mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2024-04-15T02:00:31.232180+00:00
This commit is contained in:
parent
17a0ce3038
commit
f18f8253e1
55
CVE-2024/CVE-2024-298xx/CVE-2024-29836.json
Normal file
55
CVE-2024/CVE-2024-298xx/CVE-2024-29836.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29836",
|
||||
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"published": "2024-04-15T00:15:12.847",
|
||||
"lastModified": "2024-04-15T00:15:12.847",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control, allowing for an unauthenticated attacker to update and add user profiles within the application, and gain full access of the site."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-298xx/CVE-2024-29837.json
Normal file
59
CVE-2024/CVE-2024-298xx/CVE-2024-29837.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-29837",
|
||||
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"published": "2024-04-15T00:15:13.097",
|
||||
"lastModified": "2024-04-15T00:15:13.097",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below uses poor session management, allowing for an unauthenticated attacker to access administrator functionality if any other user is already signed in."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1390"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-298xx/CVE-2024-29838.json
Normal file
59
CVE-2024/CVE-2024-298xx/CVE-2024-29838.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-29838",
|
||||
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"published": "2024-04-15T00:15:13.307",
|
||||
"lastModified": "2024-04-15T00:15:13.307",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below does not proper sanitize user input, allowing for an unauthenticated attacker to crash the controller software"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-457"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-298xx/CVE-2024-29839.json
Normal file
59
CVE-2024/CVE-2024-298xx/CVE-2024-29839.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-29839",
|
||||
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"published": "2024-04-15T00:15:13.533",
|
||||
"lastModified": "2024-04-15T00:15:13.533",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_CARD, allowing for an unauthenticated attacker to return the card value data of any user\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-298xx/CVE-2024-29840.json
Normal file
59
CVE-2024/CVE-2024-298xx/CVE-2024-29840.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-29840",
|
||||
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"published": "2024-04-15T00:15:13.753",
|
||||
"lastModified": "2024-04-15T00:15:13.753",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_PIN_FIELDS, allowing for an unauthenticated attacker to return the pin value of any user\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-298xx/CVE-2024-29841.json
Normal file
59
CVE-2024/CVE-2024-298xx/CVE-2024-29841.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-29841",
|
||||
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"published": "2024-04-15T00:15:13.963",
|
||||
"lastModified": "2024-04-15T00:15:13.963",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_KEYS_FIELDS, allowing for an unauthenticated attacker to return the keys value of any user"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-298xx/CVE-2024-29842.json
Normal file
59
CVE-2024/CVE-2024-298xx/CVE-2024-29842.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-29842",
|
||||
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"published": "2024-04-15T00:15:14.167",
|
||||
"lastModified": "2024-04-15T00:15:14.167",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_ABACARD_FIELDS, allowing for an unauthenticated attacker to return the abacard field of any user"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-298xx/CVE-2024-29843.json
Normal file
59
CVE-2024/CVE-2024-298xx/CVE-2024-29843.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-29843",
|
||||
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"published": "2024-04-15T00:15:14.373",
|
||||
"lastModified": "2024-04-15T00:15:14.373",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on MOBILE_GET_USERS_LIST, allowing for an unauthenticated attacker to enumerate all users and their access levels\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-298xx/CVE-2024-29844.json
Normal file
55
CVE-2024/CVE-2024-298xx/CVE-2024-29844.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29844",
|
||||
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"published": "2024-04-15T00:15:14.573",
|
||||
"lastModified": "2024-04-15T00:15:14.573",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Default credentials on the Web Interface of Evolution Controller 2.x (123 and 123) allows anyone to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the password. There is no warning or prompt to ask the user to change the default password."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1392"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-37xx/CVE-2024-3766.json
Normal file
92
CVE-2024/CVE-2024-37xx/CVE-2024-3766.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3766",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-15T00:15:14.773",
|
||||
"lastModified": "2024-04-15T00:15:14.773",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in slowlyo OwlAdmin up to 3.5.7. Affected by this issue is some unknown functionality of the file /admin-api/upload_image of the component Image File Upload. The manipulation of the argument file leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-260606 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.4,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.3
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fubxx/CVE/blob/main/OwlAdmin-XSS.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.260606",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.260606",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.311886",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
25
README.md
25
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-14T23:55:29.351494+00:00
|
||||
2024-04-15T02:00:31.232180+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-14T23:15:46.650000+00:00
|
||||
2024-04-15T00:15:14.773000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,24 +27,29 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-04-14T00:00:20.251311+00:00
|
||||
2024-04-15T00:00:20.253820+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
245423
|
||||
245433
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `5`
|
||||
Recently added CVEs: `10`
|
||||
|
||||
- [CVE-2024-27462](CVE-2024/CVE-2024-274xx/CVE-2024-27462.json) (`2024-04-14T23:15:45.830`)
|
||||
- [CVE-2024-3762](CVE-2024/CVE-2024-37xx/CVE-2024-3762.json) (`2024-04-14T22:15:58.687`)
|
||||
- [CVE-2024-3763](CVE-2024/CVE-2024-37xx/CVE-2024-3763.json) (`2024-04-14T23:15:46.110`)
|
||||
- [CVE-2024-3764](CVE-2024/CVE-2024-37xx/CVE-2024-3764.json) (`2024-04-14T23:15:46.373`)
|
||||
- [CVE-2024-3765](CVE-2024/CVE-2024-37xx/CVE-2024-3765.json) (`2024-04-14T23:15:46.650`)
|
||||
- [CVE-2024-29836](CVE-2024/CVE-2024-298xx/CVE-2024-29836.json) (`2024-04-15T00:15:12.847`)
|
||||
- [CVE-2024-29837](CVE-2024/CVE-2024-298xx/CVE-2024-29837.json) (`2024-04-15T00:15:13.097`)
|
||||
- [CVE-2024-29838](CVE-2024/CVE-2024-298xx/CVE-2024-29838.json) (`2024-04-15T00:15:13.307`)
|
||||
- [CVE-2024-29839](CVE-2024/CVE-2024-298xx/CVE-2024-29839.json) (`2024-04-15T00:15:13.533`)
|
||||
- [CVE-2024-29840](CVE-2024/CVE-2024-298xx/CVE-2024-29840.json) (`2024-04-15T00:15:13.753`)
|
||||
- [CVE-2024-29841](CVE-2024/CVE-2024-298xx/CVE-2024-29841.json) (`2024-04-15T00:15:13.963`)
|
||||
- [CVE-2024-29842](CVE-2024/CVE-2024-298xx/CVE-2024-29842.json) (`2024-04-15T00:15:14.167`)
|
||||
- [CVE-2024-29843](CVE-2024/CVE-2024-298xx/CVE-2024-29843.json) (`2024-04-15T00:15:14.373`)
|
||||
- [CVE-2024-29844](CVE-2024/CVE-2024-298xx/CVE-2024-29844.json) (`2024-04-15T00:15:14.573`)
|
||||
- [CVE-2024-3766](CVE-2024/CVE-2024-37xx/CVE-2024-3766.json) (`2024-04-15T00:15:14.773`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
20
_state.csv
20
_state.csv
@ -243378,7 +243378,7 @@ CVE-2024-2745,0,0,21dd83e50808577458b12385abb6a5e6bc2a585cd70ef551295012e31869f5
|
||||
CVE-2024-27454,0,0,6d3a09532b89ef204254e66da503964dcbafd450b5bdda0990f449d144c8e54b,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000
|
||||
CVE-2024-27456,0,0,3292722b93148b4ab52923fa8e4498babe5b306f79794afb1b6b9f9d803c4911,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27462,1,1,ffc1613a8162349f9e85ee9ce86cbdc5073a2092a76bc9fd14c2d891290e403c,2024-04-14T23:15:45.830000
|
||||
CVE-2024-27462,0,0,ffc1613a8162349f9e85ee9ce86cbdc5073a2092a76bc9fd14c2d891290e403c,2024-04-14T23:15:45.830000
|
||||
CVE-2024-27474,0,0,eedd7f52a8e754286d0994212e940bbab5a78ce0f631ba173f8be2320f55c67f,2024-04-10T19:49:51.183000
|
||||
CVE-2024-27476,0,0,8cccfbd88a289b73ae2a82f1969e7e11b3256be620bf6a323e970ad5fee54963,2024-04-10T19:49:51.183000
|
||||
CVE-2024-27477,0,0,475b0780b17016d259d91214e57785f69e50a4f85e3c7b3b34cb0c00dc852aa4,2024-04-10T19:49:51.183000
|
||||
@ -244356,7 +244356,16 @@ CVE-2024-2983,0,0,23d5f9d4638c65dc43b0706ddf09d53e64a3d415ebcd6885079f6fe9d10c5f
|
||||
CVE-2024-29832,0,0,9f165dd8af7b150aedd8ba0e648c487f081558a3943c83b1f6267f1670f3eb8a,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29833,0,0,425a7917efe73a1770fcefa4ce4ec7e1a0c1da408936ec3b87fe92c30b675f21,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29834,0,0,fcb2204bebc95a769cbfbc7fb2ab65826176bce82e40b2c7464bcb200fbaac1b,2024-04-02T20:31:58.463000
|
||||
CVE-2024-29836,1,1,37e4cbfbd0c62fd1e658a8e84b366928b44e312be64057cf7e2b4fe4abf6ffa1,2024-04-15T00:15:12.847000
|
||||
CVE-2024-29837,1,1,f17756fb522a9e39a5905d0c4c9a7248e53b5b5c923422cb93441052e18a639e,2024-04-15T00:15:13.097000
|
||||
CVE-2024-29838,1,1,24f1232d2cd448e0457658913ca8918f08ce3b3ab5c4de21cbbff97efcd84d58,2024-04-15T00:15:13.307000
|
||||
CVE-2024-29839,1,1,b682176657620433b340ec7cfe7e7687d1614406cb337baba237d351bc3bf298,2024-04-15T00:15:13.533000
|
||||
CVE-2024-2984,0,0,4b5982b3c3e0e5e17ce3322c4c77f227ad9c5e510c9a2d4ef229246c4d0c5f67,2024-04-11T01:25:43.683000
|
||||
CVE-2024-29840,1,1,e0bf1336a8777f05d9ddff6cf61dfcb3c4a78e2ee7e7598df2b7d8f55e88ae24,2024-04-15T00:15:13.753000
|
||||
CVE-2024-29841,1,1,bf6d11f8ff0404b2beb5351f96a9cc308cffb274608eb7f51e441183d4b2ea09,2024-04-15T00:15:13.963000
|
||||
CVE-2024-29842,1,1,9fcd654a2b9c876cb5d73b31ac2983bb0f5f46f7812ffeaa12170dee8d6b58fd,2024-04-15T00:15:14.167000
|
||||
CVE-2024-29843,1,1,fe546397c94a00575ea363edd74f297119a8af5489577f632f47948f6fe7f2f2,2024-04-15T00:15:14.373000
|
||||
CVE-2024-29844,1,1,cc64152b8477f4266dbd6ddf7c24c949161e7a5b01c40ea0ed75920030365afd,2024-04-15T00:15:14.573000
|
||||
CVE-2024-2985,0,0,eae3273dd06632fb9083734fb3ca3d6279482f4638135d81e5659988419ffe7f,2024-04-11T01:25:43.773000
|
||||
CVE-2024-29858,0,0,ec21ad079a83cd076ada45f6eaa6cdca3318bb07ab260d892702dff1f9c09fde,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29859,0,0,1a3bc8759fdc8c10e013f96dddd14f2ff64d6c749aade8e9054f9e130df1726e,2024-03-21T12:58:51.093000
|
||||
@ -245418,7 +245427,8 @@ CVE-2024-3737,0,0,3ece3dc04e2a51c738908804fdc895437fedad772f68ffb6b51e1e486b0c00
|
||||
CVE-2024-3738,0,0,09bc2e3a802ac8f6c70c5517ac81e7b57f06695f5612a81cd6c91a0a61213828,2024-04-13T18:15:07.390000
|
||||
CVE-2024-3739,0,0,7ec4f828f90436048bb80fdf887bc8a60adc89dbf654d1396a79394bec55d21d,2024-04-13T19:15:53.757000
|
||||
CVE-2024-3740,0,0,cad4660a05c482b6800e402dcb0a2b908ba4751bb8506078e808ef0aee3e4761,2024-04-13T21:15:48.353000
|
||||
CVE-2024-3762,1,1,b191d101f4a9d645c7e9f95afa47f2c207df5b4c70ecd3749179a783e15e08f0,2024-04-14T22:15:58.687000
|
||||
CVE-2024-3763,1,1,262909d0950c7a3228e8fed8ae6373f18cbf0c3e21f14cf96c53b24e96840fc4,2024-04-14T23:15:46.110000
|
||||
CVE-2024-3764,1,1,4d189903af3cfe6d7249ff59c89b78dd404f54d55b4d90a0597a6d48e963acf9,2024-04-14T23:15:46.373000
|
||||
CVE-2024-3765,1,1,b3d1b16d269cee243522ba0b3be107f044389782884d6822e375f86a69fc36c5,2024-04-14T23:15:46.650000
|
||||
CVE-2024-3762,0,0,b191d101f4a9d645c7e9f95afa47f2c207df5b4c70ecd3749179a783e15e08f0,2024-04-14T22:15:58.687000
|
||||
CVE-2024-3763,0,0,262909d0950c7a3228e8fed8ae6373f18cbf0c3e21f14cf96c53b24e96840fc4,2024-04-14T23:15:46.110000
|
||||
CVE-2024-3764,0,0,4d189903af3cfe6d7249ff59c89b78dd404f54d55b4d90a0597a6d48e963acf9,2024-04-14T23:15:46.373000
|
||||
CVE-2024-3765,0,0,b3d1b16d269cee243522ba0b3be107f044389782884d6822e375f86a69fc36c5,2024-04-14T23:15:46.650000
|
||||
CVE-2024-3766,1,1,28f42c457ae28605580e5cf8d3ddbf5c4178184dcd9c90284dd7756c20e9f53b,2024-04-15T00:15:14.773000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user