From de679f6e9955560a6a815b651b02e8b20914c3de Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 29 Dec 2024 19:03:42 +0000 Subject: [PATCH] Auto-Update: 2024-12-29T19:00:19.275056+00:00 --- CVE-2024/CVE-2024-130xx/CVE-2024-13017.json | 141 ++++++++++++++++++++ CVE-2024/CVE-2024-130xx/CVE-2024-13018.json | 141 ++++++++++++++++++++ README.md | 13 +- _state.csv | 8 +- 4 files changed, 293 insertions(+), 10 deletions(-) create mode 100644 CVE-2024/CVE-2024-130xx/CVE-2024-13017.json create mode 100644 CVE-2024/CVE-2024-130xx/CVE-2024-13018.json diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13017.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13017.json new file mode 100644 index 00000000000..bec4fabeb03 --- /dev/null +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13017.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-13017", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-29T17:15:05.873", + "lastModified": "2024-12-29T17:15:05.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PHPGurukul Maid Hiring Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/aboutus.php of the component About Us Page. The manipulation of the argument title leads to cross site scripting. The attack can be initiated remotely." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "baseScore": 3.3, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.289708", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.289708", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.470481", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13018.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13018.json new file mode 100644 index 00000000000..636d7078515 --- /dev/null +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13018.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-13018", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-29T18:15:05.027", + "lastModified": "2024-12-29T18:15:05.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PHPGurukul Maid Hiring Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/profile.php. The manipulation of the argument name leads to cross site scripting. The attack may be initiated remotely." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "baseScore": 3.3, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.289709", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.289709", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.470508", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index e11f6845303..2b6db0674ab 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-29T17:00:19.557521+00:00 +2024-12-29T19:00:19.275056+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-29T16:15:05.300000+00:00 +2024-12-29T18:15:05.027000+00:00 ``` ### Last Data Feed Release @@ -33,16 +33,15 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -275134 +275136 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `2` -- [CVE-2024-13014](CVE-2024/CVE-2024-130xx/CVE-2024-13014.json) (`2024-12-29T15:15:05.530`) -- [CVE-2024-13015](CVE-2024/CVE-2024-130xx/CVE-2024-13015.json) (`2024-12-29T16:15:05.100`) -- [CVE-2024-13016](CVE-2024/CVE-2024-130xx/CVE-2024-13016.json) (`2024-12-29T16:15:05.300`) +- [CVE-2024-13017](CVE-2024/CVE-2024-130xx/CVE-2024-13017.json) (`2024-12-29T17:15:05.873`) +- [CVE-2024-13018](CVE-2024/CVE-2024-130xx/CVE-2024-13018.json) (`2024-12-29T18:15:05.027`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index fe2898a6587..caeda33f006 100644 --- a/_state.csv +++ b/_state.csv @@ -245243,9 +245243,11 @@ CVE-2024-13008,0,0,9fab76a79510c5e7440ef1eb71b4757d894477f22e5ea95a048516ad378c0 CVE-2024-1301,0,0,a82904378c141da107f996cbfc3663893c64b71f2f3d06fe2a7b32b9cc0bfa85,2024-11-21T08:50:16.340000 CVE-2024-13012,0,0,3c34b6ff66f5cf3cf2d311b5b98382921182768bc4be51d4f1d7dede4a882efa,2024-12-29T12:15:04.970000 CVE-2024-13013,0,0,0814e500314d1ec4df226d4a432ddfe4b6c532ec8f7914a193db5e2d4c565465,2024-12-29T14:15:04.933000 -CVE-2024-13014,1,1,5f46de2838cfcaeaeeff355c5a0b514cfeea34891baeb926e426935565d03f87,2024-12-29T15:15:05.530000 -CVE-2024-13015,1,1,3dcd014dbef30b2e70ec20ccecdaaf615115de618369fe62c340a42e4d8d8a66,2024-12-29T16:15:05.100000 -CVE-2024-13016,1,1,b67ea70e64cef9d4f2f5d631157f934916ce9c950363c714e96ab8c161eaacc5,2024-12-29T16:15:05.300000 +CVE-2024-13014,0,0,5f46de2838cfcaeaeeff355c5a0b514cfeea34891baeb926e426935565d03f87,2024-12-29T15:15:05.530000 +CVE-2024-13015,0,0,3dcd014dbef30b2e70ec20ccecdaaf615115de618369fe62c340a42e4d8d8a66,2024-12-29T16:15:05.100000 +CVE-2024-13016,0,0,b67ea70e64cef9d4f2f5d631157f934916ce9c950363c714e96ab8c161eaacc5,2024-12-29T16:15:05.300000 +CVE-2024-13017,1,1,406d1ed5cbe2575a1a54010aafe73d57848810b7f6f5e6c2e0a9b1cec549270f,2024-12-29T17:15:05.873000 +CVE-2024-13018,1,1,083b5e4e2fa86246983f0fd476b84784f9dac25dcba6ed963c92124634ebb897,2024-12-29T18:15:05.027000 CVE-2024-1302,0,0,50e21539c22b43b4db748f33a4680786d0cd3b39c9a7a5fc858bc75c33660782,2024-11-21T08:50:16.467000 CVE-2024-1303,0,0,922ad92b627c1129d744b1f80cb5c88d28598a22649a8dddf52c9956281bb86f,2024-11-21T08:50:16.593000 CVE-2024-1304,0,0,7f3d377d10786bd7b29e3437adfa1f791151a43db698785def3901d685804d14,2024-11-21T08:50:16.717000