mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-08-19T04:00:17.323836+00:00
This commit is contained in:
parent
a1e574869c
commit
9a3b8fcd31
32
CVE-2024/CVE-2024-440xx/CVE-2024-44069.json
Normal file
32
CVE-2024/CVE-2024-440xx/CVE-2024-44069.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-44069",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-19T02:15:04.437",
|
||||
"lastModified": "2024-08-19T02:15:04.437",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Pi-hole before 6 allows unauthenticated admin/api.php?setTempUnit= calls to change the temperature units of the web dashboard. NOTE: the supplier reportedly does \"not consider the bug a security issue\" but the specific motivation for letting arbitrary persons change the value (Celsius, Fahrenheit, or Kelvin), seen by the device owner, is unclear."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pi-hole/web/pull/3077",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kiyell.com/The-Harmless-Pihole-Bug/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-440xx/CVE-2024-44070.json
Normal file
21
CVE-2024/CVE-2024-440xx/CVE-2024-44070.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-44070",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-19T02:15:04.643",
|
||||
"lastModified": "2024-08-19T02:15:04.643",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in FRRouting (FRR) through 10.1. bgp_attr_encap in bgpd/bgp_attr.c does not check the actual remaining stream length before taking the TLV value."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/FRRouting/frr/pull/16497",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-440xx/CVE-2024-44073.json
Normal file
29
CVE-2024/CVE-2024-440xx/CVE-2024-44073.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-44073",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-19T03:15:03.790",
|
||||
"lastModified": "2024-08-19T03:15:03.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Miniscript (aka rust-miniscript) library before 12.2.0 for Rust allows stack consumption because it does not properly track tree depth."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/rust-bitcoin/rust-miniscript/compare/11.2.0...12.2.0",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rust-bitcoin/rust-miniscript/pull/704",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rust-bitcoin/rust-miniscript/pull/712",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-440xx/CVE-2024-44076.json
Normal file
25
CVE-2024/CVE-2024-440xx/CVE-2024-44076.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-44076",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-19T03:15:03.883",
|
||||
"lastModified": "2024-08-19T03:15:03.883",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Microcks before 1.10.0, the POST /api/import and POST /api/export endpoints allow non-administrator access."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/microcks/microcks/compare/1.9.1-fix-1...1.10.0",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/microcks/microcks/issues/1212",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-79xx/CVE-2024-7921.json
Normal file
137
CVE-2024/CVE-2024-79xx/CVE-2024-7921.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7921",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-19T03:15:03.967",
|
||||
"lastModified": "2024-08-19T03:15:03.967",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Anhui Deshun Intelligent Technology Jieshun JieLink+ JSOTC2016 up to 20240805 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /report/ParkOutRecord/GetDataList. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.275071",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.275071",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.387126",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.shikangsi.com/post/share/7d5eb025-1c30-44b4-b609-61938f6d6c05",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
16
README.md
16
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-19T02:00:17.540130+00:00
|
||||
2024-08-19T04:00:17.323836+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-19T01:15:13.410000+00:00
|
||||
2024-08-19T03:15:03.967000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,16 +33,18 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
260460
|
||||
260465
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
- [CVE-2024-44067](CVE-2024/CVE-2024-440xx/CVE-2024-44067.json) (`2024-08-19T01:15:13.410`)
|
||||
- [CVE-2024-7919](CVE-2024/CVE-2024-79xx/CVE-2024-7919.json) (`2024-08-19T00:15:04.310`)
|
||||
- [CVE-2024-7920](CVE-2024/CVE-2024-79xx/CVE-2024-7920.json) (`2024-08-19T00:15:04.570`)
|
||||
- [CVE-2024-44069](CVE-2024/CVE-2024-440xx/CVE-2024-44069.json) (`2024-08-19T02:15:04.437`)
|
||||
- [CVE-2024-44070](CVE-2024/CVE-2024-440xx/CVE-2024-44070.json) (`2024-08-19T02:15:04.643`)
|
||||
- [CVE-2024-44073](CVE-2024/CVE-2024-440xx/CVE-2024-44073.json) (`2024-08-19T03:15:03.790`)
|
||||
- [CVE-2024-44076](CVE-2024/CVE-2024-440xx/CVE-2024-44076.json) (`2024-08-19T03:15:03.883`)
|
||||
- [CVE-2024-7921](CVE-2024/CVE-2024-79xx/CVE-2024-7921.json) (`2024-08-19T03:15:03.967`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
11
_state.csv
11
_state.csv
@ -257942,7 +257942,11 @@ CVE-2024-4403,0,0,07b387e13ed3d47c920433d5f499100d4d5e53ffefe1712d98753a4da5408f
|
||||
CVE-2024-4404,0,0,3ae3ea086edb9bd484931090d5df4b9ee138a4bfd155faf3c535f115da6a15de,2024-06-17T12:42:04.623000
|
||||
CVE-2024-4405,0,0,45cc63f187ac8ca241b3f6f4ea8115546cfb9789c95e5b84e970d2850f40bb92,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4406,0,0,4d2edf89174eefb11c1e35948c69459d7b4d6dd1a09c10eb7a0704c1561ef984,2024-05-02T18:00:37.360000
|
||||
CVE-2024-44067,1,1,cbf338879c41aaaddf30e8703c4159557720ab48233af527412dd8b5a890c066,2024-08-19T01:15:13.410000
|
||||
CVE-2024-44067,0,0,cbf338879c41aaaddf30e8703c4159557720ab48233af527412dd8b5a890c066,2024-08-19T01:15:13.410000
|
||||
CVE-2024-44069,1,1,6d676e6026c852947723ec0df8523c17909d90c628a1a9b7f3f31c09f151a3ad,2024-08-19T02:15:04.437000
|
||||
CVE-2024-44070,1,1,fec241a8bc709af31200474ac21f878657df675c0496926cf8a1ca03e173cb2b,2024-08-19T02:15:04.643000
|
||||
CVE-2024-44073,1,1,024052ef35dbab410ad6dcc2e1419830acd90075934fe01015ce91485393c9cc,2024-08-19T03:15:03.790000
|
||||
CVE-2024-44076,1,1,a6ccd467ba648dc89322002b80e30df66f9d5df0c456bf69adbcebb9cb869aaf,2024-08-19T03:15:03.883000
|
||||
CVE-2024-4409,0,0,ef601ae22761768812ec6eb133885b7a6b08c5417903a944100f49b603e1172f,2024-05-24T13:03:11.993000
|
||||
CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000
|
||||
CVE-2024-4411,0,0,9d1b27ccac7555d95c6be5f4488ca4d9772a0570efc26fe6a3f3d131fd0aea06,2024-05-14T16:11:39.510000
|
||||
@ -260457,5 +260461,6 @@ CVE-2024-7913,0,0,553a11741d443f553fe263cbec7577dc08e9c057f22cb110d971cb9b1a2ae2
|
||||
CVE-2024-7914,0,0,08fe806ec42c620b812e207c98df7ee04a63e0692534482aa64c33a7eb26ea71,2024-08-18T22:15:12.737000
|
||||
CVE-2024-7916,0,0,6d34b0bd172e96a1475b506a90dffbc217f42556fa54e261bdb4257c11df69d2,2024-08-18T23:15:03.780000
|
||||
CVE-2024-7917,0,0,a07c4036ed843a9ce8a234f70e0aa3853fd710edff91c384ddb42010efd8817a,2024-08-18T23:15:04.047000
|
||||
CVE-2024-7919,1,1,cd9e5313783786802dead92f74ac972e6a2a0002aa0e90c01072530244a659d5,2024-08-19T00:15:04.310000
|
||||
CVE-2024-7920,1,1,5a649028abea7e5b9cb23486b6e504409ddf07a2069247d7cc24cc9502166467,2024-08-19T00:15:04.570000
|
||||
CVE-2024-7919,0,0,cd9e5313783786802dead92f74ac972e6a2a0002aa0e90c01072530244a659d5,2024-08-19T00:15:04.310000
|
||||
CVE-2024-7920,0,0,5a649028abea7e5b9cb23486b6e504409ddf07a2069247d7cc24cc9502166467,2024-08-19T00:15:04.570000
|
||||
CVE-2024-7921,1,1,5928cdd1d16dbfb31c71085802850dcb6a9a20e0d6122d2c40342511457ae15a,2024-08-19T03:15:03.967000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user