Auto-Update: 2024-02-29T11:00:24.954836+00:00

This commit is contained in:
cad-safe-bot 2024-02-29 11:00:29 +00:00
parent de1d34886e
commit b85138a550
7 changed files with 125 additions and 22 deletions

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-1619",
"sourceIdentifier": "vulnerability@kaspersky.com",
"published": "2024-02-29T10:15:06.807",
"lastModified": "2024-02-29T10:15:06.807",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Kaspersky has fixed a security issue in the Kaspersky Security 8.0 for Linux Mail Server. The issue was that an attacker could potentially force an administrator to click on a malicious link to perform unauthorized actions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vulnerability@kaspersky.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "vulnerability@kaspersky.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"references": [
{
"url": "https://support.kaspersky.com/vulnerability/list-of-advisories/12430#010224",
"source": "vulnerability@kaspersky.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1871",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-26T16:27:53.467",
"lastModified": "2024-02-29T01:43:56.060",
"lastModified": "2024-02-29T09:15:06.190",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1876",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-26T16:27:53.967",
"lastModified": "2024-02-29T01:43:56.203",
"lastModified": "2024-02-29T09:15:06.320",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1877",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-26T16:27:54.240",
"lastModified": "2024-02-29T01:43:56.273",
"lastModified": "2024-02-29T09:15:06.407",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1878",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-26T16:27:54.480",
"lastModified": "2024-02-29T01:43:56.340",
"lastModified": "2024-02-29T09:15:06.490",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-1888",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-02-29T09:15:06.563",
"lastModified": "2024-02-29T09:15:06.563",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Mattermost fails to check the\u00a0\"invite_guest\" permission when inviting\u00a0guests of other teams to a team, allowing a member with permissions to add other members but not to add guests to add a guest to a team as long as the guest was already a guest in another team of the server\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://mattermost.com/security-updates",
"source": "responsibledisclosure@mattermost.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-02-29T09:00:28.133069+00:00
2024-02-29T11:00:24.954836+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-02-29T08:15:47.640000+00:00
2024-02-29T10:15:06.807000+00:00
```
### Last Data Feed Release
@ -29,32 +29,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
240108
240110
```
### CVEs added in the last Commit
Recently added CVEs: `10`
Recently added CVEs: `2`
* [CVE-2024-1978](CVE-2024/CVE-2024-19xx/CVE-2024-1978.json) (`2024-02-29T07:15:06.603`)
* [CVE-2024-1981](CVE-2024/CVE-2024-19xx/CVE-2024-1981.json) (`2024-02-29T07:15:06.930`)
* [CVE-2024-1982](CVE-2024/CVE-2024-19xx/CVE-2024-1982.json) (`2024-02-29T07:15:07.197`)
* [CVE-2024-25291](CVE-2024/CVE-2024-252xx/CVE-2024-25291.json) (`2024-02-29T07:15:07.453`)
* [CVE-2024-25292](CVE-2024/CVE-2024-252xx/CVE-2024-25292.json) (`2024-02-29T07:15:07.513`)
* [CVE-2024-25594](CVE-2024/CVE-2024-255xx/CVE-2024-25594.json) (`2024-02-29T07:15:07.587`)
* [CVE-2024-1887](CVE-2024/CVE-2024-18xx/CVE-2024-1887.json) (`2024-02-29T08:15:46.437`)
* [CVE-2024-23488](CVE-2024/CVE-2024-234xx/CVE-2024-23488.json) (`2024-02-29T08:15:47.110`)
* [CVE-2024-23493](CVE-2024/CVE-2024-234xx/CVE-2024-23493.json) (`2024-02-29T08:15:47.380`)
* [CVE-2024-24988](CVE-2024/CVE-2024-249xx/CVE-2024-24988.json) (`2024-02-29T08:15:47.640`)
* [CVE-2024-1888](CVE-2024/CVE-2024-18xx/CVE-2024-1888.json) (`2024-02-29T09:15:06.563`)
* [CVE-2024-1619](CVE-2024/CVE-2024-16xx/CVE-2024-1619.json) (`2024-02-29T10:15:06.807`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `4`
* [CVE-2024-1885](CVE-2024/CVE-2024-18xx/CVE-2024-1885.json) (`2024-02-29T07:15:06.293`)
* [CVE-2024-1886](CVE-2024/CVE-2024-18xx/CVE-2024-1886.json) (`2024-02-29T07:15:06.520`)
* [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2024-02-29T08:15:46.907`)
* [CVE-2024-1871](CVE-2024/CVE-2024-18xx/CVE-2024-1871.json) (`2024-02-29T09:15:06.190`)
* [CVE-2024-1876](CVE-2024/CVE-2024-18xx/CVE-2024-1876.json) (`2024-02-29T09:15:06.320`)
* [CVE-2024-1877](CVE-2024/CVE-2024-18xx/CVE-2024-1877.json) (`2024-02-29T09:15:06.407`)
* [CVE-2024-1878](CVE-2024/CVE-2024-18xx/CVE-2024-1878.json) (`2024-02-29T09:15:06.490`)
## Download and Usage