Auto-Update: 2024-04-10T02:00:33.597454+00:00

This commit is contained in:
cad-safe-bot 2024-04-10 02:03:24 +00:00
parent 0b8f8e696b
commit daa2305d76
7 changed files with 388 additions and 14 deletions

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-40148",
"sourceIdentifier": "responsible-disclosure@pingidentity.com",
"published": "2024-04-10T00:15:09.630",
"lastModified": "2024-04-10T00:15:09.630",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Server-side request forgery (SSRF) in PingFederate allows unauthenticated http requests to attack network resources and consume server-side resources via forged HTTP POST requests.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "responsible-disclosure@pingidentity.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "responsible-disclosure@pingidentity.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://docs.pingidentity.com/r/en-us/pingfederate-120/tuj1708533127032",
"source": "responsible-disclosure@pingidentity.com"
},
{
"url": "https://www.pingidentity.com/en/resources/downloads/pingfederate/previous-releases.html",
"source": "responsible-disclosure@pingidentity.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-3119",
"sourceIdentifier": "41c37e40-543d-43a2-b660-2fee83ea851a",
"published": "2024-04-10T00:15:12.107",
"lastModified": "2024-04-10T00:15:12.107",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow vulnerability exists in all versions of sngrep since v0.4.2, due to improper handling of 'Call-ID' and 'X-Call-ID' SIP headers. The functions sip_get_callid and sip_get_xcallid in sip.c use the strncpy function to copy header contents into fixed-size buffers without checking the data length. This flaw allows remote attackers to execute arbitrary code or cause a denial of service (DoS) through specially crafted SIP messages.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "41c37e40-543d-43a2-b660-2fee83ea851a",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "41c37e40-543d-43a2-b660-2fee83ea851a",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/irontec/sngrep/pull/480/commits/73c15c82d14c69df311e05fa75da734faafd365f",
"source": "41c37e40-543d-43a2-b660-2fee83ea851a"
},
{
"url": "https://github.com/irontec/sngrep/releases/tag/v1.8.1",
"source": "41c37e40-543d-43a2-b660-2fee83ea851a"
},
{
"url": "https://pentraze.com/vulnerability-reports/",
"source": "41c37e40-543d-43a2-b660-2fee83ea851a"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-3120",
"sourceIdentifier": "41c37e40-543d-43a2-b660-2fee83ea851a",
"published": "2024-04-10T00:15:12.340",
"lastModified": "2024-04-10T00:15:12.340",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stack-buffer overflow vulnerability exists in all versions of sngrep since v1.4.1. The flaw is due to inadequate bounds checking when copying 'Content-Length' and 'Warning' headers into fixed-size buffers in the sip_validate_packet and sip_parse_extra_headers functions within src/sip.c. This vulnerability allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via crafted SIP\u00a0messages."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "41c37e40-543d-43a2-b660-2fee83ea851a",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "41c37e40-543d-43a2-b660-2fee83ea851a",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/irontec/sngrep/pull/480/commits/f229a5d31b0be6a6cc3ab4cd9bfa4a1b5c5714c6",
"source": "41c37e40-543d-43a2-b660-2fee83ea851a"
},
{
"url": "https://github.com/irontec/sngrep/releases/tag/v1.8.1",
"source": "41c37e40-543d-43a2-b660-2fee83ea851a"
},
{
"url": "https://pentraze.com/vulnerability-reports/",
"source": "41c37e40-543d-43a2-b660-2fee83ea851a"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3524",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-10T00:15:12.540",
"lastModified": "2024-04-10T00:15:12.540",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in Campcodes Online Event Management System 1.0. This issue affects some unknown processing of the file /views/process.php. The manipulation of the argument name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259895."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Event%20Management%20System/Online%20Event%20Management%20System%20-%20vuln%203.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259895",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259895",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.312506",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3525",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-10T00:15:12.793",
"lastModified": "2024-04-10T00:15:12.793",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in Campcodes Online Event Management System 1.0. Affected is an unknown function of the file /views/index.php. The manipulation of the argument msg leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259896."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Event%20Management%20System/Online%20Event%20Management%20System%20-%20vuln%204.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259896",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259896",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.312507",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-09T23:55:29.557109+00:00
2024-04-10T02:00:33.597454+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-09T23:15:26.297000+00:00
2024-04-10T00:15:12.793000+00:00
```
### Last Data Feed Release
@ -27,24 +27,24 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-04-09T00:00:20.239596+00:00
2024-04-10T00:00:20.255980+00:00
```
### Total Number of included CVEs
```plain
244903
244908
```
### CVEs added in the last Commit
Recently added CVEs: `5`
- [CVE-2024-3313](CVE-2024/CVE-2024-33xx/CVE-2024-3313.json) (`2024-04-09T23:15:25.423`)
- [CVE-2024-3521](CVE-2024/CVE-2024-35xx/CVE-2024-3521.json) (`2024-04-09T23:15:25.737`)
- [CVE-2024-3522](CVE-2024/CVE-2024-35xx/CVE-2024-3522.json) (`2024-04-09T23:15:26.037`)
- [CVE-2024-3523](CVE-2024/CVE-2024-35xx/CVE-2024-3523.json) (`2024-04-09T23:15:26.297`)
- [CVE-2024-3556](CVE-2024/CVE-2024-35xx/CVE-2024-3556.json) (`2024-04-09T22:15:07.470`)
- [CVE-2023-40148](CVE-2023/CVE-2023-401xx/CVE-2023-40148.json) (`2024-04-10T00:15:09.630`)
- [CVE-2024-3119](CVE-2024/CVE-2024-31xx/CVE-2024-3119.json) (`2024-04-10T00:15:12.107`)
- [CVE-2024-3120](CVE-2024/CVE-2024-31xx/CVE-2024-3120.json) (`2024-04-10T00:15:12.340`)
- [CVE-2024-3524](CVE-2024/CVE-2024-35xx/CVE-2024-3524.json) (`2024-04-10T00:15:12.540`)
- [CVE-2024-3525](CVE-2024/CVE-2024-35xx/CVE-2024-3525.json) (`2024-04-10T00:15:12.793`)
### CVEs modified in the last Commit

View File

@ -228579,6 +228579,7 @@ CVE-2023-40142,0,0,d5a72dea9a0318cab919a5bf191445692aa0ad0a797e051a6aa9b8b7f53f5
CVE-2023-40143,0,0,8c978f8247b7423552e3d09442fe1fdea2e08675347e89ad16716858fe9c2f99,2024-02-13T22:02:22.543000
CVE-2023-40144,0,0,0056d58a6477acb16a5d607f5a3843be963e3f196d479797461e0908359c06f1,2023-08-29T14:34:01.297000
CVE-2023-40145,0,0,fc0133bc7728eb3878f4a5859c22bf60c367ee185da0135c40a479df331b812c,2023-10-26T14:26:42.150000
CVE-2023-40148,1,1,f9480f596e378ba7abeeea0f24ebcb1e97d5a19df34db1cf2a9ec622160a27b9,2024-04-10T00:15:09.630000
CVE-2023-4015,0,0,ffb821ba8a72e103b442ef841456a522cb0b0c89ec1113e0f3392baae2ce9537,2023-12-12T14:31:41.517000
CVE-2023-40150,0,0,0e872de5ba350ed9027dba969a6339b3e0651150b08d6545e648299241abca80,2023-11-07T04:20:07.803000
CVE-2023-40151,0,0,9431105ce9ddf1090a9e164bea663f282ddc71188eae991a83d3f63e68b003b0,2023-11-29T17:28:12.413000
@ -244654,6 +244655,8 @@ CVE-2024-31140,0,0,8ac72cdd6b5f7f56e71e87459ff46ad8714fcc8b963def523c845a786f9f6
CVE-2024-3116,0,0,442c5653c6cfe9feb902808d7a86b402a42b6c98e54ac39c11d1d128b28eb1d2,2024-04-04T16:33:06.610000
CVE-2024-3117,0,0,136fb5551ef6dfa1bf4e08424db43ed91a6bb8dd83f3d6ce39a5378e07bb201b,2024-04-01T01:12:59.077000
CVE-2024-3118,0,0,f6c34b2c6946d5fdb10aa55aa3b524d7a78d6b6fed9a90242c451ed5ef8e29f1,2024-04-01T01:12:59.077000
CVE-2024-3119,1,1,662535a1621b8ab46cf4e66489870f4960b930614ba2eda776ad3ddef15f8dc1,2024-04-10T00:15:12.107000
CVE-2024-3120,1,1,88f96d00430ba65418ecd1bda857ae238f511a1e06268c1b3420fbcf3caa0b18,2024-04-10T00:15:12.340000
CVE-2024-31204,0,0,d77d8a78ba72f2a1144250dcbd3aeb2b57d00c9418a1c9337730d8bd71684606,2024-04-05T12:40:52.763000
CVE-2024-31205,0,0,b253fd2658a692223bc8e40aabe86fdefb374b65b71659aad1a1d9f39a934ec9,2024-04-08T18:48:40.217000
CVE-2024-31206,0,0,bd1cbc8a5901cc2b410cb59c86ef8c814546918b6efc52403de5ae308d36d9dc,2024-04-05T12:40:52.763000
@ -244824,7 +244827,7 @@ CVE-2024-3296,0,0,bcc39314c1e9f6d53aa0ccc8e7e7cac7c279f7f6ee5a27f19287b128ea2ed6
CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f21,2024-04-04T16:33:06.610000
CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000
CVE-2024-3311,0,0,fdae3a838ab8d7960174e896ed4df4f0220eb58d7d9e06edfb8bc48c78cfd124,2024-04-05T12:40:52.763000
CVE-2024-3313,1,1,90877d59dbbd1fc2bb05cf980f27c4fc8c04c3f9b1c5c69f61fa73cfb1cb6a14,2024-04-09T23:15:25.423000
CVE-2024-3313,0,0,90877d59dbbd1fc2bb05cf980f27c4fc8c04c3f9b1c5c69f61fa73cfb1cb6a14,2024-04-09T23:15:25.423000
CVE-2024-3314,0,0,1bf793748b7ca2d665b157bc1b2bc90ac99fa8b35d4a0447ad9f365652349fa7,2024-04-05T12:40:52.763000
CVE-2024-3315,0,0,0420f58b267bbc99aea4d213036324de5dcedffd2eceb50b924a336f387693ef,2024-04-05T12:40:52.763000
CVE-2024-3316,0,0,1444bd7ef3d37273f79650663feec303d5173a142d9c7212c8d3d49e93eb50e1,2024-04-05T12:40:52.763000
@ -244897,8 +244900,10 @@ CVE-2024-3465,0,0,2c147ebdab1a9c2f236be45a5e3f17abf5dd87162f7d74a530cad5ba9d863b
CVE-2024-3466,0,0,4cdee9397ccb0cc6b86df3dd4a626bfe2bd945ea650bd37ea0096866891b044c,2024-04-09T12:48:04.090000
CVE-2024-3512,0,0,0914f55f9e6ec665d22c605cbda67688f9123dba3db52486e846c5d2265a418a,2024-04-09T19:15:41.050000
CVE-2024-3514,0,0,c31613a2af36e83407f0a5512febc068e3cbe8676f8360aa101de5784626002f,2024-04-09T19:15:41.213000
CVE-2024-3521,1,1,1bf500ac88c4e737d71f4fa8fbefdb0552bf9b52120631f776027218917edbd6,2024-04-09T23:15:25.737000
CVE-2024-3522,1,1,57bde4652cd7d90b0735eaf88dbeaa3cc69cd549096fbc47284e3c3a64ff014d,2024-04-09T23:15:26.037000
CVE-2024-3523,1,1,dc8898c3b569e17dd7f7a1de1ab94cb36d718f911ff4bd9f42f6c2bc92e0bd3e,2024-04-09T23:15:26.297000
CVE-2024-3521,0,0,1bf500ac88c4e737d71f4fa8fbefdb0552bf9b52120631f776027218917edbd6,2024-04-09T23:15:25.737000
CVE-2024-3522,0,0,57bde4652cd7d90b0735eaf88dbeaa3cc69cd549096fbc47284e3c3a64ff014d,2024-04-09T23:15:26.037000
CVE-2024-3523,0,0,dc8898c3b569e17dd7f7a1de1ab94cb36d718f911ff4bd9f42f6c2bc92e0bd3e,2024-04-09T23:15:26.297000
CVE-2024-3524,1,1,e42adb652441b7a7907bce3bea4480e04561a53779281eb759f732d6992941b3,2024-04-10T00:15:12.540000
CVE-2024-3525,1,1,b97ac339aa9bdc1857f8e56e867e4abfa405f3e1df8e4c9f8d8f156304d860a4,2024-04-10T00:15:12.793000
CVE-2024-3545,0,0,fba6d710a2b5b9bc76994807a45e940958f4950f064ba3fb1f181ea539886fb9,2024-04-09T19:15:41.380000
CVE-2024-3556,1,1,3585ee5c92a9c3d529b040dd670fbfee3d6182484f87bd29638348adaae5ce9a,2024-04-09T22:15:07.470000
CVE-2024-3556,0,0,3585ee5c92a9c3d529b040dd670fbfee3d6182484f87bd29638348adaae5ce9a,2024-04-09T22:15:07.470000

Can't render this file because it is too large.