Auto-Update: 2024-01-13T00:55:23.897752+00:00

This commit is contained in:
cad-safe-bot 2024-01-13 00:55:27 +00:00
parent 5220b1e9cc
commit e45af9d437
10 changed files with 385 additions and 58 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-4962",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-12T22:15:44.877",
"lastModified": "2024-01-12T22:15:44.877",
"lastModified": "2024-01-12T23:15:08.440",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "** DISPUTED ** A vulnerability was found in Apollo 2.0.0/2.0.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /users of the component Configuration Center. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. VDB-250430 is the identifier assigned to this vulnerability. NOTE: The maintainer explains that user data information like user id, name, and email are not sensitive."
"value": "A vulnerability was found in Apollo 2.0.0/2.0.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /users of the component Configuration Center. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. VDB-250430 is the identifier assigned to this vulnerability. NOTE: The maintainer explains that user data information like user id, name, and email are not sensitive."
}
],
"metrics": {

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-48166",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-12T23:15:08.727",
"lastModified": "2024-01-12T23:15:08.727",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A directory traversal vulnerability in the SOAP Server integrated in Atos Unify OpenScape Voice V10 before V10R3.26.1 allows a remote attacker to view the contents of arbitrary files in the local file system. An unauthenticated attacker might obtain sensitive files that allow for the compromise of the underlying system."
}
],
"metrics": {},
"references": [
{
"url": "https://labs.integrity.pt/advisories/cve-2023-48166/",
"source": "cve@mitre.org"
},
{
"url": "https://networks.unify.com/security/advisories/OBSO-2401-01.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-0230",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-12T23:15:08.847",
"lastModified": "2024-01-12T23:15:08.847",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A session management issue was addressed with improved checks. This issue is fixed in Magic Keyboard Firmware Update 2.0.6. An attacker with physical access to the accessory may be able to extract its Bluetooth pairing key and monitor Bluetooth traffic."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214050",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-0474",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-12T23:15:08.890",
"lastModified": "2024-01-12T23:15:08.890",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in code-projects Dormitory Management System 1.0. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250579."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/yingqian1984/FirePunch/blob/main/7-Dormitory%20Management%20System%20has%20SQL%20injection%20vulnerabilities%20login.php.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.250579",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.250579",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-0475",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-13T00:15:43.943",
"lastModified": "2024-01-13T00:15:43.943",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in code-projects Dormitory Management System 1.0. Affected by this issue is some unknown functionality of the file modifyuser.php. The manipulation of the argument user_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250580."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/yingqian1984/FirePunch/blob/main/7-Dormitory%20Management%20System%20has%20SQL%20injection%20vulnerabilities%20modifyuser.php.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.250580",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.250580",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-20674",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-01-09T18:15:50.473",
"lastModified": "2024-01-09T19:56:14.023",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-12T23:15:09.320",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Windows Kerberos Security Feature Bypass Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad Kerberos de Windows"
}
],
"metrics": {
@ -17,20 +21,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-22137",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-01-13T00:15:44.187",
"lastModified": "2024-01-13T00:15:44.187",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MailMunch Constant Contact Forms by MailMunch allows Stored XSS.This issue affects Constant Contact Forms by MailMunch: from n/a through 2.0.11.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/constant-contact-forms-by-mailmunch/wordpress-constant-contact-forms-by-mailmunch-plugin-2-0-11-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-22142",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-01-13T00:15:44.383",
"lastModified": "2024-01-13T00:15:44.383",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cozmoslabs Profile Builder Pro allows Reflected XSS.This issue affects Profile Builder Pro: from n/a through 3.10.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/profile-builder-pro/wordpress-profile-builder-pro-plugin-3-10-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-23301",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-12T23:15:10.030",
"lastModified": "2024-01-12T23:15:10.030",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Relax-and-Recover (aka ReaR) through 2.7 creates a world-readable initrd when using GRUB_RESCUE=y. This allows local attackers to gain access to system secrets otherwise only readable by root."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/rear/rear/issues/3122",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/rear/rear/pull/3123",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-01-12T23:00:24.733670+00:00
2024-01-13T00:55:23.897752+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-01-12T22:22:40.437000+00:00
2024-01-13T00:15:44.383000+00:00
```
### Last Data Feed Release
@ -29,59 +29,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
235808
235815
```
### CVEs added in the last Commit
Recently added CVEs: `17`
Recently added CVEs: `7`
* [CVE-2022-4962](CVE-2022/CVE-2022-49xx/CVE-2022-4962.json) (`2024-01-12T22:15:44.877`)
* [CVE-2023-42463](CVE-2023/CVE-2023-424xx/CVE-2023-42463.json) (`2024-01-12T21:15:09.117`)
* [CVE-2023-48297](CVE-2023/CVE-2023-482xx/CVE-2023-48297.json) (`2024-01-12T21:15:09.340`)
* [CVE-2023-49098](CVE-2023/CVE-2023-490xx/CVE-2023-49098.json) (`2024-01-12T21:15:09.540`)
* [CVE-2023-49099](CVE-2023/CVE-2023-490xx/CVE-2023-49099.json) (`2024-01-12T21:15:09.747`)
* [CVE-2023-49801](CVE-2023/CVE-2023-498xx/CVE-2023-49801.json) (`2024-01-12T21:15:09.943`)
* [CVE-2023-51698](CVE-2023/CVE-2023-516xx/CVE-2023-51698.json) (`2024-01-12T21:15:10.150`)
* [CVE-2023-49647](CVE-2023/CVE-2023-496xx/CVE-2023-49647.json) (`2024-01-12T22:15:45.130`)
* [CVE-2024-0468](CVE-2024/CVE-2024-04xx/CVE-2024-0468.json) (`2024-01-12T21:15:10.350`)
* [CVE-2024-0469](CVE-2024/CVE-2024-04xx/CVE-2024-0469.json) (`2024-01-12T21:15:10.573`)
* [CVE-2024-0470](CVE-2024/CVE-2024-04xx/CVE-2024-0470.json) (`2024-01-12T21:15:10.800`)
* [CVE-2024-0471](CVE-2024/CVE-2024-04xx/CVE-2024-0471.json) (`2024-01-12T21:15:11.050`)
* [CVE-2024-21654](CVE-2024/CVE-2024-216xx/CVE-2024-21654.json) (`2024-01-12T21:15:11.287`)
* [CVE-2024-21655](CVE-2024/CVE-2024-216xx/CVE-2024-21655.json) (`2024-01-12T21:15:11.510`)
* [CVE-2024-0472](CVE-2024/CVE-2024-04xx/CVE-2024-0472.json) (`2024-01-12T22:15:45.323`)
* [CVE-2024-0473](CVE-2024/CVE-2024-04xx/CVE-2024-0473.json) (`2024-01-12T22:15:45.533`)
* [CVE-2024-21639](CVE-2024/CVE-2024-216xx/CVE-2024-21639.json) (`2024-01-12T22:15:45.750`)
* [CVE-2023-48166](CVE-2023/CVE-2023-481xx/CVE-2023-48166.json) (`2024-01-12T23:15:08.727`)
* [CVE-2024-0230](CVE-2024/CVE-2024-02xx/CVE-2024-0230.json) (`2024-01-12T23:15:08.847`)
* [CVE-2024-0474](CVE-2024/CVE-2024-04xx/CVE-2024-0474.json) (`2024-01-12T23:15:08.890`)
* [CVE-2024-23301](CVE-2024/CVE-2024-233xx/CVE-2024-23301.json) (`2024-01-12T23:15:10.030`)
* [CVE-2024-0475](CVE-2024/CVE-2024-04xx/CVE-2024-0475.json) (`2024-01-13T00:15:43.943`)
* [CVE-2024-22137](CVE-2024/CVE-2024-221xx/CVE-2024-22137.json) (`2024-01-13T00:15:44.187`)
* [CVE-2024-22142](CVE-2024/CVE-2024-221xx/CVE-2024-22142.json) (`2024-01-13T00:15:44.383`)
### CVEs modified in the last Commit
Recently modified CVEs: `23`
Recently modified CVEs: `2`
* [CVE-2007-3798](CVE-2007/CVE-2007-37xx/CVE-2007-3798.json) (`2024-01-12T22:06:03.783`)
* [CVE-2022-20531](CVE-2022/CVE-2022-205xx/CVE-2022-20531.json) (`2024-01-12T21:57:29.507`)
* [CVE-2022-4949](CVE-2022/CVE-2022-49xx/CVE-2022-4949.json) (`2024-01-12T22:07:14.007`)
* [CVE-2022-21294](CVE-2022/CVE-2022-212xx/CVE-2022-21294.json) (`2024-01-12T22:13:35.553`)
* [CVE-2022-4903](CVE-2022/CVE-2022-49xx/CVE-2022-4903.json) (`2024-01-12T22:17:50.847`)
* [CVE-2023-51441](CVE-2023/CVE-2023-514xx/CVE-2023-51441.json) (`2024-01-12T21:04:54.340`)
* [CVE-2023-6801](CVE-2023/CVE-2023-68xx/CVE-2023-6801.json) (`2024-01-12T21:05:21.497`)
* [CVE-2023-4265](CVE-2023/CVE-2023-42xx/CVE-2023-4265.json) (`2024-01-12T21:58:32.967`)
* [CVE-2023-38201](CVE-2023/CVE-2023-382xx/CVE-2023-38201.json) (`2024-01-12T22:01:19.793`)
* [CVE-2023-4257](CVE-2023/CVE-2023-42xx/CVE-2023-4257.json) (`2024-01-12T22:03:42.873`)
* [CVE-2023-42663](CVE-2023/CVE-2023-426xx/CVE-2023-42663.json) (`2024-01-12T22:04:05.890`)
* [CVE-2023-5753](CVE-2023/CVE-2023-57xx/CVE-2023-5753.json) (`2024-01-12T22:04:24.617`)
* [CVE-2023-32439](CVE-2023/CVE-2023-324xx/CVE-2023-32439.json) (`2024-01-12T22:08:33.827`)
* [CVE-2023-44271](CVE-2023/CVE-2023-442xx/CVE-2023-44271.json) (`2024-01-12T22:09:08.133`)
* [CVE-2023-32636](CVE-2023/CVE-2023-326xx/CVE-2023-32636.json) (`2024-01-12T22:09:56.247`)
* [CVE-2023-0001](CVE-2023/CVE-2023-00xx/CVE-2023-0001.json) (`2024-01-12T22:10:50.817`)
* [CVE-2023-42788](CVE-2023/CVE-2023-427xx/CVE-2023-42788.json) (`2024-01-12T22:15:12.640`)
* [CVE-2023-20200](CVE-2023/CVE-2023-202xx/CVE-2023-20200.json) (`2024-01-12T22:15:56.067`)
* [CVE-2023-42464](CVE-2023/CVE-2023-424xx/CVE-2023-42464.json) (`2024-01-12T22:18:33.463`)
* [CVE-2023-0679](CVE-2023/CVE-2023-06xx/CVE-2023-0679.json) (`2024-01-12T22:22:40.437`)
* [CVE-2024-20664](CVE-2024/CVE-2024-206xx/CVE-2024-20664.json) (`2024-01-12T21:40:25.993`)
* [CVE-2024-20663](CVE-2024/CVE-2024-206xx/CVE-2024-20663.json) (`2024-01-12T21:45:42.930`)
* [CVE-2024-20662](CVE-2024/CVE-2024-206xx/CVE-2024-20662.json) (`2024-01-12T21:47:48.250`)
* [CVE-2022-4962](CVE-2022/CVE-2022-49xx/CVE-2022-4962.json) (`2024-01-12T23:15:08.440`)
* [CVE-2024-20674](CVE-2024/CVE-2024-206xx/CVE-2024-20674.json) (`2024-01-12T23:15:09.320`)
## Download and Usage