000 CVE-2024-22773,0,0,3aba96c911c7d73db03474bcda5543c0564d460038cf19cf729bddcf3e7c9cc0,2024-04-29T20:15:08.227000 -CVE-2024-22774,0,1,51b08a4c28b92deca2ce0a1da657702db62d41661863bad2bc83746ee882b6c8,2024-05-19T05:15:06.337000 +CVE-2024-22774,0,0,51b08a4c28b92deca2ce0a1da657702db62d41661863bad2bc83746ee882b6c8,2024-05-19T05:15:06.337000 CVE-2024-22776,0,0,90ee7d73ff2ea3165d0ee53642fafcade627122c4deabb0ceebf5f729ef60456,2024-02-23T16:14:43.447000 CVE-2024-22778,0,0,b51d89db366702e623e9ffcc2087e24c0edaa0d76ed8dc9f0f78dc0d88754ad8,2024-02-22T19:07:27.197000 CVE-2024-22779,0,0,eda1283002ca0a5ba4b71e37cd224cf29419640cfe8456a3a65e695acd500b10,2024-02-10T04:10:09.100000 @@ -250650,3 +250650,4 @@ CVE-2024-5094,0,0,c7cb1d506a086989211b597a556bac308086c8949fcda67629ad3aac55ff3a CVE-2024-5095,0,0,88281acb2fc9a0b63ddc9a0c6b24abb23d39f3d12e2bb0b7e6eab26e9dbb9ecc,2024-05-19T02:15:48.120000 CVE-2024-5096,0,0,d514c127943db4c2005b06debe70f9cbf1f5422a474cf712a47cd0f333952ef8,2024-05-19T02:15:49.483000 CVE-2024-5097,0,0,35d00783f08d4c1fcbaf7ec7e59ffe275260292302b76e258d33c4c0c5a1d454,2024-05-19T03:15:06.433000 +CVE-2024-5098,1,1,27e182691f6df2f6e5de66c3e5527fb52eb62e6c11728f25b5e5f30216127daf,2024-05-19T06:15:06.320000