mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-31 02:31:22 +00:00
Auto-Update: 2024-02-29T11:00:24.954836+00:00
This commit is contained in:
parent
de1d34886e
commit
b85138a550
55
CVE-2024/CVE-2024-16xx/CVE-2024-1619.json
Normal file
55
CVE-2024/CVE-2024-16xx/CVE-2024-1619.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-1619",
|
||||
"sourceIdentifier": "vulnerability@kaspersky.com",
|
||||
"published": "2024-02-29T10:15:06.807",
|
||||
"lastModified": "2024-02-29T10:15:06.807",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kaspersky has fixed a security issue in the Kaspersky Security 8.0 for Linux Mail Server. The issue was that an attacker could potentially force an administrator to click on a malicious link to perform unauthorized actions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vulnerability@kaspersky.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vulnerability@kaspersky.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.kaspersky.com/vulnerability/list-of-advisories/12430#010224",
|
||||
"source": "vulnerability@kaspersky.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1871",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-02-26T16:27:53.467",
|
||||
"lastModified": "2024-02-29T01:43:56.060",
|
||||
"lastModified": "2024-02-29T09:15:06.190",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1876",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-02-26T16:27:53.967",
|
||||
"lastModified": "2024-02-29T01:43:56.203",
|
||||
"lastModified": "2024-02-29T09:15:06.320",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1877",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-02-26T16:27:54.240",
|
||||
"lastModified": "2024-02-29T01:43:56.273",
|
||||
"lastModified": "2024-02-29T09:15:06.407",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1878",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-02-26T16:27:54.480",
|
||||
"lastModified": "2024-02-29T01:43:56.340",
|
||||
"lastModified": "2024-02-29T09:15:06.490",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
|
55
CVE-2024/CVE-2024-18xx/CVE-2024-1888.json
Normal file
55
CVE-2024/CVE-2024-18xx/CVE-2024-1888.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-1888",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-02-29T09:15:06.563",
|
||||
"lastModified": "2024-02-29T09:15:06.563",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mattermost fails to check the\u00a0\"invite_guest\" permission when inviting\u00a0guests of other teams to a team, allowing a member with permissions to add other members but not to add guests to add a guest to a team as long as the guest was already a guest in another team of the server\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mattermost.com/security-updates",
|
||||
"source": "responsibledisclosure@mattermost.com"
|
||||
}
|
||||
]
|
||||
}
|
29
README.md
29
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-02-29T09:00:28.133069+00:00
|
||||
2024-02-29T11:00:24.954836+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-02-29T08:15:47.640000+00:00
|
||||
2024-02-29T10:15:06.807000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,32 +29,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
240108
|
||||
240110
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `10`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
* [CVE-2024-1978](CVE-2024/CVE-2024-19xx/CVE-2024-1978.json) (`2024-02-29T07:15:06.603`)
|
||||
* [CVE-2024-1981](CVE-2024/CVE-2024-19xx/CVE-2024-1981.json) (`2024-02-29T07:15:06.930`)
|
||||
* [CVE-2024-1982](CVE-2024/CVE-2024-19xx/CVE-2024-1982.json) (`2024-02-29T07:15:07.197`)
|
||||
* [CVE-2024-25291](CVE-2024/CVE-2024-252xx/CVE-2024-25291.json) (`2024-02-29T07:15:07.453`)
|
||||
* [CVE-2024-25292](CVE-2024/CVE-2024-252xx/CVE-2024-25292.json) (`2024-02-29T07:15:07.513`)
|
||||
* [CVE-2024-25594](CVE-2024/CVE-2024-255xx/CVE-2024-25594.json) (`2024-02-29T07:15:07.587`)
|
||||
* [CVE-2024-1887](CVE-2024/CVE-2024-18xx/CVE-2024-1887.json) (`2024-02-29T08:15:46.437`)
|
||||
* [CVE-2024-23488](CVE-2024/CVE-2024-234xx/CVE-2024-23488.json) (`2024-02-29T08:15:47.110`)
|
||||
* [CVE-2024-23493](CVE-2024/CVE-2024-234xx/CVE-2024-23493.json) (`2024-02-29T08:15:47.380`)
|
||||
* [CVE-2024-24988](CVE-2024/CVE-2024-249xx/CVE-2024-24988.json) (`2024-02-29T08:15:47.640`)
|
||||
* [CVE-2024-1888](CVE-2024/CVE-2024-18xx/CVE-2024-1888.json) (`2024-02-29T09:15:06.563`)
|
||||
* [CVE-2024-1619](CVE-2024/CVE-2024-16xx/CVE-2024-1619.json) (`2024-02-29T10:15:06.807`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `3`
|
||||
Recently modified CVEs: `4`
|
||||
|
||||
* [CVE-2024-1885](CVE-2024/CVE-2024-18xx/CVE-2024-1885.json) (`2024-02-29T07:15:06.293`)
|
||||
* [CVE-2024-1886](CVE-2024/CVE-2024-18xx/CVE-2024-1886.json) (`2024-02-29T07:15:06.520`)
|
||||
* [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2024-02-29T08:15:46.907`)
|
||||
* [CVE-2024-1871](CVE-2024/CVE-2024-18xx/CVE-2024-1871.json) (`2024-02-29T09:15:06.190`)
|
||||
* [CVE-2024-1876](CVE-2024/CVE-2024-18xx/CVE-2024-1876.json) (`2024-02-29T09:15:06.320`)
|
||||
* [CVE-2024-1877](CVE-2024/CVE-2024-18xx/CVE-2024-1877.json) (`2024-02-29T09:15:06.407`)
|
||||
* [CVE-2024-1878](CVE-2024/CVE-2024-18xx/CVE-2024-1878.json) (`2024-02-29T09:15:06.490`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user