From 96a019473d3bddc6f365a865fb9d7037566a3368 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 21 Jan 2024 09:00:28 +0000 Subject: [PATCH] Auto-Update: 2024-01-21T09:00:24.555330+00:00 --- CVE-2024/CVE-2024-07xx/CVE-2024-0769.json | 92 +++++++++++++++++++++++ README.md | 8 +- 2 files changed, 96 insertions(+), 4 deletions(-) create mode 100644 CVE-2024/CVE-2024-07xx/CVE-2024-0769.json diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0769.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0769.json new file mode 100644 index 00000000000..36c66bc028f --- /dev/null +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0769.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-0769", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-21T08:15:07.550", + "lastModified": "2024-01-21T08:15:07.550", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. It has been rated as critical. Affected by this issue is some unknown functionality of the file /hedwig.cgi of the component HTTP POST Request Handler. The manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251666 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/c2dc/cve-reported/blob/main/CVE-2024-0769/CVE-2024-0769.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10371", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.251666", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.251666", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index b71fb9ba024..08637aa5d28 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-01-21T07:00:24.641980+00:00 +2024-01-21T09:00:24.555330+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-01-21T06:15:08.600000+00:00 +2024-01-21T08:15:07.550000+00:00 ``` ### Last Data Feed Release @@ -29,14 +29,14 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -236471 +236472 ``` ### CVEs added in the last Commit Recently added CVEs: `1` -* [CVE-2016-15037](CVE-2016/CVE-2016-150xx/CVE-2016-15037.json) (`2024-01-21T06:15:08.600`) +* [CVE-2024-0769](CVE-2024/CVE-2024-07xx/CVE-2024-0769.json) (`2024-01-21T08:15:07.550`) ### CVEs modified in the last Commit