mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-02-21T23:00:25.482001+00:00
This commit is contained in:
parent
cb677de7f6
commit
c32086d00b
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2010-3322",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2010-09-14T17:00:02.400",
|
||||
"lastModified": "2010-09-14T17:00:02.400",
|
||||
"lastModified": "2024-02-21T21:08:34.413",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,88 +84,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FCFC155-E9C9-4AE3-9CB8-D2244B9E0269"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "368E31F0-E8F2-459E-B78E-EEC3AB544669"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:4.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CDCB0EF9-08B5-4B91-876D-2C7CF7880AF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:4.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1709D44B-DC91-4BCC-982F-7BE361A09FF6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:4.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62042A83-23C7-478A-BE5C-8C66B6FB59C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:4.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDB5CDED-459E-4AF9-8747-1F58FA1950E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:4.0.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0705659E-3230-4C28-BA56-F1F2E8BEB83A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:4.0.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8FD076DE-EBF4-4829-847A-8B20DD614414"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:4.0.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B16311C2-2BB3-42E3-BFF8-860467C10611"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:4.0.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07F6F485-280B-408C-A381-76807862785D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:4.0.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "551D7F83-61DD-4333-86ED-B1D38659B76E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:4.0.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43BD38F5-B7C6-4CE9-A1B0-1E201CD0979E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B16A56F-EACF-47AC-B541-2D865CC31705"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:4.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C96B57A4-D586-444B-BD14-311AEBC40C00"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:4.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "335BA0E8-428B-4163-A809-90BEE79A7395"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:4.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1AE5B6A8-FB1E-4C0A-AC53-C0ABABE595C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:4.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE95A88B-F94B-4B3C-B0FC-0202E9E70FC5"
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0",
|
||||
"versionEndIncluding": "4.1.4",
|
||||
"matchCriteriaId": "8E3F8A4B-A6D8-4784-9C8F-F1706AB743C2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-25644",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2020-10-06T14:15:12.760",
|
||||
"lastModified": "2022-11-07T19:54:08.847",
|
||||
"lastModified": "2024-02-21T21:08:54.470",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -115,8 +115,8 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_data_grid:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DCB93575-124B-4385-B230-EF14EA8D3EAA"
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CD354E32-A8B0-484C-B4C6-9FBCD3430D2D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-39155",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2021-08-24T23:15:07.093",
|
||||
"lastModified": "2021-08-31T19:35:53.257",
|
||||
"lastModified": "2024-02-21T21:01:31.320",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -91,6 +91,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-178"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
20
CVE-2023/CVE-2023-243xx/CVE-2023-24330.json
Normal file
20
CVE-2023/CVE-2023-243xx/CVE-2023-24330.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-24330",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T21:15:08.503",
|
||||
"lastModified": "2024-02-21T21:15:08.503",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Command Injection vulnerability in D-Link Dir 882 with firmware version DIR882A1_FW130B06 allows attackers to run arbitrary commands via crafted POST request to /HNAP1/."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/caoyebo/CVE/tree/main/dlink%20882%20-%20CVE-2023-24330",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-243xx/CVE-2023-24331.json
Normal file
20
CVE-2023/CVE-2023-243xx/CVE-2023-24331.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-24331",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T21:15:08.567",
|
||||
"lastModified": "2024-02-21T21:15:08.567",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Command Injection vulnerability in D-Link Dir 816 with firmware version DIR-816_A2_v1.10CNB04 allows attackers to run arbitrary commands via the urlAdd parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/caoyebo/CVE/tree/main/Dlink%20816%20-%20CVE-2023-24331",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-243xx/CVE-2023-24332.json
Normal file
20
CVE-2023/CVE-2023-243xx/CVE-2023-24332.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-24332",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T21:15:08.617",
|
||||
"lastModified": "2024-02-21T21:15:08.617",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stack overflow vulnerability in Tenda AC6 with firmware version US_AC6V5.0re_V03.03.02.01_cn_TDC01 allows attackers to run arbitrary commands via crafted POST request to /goform/PowerSaveSet."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/caoyebo/CVE/tree/main/Tenda%20AC6%20-%20CVE-2023-24332",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-243xx/CVE-2023-24333.json
Normal file
20
CVE-2023/CVE-2023-243xx/CVE-2023-24333.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-24333",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T21:15:08.673",
|
||||
"lastModified": "2024-02-21T21:15:08.673",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stack overflow vulnerability in Tenda AC21 with firmware version US_AC21V1.0re_V16.03.08.15_cn_TDC01 allows attackers to run arbitrary commands via crafted POST request to /goform/openSchedWifi."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/caoyebo/CVE/tree/main/TENDA%20AC21%20-%20CVE-2023-24333",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-243xx/CVE-2023-24334.json
Normal file
20
CVE-2023/CVE-2023-243xx/CVE-2023-24334.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-24334",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T21:15:08.723",
|
||||
"lastModified": "2024-02-21T21:15:08.723",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stack overflow vulnerability in Tenda AC23 with firmware version US_AC23V1.0re_V16.03.07.45_cn_TDC01 allows attackers to run arbitrary commands via schedStartTime parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/caoyebo/CVE/tree/main/TENDA%20AC23%20-%20CVE-2023-24334",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-371xx/CVE-2023-37177.json
Normal file
20
CVE-2023/CVE-2023-371xx/CVE-2023-37177.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-37177",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T21:15:08.773",
|
||||
"lastModified": "2024-02-21T21:15:08.773",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in PMB Services PMB v.7.4.7 and before allows a remote unauthenticated attacker to execute arbitrary code via the query parameter in the /admin/convert/export_z3950.php endpoint."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-388xx/CVE-2023-38844.json
Normal file
20
CVE-2023/CVE-2023-388xx/CVE-2023-38844.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-38844",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T21:15:08.840",
|
||||
"lastModified": "2024-02-21T21:15:08.840",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in PMB v.7.4.7 and earlier allows a remote attacker to execute arbitrary code via the thesaurus parameter in export_skos.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42503",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-09-14T08:15:08.057",
|
||||
"lastModified": "2023-10-20T15:15:12.170",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-02-21T21:27:10.477",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -40,8 +40,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -85,7 +95,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20231020-0003/",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44981",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-10-11T12:15:11.760",
|
||||
"lastModified": "2023-11-01T07:15:09.027",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-02-21T21:10:46.910",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -78,6 +78,31 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
@ -99,11 +124,18 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00029.html",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5544",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-518xx/CVE-2023-51828.json
Normal file
20
CVE-2023/CVE-2023-518xx/CVE-2023-51828.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-51828",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T22:15:48.960",
|
||||
"lastModified": "2024-02-21T22:15:48.960",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL Injection vulnerability in /admin/convert/export.class.php in PMB 7.4.7 and earlier versions allows remote unauthenticated attackers to execute arbitrary SQL commands via the query parameter in get_next_notice function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-521xx/CVE-2023-52153.json
Normal file
20
CVE-2023/CVE-2023-521xx/CVE-2023-52153.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-52153",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T22:15:49.023",
|
||||
"lastModified": "2024-02-21T22:15:49.023",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL Injection vulnerability in /pmb/opac_css/includes/sessions.inc.php in PMB 7.4.7 and earlier allows remote unauthenticated attackers to inject arbitrary SQL commands via the PmbOpac-LOGIN cookie value."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-521xx/CVE-2023-52154.json
Normal file
20
CVE-2023/CVE-2023-521xx/CVE-2023-52154.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-52154",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T22:15:49.073",
|
||||
"lastModified": "2024-02-21T22:15:49.073",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "File Upload vulnerability in pmb/camera_upload.php in PMB 7.4.7 and earlier allows attackers to run arbitrary code via upload of crafted PHTML files."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-521xx/CVE-2023-52155.json
Normal file
20
CVE-2023/CVE-2023-521xx/CVE-2023-52155.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-52155",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T22:15:49.117",
|
||||
"lastModified": "2024-02-21T22:15:49.117",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL Injection vulnerability in /admin/sauvegarde/run.php in PMB 7.4.7 and earlier allows remote authenticated attackers to execute arbitrary SQL commands via the sauvegardes variable through the /admin/sauvegarde/run.php endpoint."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0822",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-25T16:15:08.743",
|
||||
"lastModified": "2024-02-08T13:15:08.643",
|
||||
"lastModified": "2024-02-21T21:15:08.900",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -98,6 +98,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:0934",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-0822",
|
||||
"source": "secalert@redhat.com",
|
||||
|
59
CVE-2024/CVE-2024-236xx/CVE-2024-23654.json
Normal file
59
CVE-2024/CVE-2024-236xx/CVE-2024-23654.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-23654",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-02-21T21:15:09.060",
|
||||
"lastModified": "2024-02-21T21:15:09.060",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "discourse-ai is the AI plugin for the open-source discussion platform Discourse. Prior to commit 94ba0dadc2cf38e8f81c3936974c167219878edd, interactions with different AI services are vulnerable to admin-initiated SSRF attacks. Versions of the plugin that include commit 94ba0dadc2cf38e8f81c3936974c167219878edd contain a patch. As a workaround, one may disable the discourse-ai plugin.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/discourse/discourse-ai/commit/94ba0dadc2cf38e8f81c3936974c167219878edd",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/discourse/discourse-ai/security/advisories/GHSA-32cj-rm2q-22cc",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
87
CVE-2024/CVE-2024-251xx/CVE-2024-25124.json
Normal file
87
CVE-2024/CVE-2024-251xx/CVE-2024-25124.json
Normal file
@ -0,0 +1,87 @@
|
||||
{
|
||||
"id": "CVE-2024-25124",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-02-21T21:15:09.250",
|
||||
"lastModified": "2024-02-21T21:15:09.250",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Fiber is a web framework written in go. Prior to version 2.52.1, the CORS middleware allows for insecure configurations that could potentially expose the application to multiple CORS-related vulnerabilities. Specifically, it allows setting the Access-Control-Allow-Origin header to a wildcard (`*`) while also having the Access-Control-Allow-Credentials set to true, which goes against recommended security best practices. The impact of this misconfiguration is high as it can lead to unauthorized access to sensitive user data and expose the system to various types of attacks listed in the PortSwigger article linked in the references. Version 2.52.1 contains a patch for this issue. As a workaround, users may manually validate the CORS configurations in their implementation to ensure that they do not allow a wildcard origin when credentials are enabled. The browser fetch api, as well as browsers and utilities that enforce CORS policies, are not affected by this."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-346"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-942"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://blog.portswigger.net/2016/10/exploiting-cors-misconfigurations-for.html",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://codeql.github.com/codeql-query-help/javascript/js-cors-misconfiguration-for-credentials",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS/Errors/CORSNotSupportingCredentials",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://fetch.spec.whatwg.org/#cors-protocol-and-credentials",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gofiber/fiber/commit/f0cd3b44b086544a37886232d0530601f2406c23",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gofiber/fiber/releases/tag/v2.52.1",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gofiber/fiber/security/advisories/GHSA-fmg4-x8pw-hjhg",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://saturncloud.io/blog/cors-cannot-use-wildcard-in-accesscontrolalloworigin-when-credentials-flag-is-true",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
49
README.md
49
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-02-21T21:00:24.703311+00:00
|
||||
2024-02-21T23:00:25.482001+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-02-21T20:57:31.090000+00:00
|
||||
2024-02-21T22:15:49.117000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,39 +29,38 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
239143
|
||||
239156
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `13`
|
||||
|
||||
* [CVE-2023-50975](CVE-2023/CVE-2023-509xx/CVE-2023-50975.json) (`2024-02-21T19:15:08.373`)
|
||||
* [CVE-2023-6533](CVE-2023/CVE-2023-65xx/CVE-2023-6533.json) (`2024-02-21T20:15:46.283`)
|
||||
* [CVE-2023-6640](CVE-2023/CVE-2023-66xx/CVE-2023-6640.json) (`2024-02-21T20:15:46.497`)
|
||||
* [CVE-2024-1707](CVE-2024/CVE-2024-17xx/CVE-2024-1707.json) (`2024-02-21T19:15:08.453`)
|
||||
* [CVE-2024-22473](CVE-2024/CVE-2024-224xx/CVE-2024-22473.json) (`2024-02-21T19:15:08.813`)
|
||||
* [CVE-2024-24476](CVE-2024/CVE-2024-244xx/CVE-2024-24476.json) (`2024-02-21T19:15:09.030`)
|
||||
* [CVE-2024-24479](CVE-2024/CVE-2024-244xx/CVE-2024-24479.json) (`2024-02-21T19:15:09.077`)
|
||||
* [CVE-2024-25381](CVE-2024/CVE-2024-253xx/CVE-2024-25381.json) (`2024-02-21T19:15:09.123`)
|
||||
* [CVE-2024-25249](CVE-2024/CVE-2024-252xx/CVE-2024-25249.json) (`2024-02-21T20:15:46.670`)
|
||||
* [CVE-2024-25461](CVE-2024/CVE-2024-254xx/CVE-2024-25461.json) (`2024-02-21T20:15:46.727`)
|
||||
* [CVE-2024-26310](CVE-2024/CVE-2024-263xx/CVE-2024-26310.json) (`2024-02-21T20:15:46.800`)
|
||||
* [CVE-2024-26311](CVE-2024/CVE-2024-263xx/CVE-2024-26311.json) (`2024-02-21T20:15:46.967`)
|
||||
* [CVE-2023-24330](CVE-2023/CVE-2023-243xx/CVE-2023-24330.json) (`2024-02-21T21:15:08.503`)
|
||||
* [CVE-2023-24331](CVE-2023/CVE-2023-243xx/CVE-2023-24331.json) (`2024-02-21T21:15:08.567`)
|
||||
* [CVE-2023-24332](CVE-2023/CVE-2023-243xx/CVE-2023-24332.json) (`2024-02-21T21:15:08.617`)
|
||||
* [CVE-2023-24333](CVE-2023/CVE-2023-243xx/CVE-2023-24333.json) (`2024-02-21T21:15:08.673`)
|
||||
* [CVE-2023-24334](CVE-2023/CVE-2023-243xx/CVE-2023-24334.json) (`2024-02-21T21:15:08.723`)
|
||||
* [CVE-2023-37177](CVE-2023/CVE-2023-371xx/CVE-2023-37177.json) (`2024-02-21T21:15:08.773`)
|
||||
* [CVE-2023-38844](CVE-2023/CVE-2023-388xx/CVE-2023-38844.json) (`2024-02-21T21:15:08.840`)
|
||||
* [CVE-2023-51828](CVE-2023/CVE-2023-518xx/CVE-2023-51828.json) (`2024-02-21T22:15:48.960`)
|
||||
* [CVE-2023-52153](CVE-2023/CVE-2023-521xx/CVE-2023-52153.json) (`2024-02-21T22:15:49.023`)
|
||||
* [CVE-2023-52154](CVE-2023/CVE-2023-521xx/CVE-2023-52154.json) (`2024-02-21T22:15:49.073`)
|
||||
* [CVE-2023-52155](CVE-2023/CVE-2023-521xx/CVE-2023-52155.json) (`2024-02-21T22:15:49.117`)
|
||||
* [CVE-2024-23654](CVE-2024/CVE-2024-236xx/CVE-2024-23654.json) (`2024-02-21T21:15:09.060`)
|
||||
* [CVE-2024-25124](CVE-2024/CVE-2024-251xx/CVE-2024-25124.json) (`2024-02-21T21:15:09.250`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `8`
|
||||
Recently modified CVEs: `6`
|
||||
|
||||
* [CVE-2002-0725](CVE-2002/CVE-2002-07xx/CVE-2002-0725.json) (`2024-02-21T20:38:22.460`)
|
||||
* [CVE-2020-27833](CVE-2020/CVE-2020-278xx/CVE-2020-27833.json) (`2024-02-21T20:55:45.830`)
|
||||
* [CVE-2020-3452](CVE-2020/CVE-2020-34xx/CVE-2020-3452.json) (`2024-02-21T20:57:31.090`)
|
||||
* [CVE-2021-21272](CVE-2021/CVE-2021-212xx/CVE-2021-21272.json) (`2024-02-21T20:39:19.723`)
|
||||
* [CVE-2023-22392](CVE-2023/CVE-2023-223xx/CVE-2023-22392.json) (`2024-02-21T20:08:50.277`)
|
||||
* [CVE-2023-4194](CVE-2023/CVE-2023-41xx/CVE-2023-4194.json) (`2024-02-21T20:37:17.953`)
|
||||
* [CVE-2024-1708](CVE-2024/CVE-2024-17xx/CVE-2024-1708.json) (`2024-02-21T19:15:08.683`)
|
||||
* [CVE-2024-1709](CVE-2024/CVE-2024-17xx/CVE-2024-1709.json) (`2024-02-21T19:15:08.747`)
|
||||
* [CVE-2010-3322](CVE-2010/CVE-2010-33xx/CVE-2010-3322.json) (`2024-02-21T21:08:34.413`)
|
||||
* [CVE-2020-25644](CVE-2020/CVE-2020-256xx/CVE-2020-25644.json) (`2024-02-21T21:08:54.470`)
|
||||
* [CVE-2021-39155](CVE-2021/CVE-2021-391xx/CVE-2021-39155.json) (`2024-02-21T21:01:31.320`)
|
||||
* [CVE-2023-44981](CVE-2023/CVE-2023-449xx/CVE-2023-44981.json) (`2024-02-21T21:10:46.910`)
|
||||
* [CVE-2023-42503](CVE-2023/CVE-2023-425xx/CVE-2023-42503.json) (`2024-02-21T21:27:10.477`)
|
||||
* [CVE-2024-0822](CVE-2024/CVE-2024-08xx/CVE-2024-0822.json) (`2024-02-21T21:15:08.900`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user