From 97e2939dbfde1d4d7a788b833e314a7fea3a26ef Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 26 Dec 2024 03:03:47 +0000 Subject: [PATCH] Auto-Update: 2024-12-26T03:00:24.989266+00:00 --- CVE-2024/CVE-2024-129xx/CVE-2024-12930.json | 141 ++++++++++++++++++++ README.md | 14 +- _state.csv | 7 +- 3 files changed, 151 insertions(+), 11 deletions(-) create mode 100644 CVE-2024/CVE-2024-129xx/CVE-2024-12930.json diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12930.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12930.json new file mode 100644 index 00000000000..0a47e2425db --- /dev/null +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12930.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-12930", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-26T02:15:23.210", + "lastModified": "2024-12-26T02:15:23.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Simple Admin Panel 1.0 and classified as problematic. This issue affects some unknown processing of the file addCatController.php. The manipulation of the argument c_name leads to cross site scripting. The attack may be initiated remotely." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.289283", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.289283", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.468121", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 90bb456938d..eff18704f3e 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-26T00:55:33.478411+00:00 +2024-12-26T03:00:24.989266+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-26T00:15:22.300000+00:00 +2024-12-26T02:15:23.210000+00:00 ``` ### Last Data Feed Release @@ -27,22 +27,20 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-12-25T01:00:04.343956+00:00 +2024-12-26T01:00:04.350766+00:00 ``` ### Total Number of included CVEs ```plain -274675 +274676 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `1` -- [CVE-2024-12927](CVE-2024/CVE-2024-129xx/CVE-2024-12927.json) (`2024-12-25T23:15:17.430`) -- [CVE-2024-12928](CVE-2024/CVE-2024-129xx/CVE-2024-12928.json) (`2024-12-26T00:15:21.740`) -- [CVE-2024-12929](CVE-2024/CVE-2024-129xx/CVE-2024-12929.json) (`2024-12-26T00:15:22.300`) +- [CVE-2024-12930](CVE-2024/CVE-2024-129xx/CVE-2024-12930.json) (`2024-12-26T02:15:23.210`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 8a734fc9327..60e6a5a6ae2 100644 --- a/_state.csv +++ b/_state.csv @@ -245123,10 +245123,11 @@ CVE-2024-12903,0,0,bc4a71a13a64e9c0d45e023c2f146d73439b3078b2350002a42c4be342765 CVE-2024-1291,0,0,52c4840726a3cf584db63abe3d1006ff575604ba403c25fca89470816948ce5e,2024-11-21T08:50:14.863000 CVE-2024-1292,0,0,38d9bc6a557167174bf37c6662c68d5de6a783380fb5a30941c923054e3f2f16,2024-11-21T08:50:14.983000 CVE-2024-12926,0,0,e218ff80ac001bcdc288d778a26371bdd41dd905c42a161e5fc197e8c4673bb2,2024-12-25T20:15:22.147000 -CVE-2024-12927,1,1,3e5b42fff439c719e41016207aca1dc7e835b2d040ee620b993078ed4ef9e9f3,2024-12-25T23:15:17.430000 -CVE-2024-12928,1,1,000c9232b0026a751fd78ebe571857611c04cc2288300f44734b8380aad9d523,2024-12-26T00:15:21.740000 -CVE-2024-12929,1,1,8b4ad9e2d5f7ae6ffc421134389555160c900b397c62b70258ebb0b7477370cb,2024-12-26T00:15:22.300000 +CVE-2024-12927,0,0,3e5b42fff439c719e41016207aca1dc7e835b2d040ee620b993078ed4ef9e9f3,2024-12-25T23:15:17.430000 +CVE-2024-12928,0,0,000c9232b0026a751fd78ebe571857611c04cc2288300f44734b8380aad9d523,2024-12-26T00:15:21.740000 +CVE-2024-12929,0,0,8b4ad9e2d5f7ae6ffc421134389555160c900b397c62b70258ebb0b7477370cb,2024-12-26T00:15:22.300000 CVE-2024-1293,0,0,a122e9ddbaac35fa4b5b33d2b10cf37b4d4e3a3677cea83da66723805eec222b,2024-11-21T08:50:15.167000 +CVE-2024-12930,1,1,31e95b7cb48d02fb9532fdd75b88b036b1acacc2654bb60cd04aed6b027ebbbd,2024-12-26T02:15:23.210000 CVE-2024-1294,0,0,b71ea2285980093702250bdd703066da616a4eac45cb0506e646936d244fcc0f,2024-11-21T08:50:15.277000 CVE-2024-1295,0,0,58e65e331ff11f824ceffb79237c2ca705e423c379ee489ababaab58413247e4,2024-11-21T08:50:15.410000 CVE-2024-1296,0,0,2c8681669a40b4c1355bcd3bfff211c08a874ea1e31940665fa8f736883bd89e,2024-11-21T08:50:15.633000